Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Restructurable Internet of things node intrusion detection method

A technology of intrusion detection and Internet of Things, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problem of no consideration of the security of perception data collection, calculation and transmission, high false alarm rate, weak real-time performance, etc. problem, to achieve the effect of improving flexibility and real-time performance and reducing energy consumption

Active Publication Date: 2012-04-18
INST OF MICROELECTRONICS CHINESE ACAD OF SCI
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the research on the intrusion detection system and algorithm of the Internet of Things has begun to receive attention, most of the research results are too theoretical and mainly focus on intrusions from the outside, while the security of the collection, calculation and transmission of the sensory data of the node itself performance has not been considered, and it is also lacking in flexibility and real-time performance
Especially for the intrusion specificity and practicality of combining internal and external after connecting multiple sensing sensors on one IoT end node, the research has not been reported yet.
Therefore, there is an urgent need for new intrusion detection strategies that can solve existing problems such as complex algorithms, weak real-time performance, high false alarm rate, and one-sided detection.
In addition, most of the existing Internet of Things intrusion detection systems have transplanted the solution ideas of the Internet, and the detection methods are mainly concentrated on the software level, without paying attention to the hidden dangers of the Internet of Things, which are different from the Internet, mainly because the perception source is untrustworthy and easy to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Restructurable Internet of things node intrusion detection method
  • Restructurable Internet of things node intrusion detection method
  • Restructurable Internet of things node intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention establishes a reconfigurable Internet of Things intrusion detection method, wherein gate level information flow tracking technology (gate level information flow tracking, GLIFT) is used to establish reconfigurable security "hot spot" tracking. The basic principles are as follows:

[0030] Let the original logic be f = f n ( A 1 , A 2 , . . . , A n , A 1 ‾ , A 2 ‾ , . . . A n ‾ ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a restructurable Internet of things node intrusion detection method. The method comprises the following steps: (1) in a data fusion process, according to logic operation relation, information flow logic relation is established, and an intrusion detection engine is formed according to the information flow logic relation; (2) intrusion detection engine multi-threshold scanning is carried out, and a sensor node which exceeds a threshold set label data source; (3) the sensor node which set the label data source carries out logic operation, according to an operation result, whether the set label data source has influence on the sensor node or not is determined, and if so, the sensor node which set the label data source stops sending data from the sensor node which set the label data source, otherwise, the sensor node continues to send the data from the sensor node which set the label data source. According to the invention, by utilizing a reconstruction characteristic of a programmable logic device and a characteristic of a multi-source fusion Internet of things, security monitoring is carried out on hardware level information flow of an Internet of things node, positioning and isolation of intrusion attacking are facilitated, and flexibility and real time performance of a present intrusion detection system of an Internet of things are raised.

Description

technical field [0001] The invention relates to the technical field of Internet of Things and network security, in particular to a reconfigurable method for detecting node intrusion of Internet of Things. Background technique [0002] Intrusion Detection (Intrusion Detection) is a defense concept that already exists in network security. It refers to the technology that detects violations of security policies in the network. It can detect and report unauthorized or abnormal phenomena in the system in time. It is the first step to ensure network system security Two barriers. The research on intrusion detection in the Internet of Things (mostly for wireless sensor networks) mainly includes two parts: detection system and detection algorithm. [0003] The detection system mainly includes a separate detection system, a peer-to-peer detection system and a hierarchical detection system. The discrete detection system is based on a distributed anomaly detection structure scheme bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
Inventor 李莹陈岚佟鑫
Owner INST OF MICROELECTRONICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products