Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method and system for bypass attacks in smart home environment

A smart home, bypass attack technology, applied in the field of privacy protection, can solve the problems of user leakage, reducing the effect of privacy protection, and interfering with the real behavior of users

Active Publication Date: 2016-12-07
BEIJING UNIV OF TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The privacy protection effect of this model depends entirely on the accuracy of behavior prediction. If the behavior prediction fails, the added noise data will not be enough to interfere with the user's real behavior, and the user's behavior will be leaked, thereby reducing the effect of privacy protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and system for bypass attacks in smart home environment
  • Privacy protection method and system for bypass attacks in smart home environment
  • Privacy protection method and system for bypass attacks in smart home environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] Embodiment 1: as figure 1 As shown, the present invention provides a privacy protection method to deal with side-channel attacks in smart home environment, ①, analyze the data: analyze and collect sample data, and the analysis results will be used to guide the aggregation node label noise data; ②, semi-supervised learning : The aggregation node labels the noise data sent by the sensor nodes, and then calls the learning algorithm to learn to generate new learning parameters; ③. The sensor node user substitutes the learning parameters into the prediction model, and judges whether to send noise data according to the current network status. Its specific implementation process includes:

[0096] Step 1. Considering that people's living habits in different regions will be different, smart home suppliers extract sample data according to users in different geographical locations, where sample data refers to data generated by real smart home scenarios; sensor nodes obtain smart ...

Embodiment 2

[0131] Embodiment 2: as figure 2 As shown, the present invention provides a privacy protection system for dealing with bypass attacks in a smart home environment, including: a plurality of sensor nodes 1, a convergence node 2 and a cloud platform 3;

[0132] The sensor node 1 includes an acquisition module 1-1, a prediction module 1-2 and a judgment module 1-3; the acquisition module 1-1 is used to obtain sampling data, noise data and current network status information of the smart home for subsequent operations; Data includes sensor type and sensor send time;

[0133] The cloud platform 3 is connected to all sensor nodes 1, and is used to sort the sensor types and sensor sending times, cluster the sending frequency of each type of sensor in unit time, and calculate the average sending frequency of each cluster category, Get the DFR parameters; where:

[0134] Cloud platform 3 includes receiving module 3-1, sorting module 3-2, statistical module 3-3, standardization process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method and system for bypass attacks in a smart home environment. The method comprises the steps of performing sorting and clustering on sensor types and sensor sending time in the smart home environment to obtain DFR parameters; performing labeling on noise data through the DFR parameters, calling a semi-supervised learning algorithm to obtain learning parameters, and distributing the learning parameters to all sensor nodes; and substituting the learning parameters into a prediction function by the sensor nodes to build a prediction model, inputting current network state information into the prediction model, and judging whether the noise data is sent or not. According to the method and the system, the noise data can be adaptively added according to behavior habits of people and sensor network states in the smart home environment, so that a global attacker cannot analyze a real or wrong behavior of a user even if the global attacker can monitor all wireless radio-frequency signals, and the purpose of protecting user privacy is achieved.

Description

technical field [0001] The invention relates to the technical field of privacy protection, in particular to a privacy protection method and system for dealing with bypass attacks in a smart home environment. Background technique [0002] With the continuous advancement of technologies such as wireless communication and sensors, the emergence and development of the Internet of Things with cross-age significance has been promoted. The Internet of Things integrates many research disciplines and has become one of the hot spots in the IT field. As the main branch of the Internet of Things, smart home has received extensive attention and rapid development in recent years. The wireless sensors in the smart home can perceive, the emergence of the smart home brings great convenience to people's life, but also brings great challenges to the privacy of users in the smart home environment. Traditional encryption methods can ensure the security of data during transmission, but side-cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/28H04L9/00
CPCH04L9/002H04L12/2825H04L41/142H04L41/145H04L41/147
Inventor 何泾沙肖起常成月张亚君方静
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products