Internet of things terminal secure access method and system based on edge computing

An Internet of Things terminal and edge computing technology, applied in security devices, transmission systems, transmission monitoring, etc., can solve problems such as heavy network traffic load, unstable network, and unreliable control

Active Publication Date: 2018-03-06
CERTUS NETWORK TECHNANJING
View PDF5 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The access of so many wireless sensors will inevitably bring about a series of security issues, such as secure transmission of massive data collection, secure access authentication, access control management, device data privacy protection, storage security, etc. The cloud system cannot meet real-time control, heavy network traffic load, unstable network, unreliable control, security and privacy protection cannot be guaranteed, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things terminal secure access method and system based on edge computing
  • Internet of things terminal secure access method and system based on edge computing
  • Internet of things terminal secure access method and system based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0044] Such as figure 1 As shown, a secure access method for IoT terminals based on edge computing includes the following steps:

[0045] S1. The edge computing device collects the radio frequency radiation signal for each legal sensing device separately, and obtains the collection result, among which, the result obtained by collecting the i-th legal sensing device is X i T =(x <1>T i ,x <2>T i ,x <3>T i ,....,x <l>T i ), the result is the radio frequency radiation signal dataset sent by the ith legal sensing device, l=(1,2,...,h), h represents the number of signal samples collected;

[0046] S2. The edge computing device performs preprocessing and data transformation on the radio frequency signal data set sent by each legal sensi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of things terminal secure access method and system based on edge computing. The method comprises the steps that an edge computing device carries out radio frequencyradiation signal collection on each legal sensing device, thereby obtaining collection results; the edge computing device preprocesses each legal device signal, removes outliers and carries out datanormalization on collected signals of each time; the edge computing device generates features through utilization of the normalized data, extracts feature vectors to generate feature data sets and transmits the feature vector sets to a cloud server; and the cloud server selects a classification algorithm to generate a data model, trains the data model according to the feature data sets and transmits an obtained decision-making model to the edge computing device. According to the method and the system, the data processing and access judgment are carried out at the edge computing side, and the method and the system are applicable to an Internet of things device interconnection scheme with limited resources and have the advantages of low computing complexity and high authentication accuracy.

Description

technical field [0001] The invention relates to secure access of wireless terminals, in particular to a method and system for secure access of Internet of Things terminals based on edge computing. Background technique [0002] In the future wireless communication system, the number of smart devices pouring into the wireless network will increase exponentially. Whether it is smart city, smart home, smart logistics, telemedicine, Industry 4.0, smart grid, smart transmission, all will usher in the era of the Internet of Everything. According to CISCO's forecast, by 2020, there will be 26 billion IoT devices connected to the Internet [1]. The access of so many wireless sensors will inevitably bring about a series of security issues, such as secure transmission of massive data collection, secure access authentication, access control management, device data privacy protection, storage security, etc., using traditional cloud computing The cloud system cannot meet real-time contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04W12/06H04W12/08H04B17/391
CPCH04B17/391H04L63/10H04L67/10H04L67/125H04W12/06H04W12/08
Inventor 陈松林文红谢非佚陈宜陈洁
Owner CERTUS NETWORK TECHNANJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products