Unlock instant, AI-driven research and patent intelligence for your innovation.

A data acquisition method for anti-malicious attack sensor based on recurrent neural network

A technology of cyclic neural network and malicious attack, which is applied in the field of anti-malicious attack sensor data collection based on cyclic neural network, can solve the problem of not being able to adapt to the new trend of digitization, intelligence and networking of Internet of Things devices, and not considering multi-source sensor data Problems such as internal correlation logic and lack of active response strategies for simple attacks can achieve the effect of improving prediction fitness, ensuring rationality, and improving reliability

Active Publication Date: 2021-08-17
CHANGAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in terms of the reasonable, safe and reliable new requirements of sensor data in the Internet of Things, the existing solutions have the disadvantages of simple algorithms and low intelligence, and cannot adapt to the new trend of digitalization, intelligence and networking of Internet of Things devices.
In particular, the above two solutions have obvious shortcomings when actively defending against increasingly severe and complex cyberspace threats. For the method of multi-source sensor fusion, the internal correlation logic of multi-source sensor data is not considered, resulting in a high false alarm rate , and the main purpose of the single-source method is to improve the anti-noise ability of the data, lack of active response strategies for simple attacks, and the collection algorithm blindly trusts the hardware circuit, making the sensor a new entry point for malicious attacks in cyberspace

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data acquisition method for anti-malicious attack sensor based on recurrent neural network
  • A data acquisition method for anti-malicious attack sensor based on recurrent neural network
  • A data acquisition method for anti-malicious attack sensor based on recurrent neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention are described clearly and completely below. Obviously, the described embodiments are some embodiments of the present invention, not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] Aiming at the loopholes in the sensor data acquisition link, at the hardware design level, the hardware protection level can be increased to resist physical attacks from external sound waves and electromagnetic waves. New security requirements for intelligent bodies such as human and smart cars. Aiming at the safety problem of single-source sensor data collection, the present invention adopts deep learning to improve the reliability of the coll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data acquisition method for anti-malicious attack sensors based on a cyclic neural network. Firstly, it proposes for the first time that the multivariate normal distribution function is used to detect abnormal data generated by malicious attack behaviors in real time, which improves the security of data transmission; secondly, When abnormal data is found, the cyclic neural network acceleration IP core based on the programmable logic gate array is called to quickly and intelligently predict the normal value of the sensor; finally, the cyclic neural network training data set is dynamically updated to improve the performance of the cyclic neural network for new sensors. The predicted fitness of the measured value ensures the rationality of the predicted data and further improves the reliability of data transmission. Moreover, this scheme also has the characteristics of low computational complexity and fast convergence speed, and is widely applicable to applications with limited computing resources. IoT edge devices.

Description

technical field [0001] The invention belongs to the security field of the Internet of Things, and in particular relates to a data collection method of anti-malicious attack sensors based on a cyclic neural network. Background technique [0002] Sensors are the main data acquisition devices at the front end of the Internet of Things, closely related to real physical objects, and provide time-series or location-related massive data for subsequent network transmission and cloud processing, so as to realize the intelligent purpose of collaborative perception and real-time monitoring of physical objects . With the widespread deployment of wireless access and sharing systems, sensor nodes are more likely to become the target of malicious attacks in cyberspace. Attackers can tamper or forge the original data of sensors, resulting in serious consequences such as misjudgment, failure, and loss of control of cloud systems. . Therefore, how to improve the accuracy, safety and reliabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06N3/04
Inventor 杨云倪园园杨继海段宗涛
Owner CHANGAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More