Unlock instant, AI-driven research and patent intelligence for your innovation.

A data fusion anti-tampering method based on input data compression representation association analysis

A technology of input data and data fusion, applied in the fields of digital data protection, instruments, computing, etc., can solve the problems of large redundant data processing and transmission, data fusion and processing inefficiency, inefficiency, etc., to prevent tampering, overcome potential Uncertainty, the effect of maintaining network security and good performance

Active Publication Date: 2020-07-17
INNER MONGOLIA UNIV OF TECH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this approach has obvious disadvantages: in the process of data fusion, relevant nodes need to process text according to specific encryption and decryption algorithms, and the efficiency of data fusion and processing is low
Some security fusion mechanisms to resist some malicious attacks require a large amount of redundant data processing and transmission, which is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data fusion anti-tampering method based on input data compression representation association analysis
  • A data fusion anti-tampering method based on input data compression representation association analysis
  • A data fusion anti-tampering method based on input data compression representation association analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the detailed description herein is only used to explain the present invention, not to limit the present invention.

[0037] figure 1 A flow chart of a data fusion anti-tampering mechanism according to an embodiment of the present invention is given. Generally speaking, the method includes:

[0038] Step 1), network node data feature compression: compress the original input data of network nodes to represent data features, so as to ensure the accuracy of data representation and shield the differences of different data types, specifically including:

[0039] Step 1.1), apply the hash function to compress and map the original input data into the Bloom filter.

[0040] first, t 1 The time slot collects the raw input data accepted by h sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data fusion anti-tampering method based on input data compression representation association analysis, the method includes a network node data feature compression mechanism, which compresses the original input data input to represent data features, ensures data representation accuracy, and shields different data The difference of types; the method includes a sub-dataset collection method based on the Boost principle, which divides the data set reasonably with equal probability of replacement to form the input data vector for training sub-classifiers; the method includes a method based on Adaboost The sub-classifier and tamper detection model construction method, using the divided sub-data sets to train the sub-classifier, and finally combining the sub-classifiers to build an AdaBoost classifier to predict the type of data vectors of related network nodes, and apply the voting principle to make the final prediction result , and use this mechanism to quickly identify tampered data fusion results and prevent malicious data fusion operations.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things data security, and in particular relates to a data fusion anti-tampering method based on input data compression representation association analysis. Background technique [0002] As an extension and expansion of the Internet, the Internet of Things is another major change in the field of information technology. The basic characteristics of the Internet of Things are comprehensive information perception, reliable transmission and intelligent processing. Physical information is obtained through sensing devices and transmitted to relevant service nodes through the network to realize the interconnection of people-things and things-things, and realize the intelligent identification, positioning, tracking, monitoring and management of entities in the physical world. [0003] The Internet of Things is a heterogeneous architecture composed of various supporting technologies; heterogeneous netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06K9/62
CPCG06F21/64G06F18/251G06F18/254
Inventor 张丽霞李文越刘利民王慧
Owner INNER MONGOLIA UNIV OF TECH