Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet-of-things terminal equipment communication protocol consistency security detection method

A technology for communication between IoT terminals and devices. It is used in error detection/correction, data exchange network, software testing/debugging, etc., and can solve problems such as the inability of the reader to receive data, the interruption of communication, and the inability of the base station to work normally.

Active Publication Date: 2019-12-13
STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +4
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The vulnerability of the communication link: The data transmission of the Internet of Things generally communicates by means of wireless radio frequency signals. The inherent vulnerability of wireless networks makes the system vulnerable to various forms of attack and interference
Attackers can transmit interference signals so that the reader cannot accept the data in the normal electronic tag, or the base station cannot work normally, causing communication interruption, and the communication status between the IoT terminal device and the remote server is out of sync, resulting in communication failure;
[0006] 2. Vulnerability of communication links: due to the development of wireless links, it is easy for attackers to invade the network by hijacking channels
However, there is no targeted testing method for the above-mentioned specific consistency security issues faced by the IoT terminal device communication protocol, and the traditional basic interconnection detection, capability detection, and behavior detection methods cannot effectively find the IoT terminal device in the face of Consistency security issues arising from asynchronous communication status and receipt of communication protocol messages containing malicious fields

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-things terminal equipment communication protocol consistency security detection method
  • Internet-of-things terminal equipment communication protocol consistency security detection method
  • Internet-of-things terminal equipment communication protocol consistency security detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The implementation process of how to apply technical means to solve technical problems and achieve technical effects in the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0041] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0042] Such as figure 1 Shown is the test environment system framework of the Internet of Things terminal device communication protocol consistency security detection method based on a unique input and output sequence: the Internet of Things terminal device 101, the Internet of Things communication protocol server 102, and the Internet of Things communication protocol consistency security detection system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet-of-things terminal equipment communication protocol consistency security detection method. The method comprises the following steps: 1, generating a formal description model for a communication protocol standard state machine; 2, generating a corresponding test case set based on the unique input / output sequence according to the formal description of the protocolstandard state machine, and further converting the test case set into an executable protocol interaction test case set according to the specific conditions of the detection environment and the testedequipment; and 3, executing the executable test case set, observing the external response of the tested equipment, carrying out content conformance judgment on the response output of the tested equipment, and judging whether the response output of the tested equipment is the same as the expected output of the protocol standard. According to the method, whether the communication protocol implementation of the Internet-of-things terminal equipment does not accord with the protocol standard can be rapidly detected, and potential safety hazards can be found in time.

Description

technical field [0001] The invention relates to a communication protocol security detection method, in particular to a consistency security detection method for a communication protocol of an Internet of Things device. Background technique [0002] With the rapid growth of the number of connected devices in the world, "Internet of Everything" has become an important direction for the future development of the global network. It is predicted that by 2025, the number of global IoT devices connected to the Internet will reach 25.2 billion, which will be widely used in many fields such as smart cities, smart transportation, smart production, and smart homes. At the same time, a series of security issues and threats related to it are also increasingly concerned by people. [0003] In the specific implementation process of the Internet of Things system, the consistency security detection of the communication protocol of the terminal equipment is an indispensable organic part. Si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26G06F11/36
CPCG06F11/3672G06F11/3684G06F11/3688H04L43/18
Inventor 徐江涛胡成博贾骏陶风波徐阳刘子全路永玲张照辉张军张国江杨景刚刘洋王真
Owner STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST