Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for security verification of a smart home Internet of Things system under attack

An Internet of Things system and security verification technology, which is applied in the field of security evaluation and verification of the smart home Internet of Things system, can solve the problems of the complex situation of smart home equipment and the inability to verify the security of the smart home system, and achieve the effect of good adaptability

Active Publication Date: 2021-07-30
NANJING UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The situation when smart home devices are attacked by external networks is further complicated by the uncertainty of IFTTT rules
Therefore, ordinary methods cannot verify the security of smart home systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for security verification of a smart home Internet of Things system under attack
  • A method and device for security verification of a smart home Internet of Things system under attack
  • A method and device for security verification of a smart home Internet of Things system under attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0030] A method for security verification of a smart home Internet of Things system under attack of the present invention comprises the following steps:

[0031] S1: data acquisition step;

[0032] S2: Construction steps of finite automata model;

[0033] S3: Formal specification construction steps;

[0034] S4: Model description document content construction steps;

[0035] S5: The step of verifying the system security by the model checking tool;

[0036] S6: A step of finding out the smart home devices and related IFTTT rules that cause the system to be unsafe.

[0037] The "data" in the step S1 of data acquisition consists of three parts: the first part is the description information of smart home devices, the second part is the IFTTT rules between smart home devices, and the third part is the prohibited behavior parameters of attack intensity devices....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for security verification of a smart home internet of things system being attacked. The present invention constructs a finite state machine model according to device description information and IFTTT rules, constructs a formalized protocol according to a preset protocol template and input parameters, and then uses a model checking tool to verify the correctness of the finite state machine model whether it satisfies the formalized protocol , find out the smart home devices and related IFTTT rules that cause the system to be unsafe through the counterexample path of the output of the model checking tool. When constructing the finite state machine model, the state parameter of whether each smart home device is attacked is introduced, and the attack intensity parameter is introduced globally when the formal specification is constructed. Among them, the attack intensity is the number of smart home devices under attack. The present invention verifies whether the smart home Internet of Things system is safe when it is attacked by common external networks through the introduction of the status parameter of whether it is attacked or not and the attack intensity parameter.

Description

technical field [0001] The invention relates to the security evaluation and verification of the smart home Internet of things system. Background technique [0002] Smart home devices are limited by capacity and resources, and there are many security holes, and after many devices leave the factory, their built-in operating systems will not be changed or supervised. Therefore, smart home devices are more vulnerable to external network attacks than traditional computer smart home devices. Common forms of attack include information leakage, device imitation, DoS attack, etc. The final attack result is reflected in the control of the data of the sensor device and the destruction of the data link connecting the device. Therefore, the smart home system not only provides users with diverse and powerful functions, but also provides hackers with new possibilities. It may even happen without the user's knowledge. [0003] On the other hand, with the increase in the number and types o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G05B19/418G05B15/02
CPCH04L63/1416H04L67/12G05B19/418G05B15/02G05B2219/2642H04L63/1433H04L63/20G05B23/0235G05B19/042H04L63/1466
Inventor 卜磊张秋萍张时雨王熙灶沈思远王林章李宣东
Owner NANJING UNIV