Unlock instant, AI-driven research and patent intelligence for your innovation.

Edge computing malicious node identification method

A technology of malicious nodes and identification methods, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of affecting the recognition accuracy, time-consuming, and low recognition accuracy.

Active Publication Date: 2020-03-24
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, the limited acquisition of channel information data makes it time-consuming when there is a certain amount of data required in feature extraction. If the amount of data is insufficient, the recognition accuracy will be low, which will affect the recognition accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge computing malicious node identification method
  • Edge computing malicious node identification method
  • Edge computing malicious node identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the technical solution of the present invention will be further described in detail below in conjunction with the channel frequency response based on deep neural network to identify malicious nodes, but the scope of protection of the present invention is not limited to the following .

[0024] Such as figure 1 As shown, deep neural networks have excellent fitting and classification capabilities, so using deep neural networks for malicious node identification has good performance. However, when the data set is relatively small, the deep neural network has its limitations, and the time correlation requirements for wireless channel information, or some other restrictive requirements, cannot obtain a relatively large channel sample set. Well, in cases where it is important to obtain a sufficient dataset from collecting channel responses within the relevant tim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an edge computing malicious node identification method. The method comprises the steps of collecting a channel information data set of a Kth node, generating an input sample set after average data enhancement, generating an output sample set after average sample construction, constructing a new channel information data set for identification training and the like. Accordingto the invention, a new channel response information vector is constructed by using the correlation between the collected continuous multi-frame channel information; that is to say, two or more timeslot channel frequency response vectors are averaged to obtain a new channel response vector, and the defect of low recognition rate caused by insufficient data volume in malicious node recognition bychannel information extraction channel features is overcome.

Description

technical field [0001] The invention relates to edge computing security computing, in particular to a method for identifying malicious nodes of edge computing. Background technique [0002] Edge computing, with its near-node deployment and the characteristics of the Internet of Things being close to the nodes of the Internet of Things, overcomes the long-distance transmission delay and computing load of the cloud computing center, slows down network congestion, and migrates some or all of the computing tasks of the original cloud computing model To network edge devices, the Internet of Things can better meet the needs of massive edge data, real-time, privacy protection, energy consumption and other major aspects. Therefore, edge computing has rich application scenarios, such as smart home, video surveillance, smart medical care , intelligent transportation, unmanned factories, smart grid and other applications. [0003] However, edge computing is close to many nodes. Nodes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L63/1408H04L41/14
Inventor 许爱东蒋屹新文红张宇南伊玉君
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD