Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious node physical layer detection method and system based on automatic labeling and learning

A malicious node and automatic labeling technology, applied in the field of communication security, can solve the problem of low detection rate of malicious nodes and achieve the effect of improving the detection rate and accuracy rate

Inactive Publication Date: 2020-04-10
SHENZHEN POWER SUPPLY BUREAU +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a malicious node physical layer detection method and system based on automatic labeling and learning to solve the above-mentioned problem of injecting labels into machine learning offline sample sets in attack detection and the problem of low detection rate of malicious nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious node physical layer detection method and system based on automatic labeling and learning
  • Malicious node physical layer detection method and system based on automatic labeling and learning
  • Malicious node physical layer detection method and system based on automatic labeling and learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0055] figure 1 It is a flowchart of a method for detecting a physical layer of a malicious node based on automatic labeling and learning provided by an embodiment of the present invention. Such as figure 1 As shown, the malicious node physical layer detection method based on automatic labeling and learning provided by the embodiment of the present invention includes the following steps:

[0056] S1) Obtain channel information and identity information of legal access nodes.

[0057] For example, the legal access node in the network performs upper-layer authentication with the edge control device R and extracts channel information, and the edge control device ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication safety, and discloses a malicious node physical layer detection method and detection system based on automatic labeling and learning. According to the detection method, the type of an access node in a network is identified based on a physical layer authentication strategy of channel difference, and malicious nodes initiating clone attacks and Sybil attacks can be detected at the same time; corresponding labels are automatically injected according to the types of the access nodes, so that the problem of manually injecting attack labels is solved, and the difficulty of lacking attack label samples when a supervised machine learning algorithm is used for channel authentication is solved; attack label samples are automatically injected by utilizing physical layer channel difference and setting a threshold method, and an offline label sample set is provided for a machine learning algorithm, so that automatic label injection and learning are realized, and the malicious node detection rate of an access node is improved. According to the method, the problem that the edge calculation node detects malicious nodes of various industrial wireless devices in an asymmetric scene of the industrial edge calculation Internet of Things can be effectively solved.

Description

technical field [0001] The present invention relates to the technical field of communication security, in particular, to a physical layer detection method for malicious nodes based on automatic labeling and learning, a physical layer detection system for malicious nodes based on automatic labeling and learning, and a method based on automatic labeling and learning A learned malicious node physical layer detection device. Background technique [0002] There are a large number of attacks in the edge computing industrial scenario. Once the system is attacked, the consequences will be disastrous. For example, attackers launch clone node attacks in unsupervised industrial wireless scenarios. The attacker first captures the legitimate node, steals the ID, key and data information of the legitimate node, and then deploys a large number of clone nodes in different locations in the industrial network, and uses the clone node to capture all the information of the legitimate node. Cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1416H04L63/145
Inventor 刘威李重杭陈松林文红代尚林
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products