Unlock instant, AI-driven research and patent intelligence for your innovation.

A bypass-based security monitoring method for resource-constrained terminal equipment

A terminal equipment and resource-limited technology, which is applied in the field of safety monitoring of resource-limited terminal equipment based on bypass, can solve problems such as resource limitation

Active Publication Date: 2022-05-10
ZHEJIANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the complex environment of the Internet of Things, due to its relatively simple design functions, the Internet of Things terminals often have the characteristics of limited resources, and a large number of system designs and engineering implementations behind the Internet of Things inevitably introduce a large number of security vulnerabilities and potential s attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A bypass-based security monitoring method for resource-constrained terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0029] like figure 1 As shown, this embodiment provides a bypass-based resource-limited terminal device security monitoring method, including:

[0030] Step 1: abstractly express the terminal device D as a functional body composed of different functional blocks v connected. Functional block v refers to the basic functional module with actual physical, logical or cognitive meaning, and its meaning is the function it can realize. For terminal equipment, the meaning of function block is its design function. For example, the function of the sensor is perception, the function of the amplifier is signal amplification, the function of the filter is signal filtering, and the function of the CPU is program calculation, etc.

[0031] Step 2: Since the realization of the functions of the terminal equipment involves different forms at the same time, such as software and hardware, different functional blocks are further divided into physical domains D according to their existing forms p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a bypass-based safety monitoring method for resource-limited terminal equipment. The bypass information refers to the connection relationship that exists outside the original connection relationship set among the functional domains of the terminal equipment. This kind of connection relationship outside the design can get more information in the resource-constrained IoT terminal equipment. , the present invention analyzes the existence form of information outside the system design scope of the physical domain functional block, utilizes the bypass information to establish a connection relationship, and performs data analysis and feature extraction to establish a machine learning model, thereby corresponding to the target information I, thereby Realize terminal equipment bypass safety monitoring. The method of the present invention can systematically perform safety monitoring on the bypass-based signal of the resource-limited Internet of Things terminal equipment, so as to provide protection for the bypass security of the Internet of Things terminal equipment.

Description

technical field [0001] The invention relates to the security field of the Internet of Things, in particular to a bypass-based resource-limited terminal device security monitoring method. Background technique [0002] The Internet of Things is another wave of information after computers, the Internet and mobile communication networks. With the maturity of Internet of Things technology, the number of Internet of Things terminal devices is increasing day by day, forming a multi-dimensional and heterogeneous Internet of Things terminal environment. In the complex environment of the Internet of Things, due to its relatively simple design functions, the Internet of Things terminals often have the characteristics of limited resources, and a large number of system designs and engineering implementations behind the Internet of Things inevitably introduce a large number of security vulnerabilities and potential s attack. [0003] IoT vulnerabilities can be divided into out-of-band vu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/22G16Y40/10
CPCG06F11/2205G06F11/2273G16Y40/10
Inventor 徐文渊冀晓宇郭世泽王之昀
Owner ZHEJIANG UNIV