Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SVM-based wireless terminal security access method

A wireless terminal and secure access technology, which is applied in the field of wireless communication, can solve problems such as difficulty in ensuring channel security for transmission keys, consumption of system resources, and cracking of authentication algorithms, so as to solve the problem of secure access, save system resources, and enhance safety effect

Active Publication Date: 2021-02-23
JIANGSU ELECTRIC POWER CO
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the 5G communication system, the change of system characteristics not only makes the theoretical foundation of the default physical layer security based on these security schemes need to be further demonstrated, but also makes it difficult to guarantee the security of the transmission key channel itself.
Security solutions that rely on communication upper-layer protocols for information encryption and identity authentication also consume a lot of system resources and increase communication delays
At the same time, the authentication algorithm that relies on key generation to encrypt and decrypt information is also easily cracked by malicious attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SVM-based wireless terminal security access method
  • SVM-based wireless terminal security access method
  • SVM-based wireless terminal security access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The application will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, but not to limit the protection scope of the present application.

[0042] figure 1 It is a schematic flow chart of a method for secure access of a wireless terminal based on SVM in the present invention. like figure 1 As shown, the first aspect of the present invention relates to a method for secure access of a wireless terminal based on SVM, including steps 1-3.

[0043] In step 1, a wireless network model is established based on a communication scenario between a wireless terminal and a wireless base station, and a channel feature vector is established based on the wireless network model and frame messages received by the wireless base station.

[0044] In the part of the mobile communication access network, communication connections are established between t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The SVM-based wireless terminal security access method is characterized by comprising the following steps: 1, establishing a wireless network security problem model based on a communication scene of awireless terminal and a wireless base station, and establishing a channel feature vector based on the wireless network security problem model and a frame message received by the wireless base station; 2, checking the channel feature vector of the frame message by using a pre-trained SVM authentication model, and judging whether the frame message is a legal signal or not; and 3, determining that the wireless terminal sending the at least one frame message is a legal terminal based on judgment on whether the at least one frame message is a legal signal. Based on the method provided by the invention, the frame message sent by the wireless terminal accessed to the wireless base station can be checked by improving the SVM parameter combination optimization method of differential evolution andthe differential evolution method of control parameter self-adaptive improvement, so that the legal terminal can be effectively judged.

Description

technical field [0001] The present invention relates to the field of wireless communication, and more specifically, relates to a secure access method of a wireless terminal based on SVM. Background technique [0002] At present, the 5G communication system has been widely used, but the 5G communication system also faces a series of security challenges in the application process. On the one hand, the security challenges of the 5G system come from the inheritance of the 5G system from the 3G and 4G communication systems, such as the clear text transmission of identity information and the leakage of authentication vectors. On the other hand, the evolution of network architecture also brings many new challenges. For example, it is difficult for the core network located in the security domain to provide security protection for the access network, and the heterogeneous integration of the network will bring about problems such as incompatibility of security mechanisms. [0003] S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06N3/00H04W12/08
CPCG06N3/006H04W12/08G06F18/2411G06F18/214G06N20/10G06N3/126
Inventor 朱红王文帝周冬旭高莉莎韦磊蒋承伶潘甦余昊许洪华彭冲李天一朱一帆杨林青赵轩武永泉
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products