Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for weak electromagnetic interference attack detection of Internet of Things based on edge computing

An electromagnetic interference and attack detection technology, applied in the field of industrial Internet of Things, can solve problems such as large risks in industrial production safety and reliability, production accidents, and undetectable attacks.

Active Publication Date: 2022-05-24
南通京翔科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In industrial sites, attackers can use specific electromagnetic interference devices to change the voltage on signal lines to achieve the purpose of quietly tampering with data. This kind of attack can easily destroy the accuracy of industrial equipment and lead to production accidents
Since the devices in the Industrial Internet of Things (such as analog-to-digital converters) are easy to couple with electromagnetic waves, and the signal lines for communication between the sensing module and the MCU act as antennas, attackers can launch weak electromagnetic interference attacks in various ways, so weak electromagnetic interference Interference can tamper with the data generated by the perception module
[0006] In order to defend against electromagnetic interference, electromagnetic interference filters and shielded wires are currently used to defend against the impact of strong electromagnetic interference. Although this type of electromagnetic interference defense strategy can reduce the impact of strong electromagnetic interference, electromagnetic waves will still penetrate the circuit system. That is, the defense strategy cannot eliminate the negative effects of weak electromagnetic waves
However, the lack of data security verification and attack detection between the sensing module and MCU makes it impossible to detect attacks caused by weak electromagnetic interference, which poses a greater risk to the safety and reliability of industrial production

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for weak electromagnetic interference attack detection of Internet of Things based on edge computing
  • Method and system for weak electromagnetic interference attack detection of Internet of Things based on edge computing
  • Method and system for weak electromagnetic interference attack detection of Internet of Things based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are only used to illustrate and explain the present invention, but not to limit the present invention.

[0042] figure 1 It is a schematic diagram of the weak electromagnetic interference attack of the Industrial Internet of Things provided by the present invention. like figure 1 As shown, the sensing module sends the sensing data s(t) to the ADC analog-to-digital conversion module through the signal line. Due to the difference in the manufacturing process, the noise fingerprint n(t) of the smart device will also be injected into the signal line. If an attacker launches a weak EMI attack, this malicious weak EMI signal γ(t) will also be injected into the signal line. Finally, the signal obtained by the ADC analog-to-digital conversion module is the fusion of the sensor d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for detecting weak electromagnetic interference attacks of the Industrial Internet of Things based on edge computing, belonging to the field of the Industrial Internet of Things. The method includes: extracting the noise fingerprint of the smart device from the sensing data transmitted from the sensing module to the MCU as a sample, and extracting M pieces of noise with a length T under two states of no weak electromagnetic interference attack and weak electromagnetic interference attack Fingerprint to establish a noise fingerprint sample library, where M≥5000; establish a FEU-LSTM fusion model, the FEU-LSTM fusion model includes a convolutional neural network-based FEU model and a time-recurrent neural network LSTM model; randomly extract from the noise fingerprint sample library P noise fingerprints are input to the FEU-LSTM fusion model for Q times of Epoch iterations to complete the model training, where P≥125, Q≥30; during the attack detection process, the length of the real-time read from the sensing data is T Input the noise fingerprint of the device into the trained FEU-LSTM fusion model, and judge whether the smart device is attacked by weak electromagnetic interference according to the output result of the model.

Description

technical field [0001] The invention relates to the field of the industrial Internet of things, in particular to a weak electromagnetic attack detection method of the industrial Internet of things and a weak electromagnetic attack detection system of the industrial Internet of things. Background technique [0002] The current intelligent industrial production is inseparable from the support of the Industrial Internet of Things. The Industrial Internet of Things has very high requirements on the reliability and security of data. Once the data in the Industrial Internet of Things system is tampered with, it will affect the quality control of products. even cause major accidents. [0003] In a smart device, the process from data collection to transmission includes: the sensing module converts physical quantities into analog electrical signals, and then sends the signals to the sampling module MCU module through a signal line, and the MCU module receives the data and performs se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06K9/62G06N3/04G06N3/08G16Y40/10G16Y40/50
CPCH04L63/1416G06N3/08G16Y40/10G16Y40/50G06N3/045G06N3/044G06F18/2415
Inventor 方凯王丽娜周小龙杨明霞
Owner 南通京翔科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More