IoT equipment security access method and system based on RFID signal

A security access and signal technology, applied in the field of Internet of Things, can solve the problems of Wi-Fi signal fluctuation, long access time, uncontrollable, etc., to prevent malicious devices from randomly accessing the security domain, lightweight data processing, connection Controllable effect of the entry process

Active Publication Date: 2022-01-28
广州优刻谷科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first problem is that there is a lot of noise that is difficult to eliminate in the method based on the Wi-Fi signal. The original CSI information of the Wi-Fi signal collected by the existing technology will have a lot of noise, such as cyclic shift diversity, sampling time offset, Noise caused by sampling frequency offset and beamforming, etc., these noises are difficult to remove, making it difficult to extract signal fluctuation features with sufficient confidence
The second problem is that Wi-Fi itself is vulnerable to attacks, and accessing Wi-Fi to maintain a long-term connection violates the security principle of the security domain. The existing method requires IoT devices to be connected to the Wi-Fi LAN in the security domain first. Only by establishing a Wi-Fi connection can Wi-Fi signal fluctuations be obtained, which allows unauthenticated devices to freely access the LAN in the security domain and exchange information with the security domain, which ser

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT equipment security access method and system based on RFID signal
  • IoT equipment security access method and system based on RFID signal
  • IoT equipment security access method and system based on RFID signal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0053] Example 1

[0054] figure 1 An application architecture of an IOT device secure access method based on the RFID signal provided by the present invention. like figure 1 As shown, the IOT device security access method provided by the present invention relates to a security device group, to be connected to the device, a security terminal, and an RFID reader.

[0055] The basic idea of ​​the IOT device security access method provided by the present invention is, by recording the user's activity habits and user-defined access actions, training the CNN-LightGBM model that can be identified through the RF signal change. When the RFID signal to be accessing the device generates a signal fluctuation that is sufficiently high enough for the respective motion of the probability of prediction probability, it is considered to access the device to be accessed in the room. Since the RFID signal penetrates the outer wall of the room, there is a huge attenuation, so the change in the RFID ...

Example Embodiment

[0088] Example 2

[0089] image 3 An application example schematic diagram of an IOT device security access method provided by the present invention. In this embodiment, the safety terminal is a smart gateway for all IOT equipment in the room, including smart TV, smart speakers, and smart table lamps in the room, and ordinary devices include printers, to access devices for a smart sweeping robot. The RFID reader is a normal RFID reader. Among them, the smart gateway provides Wi-Fi hotspots as an AP end. The original smart TV in the room, the smart speaker and the smart desk lamp are connected by Wi-Fi, and the smart sweeping robot is used as the access device to be taken into the room. Smart TV, smart speakers, smart table lamps and smart sweeping machines include RFID tags. The user's behavior mode database has been established. The CNN-LightGBM model that can be identifiable will have been well trained. The user-defined action is stringing up and down three times. The specific ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an IoT equipment security access method based on an RFID signal. The method comprises the following steps that the change of the RFID signal caused after a user makes an action in a mode database iscollected; corresponding RFID features are extracted to construct an action recognition training set; the CNN-LightGBM model is constructed and trained; after an RFID signal sent by the IoT equipment to be accessed is received, corresponding RFID features are extracted; the extracted RFID features are input into a CNN-LightGBM model; the CNN-LightGBM model outputs an action category and a prediction probability; whether the output action type and the time for receiving the RFID signal sent by the IoT equipment to be accessed are matched with the action and the corresponding time period in the behavior mode database or not is judged, and if so, the access request of the IoT equipment to be accessed is permitted; or otherwise, the access request of the IoT equipment to be accessed is refused.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, and more specifically, to a secure access method and system for IoT devices based on RFID signals. Background technique [0002] With the continuous development of Internet of Things (IOT) technology, more and more IoT devices appear in people's lives. Most of these devices are located in the user's home, such as smart air conditioners, smart door locks, smart speakers and so on. These IoT devices together constitute the user's smart home environment, providing users with an unprecedented experience in their home life. However, a large amount of sensitive data generated during the operation of these IoT devices will make user privacy more likely to be leaked. Therefore, ensuring the safe operation of these IoT devices is an important capability that must be deployed for each device. The most important point is that newly deployed IoT devices must be able to establish con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/47H04W84/12G06K17/00G06N3/08G16Y30/10
CPCH04W12/47H04W84/12G06K17/0029G06N3/08G16Y30/10
Inventor 陈政霖郑飞州陈胜俭
Owner 广州优刻谷科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products