Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

IoT equipment security access method and system based on RFID signal

A security access and signal technology, applied in the field of Internet of Things, can solve the problems of Wi-Fi signal fluctuation, long access time, uncontrollable, etc., to prevent malicious devices from randomly accessing the security domain, lightweight data processing, connection Controllable effect of the entry process

Active Publication Date: 2022-01-28
广州优刻谷科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first problem is that there is a lot of noise that is difficult to eliminate in the method based on the Wi-Fi signal. The original CSI information of the Wi-Fi signal collected by the existing technology will have a lot of noise, such as cyclic shift diversity, sampling time offset, Noise caused by sampling frequency offset and beamforming, etc., these noises are difficult to remove, making it difficult to extract signal fluctuation features with sufficient confidence
The second problem is that Wi-Fi itself is vulnerable to attacks, and accessing Wi-Fi to maintain a long-term connection violates the security principle of the security domain. The existing method requires IoT devices to be connected to the Wi-Fi LAN in the security domain first. Only by establishing a Wi-Fi connection can Wi-Fi signal fluctuations be obtained, which allows unauthenticated devices to freely access the LAN in the security domain and exchange information with the security domain, which seriously violates the security principles of the security domain
The third problem is that the existing method based on the extraction of feature strings takes a long time to access and is uncontrollable. The existing method continuously detects the changes in the radio frequency signal caused by the movement in the room, and extracts the signal features to generate a symmetrical key
However, due to the multipath effect, the multipath of the RF signals transmitted by IoT devices at different locations is very different; even though they are located in the same room, it is very difficult to generate a symmetric key by extracting a characteristic string
If the characteristic strings are required to be exactly the same to generate a symmetric key, the generation of a symmetric key can only be achieved by fluctuating through a similar multipath radio frequency signal affected by an action at a specific location, which will take a long time, and Uncontrollable length of time spent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT equipment security access method and system based on RFID signal
  • IoT equipment security access method and system based on RFID signal
  • IoT equipment security access method and system based on RFID signal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] figure 1 It is a schematic diagram of the application architecture of the RFID signal-based secure access method for IoT devices provided by the present invention. Such as figure 1 As shown, the IoT device secure access method provided by the present invention mainly involves a security device group, a device to be connected, a security terminal and an RFID reader.

[0055] The basic idea of ​​the secure access method for IoT devices based on RFID signals provided by the present invention is to train a CNN-LightGBM model that can recognize actions through changes in radio frequency signals by recording user activity habits and user-defined access actions. When the RFID signal of the device to be accessed generates a signal fluctuation of a corresponding action with a sufficiently high prediction probability at the correct time, the device to be accessed is considered to be in the room and the device to be accessed is allowed to access. Since the RFID signal will have ...

Embodiment 2

[0089] image 3 It is a schematic diagram of an application example of the RFID signal-based secure access method for IoT devices provided by the present invention. In this embodiment, the security terminal is a smart gateway that controls all IoT devices in the room. The security devices include smart TVs, smart speakers, and smart desk lamps in the room. Common devices include printers. The device to be connected is an intelligent sweeping robot. The RFID reader is an ordinary RFID reader. Among them, the smart gateway provides a Wi-Fi hotspot as the AP terminal. The original smart TV, smart speaker and smart desk lamp in the room are connected to the smart gateway through Wi-Fi. At the same time, the smart sweeping robot is brought into the room by the user as a device to be connected. Smart TVs, smart speakers, smart desk lamps and smart robot vacuums all include RFID tags. A database of user behavior patterns has been established. The CNN-LightGBM model for recognizing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an IoT equipment security access method based on an RFID signal. The method comprises the following steps that the change of the RFID signal caused after a user makes an action in a mode database iscollected; corresponding RFID features are extracted to construct an action recognition training set; the CNN-LightGBM model is constructed and trained; after an RFID signal sent by the IoT equipment to be accessed is received, corresponding RFID features are extracted; the extracted RFID features are input into a CNN-LightGBM model; the CNN-LightGBM model outputs an action category and a prediction probability; whether the output action type and the time for receiving the RFID signal sent by the IoT equipment to be accessed are matched with the action and the corresponding time period in the behavior mode database or not is judged, and if so, the access request of the IoT equipment to be accessed is permitted; or otherwise, the access request of the IoT equipment to be accessed is refused.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, and more specifically, to a secure access method and system for IoT devices based on RFID signals. Background technique [0002] With the continuous development of Internet of Things (IOT) technology, more and more IoT devices appear in people's lives. Most of these devices are located in the user's home, such as smart air conditioners, smart door locks, smart speakers and so on. These IoT devices together constitute the user's smart home environment, providing users with an unprecedented experience in their home life. However, a large amount of sensitive data generated during the operation of these IoT devices will make user privacy more likely to be leaked. Therefore, ensuring the safe operation of these IoT devices is an important capability that must be deployed for each device. The most important point is that newly deployed IoT devices must be able to establish con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/47H04W84/12G06K17/00G06N3/08G16Y30/10
CPCH04W12/47H04W84/12G06K17/0029G06N3/08G16Y30/10
Inventor 陈政霖郑飞州陈胜俭
Owner 广州优刻谷科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products