Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent networking safety analysis method based on sensing and calculation linkage

A technology of security analysis and intelligent networking, applied in the field of security analysis of intelligent networking based on sensor-computing linkage, can solve problems such as unconsidered security risks, potential safety hazards, and insufficient vulnerability analysis, so as to avoid neglect and misjudgment, and simplify the difficulty , the effect of avoiding security threats

Pending Publication Date: 2022-05-27
ZHEJIANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The benefits brought by new technologies are accompanied by potential safety hazards. Due to the application of artificial intelligence technology, intelligent network systems will undertake more complex tasks for humans, such as autonomous driving applications, but this also means the safety of users. run by machines
Therefore, the security of intelligent network systems often leads to bigger and more serious problems
The existing work related to artificial intelligence security mainly studies the algorithm vulnerability problem caused by the uninterpretable nature of the artificial intelligence algorithm itself. It has not considered the security risk introduced by the vulnerability of the perception module to the artificial intelligence algorithm, and there are insufficient vulnerability analysis and vulnerability mining. not efficient enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent networking safety analysis method based on sensing and calculation linkage
  • Intelligent networking safety analysis method based on sensing and calculation linkage
  • Intelligent networking safety analysis method based on sensing and calculation linkage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to facilitate those skilled in the art to understand and implement the present invention, the present invention will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are only used to illustrate and explain the present invention, but not to limit it. this invention.

[0035] The method flow of the embodiment of the present invention, such as figure 1 shown.

[0036] The intelligent networking security analysis method based on sensory computing linkage of the present invention takes an autonomous vehicle as an example. There are many information paths in an autonomous vehicle, for example, "object → camera image → obstacle detection → driving decision model → steering / no "Steering", "PedestrianLidar Capture Point CloudPoint Cloud Classification→Driving Decision ModelBrake / Acceleration", etc. The specific analysis method includes the following steps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things security analysis method based on sensing and calculation linkage, which aims at the phenomenon of linkage of a sensor and an artificial intelligence algorithm widely existing in the Internet of Things, and analyzes the overall vulnerability of an Internet of Things system in a mode of constructing and injecting an adversarial sample aiming at the artificial intelligence algorithm from a physical domain. The method comprises the following steps: firstly summarizing an Internet of Things system into a plurality of information channels according to front and back links of information processing of the Internet of Things, then carrying out vulnerability analysis on each information channel, establishing an actual test platform for signal injection, judging whether actual threats exist or not, and giving the actual threats to professionals to evaluate the harm degree of the actual threats, and finally, integrating the analysis result of each vulnerability, and evaluating the overall safety degree of the intelligent networking system. According to the method, the potential vulnerability can be comprehensively analyzed, and the safety problem of the system can be more quickly mined.

Description

technical field [0001] The invention belongs to the field of intelligent system security, and relates to an intelligent networking security analysis method based on sensory calculation linkage. Background technique [0002] IoT is the combination of AI technology and IoT infrastructure to enable more efficient IoT operations, improve human-machine interaction, and enhance data management and analysis. In 2018, KPMG released a prospective study on future scenario applications of AI to 2040. The analysts detailed a scenario in which each device in the Internet of Intelligence is equipped with its own AI algorithms, and these AIs can autonomously connect to other AIs to intelligently perform tasks together, using swarm intelligence to control and execute in real time. Value Creation. The basic requirement to realize this scenario is the perception and intelligent algorithms of each intelligent connected device. [0003] The benefits brought by new technologies are accompanie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06V20/58G06V10/764G06V10/82G06K9/62G06N3/04G06N3/08
CPCG06N3/08G06N3/045G06F18/24
Inventor 冀晓宇徐文渊程雨诗闫琛朱文俊
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products