Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protection method of smart home security gateway

A smart home and security gateway technology, applied in network connections, electrical components, transmission systems, etc., can solve problems such as insecure routing, lack of Mirai virus and its variant defense and prevention, lack of protection against smart home protocol attacks, etc. The effect of protecting network security

Active Publication Date: 2018-11-13
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Routing insecurity: The smart home gateway needs to use a router to access the Internet, and the router becomes a security shortcoming. As long as the router is attacked, the entire smart home system can be paralyzed
[0005] 2. Lack of protection against smart home protocol attacks: Hackers send attack instructions to illegally manipulate electrical appliances, the essence of which is to forge smart home protocol attacks
[0006] 3. Lack of protection for the security of the smart home gateway itself: the current smart home gateway is in the central control position of home smart devices, and it is very important to ensure its own security
[0007] 4. Lack of resistance and prevention against smart home attack trend Mirai virus and its variants

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method of smart home security gateway
  • Security protection method of smart home security gateway
  • Security protection method of smart home security gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The specific implementation of the present invention will be further described below in conjunction with accompanying drawings and examples, but the implementation and protection of the present invention are not limited thereto. Achieved with technology.

[0053] A security protection method for a smart home security gateway in this example is mainly composed of four steps, the steps are as follows:

[0054] Step 1: Power on the smart home gateway, start the dual network card according to the configuration file, and establish a secure connection with the server;

[0055] Step 2: The gateway obtains the legal user list from the server and caches it. The specific process is as follows figure 1 shown;

[0056] Step 3: Start the snort-wireless wireless network attack detection function according to the configuration;

[0057] Step 4: Start the smart home protocol attack detection system. Specifically include:

[0058] a) Extract the attack features of the smart home pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection method of a smart home security gateway. According to the security protection method disclosed by the invention, the dual network card adaptation technology and the wireless network attack detection technology are adopted to solve the insecure problem of the smart home routing; an intrusion detection system is improved to add the intrusion detection and defense against the smart home protocol attack; access control is implemented on files and progresses, and the gateway security is monitored by using integrity measure and remote proof to form a virus protection system; and dual network card traffic analysis provides detection and defense of the Mirai virus and the variants thereof. By adoption of the security protection method disclosed by theinvention, in addition to ensuring the security of the device that performs communication by using a smart home protocol in the intranet, the communication security of other devices connected to a security gateway hotspot is also ensured, the attacks against the smart home protocol are defended, the detection and defense against viruses are provided, effective detection and protection are performed on a botnet formed by the viruses, the network security of the dual-network planes of the internal home network and the external home network is protected, and solutions and ideas are provided for smart home security and even the Internet of Things security.

Description

technical field [0001] The invention relates to the field of smart home security research, in particular to a security protection method for a smart home security gateway. Background technique [0002] Since 2016, the attack trend of smart home is Mirai (Mirai Malware, Mirai malware) virus, and it is continuously mutating. The attack method is to infect smart devices with malicious programs, thereby controlling smart devices to launch Distributed Denial of Service (DDOS) attacks on normal server nodes, generating Tbytes-level attack traffic and paralyzing the network. [0003] At present, there are many kinds of smart devices, lack of unified standards and specifications, coupled with limited resources, and special and refined security requirements. However, if a security solution is tailored for each type of device, the cost of security functions may be higher than the cost of its own practical functions, so existing manufacturers generally ignore security issues. There a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/66
CPCH04L12/66H04L63/1416H04L63/1425H04L63/145H04L63/1458
Inventor 刘发贵彭妙霞
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products