A method and system for securely accessing IoT devices based on RFID signals

A security access and signal technology, applied in the field of Internet of Things, can solve the problems of Wi-Fi signal fluctuation, long access time, uncontrollable, etc., to prevent malicious devices from randomly accessing the security domain, lightweight data processing, and access Controllable effect of the entry process

Active Publication Date: 2022-03-22
广州优刻谷科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first problem is that there is a lot of noise that is difficult to eliminate in the method based on the Wi-Fi signal. The original CSI information of the Wi-Fi signal collected by the existing technology will have a lot of noise, such as cyclic shift diversity, sampling time offset, Noise caused by sampling frequency offset and beamforming, etc., these noises are difficult to remove, making it difficult to extract signal fluctuation features with sufficient confidence
The second problem is that Wi-Fi itself is vulnerable to attacks, and accessing Wi-Fi to maintain a long-term connection violates the security principle of the security domain. The existing method requires IoT devices to be connected to the Wi-Fi LAN in the security domain first. Only by establishing a Wi-Fi connection can Wi-Fi signal fluctuations be obtained, which allows unauthenticated devices to freely access the LAN in the security domain and exchange information with the security domain, which seriously violates the security principles of the security domain
The third problem is that the existing method based on the extraction of feature strings takes a long time to access and is uncontrollable. The existing method continuously detects the changes in the radio frequency signal caused by the movement in the room, and extracts the signal features to generate a symmetrical key
However, due to the multipath effect, the multipath of the RF signals transmitted by IoT devices at different locations is very different; even though they are located in the same room, it is very difficult to generate a symmetric key by extracting a characteristic string
If the characteristic strings are required to be exactly the same to generate a symmetric key, the generation of a symmetric key can only be achieved by fluctuating through a similar multipath radio frequency signal affected by an action at a specific location, which will take a long time, and Uncontrollable length of time spent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for securely accessing IoT devices based on RFID signals
  • A method and system for securely accessing IoT devices based on RFID signals
  • A method and system for securely accessing IoT devices based on RFID signals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] figure 1 It is a schematic diagram of the application architecture of the RFID signal-based secure access method for IoT devices provided by the present invention. Such as figure 1 As shown, the IoT device secure access method provided by the present invention mainly involves a security device group, a device to be connected, a security terminal and an RFID reader.

[0055] The basic idea of ​​the secure access method for IoT devices based on RFID signals provided by the present invention is to train a CNN-LightGBM model that can recognize actions through changes in radio frequency signals by recording user activity habits and user-defined access actions. When the RFID signal of the device to be accessed generates a signal fluctuation of a corresponding action with a sufficiently high prediction probability at the correct time, the device to be accessed is considered to be in the room and the device to be accessed is allowed to access. Since the RFID signal will have ...

Embodiment 2

[0089] image 3 It is a schematic diagram of an application example of the RFID signal-based secure access method for IoT devices provided by the present invention. In this embodiment, the security terminal is a smart gateway that controls all IoT devices in the room. The security devices include smart TVs, smart speakers, and smart desk lamps in the room. Common devices include printers. The device to be connected is an intelligent sweeping robot. The RFID reader is an ordinary RFID reader. Among them, the smart gateway provides a Wi-Fi hotspot as the AP terminal. The original smart TV, smart speaker and smart desk lamp in the room are connected to the smart gateway through Wi-Fi. At the same time, the smart sweeping robot is brought into the room by the user as a device to be connected. Smart TVs, smart speakers, smart desk lamps and smart robot vacuums all include RFID tags. A database of user behavior patterns has been established. The CNN-LightGBM model for recognizing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a secure access method for IoT devices based on RFID signals, comprising: collecting changes in RFID signals caused by users taking actions in the pattern database; extracting corresponding RFID features to construct an action recognition training set; constructing And train the CNN-LightGBM model; after receiving the RFID signal sent by the IoT device to be connected, extract the corresponding RFID feature; input the extracted RFID feature into the CNN-LightGBM model; the CNN-LightGBM model outputs the action category and prediction Probability; judge whether the output action category and the time of receiving the RFID signal sent by the IoT device to be connected match the action in the behavior pattern database and the corresponding time period, and if so, agree to the access request of the IoT device to be connected; otherwise reject the pending connection Access requests from IoT devices.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, and more specifically, to a secure access method and system for IoT devices based on RFID signals. Background technique [0002] With the continuous development of Internet of Things (IOT) technology, more and more IoT devices appear in people's lives. Most of these devices are located in the user's home, such as smart air conditioners, smart door locks, smart speakers and so on. These IoT devices together constitute the user's smart home environment, providing users with an unprecedented experience in their home life. However, a large amount of sensitive data generated during the operation of these IoT devices will make user privacy more likely to be leaked. Therefore, ensuring the safe operation of these IoT devices is an important capability that must be deployed for each device. The most important point is that newly deployed IoT devices must be able to establish con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/47H04W84/12G06K17/00G06N3/08G16Y30/10
CPCH04W12/47H04W84/12G06K17/0029G06N3/08G16Y30/10
Inventor 陈政霖郑飞州陈胜俭
Owner 广州优刻谷科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products