Font Size: a A A

Research On IC Card Security Defense System Based On Outlier Detection

Posted on:2020-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:X R WangFull Text:PDF
GTID:2428330572993870Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As a common electronic tag,IC card has many features such as small size,fast recognition speed and large storage capacity.It provides great convenience for people and has been widely used in various industries,such as campus cards,access cards,water & electricity cards,bus cards and so on.However,at present,the stealing of IC card emerge in an endless stream,which has disrupted the social order,and seriously affected the lives and property safety of people,thus the resolution of the security problems is urgently needed.The authenticity detection of IC cards has always been the focus of many researchers.Focusing on the abnormal detection of IC cards,the authenticity detection of IC cards and the identification of abnormal credit card behavior is majorly analyzed,and an IC card security defense system based on outlier detection is managed to build in this paper from the physical level,involving the disciplines such as electromagnetics,embedded software development,artificial intelligence and so forth.The work done in this paper is summarized as follows:(1)Domestic and Abroad Analysis and Research on IC Card Security Defense Technology.Through the comprehensive analysis of the IC card's application field and stealing in social life,the necessity of IC card security technology research is emphasized,and then several common IC card attack methods are analyzed.Thereupon,the mainstream IC card security defense technology is analyzed,the shortcomings found out,and an IC card security defense system based on abnormal value detection is put forward in this paper.(2)Research on Pseudo-Card Identification Strategy.The in-depth study on IC card is carried out from the physical,transport,and application level.Seen from the physical level,it is found that the electromagnetic properties of the IC card are different due to the differences in material,shape and conjugate impedance of resonant antenna.And a pseudo-card identification strategy based on electromagnetic strength is proposed.The sector authority and card type of the IC card transmission layer are studied,and the pseudo-card identification strategy based on the card reading mechanism is proposed.Finally,a pseudo-card identification strategy based on user habits is proposed by studying the user's IC card usage scenario.(3)Research and Design of IC Card Security Defense System.The pseudo-card identification strategy is further realized through the design of software and hardware.The system mainly includes three parts,a mobile phone APP,an IC card reading & writing terminal,and a cloud server.The IC card read/write terminal uses the Exynos 4412 chip as the core.The dual-channel magnetic field acquisition module is designed to collect magnetic field data.And peripheral modules such as WIFI,GPS,and RFID reader are equipped with.The Linux system is ported and driven,and the system software is programmed.The cloud server detects the data collected by the IC card reading & writing terminal through the abnormality detecting algorithm.When the abnormal situation occurs,the mobile phone APP notifies the user of the abnormality occurrence position in time,and asks whether to alarm with one click.(4)Research and Improvement of IC Card Anomaly Detection Agorithm.Alibaba Cloud server is built,Bagging integrated learning framework is used,and the detection speed of the system is improved through parallel processing,so as to improve the system computing capability.On the basis of improving the classification accuracy of the base classifier,the traditional Bagging algorithm is further improved,and the initiative learning of the base classifier with purpose is realized through screening the original data by the means of sorting and clustering.Then the results of the base classifier are integrated by voting,which further improves the accuracy of the detection.Finally,the system is applied to develop an IC card reading and writing system with pseudo card recognition function.The test shows that the system can take into account the differences of the IC card from the physical,transport and application level,with good generalization performance,and high recognition rate.Moreover,it is equipped with high real-time performance.The user is notified immediately and able to stop in time when the stealing behavior occurs,so that unnecessary losses are prevented and the security of the IC card system is effectively improved.
Keywords/Search Tags:IC card security, anomaly detection, integrated learning, cloud server
PDF Full Text Request
Related items