image
image
user-login
Patent search/

BLOCKCHAIN-BASED SECURITY FRAMEWORK FOR IOT DEVICES

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

BLOCKCHAIN-BASED SECURITY FRAMEWORK FOR IOT DEVICES

ORDINARY APPLICATION

Published

date

Filed on 14 November 2024

Abstract

The present invention introduces a blockchain-based security framework for IoT devices that enhances device authentication, data integrity, and secure communication in decentralized IoT networks. The framework utilizes a combination of lightweight cryptographic techniques and smart contracts to manage device registration, enforce access control, and ensure data privacy without relying on centralized authorities. By implementing an optimized consensus mechanism suitable for resource-constrained environments, the invention provides a scalable and efficient solution for mitigating common IoT security challenges, including unauthorized access, data tampering, and single points of failure, across various IoT applications.

Patent Information

Application ID202441088014
Invention FieldCOMMUNICATION
Date of Application14/11/2024
Publication Number47/2024

Inventors

NameAddressCountryNationality
Vennapusa Surendra ReddyAssistant Professor, Audisankara College of Engineering &Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. GireeshaFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. BalanarendraFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. BabuFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. Sumath kasiFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. Sudheer TejaFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. SrikanthFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. RupeshFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. PavithraFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia
K. PravallikaFinal Year B.Tech Student, Audisankara College of Engineering & Technology(AUTONOMOUS), NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India.IndiaIndia

Applicants

NameAddressCountryNationality
Audisankara College of Engineering & TechnologyAudisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist, Andhra Pradesh, India-524101, India.IndiaIndia

Specification

Description:In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address all of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein.

The ensuing description provides exemplary embodiments only and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.

Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail to avoid obscuring the embodiments.

Also, it is noted that individual embodiments may be described as a process that is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination can correspond to a return of the function to the calling function or the main function.

The word "exemplary" and/or "demonstrative" is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as "exemplary" and/or "demonstrative" is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms "includes," "has," "contains," and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term "comprising" as an open transition word without precluding any additional or other elements.

Reference throughout this specification to "one embodiment" or "an embodiment" or "an instance" or "one instance" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.

The present invention provides a comprehensive security framework that leverages blockchain technology to enhance the security, integrity, and reliability of IoT networks. The invention addresses key IoT security challenges by implementing decentralized, cryptographic methods that are lightweight and efficient, making them suitable for resource-constrained IoT devices. The framework includes various components such as device registration, authentication, secure data transmission, access control, and consensus mechanisms.

The proposed framework consists of IoT devices, edge nodes, and blockchain nodes interconnected to form a decentralized network. IoT devices, such as sensors and actuators, are linked to edge nodes that act as gateways, managing device interactions and communication with the blockchain network. Blockchain nodes, distributed across the network, maintain a shared, immutable ledger that records all transactions, ensuring transparency and data integrity. This architecture eliminates the need for a central authority and reduces single points of failure.

In the proposed framework, each IoT device undergoes a registration process before it can join the network. During registration, a unique identifier (UID) is assigned to the device, and a cryptographic key pair (public and private keys) is generated. The public key, along with the UID, is stored in the blockchain ledger using a smart contract. For authentication, the IoT device signs a challenge message with its private key, which is then verified against the stored public key on the blockchain. This decentralized authentication mechanism ensures that only legitimate devices can participate in the network.

The invention facilitates secure communication between IoT devices using cryptographic techniques integrated with blockchain. Symmetric encryption is used for data exchange between devices to ensure privacy. A hash of the transmitted data is computed and stored on the blockchain, providing an immutable record of the data exchange. This ensures that any alteration or tampering of data can be detected by comparing the stored hash with a newly computed hash of the received data.

The invention employs smart contracts to enforce access control policies dynamically. These contracts define rules for accessing specific data or functionalities, based on the identity of the user or device and the context of the request. For example, a smart contract might restrict access to sensitive data only to authenticated devices within a specified time frame. This decentralized approach to access control eliminates the need for a centralized authorization server, reducing latency and enhancing security.

To validate transactions on the blockchain, the framework uses a lightweight consensus mechanism tailored for IoT environments. Proof of Authority (PoA) is employed, where a set of trusted nodes, or validators, approve transactions based on predefined criteria. This reduces the computational overhead compared to traditional consensus algorithms like Proof of Work (PoW), making it more suitable for IoT networks with limited processing capabilities. The consensus mechanism ensures that all recorded transactions are accurate, transparent, and tamper-proof.

Given the limited resources of many IoT devices, the invention integrates lightweight cryptographic algorithms, such as Elliptic Curve Cryptography (ECC). ECC provides strong security with smaller key sizes, reducing the computational burden on devices. This allows for efficient encryption and decryption processes, ensuring that even low-power devices can participate securely in the network.

The proposed framework is designed to be scalable, supporting a large number of IoT devices across different use cases. The decentralized nature of blockchain, combined with a lightweight consensus mechanism, ensures minimal latency and efficient handling of transactions as the network grows. Additionally, the framework can be customized for various IoT applications, including smart homes, industrial IoT, and healthcare, providing flexibility to adapt to different security requirements.

In a smart home environment, numerous IoT devices, such as smart locks, cameras, and thermostats, require secure communication to ensure privacy and prevent unauthorized access. Using the blockchain-based security framework, each smart device is registered on the blockchain network with a unique identifier and public key. When a user attempts to access a smart lock via a mobile app, the authentication request is verified through the blockchain ledger using a smart contract. If the user's credentials and device signatures match the stored information, the access is granted. This decentralized authentication mechanism prevents unauthorized access, even if the central home automation server is compromised. Additionally, each data transmission, such as video feed from the camera, is hashed and recorded on the blockchain, providing a verifiable log of all activities, enhancing transparency and security.

In an industrial IoT setup, various sensors and controllers monitor and manage factory equipment. The security framework helps prevent malicious attacks that could disrupt operations. Each sensor, upon installation, registers on the blockchain using its unique identifier and public key. Data collected by sensors, such as temperature readings, is transmitted to the control system through edge nodes. The control system verifies the data integrity by checking the hash stored on the blockchain, ensuring that the transmitted data has not been altered. Access to sensitive control functions, like adjusting machine settings, is managed by smart contracts that only authorize specific devices and personnel. This setup enhances the reliability of the industrial network by preventing unauthorized commands and tampering with sensor data, thus ensuring uninterrupted and secure operations.

While considerable emphasis has been placed herein on the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the invention. These and other changes in the preferred embodiments of the invention will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter to be implemented merely as illustrative of the invention and not as limitation. , Claims:1.A method for securing communication among Internet of Things (IoT) devices, the method comprising:
Registering each IoT device on a blockchain network by assigning a unique identifier and generating a cryptographic key pair;
Storing the unique identifier and corresponding public key of each IoT device in a blockchain ledger through a smart contract;
Authenticating an IoT device by verifying the device's cryptographic signature against the stored public key on the blockchain;
Establishing a secure communication channel between authenticated IoT devices using symmetric encryption, wherein the encryption keys are distributed and validated through the blockchain network;
Verifying the integrity of data transmitted between IoT devices by storing a hash of the transmitted data in the blockchain ledger.

2.The method of claim 1, wherein the cryptographic key pair generation utilizes an elliptic curve cryptography (ECC) algorithm to ensure lightweight and efficient key management suitable for resource-constrained IoT devices.

3.The method of claim 1, further comprising a decentralized consensus algorithm based on Proof of Authority (PoA) to reduce latency and computational overhead in the IoT blockchain network.

Documents

NameDate
202441088014-COMPLETE SPECIFICATION [14-11-2024(online)].pdf14/11/2024
202441088014-DECLARATION OF INVENTORSHIP (FORM 5) [14-11-2024(online)].pdf14/11/2024
202441088014-DRAWINGS [14-11-2024(online)].pdf14/11/2024
202441088014-FORM 1 [14-11-2024(online)].pdf14/11/2024
202441088014-FORM-9 [14-11-2024(online)].pdf14/11/2024
202441088014-REQUEST FOR EARLY PUBLICATION(FORM-9) [14-11-2024(online)].pdf14/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.