image
image
user-login
Patent search/

BLOCKCHAIN-ENHANCED CYBERSECURITY SYSTEM FOR IOT DEVICE AND NETWORK SECURITY

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

BLOCKCHAIN-ENHANCED CYBERSECURITY SYSTEM FOR IOT DEVICE AND NETWORK SECURITY

ORDINARY APPLICATION

Published

date

Filed on 22 November 2024

Abstract

The present invention discloses a blockchain-enhanced cybersecurity system for securing Internet of Things (IoT) devices and networks. It utilizes a permissioned blockchain architecture to provide secure, decentralized communication among IoT devices, ensuring data integrity and protecting against unauthorized access. The system includes secure IoT gateways, lightweight IoT nodes, cryptographic processors, blockchain nodes, and decentralized storage units, each optimized for IoT environments. The IoT devices act as lightweight blockchain nodes, transmitting authenticated data to secure gateways that encrypt and relay it to full blockchain nodes for processing. The system employs a Proof of Authority (PoA) consensus mechanism for efficient transaction validation and integrates advanced encryption techniques, identity management, and smart contracts for automated actions. Additionally, an anomaly detection system monitors device behavior for potential security breaches. This architecture provides a scalable, reliable, and secure infrastructure for IoT applications, mitigating risks associated with IoT device communications and data privacy.

Patent Information

Application ID202411090739
Invention FieldCOMMUNICATION
Date of Application22/11/2024
Publication Number49/2024

Inventors

NameAddressCountryNationality
Ms. Harnit SainiAssistant Professor, Department of Computer Science and Engineering, Ajay Kumar Garg Engineering College, 27th KM Milestone, Delhi - Meerut Expy, Ghaziabad, Uttar Pradesh 201015, India.IndiaIndia
Aditya RawatDepartment of Computer Science and Engineering, Ajay Kumar Garg Engineering College, 27th KM Milestone, Delhi - Meerut Expy, Ghaziabad, Uttar Pradesh 201015, India.IndiaIndia

Applicants

NameAddressCountryNationality
Ajay Kumar Garg Engineering College27th KM Milestone, Delhi - Meerut Expy, Ghaziabad, Uttar Pradesh 201015.IndiaIndia

Specification

Description:[014] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit, and scope of the present disclosure as defined by the appended claims.
[015] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[016] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail to avoid obscuring the embodiments.
[017] Also, it is noted that individual embodiments may be described as a process that is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination can correspond to a return of the function to the calling function or the main function.
[018] The word "exemplary" and/or "demonstrative" is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as "exemplary" and/or "demonstrative" is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms "includes," "has," "contains," and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term "comprising" as an open transition word without precluding any additional or other elements.
[019] Reference throughout this specification to "one embodiment" or "an embodiment" or "an instance" or "one instance" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
[020] In an embodiment of the invention and referring to Figures 1, the invention pertains to a comprehensive cybersecurity system that employs blockchain technology to secure Internet of Things (IoT) networks. As IoT deployments continue to expand across industries, the necessity for robust security frameworks to protect device communications, data integrity, and user privacy has become paramount. This system leverages blockchain's decentralized architecture to address the inherent vulnerabilities within IoT networks, establishing an immutable ledger for recording and validating device interactions, thus mitigating risks of data tampering and unauthorized access.
[021] The primary objective of this system is to create a secure, reliable, and scalable IoT infrastructure by integrating blockchain technology with both hardware and software components specifically designed for IoT environments. The system consists of a distributed ledger setup, IoT-specific blockchain nodes, cryptographic modules, consensus mechanisms, and secure IoT gateways. Each component has been optimized to work within the limitations of IoT devices, ensuring minimal computational overhead while maintaining high security.
[022] The blockchain architecture within this system is built on a permissioned blockchain model, specifically tailored for IoT networks. This permissioned model allows for controlled access to data by authorized devices, significantly reducing the risk of unauthorized entities gaining access. Each IoT device connected to the network acts as a "lightweight" node that verifies and transmits data, which is then processed and validated by more powerful "full nodes" embedded in the central hardware of the system.
[023] The hardware components include secure IoT gateways, blockchain nodes, cryptographic processors, and decentralized storage units. Secure IoT gateways manage device interactions and data encryption before transmitting it to the blockchain. Each blockchain node is equipped with a cryptographic processor that ensures data integrity through hashing algorithms. Decentralized storage units are introduced to store blockchain data locally, ensuring faster data access and improving the overall efficiency of the system.
[024] IoT devices act as blockchain "light nodes" with limited processing and storage capacities. These nodes are designed to handle only essential functions, such as data authentication and basic encryption, thereby reducing the computational burden. The light nodes transmit data to secure IoT gateways, which then relay it to full blockchain nodes, where it is processed and validated through consensus protocols.
[025] The secure IoT gateways serve as a bridge between IoT devices and the blockchain network. Each gateway is embedded with a specialized cryptographic processor that applies asymmetric encryption algorithms, such as RSA or ECC, to secure data packets. By encrypting data before transmission, the system ensures that only authorized blockchain nodes can access and validate the information.
[026] Blockchain nodes are equipped with advanced cryptographic processors capable of performing hashing, encryption, and digital signature verification. These processors employ SHA-256 hashing for data integrity and digital signatures for identity verification. By ensuring that data cannot be altered without detection, the cryptographic processors enhance the overall trustworthiness of the network.
[027] Decentralized storage units are integrated into the system to locally store blocks of data. This design reduces data retrieval times and enhances the speed of the blockchain validation process. Each storage unit is synchronized with other storage nodes, ensuring consistency and redundancy across the network.
[028] The software components consist of consensus algorithms, identity management modules, encryption and decryption protocols, smart contracts, and an anomaly detection system. These software modules collectively strengthen the security of IoT devices and ensure seamless interoperability with the blockchain network.
[029] The system employs a Proof of Authority (PoA) consensus algorithm, which is suitable for IoT networks due to its low computational requirements. In this model, designated validator nodes authenticate transactions, ensuring rapid and secure data processing without compromising the integrity of the blockchain.
[030] The identity management module assigns unique cryptographic identities to each IoT device, enabling secure authentication. Each identity is recorded on the blockchain, creating a tamper-proof log that verifies the identity and authenticity of devices before allowing network access.
[031] Data encryption and decryption are managed through a layered cryptographic framework, where public-key infrastructure (PKI) and symmetric key algorithms are used in conjunction. This multi-layered approach ensures that only authorized nodes can access the encrypted data, protecting sensitive information even if intercepted during transmission.
[032] Smart contracts are used to automate specific device actions based on predefined conditions. For example, IoT sensors can trigger a smart contract to record environmental data if certain thresholds are met. These contracts are stored on the blockchain, ensuring that they cannot be altered without authorization.
[033] An advanced anomaly detection system is integrated to monitor device behavior and detect any deviations that may indicate a security breach. This system uses machine learning algorithms to identify unusual patterns in device data, alerting the network if any suspicious activity is detected.
[034] The system's hardware and software components are interconnected through secure communication channels, allowing seamless data transfer between IoT devices, gateways, and blockchain nodes. This interconnection enables efficient data processing, validation, and storage, which are essential for maintaining the integrity and reliability of the network.
[035] IoT device security is ensured through the combination of hardware-based cryptographic modules and software-based identity verification protocols. Each device's identity is recorded on the blockchain, allowing for continuous monitoring and authentication.
[036] Blockchain security is reinforced through cryptographic hashing, consensus protocols, and digital signatures. Each block of data contains a unique hash, linking it to previous blocks and creating an immutable chain that prevents unauthorized alterations.
[037] Network security is achieved by securing the interaction between IoT devices and the blockchain network. The system uses secure socket layer (SSL) protocols to encrypt communication channels, ensuring data privacy and preventing eavesdropping.
[038] The system is designed to support scalability, allowing additional IoT devices and blockchain nodes to be seamlessly integrated. This is achieved through modular hardware and software architectures, which enable incremental expansion without compromising performance.
[039] Performance is optimized by implementing edge computing within secure IoT gateways. By processing data at the edge of the network, the system reduces latency, improves data processing speed, and minimizes reliance on centralized servers.
[040] The integration of hardware and software components within this system significantly enhances its cybersecurity capabilities. By combining secure hardware with robust software algorithms, the system achieves a higher level of security than either component alone could provide.
Table 1: Comparative Table of System Efficacy

[041] The system has undergone extensive security validation, including penetration testing, cryptographic strength assessment, and reliability testing. Each component has been rigorously tested to ensure that it performs as expected under various conditions. , Claims:1. A blockchain-enhanced cybersecurity system for securing Internet of Things (IoT) devices and network communications, comprising:
a) a permissioned blockchain architecture configured to enable controlled access to data through authorized IoT devices;
b) IoT devices acting as lightweight nodes to authenticate and transmit data to secure IoT gateways;
c) secure IoT gateways embedded with cryptographic processors to encrypt data before transmitting it to blockchain nodes;
d) blockchain nodes equipped with cryptographic processors to perform data hashing, encryption, and digital signature verification to ensure data integrity;
e) decentralized storage units to locally store blockchain data, thereby ensuring faster retrieval and improved processing efficiency;
f) consensus mechanisms for transaction validation, utilizing a Proof of Authority (PoA) protocol to ensure rapid and secure data processing.
2. The system as claimed in claim 1, wherein the cryptographic processors within the secure IoT gateways use asymmetric encryption algorithms, including RSA or ECC, to secure data packets prior to transmission.
3. The system as claimed in claim 1, further includes an identity management module configured to assign cryptographic identities to each IoT device, with the identities recorded and maintained on the blockchain to ensure secure authentication.
4. The system as claimed in claim 1, wherein the decentralized storage units are synchronized across the network, ensuring consistency and redundancy for reliable blockchain data storage.
5. The system as claimed in claim 1, wherein the blockchain nodes employ a SHA-256 hashing algorithm for ensuring data integrity, and digital signatures for verifying the authenticity of data transmitted within the network.
6. The system as claimed in claim 1, further includes a smart contract module that automates device actions based on predefined conditions, such as triggering data recording when certain sensor thresholds are met.
7. The system as claimed in claim 1, further includes an anomaly detection system integrated with machine learning algorithms to monitor IoT device behavior, identify deviations, and alert the network to potential security breaches.
8. The system as claimed in claim 1, wherein the system's hardware and software components are interconnected through secure communication channels using SSL protocols to encrypt data transmission and ensure network security.
9. The system as claimed in claim 1, wherein the performance is optimized by implementing edge computing capabilities within secure IoT gateways, allowing local data processing to reduce latency and improve overall system efficiency.
10. The system as claimed in claim 1, wherein the system is scalable, allowing additional IoT devices and blockchain nodes to be integrated into the network with minimal impact on performance due to its modular hardware and software architecture.

Documents

NameDate
202411090739-COMPLETE SPECIFICATION [22-11-2024(online)].pdf22/11/2024
202411090739-DECLARATION OF INVENTORSHIP (FORM 5) [22-11-2024(online)].pdf22/11/2024
202411090739-DRAWINGS [22-11-2024(online)].pdf22/11/2024
202411090739-EDUCATIONAL INSTITUTION(S) [22-11-2024(online)].pdf22/11/2024
202411090739-EVIDENCE FOR REGISTRATION UNDER SSI [22-11-2024(online)].pdf22/11/2024
202411090739-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [22-11-2024(online)].pdf22/11/2024
202411090739-FORM 1 [22-11-2024(online)].pdf22/11/2024
202411090739-FORM 18 [22-11-2024(online)].pdf22/11/2024
202411090739-FORM FOR SMALL ENTITY(FORM-28) [22-11-2024(online)].pdf22/11/2024
202411090739-FORM-9 [22-11-2024(online)].pdf22/11/2024
202411090739-REQUEST FOR EARLY PUBLICATION(FORM-9) [22-11-2024(online)].pdf22/11/2024
202411090739-REQUEST FOR EXAMINATION (FORM-18) [22-11-2024(online)].pdf22/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.