Method for improving security at edge nodes
A technology of edge nodes and proxy nodes, which is applied in the direction of secure communication devices, computer security devices, and electronic digital data processing, etc., can solve problems such as not providing security functions, not working normally, and information leakage, so as to improve the available protection , security and stability improvements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] Edge nodes such as simple Internet of Things (IoT) devices often do not have the resources needed to adequately protect themselves from security threats. To improve the security of simple IoT devices, more complex functions such as security functions, applications and updates are delegated to nearby proxy nodes. A proxy node is any device within communication range of an edge node that has the resources needed to perform more complex functions on behalf of the edge node. When a security threat is detected, edge nodes and proxy nodes increase their restart frequency, thwarting the attacker's ability to maintain a corrupted infection state. Additionally, agent nodes install, configure, and run updates as they become available so that edge nodes do not need to provide updated resources. After the updates are installed, reduce the restart frequency to normal operating frequency.
[0026] An edge node may be any device with constrained capabilities, such as power, computin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


