Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for improving security at edge nodes

A technology of edge nodes and proxy nodes, which is applied in the direction of secure communication devices, computer security devices, and electronic digital data processing, etc., can solve problems such as not providing security functions, not working normally, and information leakage, so as to improve the available protection , security and stability improvements

Inactive Publication Date: 2021-08-24
ARM IP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Simple Internet of Things (IoT) devices are known to be incapable of providing complex security functions, and as a result there is a general concern that IoT will not function properly due to security attacks and information leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving security at edge nodes
  • Method for improving security at edge nodes
  • Method for improving security at edge nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Edge nodes such as simple Internet of Things (IoT) devices often do not have the resources needed to adequately protect themselves from security threats. To improve the security of simple IoT devices, more complex functions such as security functions, applications and updates are delegated to nearby proxy nodes. A proxy node is any device within communication range of an edge node that has the resources needed to perform more complex functions on behalf of the edge node. When a security threat is detected, edge nodes and proxy nodes increase their restart frequency, thwarting the attacker's ability to maintain a corrupted infection state. Additionally, agent nodes install, configure, and run updates as they become available so that edge nodes do not need to provide updated resources. After the updates are installed, reduce the restart frequency to normal operating frequency.

[0026] An edge node may be any device with constrained capabilities, such as power, computin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A machine-implemented method for securing at least one edge node in a network of nodes is provided. The method includes: communicatively coupling the at least one edge node and a proxy node; providing an application for the at least one edge node in an isolated area associated with the at least one edge node at the proxy node; determining that an update is required for the at least one edge node; increasing the restart frequency of the at least one edge node after determining that an update is required; and increasing the restart frequency of the proxy node after determining that an update is required.

Description

technical field [0001] The technology relates to apparatus and methods for improving security at simple Internet of Things devices. More specifically, the technology relates to improving security at simple IoT devices through a combination of proxy nodes and defensive secure reboots. Background technique [0002] It is known that simple Internet of Things (IoT) devices do not have the ability to provide complex security functions, and as a result there is a general concern that the Internet of Things will not function properly due to security attacks and information leakage. Contents of the invention [0003] According to a first technique, there is provided a machine-implemented method for securing at least one edge node in a network of nodes. The method includes: communicatively coupling the at least one edge node and a proxy node; providing an application for the at least one edge node in an isolated area associated with the at least one edge node at the proxy node; de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04W84/18
CPCG06F21/51G06F21/53H04L63/0281G06F21/575H04L67/34G06F8/65G06F2009/45575G06F9/45558H04L67/56G06F8/61G06F9/4406H04L41/0886H04W84/18H04L9/40H04L65/40
Inventor P·H·格雷乔夫
Owner ARM IP