Securing communication of devices in the internet of things

A device and network technology, applied in the field of device communication in the protection of the Internet of Things, can solve problems such as low bandwidth

Active Publication Date: 2019-09-20
DRNC HLDG INC
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the devices are not always connected to and reachable by a web service, and their bandwidth may be low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Securing communication of devices in the internet of things
  • Securing communication of devices in the internet of things
  • Securing communication of devices in the internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A detailed description of the illustrative embodiments will now be described with reference to the accompanying drawings. While this description provides detailed examples of possible implementations, it should be noted that the details are intended to be exemplary, and in no way limit the scope of the application.

[0019] This paper recognizes that popular messaging protocols for IoT architectures are often weak for even basic security. It is further recognized here that some proposed solutions (e.g., using TLS and X.509 certificates for authentication and channel protection) are not suitable for resource-constrained devices and persistent IoT deployments. For example, encryption certificates with a limited lifetime are not suitable for long-term deployments. Therefore, it is recognized here that some features are missing in current IoT architectures based on publish / subscribe protocols. For example, in various example embodiments described below, there is a device-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

It is recognized herein that current messaging protocols for internet of things (IoT) architectures are often weak from a security perspective, and are often poorly suited for resource- constrained devices. An example IoT system described herein combines device authentication and application-layer key establishment using facilities of IoT messaging protocols. The IoT system may include a Trust Broker, which acts as a registration point for devices, and an edge gateway, which manages communication between a given device and the trust broker (and IoT servers). The edge gateway may acquire a trusted role, such that it may be a secure intermediary for device-server messaging, and such that it can facilitate authentication of devices to services.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Provisional Patent Application No. 62 / 455,071, filed February 6, 2017, the disclosure of which is incorporated herein by reference in its entirety. Background technique [0003] Devices in the Internet of Things (IoT) are usually not directly connected to communication networks. Typically, small IoT devices connect to hubs and gateways, which in turn establish connections to the Internet. A characteristic of such devices is that they are loosely connected through gateways. For example, the devices are not always connected to and reachable by a web service, and their bandwidth may be low. Additionally, IoT devices typically have a long lifespan and are deployed in remote, hard-to-reach areas. [0004] Typical application-layer communication protocols for such resource-constrained IoT devices follow a simple message-centric paradigm, such as a publish (pub) / subscribe (sub) approa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/70
CPCH04L63/0876H04L63/0884H04W4/70H04W12/069H04L12/66H04L63/10H04L63/20H04W12/66
Inventor 安德烈亚斯·施密特
Owner DRNC HLDG INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products