Abstract: In loT (Internet of Things) the centralized architectures provide the services where the centralized entities collect the information process it and provide the information. Instead distributed architectures can also be used where dynamic exchange of data takes place between the entities which collaborate as present at the network edge. Better understanding of the applications of the distributed approach is possible by knowing the merits and demerits in terms of its features and challenges towards its privacy and security. The work is fastened by IoT with the help of sensors, actuators and wireless network as the job is controlled without the intervention of the human. The three layers of IoT consist of realization that is imaginary. This invention focuses on the strength and properties along with its challenges of the distributed approach to be solved.
SECURITY AND CHALLENGES OF PROTECTION AND PRIVACY IN
DISTRIBUTED IOT
Field and background of the invention
The idea behind Internet of Things (IoT) is developed over time. IoT is a network that is spread worldwide with number of entities that are interconnected. The entities that are heterogeneous have counterpart with location and address on Internet. A communication channel can be opened that provides service all round the clock at any location using IoT. The basic blocks of this paradigm are the various technologies such as RFID (Radio frequency identification), machine to machine interface (M2M) etc. Various domain applications such as- logistics, monitoring of environment, healthcare, automotive etc forms this paradigm. A single strategy cannot realize the IoT's vision hence requires centralized approach. Summary of Invention
The proposed invention focus on the concept of distributed IoT which considers various documents that implements IoT in real world applications. The architecture of IoT has to be centralized which is autonomous with intelligence equally distributed even at the edges of the network. When the intelligence of the network is distributed, privacy of the data shared is to be considered. Security is the main feature necessary in the field of IoT. The main challenges in the field of IoT is designing and deploying the mechanisms of security. This condition has to be considered for the implementation of distributed IoT in the real world applications.
The approaches that are well suited for providing security in distributed IoT are
explored.
Brief description of the system
The architecture of IoT with centralized control poses challenges that are addressed in this invention. The central entity consists of the application logic such as a application platform of IoT that is cloud based, provides limited entry points that are well known to the network. The central entity is connected to the input system which are the providers of data such as sensors and to the output system such as actuators which are the user applications. The logic for authentication is centralized in this entity or in the associated provider's identity. As there is no problem of scalability, a trust relationship is established with the centralized entity. When the collaboration principle complies with IoT, the management system of federated identity can be used with the service providers belonging to the same level of trust. This invention involves the N to N scenario with the providers of data are active which acquires the information from other possible sources. Direct query of the local information providers is possible without the entities that are externally included. The logic of authentication is provided in each of the service provider such that at most security is provided.
The invention is herein described by the following block diagram where, Figl. The System Approaches
Description of the system
Authentication that is successful is always accompanied by secure communication, such as protocols providing authentication to the server and mutually. User credentials liked shared keys or certificates are used by this process. Easy management and distribution of credentials is possible if the application providers are centralized and limited. More challenges arise in the case of distributed architectures of IoT as connection of an entity is possible with other entity with information exchanged between them. Hence major problem in this case is the management of key. Challenges of resources for computation are also added. A secured channel can be opened with the devices negotiate the parameters like mechanism for protection, algorithms and strength. Implementation of certain configurations is possible only by certain constrained devices. Strong mechanism of protection is needed for important data to be secured.
CLAIMS We Claim:
1. Many challenges such as interoperability, authentication management, model of the business and entity authorization are considered.
2. Centralized application platform is concentrated by the logic of intelligence.
3. Distributed entities manage the data which pushes or pulls data when required.
4. Approach is applicable and beneficial to the real world applications.
5. Co-existence of both distributed and centralized approaches with each other.
| # | Name | Date |
|---|---|---|
| 1 | Form9_Earlier Publication_18-10-2019.pdf | 2019-10-18 |
| 2 | Form5_As Filed_18-10-2019.pdf | 2019-10-18 |
| 3 | Form3_As Filed_18-10-2019.pdf | 2019-10-18 |
| 4 | Form2 Title Page_Complete_18-10-2019.pdf | 2019-10-18 |
| 5 | Form1_As Filed_18-10-2019.pdf | 2019-10-18 |
| 6 | Form18_Normal Request_18-10-2019.pdf | 2019-10-18 |
| 7 | Drawings_As Filed_18-10-2019.pdf | 2019-10-18 |
| 8 | Description Complete_As Filed_18-10-2019.pdf | 2019-10-18 |
| 9 | Claims_As Filed_18-10-2019.pdf | 2019-10-18 |
| 9 | Form3_As Filed_18-10-2019.pdf | 2019-10-18 |
| 10 | Abstract_As Filed_18-10-2019.pdf | 2019-10-18 |
| 10 | Form5_As Filed_18-10-2019.pdf | 2019-10-18 |
| 11 | 201941042289-FER.pdf | 2021-12-15 |
| 11 | Form9_Earlier Publication_18-10-2019.pdf | 2019-10-18 |
| 1 | 201941042289E_25-11-2021.pdf |