Sign In to Follow Application
View All Documents & Correspondence

Blockchain Enabled Security Enhancement System And Method For Internet Of Things (Iot)

Abstract: The present disclosure pertains to a blockchain enabled security enhancement system and method for lot. The system (100) includes a network (104), including one or more cluster of nodes (106), and a processing unit (104) in communication with the one or more cluster of nodes (106). The processing unit (104) facilitates in forming a first set of cluster nodes from the one or more cluster of nodes using Hybrid Fuzzy Possibility C Means Clustering technique to improve the packet loss and transmission time, and based on degree, energy fairness factor and one or more security component a cluster head is selected. After selecting the cluster head, a set of data packets are transmitted using Efficient secure and fair cluster routing protocol (ESFCRP), and intrusion over packet transfer time is identified. The processing unit (104) is configured to categorize an attacker node and real network node to enhance safety. Using Byzantine agreement classification malicious nodes are detected, and performance comparison is performed.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
17 June 2021
Publication Number
08/2023
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
info@khuranaandkhurana.com
Parent Application
Patent Number
Legal Status
Grant Date
2025-11-06
Renewal Date

Applicants

Chitkara Innovation Incubator Foundation
SCO: 160-161, Sector - 9c, Madhya Marg, Chandigarh- 160009, India.

Inventors

1. PARMAR, Monika
Chitkara University School of Engineering and Technology, Chitkara University, Atal Shiksha Kunj, Pinjore-Nalagarh National Highway (NH-21A), District: Solan - 174103, Himachal Pradesh, India.
2. KAUR, Harsimran Jit
Chitkara University Institute of Engineering and Technology, Chitkara University, Chandigarh-Patiala National Highway, Village Jansla, Rajpura, Punjab - 140401, India.
3. GUPTA, Lipika
Chitkara University School of Engineering and Technology, Chitkara University, Atal Shiksha Kunj, Pinjore-Nalagarh National Highway (NH-21A), District: Solan - 174103, Himachal Pradesh, India.

Specification

The present disclosure relates to the field of network security. More particularly, the present disclosure relates to a blockchain enabled network security system and method for Internet of Things (IoT) for secured data transmission over network without reducing the performance and enhancing throughput efficiency.
BACKGROUND
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art. [0003] As IoT is most common paradigm of today's era. Also, most enormous networking task is securing the Internet of Thing networks and includes every factor like resource constraints, dynamic topologies, finite physical security, and no infrastructure as there is problem of single point failure because of centralized nature of IoT and for same security is a major concern. Insufficient network infrastructure is most important in network architecture arrangements. This greatly influences option and design of authentication, mechanism of pre-authentication and protocols for key exchange, and also prerequisites and various types of mechanisms regarding the management of key. On the Internet of Thing network, constructing the secure pre-authentication channel is a difficult prospect since nodes require to pre-share keys across unprotected channels in absence of a Trusted Third Party (TTP). Insufficient infrastructure also makes it difficult in many authentications and key exchange protocols. The next difficulty is resource-constrained nodes and solution should be more effective to improve the transmission and reduce computational costs.
[0004] Node mobility and dynamics do not influence protocols of security directly. These properties should be reviewed for designing proper key management mechanisms. Owing to inadequate physical protection and ease of accessibility, compromise of node takes place easily. Therefore, security solutions

should be strong enough to the node compromising and reduce deterioration of this compromise when it happens. The traditional management setup doesn't control latency and scalability. There is a requirement of framework that shows improved throughput and confirms IoT environment secure data transmission without a response delay. The distributed selection without reducing performance and achieving high throughput is required.
[0005] Existing solutions can include Efficient Secure And Fair Cluster Routing Protocol: An improved bee colony optimization cluster based efficient secure and fair routing protocol for mobile ad hoc network where an Efficient Secure and Fair Cluster Routing Protocol (ESFCRP) are proposed which integrates security elements into the clustering method for achieving attacker identification with classification. At this point, Modified Fuzzy Possibility C Means Clustering (MFPCM) algorithm. Also, ESFCRP can be simulated and compared with existing protocols such as NCPR, CLMNRP and RNULVRP. However, the solution does not discloses about HFPCM-Hybrid fuzzy possibility algorithm that shows improved throughput efficiency and minimal loss of data packets during transmission. Another solution can include a Novel Secure and Efficient Clustering Based Routing Protocol for Manet with Certificate Revocation where transmission of messages from the source to the destination, it wants a shortest and stable path, since all the mobile nodes is also in moving state whereas transmittal the message. This will be through with assistance of Restructured network based unclear logic Routing Protocol (RNULVRP). Metrics embrace the expected transmission time, estimated transmission count, etc. If there is any malicious node within the path, alternate path is found. If acknowledgement is not received at intervals the required time which suggests this node either has not forwarded the packet to the neighborhood or it should discard the packet, the actual node is taken into account as a malicious node. In Proposed RNULVRP approach, that efficient to finding out the malicious node and revokes the certificate with less time and resource. This improves the performance, accuracy, and dependability of the network. Clusters are formed to create the revocation method faster, that reduces the network traffic. However, the

solution does not discloses about Blockchain based decentralized HCHF method that can improve throughput and can identify suspicious behavior and controls malicious traffic.
[0006] Another solution can include Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks where a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. However, the solution does not discloses about a secured routing cluster Protocol that can identify intrusion over packet transfer time, categorizes the attacker node and real network node, and can improve safety. Another solution can include an optimal clustering mechanism based on Fuzzy-C means for wireless sensor networks where an energy-efficient clustering algorithm based on Fuzzy-C means for wireless sensor networks is proposed. The improved Fuzzy-C means clustering algorithm is proposed to divide the sensor nodes into a specified number of clusters. The simulation results show that the proposed algorithm can obtain uniform spatial distribution of cluster heads and balance the energy consumption of network effectively. However, the solution does not discloses HFPCM- Hybrid Fuzzy Possibility algorithm along with proposed cluster routing protocol identifies intrusion over packet transfer time. Also, Blockchain consequences can be used to rectify concern delay in packet transmission also clustering is used here to improve the packet loss and transmission time
[0007] There is a need to overcome above mentioned of prior art by bringing a solution that facilitates in improved throughput and confirms IoT environment secure data transmission without a response delay. Also, the solution helps in distributed selection without reducing performance and achieving high throughput. Also, the solution helps in providing high security to network,

improved throughput efficiency and minimal loss of data packets during transmission. The solution also helps in improving throughput and can identify suspicious behavior and controls malicious traffic along with identifying intrusion over packet transfer time, categorizing the attacker node and real network node, and can improve safety. Blockchain consequences are used to rectify the delay in packet transmission also clustering is used in the proposed solution to improve packet loss and transmission time.
OBJECTS OF THE PRESENT DISCLOSURE
[0008] Some of the objects of the present disclosure, which at least one
embodiment herein satisfies are as listed herein below.
[0009] It is an object of the present disclosure to provide a system and method
for blockchain enabled security enhancement related to Internet of Things (IoT)
that facilitates in improving throughput and confirms IoT environment secure data
transmission without a response delay.
[0010] It is an object of the present disclosure to provide a system and method
for blockchain enabled security enhancement that helps in distributed selection
without reducing performance and achieving high throughput.
[0011] It is an object of the present disclosure to provide a system and method
for blockchain enabled security enhancement that helps in providing high security
to network, improved throughput efficiency and minimal loss of data packets
during transmission.
[0012] It is an object of the present disclosure to provide a system and method
for blockchain enabled security enhancement that enables in improving
throughput and identifies suspicious behavior and controls malicious traffic.
[0013] It is an object of the present disclosure to provide a system and method
for blockchain enabled security enhancement that facilitates in identifying
intrusion over packet transfer time, categorizes the attacker node and real network
node, and improves safety with help of efficient secure and fair routing cluster
Protocol (ESFCRP).

[0014] It is an object of the present disclosure to provide a system and method for blockchain enabled security enhancement where output indicates the better packet delivery ratio, network life, output, and packet loss reduction, and meantime delay.
[0015] It is an object of the present disclosure to provide a system and method for blockchain enabled security enhancement where distributed selection is achieved without reducing performance and a high throughput is achieved. [0016] It is an object of the present disclosure to provide a system and method for blockchain enabled security enhancement where Blockchain consequences are used to rectify delay in packet transmission and also clustering is used to improve the packet loss and transmission time.
SUMMARY
[0017] The present disclosure relates to the field of network security. More particularly, the present disclosure relates to a blockchain enabled network security system and method for Internet of Things (IoT) for secured data transmission over network without reducing the performance and enhancing throughput efficiency.
[0018] An aspect of the present disclosure pertains to a blockchain enabled security enhancement system for Internet of Things (IoT). The system may include a network with one or more cluster of nodes, where the one or more cluster of nodes pertain to one or more IoT devices. The system may include one or more processors in communication with the one or more cluster of nodes, where the one or more processors may be operatively coupled with a memory, the memory storing instructions executable by the one or more processors. [0019] In an aspect, the one or more processors may be configured to select a first cluster of nodes from the one or more cluster of nodes using Hybrid Fuzzy Possibility C Means (HFPCM) Clustering, where the one or more processors may be configured to receive a set of data packets from the first cluster of nodes based on the Hybrid Fuzzy Possibility C Means Clustering, where the set of data packets may pertain to information, content related to the IoT devices.

[0020] In an aspect, the one or more processors may be configured to identify a cluster head from the first cluster of nodes based on degree, energy fairness factor and one or more security components. The one or more processors may be configured to transmit the set of data packets to the cluster head using Efficient secure and fair cluster routing protocol (ESFCRP), and may identify intrusion over the set of data packets transfer time. The one or more processors may be configured to detect and categorize an attacker node and a malicious node using Byzantine agreement classification based on the identified intrusion. [0021] In an aspect, the one or more processors may be configured to compare performance of the first cluster of nodes based on the detected and categorized attacker node and malicious node and enables in enhancing security and improving throughput for the set of data packets, and loss of the set of data packets during transmission.
[0022] In an aspect, the formation of the first cluster of nodes using Hybrid Fuzzy Possibility C Means Clustering may facilitate in improving the set of data packets loss and transmission time
[0023] In an aspect, a Restructured Network-based Unclear Logic Routing Protocol may be used to detect shortest and stable path for the transmission of the set of data packets.
[0024] In an aspect, the HFPCM-Hybrid fuzzy possibility algorithm may enable in improving throughput efficiency and minimizing loss of set of data packets during transmission.
[0025] In an aspect, the one or more processors may be configured to identify suspicious behavior of the cluster of one or more nodes and may help in controlling malicious traffic during transmission of the set of data packets. [0026] In an aspect, the one or more processors may be configured to block malicious module and facilitates in controlling the set of data packets loss rate. [0027] In an aspect, the one or more processors may include any or a combination of Software Defined Networking (SDN) Controller, Open flow switch and Node cluster controller.

[0028] In an aspect, the HFPCM- Hybrid Fuzzy Possibility algorithm along with the cluster routing protocol may facilitate in identifying intrusion over set of data packets transfer time.
[0029] In an aspect, secured routing cluster Protocol may enable in identifying intrusion over set of data packets transfer time, categorizes the attacker node and real network node, and facilitates in improving safety.
[0030] Another aspect of the present disclosure pertains to a method for blockchain enabled security enhancement for Internet of Things (IoT). The method may include steps of selecting, at a one or more processors, a first cluster of nodes from one or more cluster of nodes using Hybrid Fuzzy Possibility C Means Clustering, where the one or more processors may be configured to receive a set of data packets from the first cluster of nodes based on the Hybrid Fuzzy Possibility C Means Clustering. The set of data packets may pertain to information, content related to one or more IoT devices. The one or more processors may be in communication with the one or more cluster of nodes, where the one or more processors may be operatively coupled with a memory, the memory storing instructions executable by the one or more processors. [0031] In an aspect, the method may include a step of identifying, at the one or more processors, a cluster head from the first cluster of nodes based on degree, energy fairness factor and one or more security components. [0032] In an aspect, the method may include a step of transmitting, at the one or more processors, the set of data packets to the cluster head using Efficient secure and fair cluster routing protocol (ESFCRP), and identifies intrusion over the set of data packets transfer time.
[0033] In an aspect, the method may include a step of detecting and categorizing, at the one or more processors, an attacker node and a malicious node using Byzantine agreement classification based on the identified intrusion. The method may include a step of comparing, at the one or more processors, performance of the first cluster of nodes based on the detected and categorized attacker node and malicious node and enables in enhancing security and improving throughput for the set of data packets.

BRIEF DESCRIPTION OF THE DRAWINGS
[0034] The accompanying drawings are included to provide a further
understanding of the present disclosure, and are incorporated in and constitute a
part of this specification. The drawings illustrate exemplary embodiments of the
present disclosure and, together with the description, serve to explain the
principles of the present disclosure.
[0035] The diagrams are for illustration only, which thus is not a limitation of
the present disclosure, and wherein:
[0036] FIG. 1 illustrates network architecture of proposed blockchain enabled
security enhancement system for Internet of Things (IoT), to elaborate upon its
working in accordance with an embodiment of the present disclosure.
[0037] FIG. 2 illustrates exemplary functional components of processing unit
of the proposed blockchain enabled security enhancement system for IoT, in
accordance with an embodiment of the present disclosure.
[0038] FIG. 3 illustrates an exemplary view of the flow diagram of steps
performed by blockchain based security enhancement system, in accordance with
an embodiment of the present disclosure.
[0039] FIG. 4 illustrates an exemplary view of the flow diagram of steps
performed by the processing unit for blockchain enabled security enhancement
system, in accordance with an embodiment of the present disclosure.
[0040] FIG. 5 illustrates an exemplary flow diagram of method for blockchain
enabled security enhancement, in accordance with an embodiment of the present
disclosure.
[0041] FIG. 6 illustrates an exemplary computer system in which or with
which embodiments of the present invention can be utilized in accordance with
embodiments of the present disclosure.
DETAIL DESCRIPTION
[0042] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present

invention. It will be apparent to one skilled in the art that embodiments of the
present invention may be practiced without some of these specific details.
[0043] Embodiments of the present invention include various steps, which
will be described below. The steps may be performed by hardware components or
may be embodied in machine-executable instructions, which may be used to cause
a general-purpose or special-purpose processor programmed with the instructions
to perform the steps. Alternatively, steps may be performed by a combination of
hardware, software, firmware and/or by human operators.
[0044] If the specification states a component or feature "may", "can",
"could", or "might" be included or have a characteristic, that particular component
or feature is not required to be included or have the characteristic.
[0045] As used in the description herein and throughout the claims that
follow, the meaning of "a," "an," and "the" includes plural reference unless the
context clearly dictates otherwise. Also, as used in the description herein, the
meaning of "in" includes "in" and "on" unless the context clearly dictates
otherwise.
[0046] While embodiments of the present invention have been illustrated and
described, it will be clear that the invention is not limited to these embodiments
only. Numerous modifications, changes, variations, substitutions, and equivalents
will be apparent to those skilled in the art, without departing from the spirit and
scope of the invention, as described in the claim.
[0047] The present disclosure relates to the field of network security. More
particularly, the present disclosure relates to a blockchain enabled network
security system and method for Internet of Things (IoT) for secured data
transmission over network without reducing the performance and enhancing
throughput efficiency.
[0048] FIG. 1 illustrates network architecture of proposed blockchain enabled
security enhancement system for Internet of Things (IoT), to elaborate upon its
working in accordance with an embodiment of the present disclosure.
[0049] As illustrated in FIG. 1, the proposed blockchain enabled security
enhancement system(interchangeably referred to as system , herein) can include a

network (102) (interchangeably referred to as networking module (102), one or more cluster of nodes (106-1, 106-2... 108-N (collectively referred to as cluster of nodes (106) and individually referred to as node (106), herein), and one or more processors (104) (interchangeably referred to as processing unit (104). The one or more cluster of nodes (106) are communicatively coupled to the processing unit (104) through the network (102). The one or more cluster of nodes (106) can pertain to one or more Internet of Things (IoT) devices. In an embodiment, the system (100) can facilitate in security enhancement for secured data transmission over the network (102) without reducing performance and enhancing throughput efficiency.
[0050] In an illustrative embodiment, the network (102) can include a communication unit, where the communication unit facilitates communication between the one or more cluster of nodes (106). In another illustrative embodiment, the communication unit can include any or a combination of Wireless local area network (WLAN), Wireless fidelity (Wi-fi), Worldwide interoperability for microwave access (WiMAX), cellular communication module, and the like.
[0051] In an illustrative embodiment, the one or more cluster of nodes (106) can include any or a combination of IoT based devices like mobile computing device like cell phones, mobiles, laptops, computers, a smart phone, a portable computer, a personal digital assistant, a handheld device, computer, but not limited to the like.
[0052] In an embodiment, the system (100) can be implemented using any or a combination of hardware components and software components such as a cloud, a server, a computing system, a computing device, a network device and the like. Further, the one or more cluster of nodes (106) can interact with the processing unit (104), through plurality of networking module (102), such as Wi-Fi, Bluetooth, Li-Fi, WLAN. In an implementation, the system (100) can be accessed by the networking module (102) or a server that can be configured with any operating system, including but not limited to, Android™, iOS™, and the like.

[0053] In an embodiment, the processing unit (104) can include any or a combination of Software Defined Networking (SDN) Controller, Open flow switch, Node cluster controller, and the like
[0054] Further, the networking module (102) can be a wireless network, a wired network or a combination thereof that can be implemented as one of the different types of networks, such as Intranet, Local Area Network (LAN), Wide Area Network (WAN), Internet, and the like. Further, the networking module (102) can either be a dedicated network or a shared network. The shared network can represent an association of the different types of networks that can use variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like.
[0055] In an illustrative embodiment, the system (100) can disclose a framework for security enhancement, where the processing unit (104) can facilitate in selecting a first cluster of nodes from the one or more nodes from the network (102) randomly, and can enable in cluster head selection. In another illustrative embodiment, the first cluster of nodes can be formed using Hybrid Fuzzy Possibility C Means Clustering technique to improve set of data packets loss and transmission time, where the set of data packets can be received by the processing unit (104) from the first cluster of nodes and based on degree, energy fairness factor and one or more security component a cluster head can be selected. After selecting the cluster head, the set of data packets can be transmitted using Efficient secure and fair cluster routing protocol (ESFCRP), and the ESFCRP can identify intrusion over set of data packets transfer time. The processing unit (104) can facilitate in categorizing an attacker node and real network node to enhance safety.
[0056] In an illustrative embodiment, for detection of shortest and stable path a Restructured Network-based Unclear Logic Routing Protocol can be used. Using one or more techniques such as Byzantine agreement classification, malicious nodes can be detected, and performance comparison can be performed. Further, output received from performance comparison indicates better set of data packets

delivery ratio, network life, output, set of data packets loss reduction, and meantime delay, also Blockchain consequences can be used to rectify delay in the set of data packets transmission.
[0057] In an illustrative embodiment, HFPCM Hybrid fuzzy possibility algorithm can facilitate in improving throughput efficiency and minimal loss of set of data packets during transmission. Blockchain based decentralized HCHF method can help in improving the system (100) and enables in identifying suspicious behavior and controls malicious traffic. In another illustrative embodiment, the system (100) can facilitate in blocking malicious module and help in controlling the set of data packets loss rate. He secured routing cluster Protocol identifies intrusion over packet transfer time, categorizes the attacker node and real network node, it will improve safety. HFPCM- Hybrid Fuzzy Possibility algorithm along with the proposed cluster routing protocol identifies intrusion over packet transfer time. Blockchain consequences can be used to rectify concern delay in the set of data packets transmission also clustering can be used to improve the set of data packets loss and transmission time. [0058] In an illustrative embodiment, the system (100) can facilitate in network security enhancement with implementation of Efficient Secure and Fair Cluster Routing Protocol (ESFCRP) and compare with RNULVRP (Restructured Network-based Unclear Logic for the Valid Routing Path). Analysis of attacker identification along with classification can also be presented. In another illustrative embodiment, the Hybrid Fuzzy Possibility C Means Clustering (HFPCM) algorithm can be used optimizing various clusters in IoT networks. [0059] FIG. 2 illustrates exemplary functional components of processing unit of the proposed blockchain enabled security enhancement system for lot, in accordance with an embodiment of the present disclosure.
[0060] FIG. 3 illustrates an exemplary view of the flow diagram of steps performed by blockchain based security enhancement system, in accordance with an embodiment of the present disclosure.

[0061] FIG. 4 illustrates an exemplary view of the flow diagram of steps performed by the processing unit for blockchain enabled security enhancement system, in accordance with an embodiment of the present disclosure. [0062] As illustrated in an embodiment, the processing unit (104) can include one or more processor(s) (202). The one or more processor(s) (202) can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) (202) are configured to fetch and execute computer-readable instructions stored in a memory (204) of the processing unit (104). The memory (204) can store one or more computer-readable instructions or routines, which may be fetched and executed to create or share the data units over a network service. The memory (204) can include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like. [0063] In an embodiment, the processing unit (104) can also include an interface(s) (206) of one or more Internet of Things (IoT) based devices. The interface(s) (206) may include a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) (206) may facilitate communication of the processing unit (104) with various IoT devices can be coupled to the processing unit (104). The interface(s) (206) may also provide a communication pathway for one or more components of the processing unit (104). Examples of such components include, but are not limited to, processing engine(s) (208) and database (210). [0064] In an embodiment, the processing engine(s) (208) can be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) (208). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) (208) may be processor executable instructions stored on a non-transitory machine-readable storage medium and the

hardware for the processing engine(s) (208) may include a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (208). In such examples, the processing unit (104) can include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the processing unit (104) and the processing resource. In other examples, the processing engine(s) (208) may be implemented by electronic circuitry. A database (210) can include data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine(s) (208).
[0065] In an embodiment, the processing engine(s) (208) can include a selection unit (212), a categorization unit (214), a comparison unit (216), and other unit (s) (218). The other unit(s) (218) can implement functionalities that supplement applications or functions performed by the processing unit (100) or the processing engine(s) (208).
[0066] The database (210) can include data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine(s) (208).
[0067] As illustrated in FIG. 2, the processing unit (104) can be configured to receive a set of data packets from one or more cluster of nodes (106), where the one or more cluster of nodes (106) can pertain to Internet of Things (IoT) based devices. In an embodiment, the processing unit (104) can be communicatively coupled to the one or more cluster of nodes (106). In an embodiment, the processing unit (104) can be operatively coupled with a memory, the memory storing instructions executable by the one or more processors (104). [0068] In an embodiment, the processing unit (104) can include any or a combination of Software Defined Networking (SDN) Controller, Open flow switch, Node cluster controller, and the like. In another embodiment, the selection unit (212) can be configured to receive the set of data packets from the one or

more cluster of nodes (106) and can select a first cluster of nodes from the one or more cluster of nodes (106) using Hybrid Fuzzy Possibility C Means (HFPCM) Clustering. In an illustrative embodiment, the selection unit (212) can be configured to receive the set of data packets from the first cluster of nodes based on the Hybrid Fuzzy Possibility C Means Clustering. In another illustrative embodiment, the set of data packets can pertain to information, content related to the one or more IoT devices.
[0069] In an illustrative embodiment, formation of the first cluster of nodes using Hybrid Fuzzy Possibility C Means Clustering can facilitate in improving the set of data packets loss and transmission time. In another illustrative embodiment, the HFPCM-Hybrid fuzzy possibility algorithm can enable in improving throughput efficiency and minimizing loss of set of data packets during transmission. In yet another illustrative embodiment, the HFPCM- Hybrid Fuzzy Possibility algorithm along with the cluster routing protocol can facilitate in identifying intrusion over set of data packets transfer time.
[0070] In an illustrative embodiment, the selection unit (212) can be configured to identify a cluster head from the first cluster of nodes based on degree, energy fairness factor and one or more security components. In another illustrative embodiment, the selection unit (212) can be configured to transmit the set of data packets to the cluster head using Efficient secure and fair cluster routing protocol (ESFCRP), where the ESFCRP can identify intrusion over the set of data packets transfer time, where information pertaining to identified intrusion can be transmitted to the categorization unit (214).
[0071] In an illustrative embodiment, the categorization unit (214) can be configured to detect and categorize an attacker node and a malicious node using Byzantine agreement classification based on the identified intrusion. In another illustrative embodiment, the categorization unit (214) can be configured to detect and identify the malicious node or the attacker node that can hamper throughput efficiency, speed of transmission of the set of data packets. In yet another illustrative embodiment, information pertaining to malicious node and attacker node can be transmitted to the comparison unit (216) for performance comparison.

[0072] In an illustrative embodiment, the categorization unit (214) can be configured to detect a shortest and stable path for transmission of the set of data packets using Restructured Network-based Unclear Logic Routing Protocol. In another illustrative embodiment, the categorization unit (214) can be configured to identify suspicious behavior of the cluster of one or more nodes (106) and can helps in controlling malicious traffic during transmission of the set of data packets.
[0073] In an embodiment, after the malicious and attacker node is detected by the categorization unit (216), information pertaining to the malicious node detection and attacker node can be compared by the comparison unit (216), where the comparison unit (216) can compare the performance of the one or more IoT based devices through the set of data packets lost, delayed, and corrupted. In an illustrative embodiment, the comparison unit (216) can store the information pertaining to the malicious node detection and the attacker node in the database (210). In another illustrative embodiment, the comparison unit (216) can be configured to compare performance of the first cluster of nodes based on the detected and categorized attacker node and malicious node and enables in enhancing security and improving throughput for the set of data packets, and loss of the set of data packets during transmission.
[0074] In an illustrative embodiment, the other unit(s) (218) can be configured to block malicious module and facilitates in controlling the set of data packets loss rate. In another illustrative embodiment, the other unit(s) (218) can be configured to identify intrusion over set of data packets transfer time, categorizes the attacker node and real network node, and facilitates in improving safety through a secured routing cluster Protocol.
[0075] It would be appreciated that units being described are only exemplary units and any other unit or sub-unit may be included as part of the processing unit (104). These units too may be merged or divided into super- units or sub-units as may be configured.
[0076] In an embodiment, FIG. 3 illustrates a flow diagram of step involved in the system (100). The system (100) can help in security enhancement framework,

where a consensus routing protocol can help in improving the security. The cluster head can be selected and set of data packets can be transmitted. Efficient secure and fair cluster routing protocol (ESFCRP) can facilitate in transmission of the set of data packets. Restructured network based unclear logic for valid routing path (RNUL VRP) can enable in Path Selection with low energy and the malicious node can be detected. After detection of the malicious node, performance comparison can be done.
[0077] In an embodiment, FIG. 4 illustrates a flow diagram of steps performed by the processing unit (104) for the system (100). The processing unit (104) can be configured to select the first cluster of nodes from the one or more cluster of nodes a cluster head from network model using Hybrid Fuzzy Possibility C Means Clustering. The processing unit (104) can be configured to select a cluster head. The processing unit (104) can be configured to transmit the set of data packets using ESFCRP and can enable in path selection with low energy for the transmission of the ser of data packets. The malicious node can be detected through Byzantine Agreement Classification System and the performance can be compared.
[0078] FIG. 5 illustrates an exemplary flow diagram of method for blockchain enabled security enhancement, in accordance with an embodiment of the present disclosure.
[0079] In an embodiment, FIG. 5 illustrates a method (500) for blockchain enabled security enhancement for Internet of Things (IoT). The method can include a step (502) of selecting, at a one or more processors (104), a first cluster of nodes from one or more cluster of nodes (106) using Hybrid Fuzzy Possibility C Means Clustering, where the one or more processors (104) can be configured to receive a set of data packets from the first cluster of nodes based on the Hybrid Fuzzy Possibility C Means Clustering, where the set of data packets can pertain to information, content related to one or more IoT devices.
[0080] In an embodiment, the one or more processors (104) can be in communication with the one or more cluster of nodes (106), where the one or

more processors (104) can be operatively coupled with a memory, the memory
storing instructions executable by the one or more processors.
[0081] In an embodiment, the method (500) can include a step (504) of
identifying, at the one or more processors (104), a cluster head from the first
cluster of nodes based on degree, energy fairness factor and one or more security
components.
[0082] In an aspect, the method (500) can include a step (506) of transmitting,
at the one or more processors, the set of data packets to the cluster head using
Efficient secure and fair cluster routing protocol (ESFCRP), and identifies
intrusion over the set of data packets transfer time.
[0083] In an aspect, the method (500) can include a step (508) of detecting
and categorizing, at the one or more processors (104), an attacker node and a
malicious node using Byzantine agreement classification based on the identified
intrusion.
[0084] In an aspect, the method (500) can include a step (510) of comparing,
at the one or more processors (104), performance of the first cluster of nodes
based on the detected and categorized attacker node and malicious node and
enables in enhancing security and improving throughput for the set of data
packets.
[0085] FIG. 6 illustrates an exemplary computer system in which or with
which embodiments of the present invention can be utilized in accordance with
embodiments of the present disclosure.
[0086] As shown in FIG. 6, computer system includes an external storage
device (610), a bus (620), a main memory (630), a read only memory (640), a
mass storage device (650), communication port (660), and a processor (670). A
person skilled in the art will appreciate that computer system may include more
than one processor and communication ports. Examples of processor 670 include,
but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD®
Opteron® or Athlon MP® processor(s), Motorola® lines of processors,
FortiSOC™ system on a chip processors or other future processors. Processor
(670) may include various modules associated with embodiments of the present

invention. Communication port (660) can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port (660) may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[0087] In an embodiment, the memory (630) can be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. Read only memory (640) can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor (670). Mass storage (650) may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7102 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc. [0088] In an embodiment, the bus (620) communicatively couples processor(s) (670) with the other memory, storage and communication blocks. Bus (620) can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects processor (670) to software system. [0089] In another embodiment, operator and administrative interfaces, e.g. a display, keyboard, and a cursor control device, may also be coupled to bus (620) to support direct operator interaction with computer system. Other operator and administrative interfaces can be provided through network connections connected

through communication port (660). External storage device (610) can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc -Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[0090] As used herein, and unless the context dictates otherwise, the term "coupled to" is intended to include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean "communicatively coupled with" over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[0091] It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements,' components, or steps that are not expressly referenced. [0092] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill

in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
[0093] The present disclosure provides a system and method for blockchain
enabled security enhancement related to Internet of Things (IoT) that facilitates in
improving throughput and confirms IoT environment secure data transmission
without a response delay.
[0094] The present disclosure provides a system and method for blockchain
enabled security enhancement that helps in distributed selection without reducing
performance and achieving high throughput.
[0095] The present disclosure provides a system and method for blockchain
enabled security enhancement that helps in providing high security to network,
improved throughput efficiency and minimal loss of data packets during
transmission.
[0096] The present disclosure provides a system and method for blockchain
enabled security enhancement that enables in improving throughput and identifies
suspicious behavior and controls malicious traffic.
[0097] The present disclosure provides a system and method for blockchain
enabled security enhancement that facilitates in identifying intrusion over packet
transfer time, categorizes the attacker node and real network node, and improves
safety with help of efficient secure and fair routing cluster Protocol (ESFCRP).
[0098] The present disclosure provides a system and method for blockchain
enabled security enhancement where output indicates the better packet delivery
ratio, network life, output, and packet loss reduction, and meantime delay.
[0099] The present disclosure provides a system and method for blockchain
enabled security enhancement where distributed selection is achieved without
reducing performance and a high throughput is achieved.

[00100] The present disclosure provides a system and method for blockchain enabled security enhancement where Blockchain consequences are used to rectify delay in packet transmission and also clustering is used to improve the packet loss and transmission time.

We Claim:

1. A blockchain enabled security enhancement system (100) for Internet of
Things (IoT), wherein the system (100) comprises of:
a network (102) including one or more cluster of nodes (106), wherein the one or more cluster of nodes (106) pertain to one or more IoT devices,
one or more processors (104) in communication with the one or more cluster of nodes (106), wherein the one or more processors (104) are operatively coupled with a memory, the memory storing instructions executable by the one or more processors and configured to:
select a first cluster of nodes from the one or more cluster of nodes (106) using Hybrid Fuzzy Possibility C Means (HFPCM) Clustering, wherein the one or more processors (104) are configured to receive a set of data packets from the first cluster of nodes based on the Hybrid Fuzzy Possibility C Means Clustering, wherein the set of data packets pertain to information, content related to the one or more IoT devices;
identify a cluster head from the first cluster of nodes based on degree, energy fairness factor and one or more security components,
transmit the set of data packets to the cluster head using Efficient secure and fair cluster routing protocol (ESFCRP), and identifies intrusion over the set of data packets transfer time
detect and categorize an attacker node and a malicious node using Byzantine agreement classification based on the identified intrusion
compare performance of the first cluster of nodes based on the detected and categorized attacker node and malicious node and enables in enhancing security and improving throughput for the set of data packets, and loss of the set of data packets during transmission.
2. The system (100) as claimed in claim 1, wherein the formation of the first
cluster of nodes using Hybrid Fuzzy Possibility C Means Clustering facilitates in
improving the set of data packets loss and transmission time.

3. The system (100) as claimed in claim 1, wherein a Restructured Network-based Unclear Logic Routing Protocol is used to detect shortest and stable path for the transmission of the set of data packets.
4. The system (100) as claimed in claim 1, wherein the HFPCM-Hybrid fuzzy possibility algorithm enables in improving throughput efficiency and minimizing loss of set of data packets during transmission.
5. The system (100) as claimed in claim 1, wherein the one or more processors (104) are configured to identify suspicious behavior of the cluster of one or more nodes (106) and helps in controlling malicious traffic during transmission of the set of data packets.
6. The system (100) as claimed in claim 1, wherein the one or more processors (104) are configured to block malicious module and facilitates in controlling the set of data packets loss rate.
7. The system (100) as claimed in claim 1, wherein the one or more processors (104) includes any or a combination of Software Defined Networking (SDN) Controller, Open flow switch and Node cluster controller.
8. The system (100) as claimed in claim 1, wherein the FIFPCM- Hybrid Fuzzy Possibility algorithm along with the cluster routing protocol facilitates in identifying intrusion over set of data packets transfer time.
9. The system (100) as claimed in claim 1, wherein secured routing cluster Protocol enables in identifying intrusion over set of data packets transfer time, categorizes the attacker node and real network node, and facilitates in improving safety.
10. A method (500) for blockchain enabled security enhancement for Internet of Things (IoT), wherein the method (500) comprises of:
selecting, at a one or more processors (104), a first cluster of nodes from one or more cluster of nodes (106) using Hybrid Fuzzy Possibility C Means Clustering, wherein the one or more processors (104) are configured to receive a set of data packets from the first cluster of nodes based on the Hybrid Fuzzy Possibility C Means Clustering, wherein the set of data packets pertain to information, content related to one or more IoT devices,

wherein the one or more processors (104) are in communication with the one or more cluster of nodes, wherein the one or more processors (104) are operatively coupled with a memory, the memory storing instructions executable by the one or more processors (104);
identifying, at the one or more processors (104), a cluster head from the first cluster of nodes based on degree, energy fairness factor and one or more security components;
transmitting, at the one or more processors (104), the set of data packets to the cluster head using Efficient secure and fair cluster routing protocol (ESFCRP), and identifies intrusion over the set of data packets transfer time;
detecting and categorizing, at the one or more processors (104), an attacker node and a malicious node using Byzantine agreement classification based on the identified intrusion, and
comparing, at the one or more processors (104), performance of the first cluster of nodes based on the detected and categorized attacker node and malicious node and enables in enhancing security and improving throughput for the set of data packets.

Documents

Application Documents

# Name Date
1 202111027008-STATEMENT OF UNDERTAKING (FORM 3) [17-06-2021(online)].pdf 2021-06-17
2 202111027008-POWER OF AUTHORITY [17-06-2021(online)].pdf 2021-06-17
3 202111027008-FORM FOR STARTUP [17-06-2021(online)].pdf 2021-06-17
4 202111027008-FORM FOR SMALL ENTITY(FORM-28) [17-06-2021(online)].pdf 2021-06-17
5 202111027008-FORM 1 [17-06-2021(online)].pdf 2021-06-17
6 202111027008-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [17-06-2021(online)].pdf 2021-06-17
7 202111027008-EVIDENCE FOR REGISTRATION UNDER SSI [17-06-2021(online)].pdf 2021-06-17
8 202111027008-DRAWINGS [17-06-2021(online)].pdf 2021-06-17
9 202111027008-DECLARATION OF INVENTORSHIP (FORM 5) [17-06-2021(online)].pdf 2021-06-17
10 202111027008-COMPLETE SPECIFICATION [17-06-2021(online)].pdf 2021-06-17
11 202111027008-Proof of Right [14-07-2021(online)].pdf 2021-07-14
12 202111027008-FORM 18 [08-04-2023(online)].pdf 2023-04-08
13 202111027008-FER.pdf 2023-09-15
14 202111027008-FORM-26 [30-10-2023(online)].pdf 2023-10-30
15 202111027008-FER_SER_REPLY [30-10-2023(online)].pdf 2023-10-30
16 202111027008-DRAWING [30-10-2023(online)].pdf 2023-10-30
17 202111027008-CORRESPONDENCE [30-10-2023(online)].pdf 2023-10-30
18 202111027008-CLAIMS [30-10-2023(online)].pdf 2023-10-30
19 202111027008-US(14)-HearingNotice-(HearingDate-19-08-2025).pdf 2025-07-17
20 202111027008-FORM-26 [13-08-2025(online)].pdf 2025-08-13
21 202111027008-Correspondence to notify the Controller [13-08-2025(online)].pdf 2025-08-13
22 202111027008-Written submissions and relevant documents [03-09-2025(online)].pdf 2025-09-03
24 202111027008-IntimationOfGrant06-11-2025.pdf 2025-11-06

Search Strategy

1 SearchHistory14092023E_14-09-2023.pdf

ERegister / Renewals