Sign In to Follow Application
View All Documents & Correspondence

Intelligent Attack Detection Of A Smart Home Network Security Based On Blockchain

Abstract: Securing a Smart Home network is critical. The rapid development of ICT in smart homes propels IoT from infancy to maturity. Many commercial ventures now allow smart home customers to buy blockchain-based solutions. No explicit instructions exist for adapting blockchain implementation in smart homes. This work proposes a solution to data privacy in smart home network security (SHNS) based on Blockchain to address the issues of smart home network security. Data security, network latency, attack mitigation, and decentralized technologies were offered in this research work. This methodology is intended to assess the security of Blockchain-based Smart Home Networks. In addition, the Token Sharing Approach is utilized to assess network latency, as it combines the benefits of both client-server and decentralized approaches, allowing for more accurate results. Security metrics are identified when the model is proposed. These metrics assess a smart home network's security. 4 claims & 3 Figures

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
30 April 2022
Publication Number
22/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

MLR Institute of Technology
Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad

Inventors

1. Mr. J. Pradeep Kumar
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
2. Dr. Allam Balaram
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
3. Dr. Koppula Srinivas Rao
Department of Computer Science and Engineering, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
4. Dr. Nagireddy Venkata Rajasekhar Reddy
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
5. Mrs. B.Varija
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
6. Mrs. Manda Silparaj
Department of Computer Science and Engineering, Vignan Institute of Technology and Science, Hyderabad-500070
7. Mr. Nagaram Ramesh
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
8. Mr. Panyam Aditya Sharma
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad

Specification

Description: Field of Invention
As a difficult process, smart home network security analysis is crucial for the development and release of an encrypted smart home system, which allows users to control all of their gadgets from a single location. Smart home network security analysis entails finding the most vulnerable parts of the network at the earliest possible stage and analysing the network's traffic, values extracted from it, and the internal behaviours of each subsystem that may indicate a security threat. A smart home system's quality can only be improved if it undergoes security analysis, which is both a prerequisite and a crucial activity in this process. Quality smart home solutions may be developed for less money and time with the support of accurate security assessments. Since the previous few decades, the topic of smart home security has been of interest to both academia and industry.
Background of the Invention
The Control group data set had a higher standard deviation, which indicated that the variances between points. In addition to the blockchain and CTI data carried by the Experimental group devices, additional computer resources such as IP Tables and Python scripting were also leveraged for the automated execution of firewall rules(US8918639B2). Blockchain-based network security controls saved clock cycles and bandwidth by quickly responding to intrusions at the ISP transaction level, as shown through trials. Customers' premises equipment (CPE) at the edge of their home network, however, indicated a higher CPU use as it dealt with higher traffic loads brought on by blockchain transactions(CN112866172A). Nevertheless, the numerical results showed that the increase for all metrics is manageable and, during the research, the author thought that the cost is exceeded by the benefits of providing more protection for ISPs and their customers. The experimental group's streaming video data also showed a modest decline in performance. However, because both groups ran at 640x360 pixels and 25 frames per second, the visual differences are indistinguishable. The CTI data was delivered across the network in an average of 4.4586 seconds, according to the blockchain statistics. The Ethereum network's speed demonstrated that security rules could be enforced more quickly(CN100461732C) and spread denial of service attacks could be stopped at their source. For example, disabling all stages of the botnet.
Accurately pinpointing the most effective method for predicting network security threats Traditional overlay network approaches, lightweight encryption, and honeypots were all used in the early models of security implementation. Despite this, all of these methods are vulnerable to network attacks because of their reliance on the device and server, and the increased likelihood of assaults that result from this need(US20180247191A1). It is more vital to build an architecture for security that is less dependent on any sophisticated network parameter and more resilient to cyber-attacks because of the centralized structure of smart home, i.e. an encryption algorithm or an overlaid network, making it more susceptible to cyber-attacks.
As a result of this, many of the earlier prediction models in the literature have become infeasible because of the difficulty of predicting security in big complex network datasets with a variety of variables or dimensions. A notable prediction model requires that the datasets be simplified, streamlined, and efficient, therefore it is imperative to focus on the most important attributes(US10924363B2). The literature on smart home network security has a plethora of security strategies and network architectures. Both infrastructure-dependent and infrastructure-independent security measures have been developed. One thing to keep in mind is that most schemes are centralised, which means that all communication takes place through a single computer. A secure architecture that also enables device and message verification is the goal.
Summary of the Invention
The main objective of this work is Design a smart home network security (SHNS) architecture based on the clock chain and Identify the network attack detection and mitigation in SHNS architecture. It's important to focus on smart home security by identifying the obstacles that must be overcome in order to put security measures in place in a SHN, but this does not address the difficult issue of protecting a SHN's network from network attacks because of the high costs of manufacturing, development, and installation. Another reason for building a more safe and qualitative approach to smart homes is the growing number of security concerns that come with an existing system, as well as the increasing importance of doing so in order to satisfy customers. Contrary to popular belief, as the complexity of smart home systems grows, so do the standards for their implementation. This is because software testers are unable to thoroughly test for errors in the source code because they have less time and resources available to them during the testing phase, and as a result, standards for smart home networking are released with flaws. The goal of "smart houses" is to provide services that improve the quality of life for the people who live in them by integrating intelligence into the home environment. As a general rule, "smart home" refers to any digital environment that helps its occupants in their daily lives to enhance their safety and comfort, proactively but sensibly so. Freedom to meet one's social, emotional, and rational needs is one of the fundamental goals of this spaceship. The architecture of reasoning and decision support systems in smart homes makes it possible to respond intelligently.
Brief Description of Drawings
Figure 1: Architecture for Smart home
Figure 2: Network attack detection process in smart home Network security
Figure 3: Block chain based smart home gateway
Detailed Description of the Invention
It's important to focus on smart home security by identifying the obstacles that must be overcome in order to put security measures in place in a SHN, but this does not address the difficult issue of protecting a SHN's network from network attacks because of the high costs of manufacturing, development, and installation. Another reason for building a more safe and qualitative approach to smart homes is the growing number of security concerns that come with an existing system, as well as the increasing importance of doing so in order to satisfy customers. Contrary to popular belief, as the complexity of smart home systems grows, so do the standards for their implementation. This is because software testers are unable to thoroughly test for errors in the source code because they have less time and resources available to them during the testing phase, and as a result, standards for smart home networking are released with flaws. The goal of "smart houses" is to provide services that improve the quality of life for the people who live in them by integrating intelligence into the home environment. As a general rule, "smart home" refers to any digital environment that helps its occupants in their daily lives to enhance their safety and comfort, proactively but sensibly so. Freedom to meet one's social, emotional, and rational needs is one of the fundamental goals of this spaceship. The architecture of reasoning and decision support systems in smart homes makes it possible to respond intelligently.
T-test Post Hoc analysis, followed by a paired two-tailed Friedman test, was found to be the most effective method in this experiment for analysing the suggested Blockchain-based network security model. Samples of qualities or dimensions that have a natural similarity to one another or attributes from the same group that are examined twice are the subject of Paired T-tests. Each machine learner has been compared statistically to original datasets with all attributes, The suggested Blockchain-Based Network Security Model, as well as the current and proven ways of security enhancement. For the sake of determining which statistically significant technique is most prominent in predicting software faults using the proposed Blockchain Based Network Security Model, a comparison analysis is being carried out to evaluate the influence of the proposed model.
Blockchain has emerged as a viable method to secure data and transactions for many next-generation applications, such as the Internet of Things (IoT), smart cities (smart infrastructure), and many more. Most blockchain systems are decentralised and trustless, relying on online-distributed ledgers to store data disseminated over the network. Apps can run independently of a third party by utilising the distributed ledger. Blockchain allows data to be exchanged between untrusted peers in a peer-to-peer network in a way that can be verified. Data can be stored and exchanged in blocks using blockchain technology to foster decentralisation and overcome traditional centralised architecture's shortcomings. It is possible for the smart home gateway to meet security needs including secrecy, integrity, and authentication thanks to the blockchain's decentralised and encrypted nature.
The components and devices like blockchain network, IOT devices which are used in smart home network as architecture shown in Fig:1. Network attack detection process in smart home Network security is test for errors in the source code because they have less time and resources available to them during the testing phase, and as a result, standards for smart home networking are released with flaws. The goal of "smart houses" is to provide services that improve the quality of life for the people who live in them by integrating intelligence into the home environment shown in Fig:2. Block chain based smart home gateway proposes a solution to data privacy in smart home network security (SHNS) based on Blockchain to address the issues of smart home network security. Data security, network latency, attack mitigation, and decentralized technologies were offered shown in Fig:3.
4 claims & 3 Figures , Claims: The scope of the invention is defined by the following claims:

Claim:
1. The Design an Intelligent Attack Detection of a Smart home network security based on blockchain comprising the steps of:
a) The new Hybrid smart home security model bridges the gap between network security and statistics, allowing for more accurate predictions of security in smart home networks.
b) The network attack detection process for the smart home security system is developed.
c) A new blockchain based smart home gateway system is designed.
2. The Design an Intelligent Attack Detection of a Smart home network security based on blockchain comprising as claimed in claim1, the new Hybrid smart home security model bridges the gap between network security and statistics, allowing for more accurate predictions of security in smart home networks.
3. The Design an Intelligent Attack Detection of a Smart home network security based on blockchain comprising as claimed in claim1, Develop the network attack detection process in the smart home security system.
4. The Design an Intelligent Attack Detection of a Smart home network security based on blockchain comprising as claimed in claim1, Designed a new blockchain based smart home gateway

Documents

Application Documents

# Name Date
1 202241025435-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-04-2022(online)].pdf 2022-04-30
2 202241025435-FORM-9 [30-04-2022(online)].pdf 2022-04-30
3 202241025435-FORM FOR SMALL ENTITY(FORM-28) [30-04-2022(online)].pdf 2022-04-30
4 202241025435-FORM 1 [30-04-2022(online)].pdf 2022-04-30
5 202241025435-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-04-2022(online)].pdf 2022-04-30
6 202241025435-EVIDENCE FOR REGISTRATION UNDER SSI [30-04-2022(online)].pdf 2022-04-30
7 202241025435-EDUCATIONAL INSTITUTION(S) [30-04-2022(online)].pdf 2022-04-30
8 202241025435-DRAWINGS [30-04-2022(online)].pdf 2022-04-30
9 202241025435-COMPLETE SPECIFICATION [30-04-2022(online)].pdf 2022-04-30