Sign In to Follow Application
View All Documents & Correspondence

Iot With Artificial Intelligence Based Data Authentication From End To End To Cyber Security Of Configuration Using Deep Learning Techniques

Abstract: ABSTRACT IOT WITH ARTIFICIAL INTELLIGENCE BASED DATA AUTHENTICATION FROM END TO END TO CYBER SECURITY OF CONFIGURATION USING DEEP LEARNING TECHNIQUES The IoT systems and connectivity provide improved experience and improve the quality of service for the users in different perspectives. Recent development of the technological prospects and management of the sufficient aspects for the delivery of performance need to be ensured in this regard. The concept of IoT is related with the widely connected features, systems, data storage facilities, management processes, applications, devices, users, gateways, services and thousands of other elements. As the importance of IoT applications has been growing in recent times, the prospects for development and management are immense for the development opportunities. In recent times, cybersecurity and ensuring privacy for the users have attracted attention of the users. With growing popularity of the social media platforms, more and more people are becoming connected. With growing opportunity of connectivity, people need more secured space to connect. In this invention, different aspects of the cybersecurity based on the deep learning models and analyzing the concepts of machine learning, understanding the concept of security and privacy, contributing to the development and management of cybersecurity etc. To demonstrate the understanding of cybersecurity in the IoT networks, effective deep learning models such as MLP, CNN, LSTP and a hybrid model of CNN and LSTP have been analyzed. To contribute to the learning process, future research opportunities have also been identified.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
23 May 2023
Publication Number
26/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Amit Verma
Assistant Professor, Maharaja Agrasen University, Baddi, Solan, Himachal Pradesh, India.
Dr. Raman Kumar
Assistant professor, Department of CSE, IK Gujral Punjab Technical University, Kapurthala, Jalandhar, India.
Dr. Santosh Kumar Singh
Assistant Professor, Department of CS & IT, Don Bosco Institute of Technology (Affiliated to GGSIPU), Delhi NCR, Delhi, India.
Dr. Varun Tiwari
Associate Professor, Department of CS/IT, Bosco Technical Training Society (Affiliated to GGSIPU), Delhi NCR, Delhi, India.
Dr. Ruchi Sawhney
Assistant Professor, Department of CS/IT, Bosco Technical Training Society, GGSIP University, Delhi NCR, Delhi, India.
Deepika Kirti
Assistant Professor, Department of CS/ IT, Bosco Technical Training Society, GGSIP University, Delhi NCR, Delhi, India.

Inventors

1. Amit Verma
Assistant Professor, Maharaja Agrasen University, Baddi, Solan, Himachal Pradesh, India.
2. Dr. Raman Kumar
Assistant professor, Department of CSE, IK Gujral Punjab Technical University, Kapurthala, Jalandhar, India.
3. Dr. Santosh Kumar Singh
Assistant Professor, Department of CS & IT, Don Bosco Institute of Technology (Affiliated to GGSIPU), Delhi NCR, Delhi, India.
4. Dr. Varun Tiwari
Associate Professor, Department of CS/IT, Bosco Technical Training Society (Affiliated to GGSIPU), Delhi NCR, Delhi, India.
5. Dr. Ruchi Sawhney
Assistant Professor, Department of CS/IT, Bosco Technical Training Society, GGSIP University, Delhi NCR, Delhi, India.
6. Deepika Kirti
Assistant Professor, Department of CS/ IT, Bosco Technical Training Society, GGSIP University, Delhi NCR, Delhi, India.

Specification

Description:FORM 2
THE PATENTS ACT, 1970 (39 of 1970)
&
THE PATENT RULES, 2003
Complete Specification
(See section 10 and rule 13)
1. Title of the Invention: IOT WITH ARTIFICIAL INTELLIGENCE BASED DATA AUTHENTICATION FROM END TO END TO CYBER SECURITY OF CONFIGURATION USING DEEP LEARNING TECHNIQUES

2. Applicants
Name Nationality Address

Amit Verma
Indian Assistant Professor, Maharaja Agrasen University, Baddi, Solan, Himachal Pradesh, India.


Dr. Raman Kumar
Indian Assistant professor, Department of CSE, IK Gujral Punjab Technical University, Kapurthala, Jalandhar, India.

Dr. Santosh Kumar Singh

Indian Assistant Professor, Department of CS & IT, Don Bosco Institute of Technology (Affiliated to GGSIPU), Delhi NCR, Delhi, India.


Dr. Varun Tiwari

Indian Associate Professor, Department of CS/IT, Bosco Technical Training Society (Affiliated to GGSIPU), Delhi NCR, Delhi, India.


Dr. Ruchi Sawhney

Indian Assistant Professor, Department of CS/IT, Bosco Technical Training Society, GGSIP University, Delhi NCR, Delhi, India.


Ms. Deepika Kirti

Indian Assistant Professor, Department of CS/ IT, Bosco Technical Training Society, GGSIP University, Delhi NCR, Delhi, India.
3. Preamble to the Description:
The following specification particularly describes the invention and the manner in which it is to be performed.

4. DESCRIPTION
FIELD OF THE INVENTION
The present invention aims to show the iot with Artificial Intelligence based data authentication from end to end to cyber security of configuration using deep learning techniques.
BACKGROUND OF THE INVENTION
Technological development and emerging prospects have redefined the way human interact and connect with each other. Providing necessary development and management processes for dealing with the deep learning processes, different aspects of the internet security and management processes are vital to analyse. Considering the continuing growths and expansion of the IoT networks and management capabilities, modern day practices for developing the security criteria need to be utilized. Modern IoT 4th generation networks and processes are intricate in nature and require effective utilization of the available resources. As the concept of IoT system and networks deal with interrelated components which allow the users to communicate and inter connect via sub networks, ensuring security for different components and subnetworks are challenging at times. Each SN or sub network is allowed to work for specific task and relevant aspects of the architecture. In this way, overall determination and management of the IoT networks require effective utilization of the capabilities and management processes, so that different neural engines can be connected effectively. These connected networks and sub networks need to be designed to address the challenges and prospects that are required to evaluate the context of security. In the context of IoT security, the CIA or Confidentiality, Availability and Integrity are considered as the fundamental elements of secured workspace. In order to explore the contexts of cybersecurity, relevant models and prospects have been evaluated in this regard in order to develop relevant criteria and management criteria.
SUMMARY OF THE INVENTION
Modern IoT technologies, and system offer greater prospects for the integrated management of the technology, services and management capability for the digital world. People are becoming more and more connected and intuitive as a result of integrated development of the technology. As a consequence of growing technological capability, the security concerns are becoming more and more important. Considering the growth and management opportunities for the professionals, need to be justified for the effective management of the technological tools and development opportunities. In this analysis, different aspects of the IoT applications, considerations for the deep learning etc. have been discussed to analyse the security implications for the modern technology.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig.1: depicts IoT security techniques.
Fig.2: depicts artificial intelligence for the development report on AI and IOT in security aspects.

BRIEF DESCRIPTION OF THE INVENTION
Technological development and emerging prospects have redefined the way human interact and connect with each other. Providing necessary development and management processes for dealing with the deep learning processes, different aspects of the internet security and management processes are vital to analyse. Considering the continuing growths and expansion of the IoT networks and management capabilities, modern day practices for developing the security criteria need to be utilized. Modern IoT 4th generation networks and processes are intricate in nature and require effective utilization of the available resources. As the concept of IoT system and networks deal with interrelated components which allow the users to communicate and inter connect via sub networks, ensuring security for different components and subnetworks are challenging at times. Each SN or sub network is allowed to work for specific task and relevant aspects of the architecture.
In this way, overall determination and management of the IoT networks require effective utilization of the capabilities and management processes, so that different neural engines can be connected effectively. These connected networks and sub networks need to be designed to address the challenges and prospects that are required to evaluate the context of security. In the context of IoT security, the CIA or Confidentiality, Availability and Integrity are considered as the fundamental elements of secured workspace. In order to explore the contexts of cybersecurity, relevant models and prospects have been evaluated in this regard in order to develop relevant criteria and management criteria.
DEEP LEARNING
Deep Structured Learning or simple Deep Learning can be referred to as member of broader Machine Learning Family. Considering the scopes and opportunities for different deep learning methods and facilities, modern day digital world has adopted effective strategies to address different deep learning and machine learning methods and strategies. Different computer and system network architecture require different forms of deep learning models.
The basic formation of the DL model consists of single input layer and several hidden layers. These hidden layers in the model lead to output layer. CNN or Convolutional Neural Network is widely used to determine and utilize the concepts of the IoT application and management development. Recurrent Neural Network or RNN is the type of deep learning process which has provided effective.
development of the network management. LSTM model and RNN are similar in the evolution and development prospects which need to be determined in order to develop different criteria for the effective management of the cybersecurity prospects. Different deep learning processes and methods have intrinsic implications on the computer and network systems such as speech recognition, image processing, AI applications, health care management, driving and management etc. Considering the growth and prospects of the sector of IoT enabled deep learning setting, the security prospects are important so that different criteria for development can be ensured. The context of deep learning can also be expanded to the aspect of decentralized computer networks as well as in the centralized networks. With growing needs and increasing usage, development of the IoT networks and deep learning have roots in the development of the modern technological development aspects. Cyber Security in IoT Networks To understand the concept of cyber security, this is necessary for the research processes to understand the concept of privacy.
IoT networks are connected layers of controllers and physical components, edge computing considerations and computing levels, connective level considerations, management of the security components and determination of the outcomes of the processes, data abstraction processes, accumulation of data and information, application process, IoT security level determination, collaboration and management of the security processes etc. In order to determine the aspects of cybersecurity, this is necessary to understand the aspects of privacy, and security in the networks. Privacy In digital world practices, this is important for the practitioners to implement the privacy and security concerns so that maintaining individual privacy is possible. Cybersecurity is termed as the collective approach for ensuring protection of computer networks and systems from damage or any kind of external theft relating to the prospects of hardware, system, electronic data and software etc. Modern digital world is becoming increasingly dependent on the effective use and management of computer systems.
Due to rapid growth of technological advancements, smart devices and technologies, wireless network systems such as Bluetooth, Wi-Fi etc. security is becoming important in present day applications. Jarvis Thomson argued that the concept of property and liberty can be regarded as privacy but the context of privacy differs from the sole concept of liberty and property claims. Solove regarded 8 exact concepts of privacy to demonstrate the concept of security. Right to be alone: If a person wishes to be alone from other persons’ contact, he or she can maintain the secrecy. The concept of privacy and security are dependent on how individual processes the concept of security. Limited Access: This notion is dependent on the prospect that a person can take part in different societal affairs irrespective of the rules and information barriers. Considering the needs and challenges for the personal development and management can be considered in this regard. Control: The right to control over the information and management on self management and prospects can be considered in this regard. Privacy State: The state of individual’s privacy and management can be considered in this stage. Managing the privacy and management can be effectively maintained to ensure cybersecurity for different persons.
The right to secrecy and management of personal information needs to be established considering individual requirements. Autonomy and Personhood: Autonomy and personhood for given security contexts need to be maintained for delivering effective management support. Autonomy of the selection process needs to be maintained for this purpose. Personal Growth: Personal growth opportunity and management considerations for the security prospects can be ensured. Intimate Relationships: The right to secure the relationships and interactions with the friends and partners need to be secured in this purpose.
CYBERSECURITY IN IOT
The concept of cybersecurity is based on the idea to promote safe practice and integrity of the digital world and practices. Cybersecurity is considered as the practice of protecting and safeguarding the online practices, interaction, programs and networks etc. In recent times, there have been multiple cyber-attacks endangering the safeguarding and management of the security in the first place. Successful cybersecurity approaches always consider the elements for privacy of the individuals, integrates the organisational approach with the individual interests, and offer multiple layers of security to promote safe practices. Considering the elements and management of the cybersecurity practices, different aspects of the evaluation and management of cybersecurity considerations need to be evaluated. In different layers and architecture of the IoT networks, providing required cyber security is challenging for the developers. Internet of things is considered as the next big thing for the digital world. In this way, the user specific applications and management capability for the processing of organisational capability can be ensured. IoT applications and development of the integrated processes target to provide enhanced quality of the operation, interaction and management capability for the professionals. IoT applications and system usually consist of the technologies, smart objects around the world which are connected via secured network. Cybersecurity in the IoT applications plays vital part as this can ensure effective management of the interaction with the human and objectives. IDS or Intrusion Detection System is used widely for the determination and management of the threats in the cyber space. In this way, the developers can securely ensure effective performance and management capability of the cyber threats that may put the system in danger. Considering the growth and management capability for the cyber security, relevant architecture and management capability need to be addressed. QoS or Quality of Service of the IoT applications and devices are important aspects for effective determination of the performance and management of the capability assessment.
IDS can detect the potential cyber attacks and harms may cause in the cyber platforms. Low latency applications and system performance need to be upgraded for the evaluation of the performance and management considerations for the safe cyber space. Secured IoT Architecture Secure IoT management and network tools require sufficient development and processing of the information management. In this regard, digital technology and capability assessment for the technological tools and assembling the architecture are vital. Considering four layered architecture for the development of the secure IoT networks have been designed in this case. Four different layers for the IoT networks are device layer, communication layer, loud layer and lifecycle management layer. All these layers have significant impact on the development of the structure and components for secure structure and development.

, Claims: CLAIMS
We Claim:
1. A method of improving protection and remediation due to AI's ability to detect nuanced attacks, heighten security, and enhance incident response.
2. Increases time savings as AI expedites the detection and response cycle time, rapidly quantifying risks and accelerating analyst decision making with data-driven mitigation measures.
3. IoT cyber security is a technology segment devoted to protecting linked devices and networks in the Internet of things (IoT).
4. IoT entails connecting a system of interconnected computing devices, mechanical and digital machinery, items, animals, and/or people to the Internet.
5. IoT Security is the act of securing Internet devices and the networks they're connected to from threats and breaches by protecting, identifying, and monitoring risks all while helping fix vulnerabilities from a range of devices that can pose security risks to your business.
6. AI uses machine learning and deep learning technologies to improve its knowledge to “understand” the threats and risks to cybersecurity.
7. AI gathers information and analyzes the relationships between threats such as malicious files, suspicious IP addresses, or corporate employees.

Dated this the 22nd May 2023.

Senthil Kumar B
Agent for the applicant
IN/PA-1549

Documents

Application Documents

# Name Date
1 202311035772-STATEMENT OF UNDERTAKING (FORM 3) [23-05-2023(online)].pdf 2023-05-23
2 202311035772-REQUEST FOR EARLY PUBLICATION(FORM-9) [23-05-2023(online)].pdf 2023-05-23
3 202311035772-FORM-9 [23-05-2023(online)].pdf 2023-05-23
4 202311035772-FORM 1 [23-05-2023(online)].pdf 2023-05-23
5 202311035772-DRAWINGS [23-05-2023(online)].pdf 2023-05-23
6 202311035772-DECLARATION OF INVENTORSHIP (FORM 5) [23-05-2023(online)].pdf 2023-05-23
7 202311035772-COMPLETE SPECIFICATION [23-05-2023(online)].pdf 2023-05-23