SYSTEM AND METHOD FOR ACHIEVING CYBER SECURITY OF INTERNET OF THINGS (IOT) DEVICES USING EMBEDDED RECOGNITION TOKEN

Fecha de publicación: 25/02/2022
Fuente: Wipo "IOT"
An embedded recognition token based method for implementing cyber security using Internet of Things (IoT) devices ABSTRACT The present invention relates to a system and method for achieving cyber security or preventing cyber-attacks of Internet of Things (IoT) devices in an internet environment. The objective of present invention is to solve the anomalies presented in the prior art techniques and using advanced technique for authenticating the legitimate communication between Internet of Things (IoT) devices. The disclosure presents a technique using embedded recognition token for authenticating the legitimate use of the Internet of Things (IoT) devices in an internetwork environment. The use of Internet of Things (IoT) devices is increasing with the advancement in technology and the feature of Internet of Things (IoT) devices for building an automatic system. The use of Internet of Things (IoT) devices makes most of the system automatic and robust in nature. With the increasing use of Internet of Things (IoT) devices, the cyber attacks to these devices are also increasing day by day. The hackers or attackers can intrude the network environment and steal the personal information. The hackers can also control these Internet of Things (IoT) devices remotely and change the functioning of the system built using these Internet of Things (IoT) devices. Hence, providing cyber security to Internet of Things (IoT) devices is an important aspect that need to be dealt with greater accuracy and improved performance. The proposed invention uses embedded recognition token for legitimate communication between Internet of Things (IoT) devices for achieving cyber security. The proposed invention discloses a method that provide/issue unique embedded recognition token and hash key for each of the plurality of Internet of Things (IoT) devices. These issued embedded recognition token and hash key are used to authenticate the legitimacy of the Internet of Things (IoT) devices in the internetwork environment. Suppose the first Internet of Things (IoT) device need a communication with second IoT device, then first IoT devices sends its embedded recognition token to the second IoT device which is used to authenticate the first IoT device using the hash key. After recognition, the second IoT device invites the first IoT devices to establish communication link between first and second IoT device along with its embedded recognition token. The first IoT device recognize/authenticate the second IoT device using received embedded recognition token and hash key and after recognition, establishes a secure communication link between first and second IoT devices. The first and second IoT devices can perform communication in internetwork environment securely using said secure communication link by authenticating the legitimacy of both the communicating devices and intruder will not enter within the communication. In this way, cyber attacks can be prevented and cyber security can be achieved in IoT devices with the proposed invention. The proposed method can be applied on plurality of IoT devices simultaneously within communication environment.