Unknown Organization (20240244038). METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS simplified abstract
Contents
METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS
Organization Name
Inventor(s)
Ted H. Szymanski of Toronto (CA)
METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240244038 titled 'METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS
- Simplified Explanation:**
The patent application describes methods to enhance cyber-security and privacy in a proposed deterministic Internet of Things (IoT) network. The network consists of deterministic packet switches controlled by a low-complexity software-defined networking (SDN) control-plane, enabling the transport of deterministic traffic flows with guaranteed rates of transmission.
- Key Features and Innovation:**
- Utilizes deterministic packet switches and SDN control-plane for enhanced cyber-security and privacy in IoT networks. - Configures interference-free deterministic virtual networks (DVNs) with deterministic traffic flows (DTFs) for secure data transmission. - Implements deterministic periodic schedules for authorized data transmission over fiber-optic links, ensuring immunity to congestion, interference, and denial-of-service attacks. - Employs low-complexity private-key encryption/decryption units at source nodes, destination nodes, and switches for secure data transmission. - Configures long private keys and very long keys for encryption/decryption units to achieve high levels of security. - Uses a new serial permutation unit for exceptional security and high throughputs in FPGA hardware.
- Potential Applications:**
- Secure data transmission in IoT networks. - Protection against cyber-attacks and unauthorized access. - Enhanced privacy and confidentiality in IoT communication.
- Problems Solved:**
- Addressing cyber-security vulnerabilities in IoT networks. - Ensuring secure and private data transmission. - Detecting and preventing unauthorized transmissions.
- Benefits:**
- Enhanced cyber-security and privacy in IoT networks. - Immunity to congestion, interference, and denial-of-service attacks. - Secure and guaranteed data transmission rates. - Efficient energy use with low-complexity encryption/decryption units.
- Commercial Applications:**
Secure IoT communication technology for industries such as healthcare, finance, and smart cities.
- Questions about IoT Security:**
1. How does the proposed deterministic IoT network enhance cyber-security and privacy? 2. What are the key features of the deterministic packet switches and SDN control-plane in ensuring secure data transmission in IoT networks?
Original Abstract Submitted
methods to strengthen the cyber-security and privacy in a proposed deterministic internet of things (iot) network are described. the proposed deterministic iot consists of a network of simple deterministic packet switches under the control of a low-complexity ‘software defined networking’ (sdn) control-plane. the network can transport ‘deterministic traffic flows’ (dtfs), where each dtf has a source node, a destination node, a fixed path through the network, and a deterministic or guaranteed rate of transmission. the sdn control-plane can configure millions of distinct interference-free ‘deterministic virtual networks’ (d)vns) into the iot, where each dvn is a collection of interference-free dtfs. the sdn control-plane can configure each deterministic packet switch to store several deterministic periodic schedules, defined for a scheduling-frame which comprises f time-slots. the schedules of a network determine which dtfs are authorized to transmit data over each fiber-optic link of the network. these schedules also ensure that each dtf will receive a deterministic rate of transmission through every switch it traverses, with full immunity to congestion, interference and denial-of-service (dos) attacks. any unauthorized transmissions by a cyber-attacker can also be detected quickly, since the schedules also identify unauthorized transmissions. each source node and destination node of a dtf, and optionally each switch in the network, can have a low-complexity private-key encryption/decryption unit. the sdn control-plane can configure the source and destination nodes of a dtf, and optionally the switches in the network, to encrypt and decrypt the packets of a dtf using these low-complexity encryption/decryption units. to strengthen security and privacy and to lower the energy use, the private keys can be very large, for example several thousands of bits. the sdn control-plane can configure each dtf to achieve a desired level of security well beyond what is possible with exitsing schemes such as aes, by using very long keys. the encryption/decryption units also use a new serial permutation unit the very low hardware cost, which allows for exceptional security and very-high throughputs in fpga hardware.