Browse Prior Art Database

Method and apparatus of enhancing security on lightweight IOT device

IP.com Disclosure Number: IPCOM000246039D
Publication Date: 2016-Apr-28
Document File: 9 page(s) / 123K

Publishing Venue

The IP.com Prior Art Database

Abstract

Our idea is about confusing hacker with fake data that sent out by IoT devices. There are a negotiation between IoT and receiving server before sending out any data. They agree the specific algorithm to transfer real data to fake data that within a reasonable range. Thus, if hacker listens on the data sent out by IoT devices, he/she will get the wrong data. But for real receiving server, it can convert the fake data back to correct value.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 29% of the total text.

Page 01 of 9

Method and apparatus of enhancing security on lightweight IOT device

The Internet of Things(IOT) technology makes "things" become sentient. Things can send or receive data, even can automatically control environment. IOT has been used in many application area, such as wearable device, agriculture automation, energy consumption management, smart homes... etc. With more active wireless connected devices, the security of IOT has soon gain attention. Many IOT devices are low energy and lightweight. However, security method requires more cpu computing resource. It's hard to have a lightweight IOT with a certain level of security ability.

For sensors sending routine information, the information might be stolen and re-used, but applying security method to those kinds of lightweight IOT sensors will be costy. For example, a temperature sensor continually sends temperature data to a server, so the server can monitor the temperature of the environment. The temporature data is valuable for recreating the same environment for growing nice vegetables. The sensor's packets might be listened by hackers who want to steal the data. Instead of adding complicated security method, we need a lightweight security method to decrease hacker's intention to steal the data and make the data more secure.

Thus, we present a new secure way to transmit data only require little cpu computing resource. We use the history data to transform the real data into fake data by a specific math function, so the hacker who try to steal data will not get the real data easily and need to spend a lot of time gathering data to infer the function.

In order to prevent hacker from getting real data too easily, we focus on IOT device and use algorithm function to calculate record  history information to let IOT device keeps sending incorrect data to server. Implement the idea, hacker will force to increase effort and time to get correct data from IOT device. 

Claim point:

1. IOT device keeps sending incorrect/modify data to server/receiver

2. Configure for customized number of history record which will be used in the selective algorithm
3. Random change algorithm function after reset server/receiver and IOT device

4. IOT Device and server/receiver record history data for config number

5. There is an agreement between server/receiver and IOT device on the algorithm.

Advantage:

1. Algorithm will increase a little IOT device loading rather than security issue

2. Hacker needs to be exposed himself/herself longer to collect historical data and make it easier to detect the hacker.

3. different algorithm can cheat hacker differently. For example, an algorithm that will give an output that will close to the real value, so the hacker won't know he/she is getting wrong data. Or, an algorithm that will create an unreasonable data but hacker won't be able to revert it back to real value.

Design an algorithm function (call deception function) to encode output data on IOT device and decode th...