Invention Publication
- Patent Title: METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS
-
Application No.: US18241650Application Date: 2023-09-01
-
Publication No.: US20240244038A1Publication Date: 2024-07-18
- Inventor: Ted H. Szymanski
- Applicant: Ted H. Szymanski
- Applicant Address: CA Toronto
- Assignee: Ted H. Szymanski
- Current Assignee: Ted H. Szymanski
- Current Assignee Address: CA Toronto
- Main IPC: H04L9/40
- IPC: H04L9/40 ; H04L9/08 ; H04L9/14 ; H04L45/64 ; H04L47/2483 ; H04L47/52 ; H04L47/62 ; H04L49/00 ; H04L49/101 ; H04L49/253 ; H04L67/12

Abstract:
Methods to strengthen the cyber-security and privacy in a proposed deterministic Internet of Things (IOT) network are described. The proposed deterministic IoT consists of a network of simple deterministic packet switches under the control of a low-complexity ‘Software Defined Networking’ (SDN) control-plane. The network can transport ‘Deterministic Traffic Flows’ (DTFs), where each DTF has a source node, a destination node, a fixed path through the network, and a deterministic or guaranteed rate of transmission. The SDN control-plane can configure millions of distinct interference-free ‘Deterministic Virtual Networks’ (D)VNs) into the IoT, where each DVN is a collection of interference-free DTFs. The SDN control-plane can configure each deterministic packet switch to store several deterministic periodic schedules, defined for a scheduling-frame which comprises F time-slots. The schedules of a network determine which DTFs are authorized to transmit data over each fiber-optic link of the network. These schedules also ensure that each DTF will receive a deterministic rate of transmission through every switch it traverses, with full immunity to congestion, interference and Denial-of-Service (DOS) attacks. Any unauthorized transmissions by a cyber-attacker can also be detected quickly, since the schedules also identify unauthorized transmissions. Each source node and destination node of a DTF, and optionally each switch in the network, can have a low-complexity private-key encryption/decryption unit. The SDN control-plane can configure the source and destination nodes of a DTF, and optionally the switches in the network, to encrypt and decrypt the packets of a DTF using these low-complexity encryption/decryption units. To strengthen security and privacy and to lower the energy use, the private keys can be very large, for example several thousands of bits. The SDN control-plane can configure each DTF to achieve a desired level of security well beyond what is possible with exitsing schemes such as AES, by using very long keys. The encryption/decryption units also use a new serial permutation unit the very low hardware cost, which allows for exceptional security and very-high throughputs in FPGA hardware.
Public/Granted literature
- US12244576B2 Methods to strengthen cyber-security and privacy in a deterministic internet of things Public/Granted day:2025-03-04
Information query