AU2021102086A4 - Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN) - Google Patents

Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN) Download PDF

Info

Publication number
AU2021102086A4
AU2021102086A4 AU2021102086A AU2021102086A AU2021102086A4 AU 2021102086 A4 AU2021102086 A4 AU 2021102086A4 AU 2021102086 A AU2021102086 A AU 2021102086A AU 2021102086 A AU2021102086 A AU 2021102086A AU 2021102086 A4 AU2021102086 A4 AU 2021102086A4
Authority
AU
Australia
Prior art keywords
lpwan
lot
secured
low power
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021102086A
Inventor
Shahnawaz Ahmad
Anju Asokan
Ambar Bajpai
Pramod Kumar Bhatt
Deepika Chauhan
G. N. R. Prasad
Chaitanya Singh
Kishan Pal Singh
Vatsya Tiwari
Ranjan Walia
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2021102086A priority Critical patent/AU2021102086A4/en
Application granted granted Critical
Publication of AU2021102086A4 publication Critical patent/AU2021102086A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

SECURE LONG RANGE DEVICE TO DEVICE COMMUNICATION METHOD FOR IOT DEVICE USING LOW POWER WISE AREA NETWORKS (LPWAN) Abstract At the end of 2022, nearly, more than 70 billion devices are connected for performing secured transaction between device to device while they are connected by Internet of Things (loT) platform. It induces required secured data communication established two device users for their need includes net-banking, online shopping, and easy money transferring app etc. For all above activities a flexible, secured, and long range with low power network is required which will be enhanced the characteristic of multi-disciplinary applications. It is referred as Low Power Wide Area Networks (LPWAN). It is famous radio communication technology consume low power and provide high data rate for long distance coverage. It is primary characteristic requirement for secured device to device communication and need D2D traffic management, energy efficiency, extended range coverage, security framework, and interconnecting. However, in the real time scenario LPWAN faces issues like network management, device traffic control strategy energy efficient device deployed network security and software integrity. There are several architectural options available for interconnecting device namely Sigfox, NBoT, LoRaWAN, Narrowband loT (NB-loT), and long-term evolution (LTE)-M among others in terms of loT factors. In this research work focus on designing a flexible of structure selection based on the requirement of specific application and provides an efficient solution to device secured connectivity, extended battery lifetime and coverage. It takes the advantage of structure latency and QoS in terms of service and security. It is ensuring that the modified LPWAN technologies increase success factors and withstand for various application tested at different real time scenario. Especially, today's business market is expanded lot and provides huge space for young business mind to earn money as well as improve technical skill set in the aspects of loT platform. Such technology helps lot to acquire benefit and provide exponential growth of marketing industries by improving customer connection. Thereby, it will help the business industry to make the product and increasing selling strategy for long period effectively based on the LPWAN technology. It also impacts on features like scalability, security, immutability and auditing, data flows, tractability and interoperability. SECURE LONG RANGE DEVICE TO DEVICE COMMUNICATION METHOD FOR IOT DEVICE USING LOW POWER WISE AREA NETWORKS (LPWAN) Diagram Application End Nodes Gateway A Servers Gateway B Network Server 6a LoRa Networks Gateway Z Fig. 1 illustrates the block diagram of secured device to device connection LPWAN based on loT system. LPWAN Nodes LPWAN GatwayslConcentrators Network Server Application Servers A Fig. 2 illustrates a process of device traffic management system for endpoint security I| End-device transmission 1RX1 RX2 I RXDelayl: Transmit Time On Air RXDelay2 Fig. 3 illustrates the end to end device communication using class A of LPWAN based on loT system.

Description

SECURE LONG RANGE DEVICE TO DEVICE COMMUNICATION METHOD FOR IOT DEVICE USING LOW POWER WISE AREA NETWORKS (LPWAN) Diagram
Application End Nodes Gateway A Servers
Gateway B
Network Server
6a LoRa Networks Gateway Z
Fig. 1 illustrates the block diagram of secured device to device connection LPWAN based on loT system.
LPWAN Nodes LPWAN GatwayslConcentrators Network Server Application Servers
A
Fig. 2 illustrates a process of device traffic management system for endpoint security
I| End-device transmission I 1RX1 RXDelayl: RX2
Transmit Time On Air RXDelay2
Fig. 3 illustrates the end to end device communication using class A of LPWAN based on loT system.
SECURE LONG RANGE DEVICE TO DEVICE COMMUNICATION METHOD FOR IOT DEVICE USING LOW POWER WISE AREA NETWORKS (LPWAN) FIELD OF INVENTION
This invention is related to give sufficient solution of ensuring secured transaction between device to device for smart loT applications by using Low Power Wide Area Networks (LPWAN) architecture in order to do system self-configurable activities, a flexible structure, secured and long range with low power network improves the characteristic of multi disciplinary applications.
BACKGROUND
By 2025, almost all the bank transaction goes on internet of things (loT)platform here digital device and machine connected to enhance secured data exchange and storage at specific cloud space. With help of loT framework, all such machines are established the connection for data sharing of about system device configuration capabilities. Recently, most of bank transaction occurred for online shopping especially Amazon AWS, IBM Watson or Microsoft, they are developed standard M2M devices management software tools for providing advance client service and enterprises. The smaller version of similar prototypes is available for home automation, healthcare monitoring, weather forecasting etc. However, it is not satisfying a global solution if the industries removed into smart environment. Because, device numbers goes exponentially, thus, gives large volume to access and manage space is limited due to (i) interoperability between heterogeneity devices in terms of interface model type and data format (ii) device mobility, (iii) end to end users accessibility, (iv) type of network framework, (v) irregular device configuration management, (vi) lack of unique standard protocol, (vii) third party device interruption illegally and (viii) easy removal of M2M device. Thus, induces critical issues in the D2D management tools which reduce the performance efficiency of the smart online transaction system. In addition, the real time scenario LPWAN faces issues like network management, device traffic control strategy energy efficient device deployed network security and software integrity. There are several architectural options available for interconnecting device namely Sigfox, NBoT, LoRaWAN, Narrowband loT (NB-loT), and long term evolution (LTE)-M among others in terms of loT factors. In this work, designing a flexible of structure selection based on the requirement of specific application and provides an efficient solution to device secured connectivity, extended battery lifetime and coverage. It takes the advantage of structure latency and QoS in terms of service and security. It is ensuring that the modified LPWAN technologies increase success factors and withstand for various application tested at different real time scenario. It collects device configuring data set from active connected devices. The cloud system is mandatory for all accessible function of stored data and proper gateway security algorithms is enabled which is working background of the mobile application. It gives highly integrated structure for D2D configuration and supports all type of data format, accompany with different communication protocols. It collects device configured data and predicts earlier failures states; consistency sends control commands from monitors centre. It has self-configurable ability whenever failures occurs and also provide failure type and degree of impact. Once, it detects failures, then, immediately, message notification system is enabled. Thus, share updating icon information with subscriber device during quality measures exceeds or below the expected level. The device coverage range and manageable function between mobile devices is evaluated from past transaction of data of the secured device. It safeguard device connectivity from unexpected subscribers by using smart filtering operation is enabled to segregate the subscriber numbers and receive additional configure improvement. Especially, today's business market is expanded lot and provides huge space for young business mind to earn money as well as improve technical skill set in the aspects of loT platform. Such technology helps lot to acquire benefit and provide exponential growth of marketing industries by improving customer connection. Thereby, it will help the business industry to make the product and increasing selling strategy for long period effectively based on the LPWAN technology. It also impact on features like scalability, security, immutability and auditing, data flows, tractability and interoperability.
OBJECT OF THE INVENTION
The focus of this research work is to ensure secured transaction between device to device for smart loT applications by using Low Power Wide Area Networks (LPWAN) architecture in order to do system self-configurable activities, a flexible structure, secured and long range with low power network improves the characteristic of multi-disciplinary applications.
• To ensure quality connection between configured devices where data transaction goes securely and predicts earlier vulnerability influence and maintain consistency sends control commands from monitors centre. • To improve self-configurable ability and software integrity for betterment of impact on implementing real time scenario.
• To provide smart device connection after verifying authenticated message received from trusty device chain network at right time. • To maintain quality integration with secured based information systems for sustainable customer transaction details and protects stored data from unauthorized person. • To enable message notification system, thus, share updating icon information with subscriber device during quality measures exceeds or below the expected level. • To enhance device coverage range and manageable function between mobile devices after evaluation past transaction of data with secured device. • To send continuous message notification about irregularity of data transaction and evaluates the security check and safety producers. • To safeguard device connectivity from unexpected subscribers by using smart filtering operation is enabled to segregate the subscriber numbers and receive additional configure improvement. • To protect device connectivity from unexpected subscribers by using smart security system which enabled to segregate the subscriber numbers and receive additional configure improvement. • It forms trusty and well configuring quality device for sufficient data sharing and tracking by balancing connectivity between devices.
SUMMARY
In this research work, focused on designing a flexible of structure selection based on the requirement of specific application and provides an efficient solution to device secured connectivity, extended battery lifetime and coverage. It takes the advantage of structure latency and QoS in terms of service and security. It is ensuring that the modified LPWAN technologies increase success factors and withstand for various application tested at different real time scenario. It induced effective secured network formation before user device starts actual data transaction after checking security firewall at the time of user consumed. By the way, it can record the user login, transits time, and quality inspection information of each transaction. Thereby, end users have optimized their business strategy by receiving future forecasts and acquire secured data transaction; they can also manage their individual bank account actability on the available immutable private ledger. Every product transaction is encrypted and stored in the secured cloud location. The information has stored securely on cloud and it is accessible only by mobile user after verifying stakeholder during quality measures exceeds or below the expected level. Especially, today's business market is expanded lot and provides huge space for young business mind to earn money as well as improve technical skill set in the aspects ofloT platform. Such technology helps lot to acquire benefit and provide exponential growth of marketing industries by improving customer connection. Thereby, it will help the business industry to make the product and increasing selling strategy for long period effectively based on the LPWAN technology. It also impact on features like scalability, security, immutability and auditing, data flows, tractability and interoperability. It guided practitioners examining its various aspects by directing them to the right information sources.
DETAILED DESCRIPTION OF THE INVENTION
Fig. 1 illustrates the block diagram of secured devicetodevice connection LPWAN based on loT system. Fig. 2 illustrates a process of device traffic management system for endpoint security Fig. 3 illustrates the end to end device communication using class A of LPWAN based on loT system.
DETAILED DESCRIPTION OF THE INVENTION
Preferred embodiments of the present invention will now be described in detail in accordance with the accompanying drawings.
Internet of things (loT) technology enters in all discipline of bank transaction goes on digital device and machine connected to enhance secured data exchange and storage at specific cloud space. It has flexible structure to incorporate multiple tasks and scale exponentially by interfacing different embedded devices. Low Power Wide Area Networks (LPWAN) has emerged radio communication technology that will transform digital currency in much faster than conventional mode of payment transaction. By combining both loT and LPWAN architecture assured secured and efficient supply chain management strategy with increased effectiveness of the product tracking B2B trusty function. Figure 1 illustrates the block diagram of secured device to device connection LPWAN based on loT system. There are four unique operation is performed in front of system such as (i) device registration, (ii) task allocation, (iii) task identification, and (iv) task verification. In the first step, users can activate their device after successful installation of mobile application. The device receives membership service after authenticated the personal information. The unique identity number is generated through that communication is established between trusty value chain allocation evaluated which includes task ID, device ID, device data, and participant information. After that, transaction proposal has been submitted to the smart contract after verifying digital signature. It has executed and evaluated once the transaction is successful. Otherwise, it needs to take again repeated the previous step to obtain succeeded condition. Then, device owner again submit the proposal for specific information, if the trusty chain value network permits the request, then, the event is assigned. It promotes eco-friendly product transaction between trusty value chain networks due to real time digital currency transparency approval from government authority. At the final stage, task verification is performed, that is, set of rules to be predefined based on that network formation is happened. It safeguards stakeholders from unexpected payment loss by using smart bitcoin ledges available for each to promote healthy relationship. It obtained trusty and well sufficient value chain network for product tracking for effective selling by detecting vulnerability action present inside the marketing place. Simple and effective identification of device configuration between M2M is the primary requirement in the smart industries environment. Because, machine numbers goes exponentially, hence, it seems difficult to operate in the synchronous manner and also connectivity issues is possible whenever third party device interrupt. Thus, gives large volume to introduce unique standard device management protocol which operates under loT framework to support smart industries sectors. That is, an Open Mobile Alliance Device Management (OMA-DM) loT protocol is proposed to provide global solution of the smart industries on device management framework for self-configurable, initialization, tracking configure change and evaluate future extension and also secured their content details from vulnerability attacks.
Smart device connectivity Layer:
It is composed of several web services which include (i) interoperability and heterogeneity devices (ii) device mobility, (iii) end to end users accessibility, (iv) type of network framework, (v) device configuration management, (vi) unique standard protocol, (vii) detect illegal interruption. It has safeguard device connectivity from unexpected subscribers by using smart filtering operation is enabled to segregate the subscriber numbers and receive additional configure improvement. It has obtained trusty and well configuring quality device for sufficient content tracking by balancing connectivity between devices. The flexible of structure selection is highly efficient for global solution of the smart industries on device management framework for self-configurable, initialization, tracking configure change and evaluate future extension and also secured their content details from vulnerability attacks. In thi nrnnneed (,IAA.-nA nrntnrn1 it rnillrfte dnvirin rnnfiniirinn riatn zit frnm nrtivin connected devices. The cloud system is mandatory for all accessible function of stored data and proper gateway security algorithms is enabled which is working background of the mobile application. It gives highly integrated structure for M2M device configuration and supports all type of data format, accompany with different communication protocols. It collects device configured data and predicts earlier failures states; consistency sends control commands from monitors centre. It has self-configurable ability whenever failures occurs and also provide failure type and degree of impact. Once, it detects failures, then, immediately, message notification system is enabled. Thus, share updating icon information with subscriber device during quality measures exceeds or below the expected level. The device coverage range and manageable function between mobile devices is evaluated from past transaction of data of the secured device. It safeguard device connectivity from unexpected subscribers by using smart filtering operation is enabled to segregate the subscriber numbers and receive additional configure improvement. The proposed OMA-DM protocol obtained trusty and well configuring quality device for sufficient content tracking by balancing connectivity between devices. It has detected the availability of subscribers updating after verifying the membership details from the registered database.
D2D configured phase
In this stage, device gives initial registration for device configuration and data storage accessibility. Usually, device allows once it is properly registered in the server database. Whenever, device requesting for data access, then, proper gateway protocol is initiated and it is recorded in the server for future verification. It generate different core link based on configuration data set receives from the cloud database. But, it is accessible only if the authorized device detected after verifying the registered past history. Some time legal D2D device agreement is followed if the number of device is come for device connectivity and storage. It monitor the system performance after evaluation past transaction of data with secured device and scale it device coverage range, enhances manageable between mobile devices. It sends continuous message notification about irregularity of data transaction and evaluates the security check and safety producers.

Claims (6)

SECURE LONG RANGE DEVICE TO DEVICE COMMUNICATION METHOD FOR IOT DEVICE USING LOW POWER WISE AREA NETWORKS (LPWAN) WE CLAIM
1. It supports to establish secured connection between heterogeneous loT devices. It provides flexible network connectivity, protect against malicious attacks, high packet delivery ratio, withstanding capability of varying load and node size.
2. It provides smart device connection after verifying authenticated message received from trusty device chain network at right time. It maintains quality integration with secured based information systems for sustainable customer transaction details and protects stored data from unauthorized person. / It ensures quality collections of devices configured data and predicts earlier failures states; consistency sends control commands from monitors centre. / It provides self-configurable ability whenever failures detected, and it finds failure type and degree of impact.
3. It improves the performance of data gathering and mobility management in static and dynamic environment.
4. It develops novel structures of the modified LPWAN technologies which increase success factors and withstand for various application tested at different of collaboration and value creation across trusty device chain networks. / It monitors the system performance after evaluation past transaction of data with secured device and scale it device coverage range, enhances manageable between mobile devices. / It sends continuous message notification about irregularity of data transaction and evaluates the security check and safety producers.
5. To protect device connectivity from unexpected subscribers by using smart security system which enabled to segregate the subscriber numbers and receive additional configure improvement.
6. It forms trusty and well configuring quality device for sufficient data sharing and tracking by balancing connectivity between devices.
SECURE LONG RANGE DEVICE TO DEVICE COMMUNICATION METHOD FOR IOT Apr 2021
DEVICE USING LOW POWER WISE AREA NETWORKS (LPWAN) Diagram 2021102086
Fig. 1 illustrates the block diagram of secured device to device connection LPWAN based on IoT system.
Fig. 2 illustrates a process of device traffic management system for endpoint security
Fig. 3 illustrates the end to end device communication using class A of LPWAN based on IoT system.
AU2021102086A 2021-04-20 2021-04-20 Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN) Ceased AU2021102086A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021102086A AU2021102086A4 (en) 2021-04-20 2021-04-20 Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021102086A AU2021102086A4 (en) 2021-04-20 2021-04-20 Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN)

Publications (1)

Publication Number Publication Date
AU2021102086A4 true AU2021102086A4 (en) 2021-06-03

Family

ID=76132942

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021102086A Ceased AU2021102086A4 (en) 2021-04-20 2021-04-20 Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN)

Country Status (1)

Country Link
AU (1) AU2021102086A4 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114340037A (en) * 2021-12-15 2022-04-12 广州欧创智能科技有限公司 Communication method, system, equipment and medium between LoRaWAN (Long-area network) equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114340037A (en) * 2021-12-15 2022-04-12 广州欧创智能科技有限公司 Communication method, system, equipment and medium between LoRaWAN (Long-area network) equipment
CN114340037B (en) * 2021-12-15 2022-08-19 广州欧创智能科技有限公司 Communication method, system, equipment and medium between LoRaWAN (Long-Range Wide area network) equipment

Similar Documents

Publication Publication Date Title
Maroufi et al. On the convergence of blockchain and internet of things (iot) technologies
US11637746B2 (en) Object identification for groups of IoT devices
CN111383021B (en) Node management method, device, equipment and medium based on block chain network
CN100493088C (en) Method for applying cooperative enhancement mechanism to adhoc network
CN112527912B (en) Data processing method and device based on block chain network and computer equipment
CN101895442B (en) Network quality active monitoring method and system in credible Internet
CN104335546A (en) Using neighbor discovery to create trust information for other applications
Hamdaoui et al. IoTShare: A blockchain-enabled IoT resource sharing on-demand protocol for smart city situation-awareness applications
WO2022100679A1 (en) Data communication method and apparatus, computer device, and storage medium
CN104184713A (en) Terminal identification method, machine identification code registration method, and corresponding system and equipment
CN104871168A (en) Resource protection on un-trusted devices
CN105991596A (en) Access control method and system
AU2021102086A4 (en) Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN)
CN111680282B (en) Node management method, device, equipment and medium based on block chain network
CN112200680B (en) Block link point management method, device, computer and readable storage medium
CN106021375A (en) Database access method and database agent node
CN111327602B (en) Equipment access processing method, equipment and storage medium
CN114301912A (en) Information interaction method and device based on block chain
CN117061538A (en) Consensus processing method and related device based on block chain network
US20180270236A1 (en) Method for protecting machine type communication device, network entity and mtc device
WO2012163587A1 (en) Distributed access control across the network firewalls
Abbas et al. Blockchain based vehicular trust management and less dense area optimization
TWI531202B (en) Online authentication by proximity
Raman et al. Blockchain technology for privacy and security issues and challenges in IOT-based systems
Singh et al. Quality of Services in Assets of Smart Parking

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry