Method and System for Collaborative Security Key Generation for Ad-hoc Internet of Things (IoT) Nodes

Technology Overview

Security of the IoT nodes are increasingly becoming an important and critical challenge to solve before many applications in an ad-hoc IoT network become secured and commercially viable. This system enables multiple dynamic trusted IoT nodes be formed and collaborate among each other to strengthen the security key generation, distribution and management for other neighboring IoT nodes.

Technology Features & Specifications

The system allows user to first define a set of trusted IoT nodes through a template-driven security planning module. Driven by business and industry needs, the trusted IoT nodes which are topology-, application- and context-aware, can be replaced by other more reliable nodes in forming dynamic trusted IoT nodes when operating in different environment. The methodology enables a continuously changing trusted nodes be formed to increase the level of difficulty in being detected and compromised.

Potential Applications

The system provides enhanced security for IoT applications and services in ad-hoc mesh network. It can be applied in areas such as:

  1. Machine-to-machine communications in future manufacturing,
  2. Health and elderly care solutions in smart home,
  3. Smart building management applications,
  4. Intelligent transportation applications,
  5. Smart community for collaborative work and play, etc.

Market Trends and Opportunities

The Internet of Things (IoT) is emerging as the third wave in the development of the Internet. The 1990s fixed Internet wave connected 1 billion users while the 2000s mobile wave connected another 2 billion. The IoT has the potential to connect 10x as many (28 billion) things to the Internet by 2020, ranging from bracelets to cars. Breakthroughs in the cost of sensors, processing power and bandwidth to connect devices are enabling ubiquitous connections right now. Early simple products like fitness trackers and thermostats are already gaining traction.

Customer Benefits

As self-organisng IoT network without IT infrastructure has frequently changing network topology, and the IoT nodes have limited memory size, processor and battery power, a centralised security authentication node becomes impractical to be implemented. The dynamic trusted IoT nodes which create and manage unique security keys collaboratively will provide an additional user-controllable security layer for IoT nodes, critically important for IoT applications and services in ad-hoc network.

Make an Enquiry