TRUST HEURISTIC MODEL FOR REDUCING CONTROL LOAD IN IOT RESOURCE ACCESS NETWORKS
First Claim
1. A method for controlled resource access in an Internet of Things (IoT) network, comprising:
- requesting, by a requesting node, access to a first controlled resource in the IoT network, wherein access to the first controlled resource includes a requirement to periodically complete an authentication procedure;
responding to a challenge message received from a first gatekeeper node; and
receiving the requested access to the first controlled resource in response to correctly responding to the challenge message, wherein the first gatekeeper node reduces the requirement to periodically complete the authentication procedure in response to the requesting node correctly responding to one or more successive challenge messages.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure relates to a trust heuristic model for reducing a control load in an IoT resource access network. For example, an authenticating node may challenge a client node that requests access to a resource and grant the access if the client node correctly responds to the challenge or alternatively deny the access if the client node incorrectly responds to the challenge. Furthermore, based on the response to the challenge, the client node may be assigned a trust level, which may be dynamically updated based on successive challenge-and-response exchanges and/or interactions with other IoT network nodes. For example, to reduce the resource access control load, subsequent challenge-and-response intervals may be increased or eliminated if the client node correctly responds to successive challenges over time, while client nodes that incorrectly respond to successive challenges over time may be blocked from accessing the resource or banned from the IoT network.
-
Citations
30 Claims
-
1. A method for controlled resource access in an Internet of Things (IoT) network, comprising:
-
requesting, by a requesting node, access to a first controlled resource in the IoT network, wherein access to the first controlled resource includes a requirement to periodically complete an authentication procedure; responding to a challenge message received from a first gatekeeper node; and receiving the requested access to the first controlled resource in response to correctly responding to the challenge message, wherein the first gatekeeper node reduces the requirement to periodically complete the authentication procedure in response to the requesting node correctly responding to one or more successive challenge messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An Internet of Things (IoT) device, comprising:
-
means for requesting access to a controlled resource in an IoT network, wherein access to the controlled resource includes a requirement to periodically complete an authentication procedure; means for responding to a challenge message received from a gatekeeper node; and means for receiving the requested access to the controlled resource in response to correctly responding to the challenge message, wherein the gatekeeper node reduces the requirement to periodically complete the authentication procedure in response to the IoT device correctly responding to one or more successive challenge messages.
-
-
20. A computer-readable storage medium having computer-executable instructions recorded thereon, wherein executing the computer-executable instructions on an Internet of Things (IoT) device causes the IoT device to:
-
request access to a controlled resource in an IoT network, wherein access to the controlled resource includes a requirement to periodically complete an authentication procedure; respond to a challenge message received from a gatekeeper node; and receive the requested access to the controlled resource in response to correctly responding to the challenge message, wherein the gatekeeper node reduces the requirement to periodically complete the authentication procedure in response to the IoT device correctly responding to one or more successive challenge messages.
-
-
21. A method for controlling resource access in an Internet of Things (IoT) network, comprising:
-
receiving, at a gatekeeper node, a request to access a controlled resource in the IoT network from a requesting node, wherein access to the controlled resource includes a requirement to periodically complete an authentication procedure; transmitting a challenge message to the requesting node; receiving a response to the challenge message from the requesting node; and determining whether to grant the requesting node access to the controlled resource based on the received response to the challenge message, wherein the gatekeeper node further adjusts the requirement for the requesting node to periodically complete the authentication procedure based on whether the received response to the challenge message was correct. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification