Trust heuristic model for reducing control load in IoT resource access networks
First Claim
1. A method for controlled resource access in an Internet of Things (IoT) network, comprising:
- requesting, by a requesting node, access to a first controlled resource in the IoT network, wherein access to the first controlled resource includes a requirement to periodically repeat an authentication procedure;
responding to a challenge message received from a first gatekeeper node, wherein the first gatekeeper node is configured to deny access to the first controlled resource when the response to the challenge message is incorrect; and
receiving the requested access to the first controlled resource in response to correctly responding to the challenge message, wherein the first gatekeeper node increases a time before the requesting node is required to repeat the authentication procedure in response to the requesting node correctly responding to two or more successive challenge messages.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure relates to a trust heuristic model for reducing a control load in an IoT resource access network. For example, an authenticating node may challenge a client node that requests access to a resource and grant the access if the client node correctly responds to the challenge or alternatively deny the access if the client node incorrectly responds to the challenge. Furthermore, based on the response to the challenge, the client node may be assigned a trust level, which may be dynamically updated based on successive challenge-and-response exchanges and/or interactions with other IoT network nodes. For example, to reduce the resource access control load, subsequent challenge-and-response intervals may be increased or eliminated if the client node correctly responds to successive challenges over time, while client nodes that incorrectly respond to successive challenges over time may be blocked from accessing the resource or banned from the IoT network.
19 Citations
32 Claims
-
1. A method for controlled resource access in an Internet of Things (IoT) network, comprising:
-
requesting, by a requesting node, access to a first controlled resource in the IoT network, wherein access to the first controlled resource includes a requirement to periodically repeat an authentication procedure; responding to a challenge message received from a first gatekeeper node, wherein the first gatekeeper node is configured to deny access to the first controlled resource when the response to the challenge message is incorrect; and receiving the requested access to the first controlled resource in response to correctly responding to the challenge message, wherein the first gatekeeper node increases a time before the requesting node is required to repeat the authentication procedure in response to the requesting node correctly responding to two or more successive challenge messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An Internet of Things (IoT) device, comprising:
-
a transceiver configured to; transmit a request to access a controlled resource in an IoT network, wherein access to the controlled resource includes a requirement to periodically repeat an authentication procedure; and respond to a challenge message received from a gatekeeper node, wherein the gatekeeper node is configured to deny access to the controlled resource when the response to the challenge message is incorrect; and at least one processor, coupled to the transceiver, and configured to receive the requested access to the controlled resource based on a correct response to the challenge message, wherein the gatekeeper node is configured to increase a time before the requesting node is required to repeat the authentication procedure in response to the IoT device correctly responding to two or more successive challenge messages. - View Dependent Claims (20)
-
-
21. A “
- non-transitory”
computer-readable storage medium having computer-executable instructions recorded thereon, wherein executing the computer-executable instructions on an Internet of Things (IoT) device causes the IoT device to;request access to a controlled resource in an IoT network, wherein access to the controlled resource includes a requirement to periodically repeat an authentication procedure; respond to a challenge message received from a gatekeeper node, wherein the gatekeeper node is configured to deny access to the controlled resource when the response to the challenge message is incorrect; and receive the requested access to the controlled resource in response to correctly responding to the challenge message, wherein the gatekeeper node is configured to increase a time before the requesting node is required to repeat the authentication procedure in response to the IoT device correctly responding to two or more successive challenge messages. - View Dependent Claims (22)
- non-transitory”
-
23. A method for controlling resource access in an Internet of Things (IoT) network, comprising:
-
receiving, at a gatekeeper node, a request to access a controlled resource in the IoT network from a requesting node, wherein access to the controlled resource includes a requirement to periodically repeat an authentication procedure; transmitting a challenge message to the requesting node; receiving a response to the challenge message from the requesting node; determining whether to grant the requesting node access to the controlled resource based on the received response to the challenge message, wherein the requesting node is granted access to the controlled resource when the received response is correct or denied access to the controlled resource when the received response is incorrect; and increasing a time before the requesting node is required to repeat the authentication procedure in response to the requesting node correctly responding to two or more successive challenge messages. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification