IoT and Blockchain - Edge computing opportunity

IoT and Blockchain - Edge computing opportunity

This is an Edge computing opportunity for Networking Companies  like CISCO, AT&T, IBM, Hitachi, DELL …. Obviously they need to be on the forefront of IoT.   IoT devices reach directly out onto the Internet, communicate M2M, receive instructions and deliver information. The newer smarter devices have a lot of functionality and protection built into their designs ... But there are millions of older devices and devices that are not fully integrated with IoT functionality.  Here is where network vendors can create edge capabilities on their routers and hubs, where the functionality can be used to not only enhance the local devices' interface, but their communications can be updated as IoT protocols evolve.   Cisco is already built edge capabilities for their endpoint devices: Their ability to do analytics right at the data sources will be a huge advantage.  So will be the ability to service and allow customers to take advantage of internet enabled devices that don’t have IoT functionality, and provide that functionality at the router.  It is also a place for added protection; which is a growing concern for many remotely controlled machinery.

 One of the biggest issues with IoT is security.  Protecting the devices especially when they are receiving information via the cloud; it is critical to furnish the ability to guarantee that the delivery is from a valid source/device.  The basis of a Blockchain enabled feature is to provide a crypto based access control that is peer-to-peer in its implementation. The privacy is very high since the peer to peer connection can be verified by private (e.g. manufacturer controlled) or public blockchain exchanges (general access). Using gateway products such as enhanced network routers, we can locally connect via protected paths to local devices using, hard wire, encoded Wi-Fi, and other similar methods.  Safe local connections in conjunction with network vendor firewalls that protect the connected devices provides a formidable local barrier.  Now, we need to guarantee that these safely connected devices are a communicating on the internet to a genuine source. Also these devices need a method to guarantee commands they receive are from a legitimate source (no hacker should be playing with you machinery or healthcare device).  It isn’t enough to appear as a trusted source, you also need trusted validation - - - One solution that can be added to this overall security protection for IoT is the use of Blockchain technology, which can be incorporated into the IoT paradigm. Creating a tight and fully protected environment for new devices and legacy connections that utilize remote routing equipment.

 A Blockchain possible enhancement

With Blockchain, there is a serious opportunity to provide IoT functionality securely to the growing millions of IoT devices (smart and simpler versions).  A business opportunity, that is for sure.

Darren Olson

Navy Veteran, Security Consultant, Security Designer, ZTDA, 2FA, Naval Combat Systems, Custom Access Control Solutions.

6 年

We've done it in the military since 1983 as I was trained in Cryptography then. The Navy Destroyers I served on were "floating sensor platforms", radar, sonar, communications, sonobuoys are a good example of an IoT device. Dropped from Aurora aircraft to ping submarines, track hurricanes, water temps, now we're connecting the car to the net with the same crypto.

回复
Paul F. Dowding

Blockchain & Distributed Ledger Technology Innovator | Co-Founder & Head of Design at L4S Corp.

6 年

The potential for IOT security via a Distributed Ledger Solution is there but not with the current designs. All the current, major publicized POC's are not scalable are low capacity and high latency, which are all critical performance requirements for any commercially viable implementation. https://www.dhirubhai.net/pulse/thinking-outside-block-overcoming-herd-mentality-blocking-dowding

回复
Julien BRODIER

Blockchain, cryptography, securities

8 年

Doing chip-to-cloud is more expensive because of hosting infrastructure costs. Moreover it doesn't perfectly fit into the P2P model so everyone has to trust the cloud vendor infrastructure. On the other side, Fog/local computing (i.e. embedded blockchain nodes + HSM + seals ) implies hardware design costs, but some companies are already selling blockchain-ready hw platforms.

Winston S.

Senior Info/Data Management Professional - Experienced Senior Leader in multiple Data Management disciplines - Data Strategy | Data Governance | Data Protection | Data Privacy

8 年

I understand the need to perform analytics and data consolidation closer to IOT devices in the field to manage the costs and complexity of transferring said data to the cloud, hence the invention of the term "fog computing" which I first heard from CISCO. When looking a the infrastructure complexity, this makes sense. I understand, and have executed, on building secure applications and therefore understand the need to build secure code for IOT devices to prevent them being hacked and/or used for nefarious purposes. I have read widely and deeply on blockchain and distributed ledger. I cannot fathom how it could be thought that blockchain technology can in any way secure IOT devices from nefarious use by bad actors, it's illogical, and seems to add great complexity and cost for little to no benefit. Why not apply the KISS principle, secure the IOT devices like you'd do for any other harware/software solution (or should be doing by default), figure out your network and data architecture to be simple and cost effective (fog or otherwise). Use the right tool for the right job otherwise it's just a hammer.

要查看或添加评论,请登录

Joel Binn的更多文章

社区洞察

其他会员也浏览了