IoT and Blockchain - Edge computing opportunity
This is an Edge computing opportunity for Networking Companies like CISCO, AT&T, IBM, Hitachi, DELL …. Obviously they need to be on the forefront of IoT. IoT devices reach directly out onto the Internet, communicate M2M, receive instructions and deliver information. The newer smarter devices have a lot of functionality and protection built into their designs ... But there are millions of older devices and devices that are not fully integrated with IoT functionality. Here is where network vendors can create edge capabilities on their routers and hubs, where the functionality can be used to not only enhance the local devices' interface, but their communications can be updated as IoT protocols evolve. Cisco is already built edge capabilities for their endpoint devices: Their ability to do analytics right at the data sources will be a huge advantage. So will be the ability to service and allow customers to take advantage of internet enabled devices that don’t have IoT functionality, and provide that functionality at the router. It is also a place for added protection; which is a growing concern for many remotely controlled machinery.
One of the biggest issues with IoT is security. Protecting the devices especially when they are receiving information via the cloud; it is critical to furnish the ability to guarantee that the delivery is from a valid source/device. The basis of a Blockchain enabled feature is to provide a crypto based access control that is peer-to-peer in its implementation. The privacy is very high since the peer to peer connection can be verified by private (e.g. manufacturer controlled) or public blockchain exchanges (general access). Using gateway products such as enhanced network routers, we can locally connect via protected paths to local devices using, hard wire, encoded Wi-Fi, and other similar methods. Safe local connections in conjunction with network vendor firewalls that protect the connected devices provides a formidable local barrier. Now, we need to guarantee that these safely connected devices are a communicating on the internet to a genuine source. Also these devices need a method to guarantee commands they receive are from a legitimate source (no hacker should be playing with you machinery or healthcare device). It isn’t enough to appear as a trusted source, you also need trusted validation - - - One solution that can be added to this overall security protection for IoT is the use of Blockchain technology, which can be incorporated into the IoT paradigm. Creating a tight and fully protected environment for new devices and legacy connections that utilize remote routing equipment.
A Blockchain possible enhancement
With Blockchain, there is a serious opportunity to provide IoT functionality securely to the growing millions of IoT devices (smart and simpler versions). A business opportunity, that is for sure.
Navy Veteran, Security Consultant, Security Designer, ZTDA, 2FA, Naval Combat Systems, Custom Access Control Solutions.
6 年We've done it in the military since 1983 as I was trained in Cryptography then. The Navy Destroyers I served on were "floating sensor platforms", radar, sonar, communications, sonobuoys are a good example of an IoT device. Dropped from Aurora aircraft to ping submarines, track hurricanes, water temps, now we're connecting the car to the net with the same crypto.
Blockchain & Distributed Ledger Technology Innovator | Co-Founder & Head of Design at L4S Corp.
6 年The potential for IOT security via a Distributed Ledger Solution is there but not with the current designs. All the current, major publicized POC's are not scalable are low capacity and high latency, which are all critical performance requirements for any commercially viable implementation. https://www.dhirubhai.net/pulse/thinking-outside-block-overcoming-herd-mentality-blocking-dowding
Blockchain, cryptography, securities
8 年Doing chip-to-cloud is more expensive because of hosting infrastructure costs. Moreover it doesn't perfectly fit into the P2P model so everyone has to trust the cloud vendor infrastructure. On the other side, Fog/local computing (i.e. embedded blockchain nodes + HSM + seals ) implies hardware design costs, but some companies are already selling blockchain-ready hw platforms.
Nice one Joel Binn
Senior Info/Data Management Professional - Experienced Senior Leader in multiple Data Management disciplines - Data Strategy | Data Governance | Data Protection | Data Privacy
8 年I understand the need to perform analytics and data consolidation closer to IOT devices in the field to manage the costs and complexity of transferring said data to the cloud, hence the invention of the term "fog computing" which I first heard from CISCO. When looking a the infrastructure complexity, this makes sense. I understand, and have executed, on building secure applications and therefore understand the need to build secure code for IOT devices to prevent them being hacked and/or used for nefarious purposes. I have read widely and deeply on blockchain and distributed ledger. I cannot fathom how it could be thought that blockchain technology can in any way secure IOT devices from nefarious use by bad actors, it's illogical, and seems to add great complexity and cost for little to no benefit. Why not apply the KISS principle, secure the IOT devices like you'd do for any other harware/software solution (or should be doing by default), figure out your network and data architecture to be simple and cost effective (fog or otherwise). Use the right tool for the right job otherwise it's just a hammer.