SlideShare a Scribd company logo
1 of 62
Download to read offline
IoT and Blockchain Convergence
Prof. Ahmed Banafa
College of Engineering
San Jose State University
San Jose, CA USA
• The Internet of Things (IoT) as a concept is
fascinating and exciting, but one of the major
challenging aspects of IoT is having a secure
ecosystem encompassing all building blocks of
IoT-architecture.
• Understanding the different building blocks of
IoT, identifying the areas of vulnerability in
each block and exploring technologies needed
to counter each of the weaknesses are
essential in dealing with the security issue of
IoT.
IoT and Blockchain Convergence
IoT architecture can be represented
by four building blocks:
• Things: These are defined as uniquely
identifiable nodes, primarily sensors that
communicate without human interaction
using different connectivity methods.
• Gateways: These act as intermediaries
between things and the cloud to provide the
needed connectivity, security, and
manageability.
• Network infrastructure: This is comprised of
routers, aggregators, gateways, repeaters and
other devices that control and secure data
flow.
• Cloud infrastructure: Cloud infrastructure
contains large pools of virtualized servers and
storage that are networked together with
computing and analytical capabilities
Challenges to secure IoT deployments
• Existing security technologies will play a role
in mitigating IoT risks but they are not
enough. The goal is to get data securely to the
right place, at the right time, in the right
format. It's easier said than done for many
reasons, and here is a list of some of the
challenges:
• Many IoT Systems are poorly designed and
implemented, using diverse protocols and
technologies that create complex and
sometimes conflicting configurations.
• Limited guidance for life cycle maintenance
and management of IoT devices
• IoT privacy concerns are complex and not
always readily evident.
• There is a lack of standards for authentication
and authorization of IoT edge devices.
• Security standards, for platform configurations,
involving virtualized IoT platforms supporting
multi-tenancy is immature.
• The uses for Internet of Things technology are
expanding and changing—often in uncharted
waters.
• In addition to the above list, new security
technologies will be required to protect IoT
devices and platforms from both information
attacks and physical tampering, to encrypt
their communications, and to address new
challenges such as impersonating "things" or
denial-of-sleep attacks that drain batteries, to
denial-of-service attacks (DoS).
• But IoT security will be complicated by the fact
that many "things" use simple processors and
operating systems that may not support
sophisticated security approaches.
• A prime example of the urgent need for such new
security technologies is the recent massive
distributed denial of service attack (DDoS) that
crippled the servers of popular services like
Twitter, Netflix, NYTimes, and PayPal across the
U.S. on October 21st, 2016. It was the result of an
immense assault that involved millions of
internet addresses and malicious software.
• One source of the traffic for the attacks was
devices infected by the Mirai malware.
• The attack comes amid heightened
cybersecurity fears and a rising number of
internet security breaches. All indications
suggest that countless IoT devices that power
everyday technology like closed-circuit
cameras and smart-home devices were
hijacked by the malware, and used against the
servers.
The problem with the current
centralized model
• Current IoT ecosystems rely on centralized,
brokered communication models, otherwise
known as the server/client paradigm.
• All devices are identified, authenticated and
connected through cloud servers that sport
huge processing and storage capacities.
Connections between devices have to
exclusively go through the internet, even if
they happen to be a few feet apart.
• While this model has connected generic
computing devices for decades and will
continue to support small-scale IoT networks
as we see them today, it will not be able to
respond to the growing needs of the huge IoT
ecosystems of tomorrow.
• Existing IoT solutions are expensive because of
the high infrastructure and maintenance cost
associated with centralized clouds, large
server farms, and networking equipment.
• The sheer amount of communications that will
have to be handled when there are tens of
billions of IoT devices will increase those costs
substantially.
• Even if the unprecedented economic and
engineering challenges are overcome, cloud
servers will remain a bottleneck and point of
failure that can disrupt the entire network.
Decentralizing IoT networks
• A decentralized approach to IoT networking
would solve many of the issues above.
• Adopting a standardized peer-to-peer
communication model to process the
hundreds of billions of transactions between
devices will significantly reduce the costs
associated with installing and maintaining
large centralized data centers and will
distribute computation and storage needs
across the billions of devices that form IoT
networks.
• This will prevent failure in any single node in a
network from bringing the entire network to a
halting collapse.
• However, establishing peer-to-peer
communications will present its own set of
challenges, chief among them the issue of
security. And as we all know, IoT security is much
more than just about protecting sensitive data.
• The proposed solution will have to maintain
privacy and security in huge IoT networks and
offer some form of validation and consensus for
transactions to prevent spoofing and theft.
To perform the functions of traditional IoT
solutions without a centralized control, any
decentralized approach must support three
foundational functions:
• Peer-to-peer messaging;
• Distributed file sharing;
• Autonomous device coordination.
The Blockchain Approach
• Blockchain, the "distributed ledger"
technology, has emerged as an object of
intense interest in the tech industry and
beyond. Blockchain technology offers a way of
recording transactions or any digital
interaction in a way that is designed to be
secure, transparent, highly resistant to
outages, auditable, and efficient; as such, it
carries the possibility of disrupting industries
and enabling new business models.
• The technology is young and changing very
rapidly; widespread commercialization is still a
few years off. Nonetheless, to avoid disruptive
surprises or missed opportunities, strategists,
planners, and decision makers across
industries and business functions should pay
heed now and begin to investigate
applications of the technology.
What is Blockchain?
• Blockchain is a database that maintains a
continuously growing set of data records. It is
distributed in nature, meaning that there is no
master computer holding the entire chain.
Rather, the participating nodes have a copy of
the chain. It’s also ever-growing — data
records are only added to the chain.
A blockchain consists of two types of elements:
• Transactions are the actions created by the
participants in the system.
• Blocks record these transactions and make
sure they are in the correct sequence and
have not been tampered with.
What are some advantages of
blockchain?
• The big advantage of blockchain is that it's
public. Everyone participating can see the
blocks and the transactions stored in them.
This doesn't mean everyone can see the
actual content of your transaction, however;
that's protected by your private key.
• A blockchain is decentralized, so there is no
single authority that can approve the
transactions or set specific rules to have
transactions accepted.
• That means there's a huge amount of trust
involved since all the participants in the
network have to reach a consensus to accept
transactions.
• Most importantly, it's secure. The database
can only be extended and previous records
cannot be changed (at least, there's a very
high cost if someone wants to alter previous
records).
How does it work?
• When someone wants to add a transaction to
the chain, all the participants in the network
will validate it. They do this by applying an
algorithm to the transaction to verify its
validity.
• What exactly is understood by "valid" is
defined by the blockchain system and can
differ between systems. Then it is up to a
majority of the participants to agree that the
transaction is valid.
• A set of approved transactions is then bundled
in a block, which gets sent to all the nodes in
the network. They, in turn, validate the new
block. Each successive block contains a hash,
which is a unique fingerprint, of the previous
block.
The blockchain and IoT
• Blockchain technology is the missing link to
settle privacy and reliability concerns in the
Internet of Things. Blockchain technology
could perhaps be the silver bullet needed by
the IoT industry.
• It can be used in tracking billions of connected
devices, enabling the processing of
transactions and coordination between
devices; this allows for significant savings for
IoT industry manufacturers.
• This decentralized approach would eliminate
single points of failure, creating a more
resilient ecosystem for devices to run on. The
cryptographic algorithms used by blockchains
would make consumer data more private.
• The ledger is tamper-proof and cannot be
manipulated by malicious actors because it
doesn't exist in any single location, and man-
in-the-middle attacks cannot be staged
because there is no single thread of
communication that can be intercepted.
• Blockchain makes trustless, peer-to-peer
messaging possible and has already proven its
worth in the world of financial services
through cryptocurrencies such as bitcoin,
providing guaranteed peer-to-peer payment
services without the need for third-party
brokers.
• The decentralized, autonomous, and trustless
capabilities of the blockchain make it an ideal
component to become a foundational
element of IoT solutions.
• It is no surprise that enterprise IoT
technologies have quickly become one of the
early adopters of blockchain technology.
• In an IoT network, the blockchain can keep an
immutable record of the history of smart
devices. This feature enables the autonomous
functioning of smart devices without the need
for centralized authority.
• As a result, the blockchain opens the door to a
series of IoT scenarios that were remarkably
difficult, or even impossible to implement
without it.
• For example, by leveraging the blockchain, IoT
solutions can enable secure, trustless
messaging between devices in an IoT network.
• In this model, the blockchain will treat
message exchanges between devices similar
to financial transactions in a bitcoin network.
To enable message exchanges, devices will
leverage smart contracts which then model
the agreement between the two parties
• One of the most exciting capabilities of the
blockchain is the ability to maintain a duly
decentralized, trusted ledger of all
transactions occurring in a network.
• This capability is essential to enable the many
compliances and regulatory requirements of
industrial IoT (IIoT) applications without the
need to rely on a centralized model.
What are the challenges?
In spite of all its benefits, the blockchain model
is not without its flaws and shortcomings:
• Scalability issues pertaining to the
blockchain that might lead to centralization,
which is casting a shadow over the future of
the cryptocurrency.
• Processing power and time required to
perform encryption for all the objects involved
in a blockchain-based ecosystem. IoT
ecosystems are very diverse. In contrast to
generic computing networks, IoT networks are
comprised of devices that have very different
computing capabilities, and not all of them
will be capable of running the same
encryption algorithms at the desired speed.
• Storage too will be a hurdle. Blockchain
eliminates the need for a central server to
store transactions and device IDs, but the
ledger has to be stored on the nodes
themselves. And the ledger will increase in
size as time passes. That is beyond the
capabilities of a wide range of smart devices
such as sensors, which have very low storage
capacity.
• Lack of skills: few people understand how
blockchain technology really works and when
you add IoT to the mix that number will shrink
drastically.
• Legal and compliance issues: It's a new
territory in all aspects without any legal or
compliance code to follow, which is a serious
problem for manufacturers and service
providers. This challenge alone will scare off
many businesses from using blockchain
technology.
The Optimum Platform
Developing solutions for the Internet of Things
requires unprecedented collaboration,
coordination, and connectivity for each piece in
the ecosystem, and throughout the ecosystem
as a whole.
All devices must work together and be
integrated with all other devices, and all devices
must communicate and interact seamlessly with
connected systems and infrastructures. It's
possible, but it can be expensive, time-
consuming, and difficult.
The optimum platform for IoT can:
• Acquire and manage data to create a
standards-based, scalable, and secure
platform.
• Integrate and secure data to reduce cost and
complexity while protecting your investment.
• Analyze data and act by extracting business
value from data, and then acting on it.
• Security needs to be built in as a foundation of
IoT systems, with rigorous validity checks,
authentication, data verification, and all the
data needs to be encrypted.
• At the application level, software
development organizations need to be better
at writing code that is stable, resilient and
trustworthy, with better code development
standards, training, threat analysis and testing
• As systems interact with each other, it's
essential to have an agreed interoperability
standard, which is safe and valid. Without a
solid bottom-top structure we will create
more threats with every device added to the
IoT. What we need is a secure and safe IoT
with privacy protected.
• That's a tough trade off but not impossible
and blockchain technology is an attractive
option if we can overcome its drawbacks.
Any questions?
Thank you!
@BanafaAhmed
https://www.linkedin.com/in/ahmedbanafa
ahmed.banafa@sjsu.edu

More Related Content

What's hot

Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain SecurityITU
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basicsRomit Bose
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Types of blockchain
Types of blockchainTypes of blockchain
Types of blockchainDarwin Labs
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in BlockchainEC-Council
 
Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOTStacey Roberts
 
Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation101 Blockchains
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureEC-Council
 
Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyhellygeorge
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityKevin Cedeño, CISM, CISA
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithmsAnurag Dashputre
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?101 Blockchains
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoTMat Keep
 

What's hot (20)

Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Types of blockchain
Types of blockchainTypes of blockchain
Types of blockchain
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
 
Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOT
 
Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
 
Blockchain
BlockchainBlockchain
Blockchain
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
 
Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgers
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of Cybersecurity
 
Blockchain+IOT
Blockchain+IOTBlockchain+IOT
Blockchain+IOT
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoT
 

Viewers also liked

7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
 
State of Blockchain Q4 2016
State of Blockchain Q4 2016State of Blockchain Q4 2016
State of Blockchain Q4 2016CoinDesk
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
BlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists
 
Smart Industry 4.0: IBM Watson IoT in de praktijk
Smart Industry 4.0: IBM Watson IoT in de praktijkSmart Industry 4.0: IBM Watson IoT in de praktijk
Smart Industry 4.0: IBM Watson IoT in de praktijkIoT Academy
 
IoT+Blockchain & Decentralized Apps
IoT+Blockchain & Decentralized AppsIoT+Blockchain & Decentralized Apps
IoT+Blockchain & Decentralized AppsRong Chen
 
Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTRobin Teigland
 
Introducing the Blockchain and Distributed Ledger Technology
Introducing the Blockchain and  Distributed Ledger TechnologyIntroducing the Blockchain and  Distributed Ledger Technology
Introducing the Blockchain and Distributed Ledger TechnologyJollen Chen
 
Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Colin Harrison
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityDinis Guarda
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoTAhmed Banafa
 
IBM ADEPT
IBM ADEPTIBM ADEPT
IBM ADEPT_hd
 
State of Blockchain Consortia by William Mougayar - December 2016
State of Blockchain Consortia by William Mougayar  - December 2016State of Blockchain Consortia by William Mougayar  - December 2016
State of Blockchain Consortia by William Mougayar - December 2016The Business Blockchain
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart CityDr. Mazlan Abbas
 
Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...
Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...
Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...Business of Software Conference
 
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...Business of Software Conference
 
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Leonardo De Moura Rocha Lima
 
Becoming a blockchain professional
Becoming a blockchain professionalBecoming a blockchain professional
Becoming a blockchain professionalPortia Burton
 

Viewers also liked (20)

7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
State of Blockchain Q4 2016
State of Blockchain Q4 2016State of Blockchain Q4 2016
State of Blockchain Q4 2016
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
BlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists - English presentation
BlockChain Strategists - English presentation
 
Smart Industry 4.0: IBM Watson IoT in de praktijk
Smart Industry 4.0: IBM Watson IoT in de praktijkSmart Industry 4.0: IBM Watson IoT in de praktijk
Smart Industry 4.0: IBM Watson IoT in de praktijk
 
IoT+Blockchain & Decentralized Apps
IoT+Blockchain & Decentralized AppsIoT+Blockchain & Decentralized Apps
IoT+Blockchain & Decentralized Apps
 
Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoT
 
Introducing the Blockchain and Distributed Ledger Technology
Introducing the Blockchain and  Distributed Ledger TechnologyIntroducing the Blockchain and  Distributed Ledger Technology
Introducing the Blockchain and Distributed Ledger Technology
 
Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Harrison lsri blockchain 2017
Harrison lsri blockchain 2017
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 
IBM ADEPT
IBM ADEPTIBM ADEPT
IBM ADEPT
 
State of Blockchain Consortia by William Mougayar - December 2016
State of Blockchain Consortia by William Mougayar  - December 2016State of Blockchain Consortia by William Mougayar  - December 2016
State of Blockchain Consortia by William Mougayar - December 2016
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...
Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...
Paul Egan, IoTUK, IoT Forum 2016, Regulation: What is it good for? Absolute I...
 
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
 
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
 
Becoming a blockchain professional
Becoming a blockchain professionalBecoming a blockchain professional
Becoming a blockchain professional
 

Similar to IoT and Blockchain Convergence

Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Dr. Kotrappa Sirbi
 
Blockchain in industry 4.0
Blockchain in industry 4.0Blockchain in industry 4.0
Blockchain in industry 4.0Mujahid Hussain
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinM Shamim Iqbal
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfSeynji
 
Blockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNGBlockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNGRids Vazi
 

Similar to IoT and Blockchain Convergence (20)

Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Blockchain
BlockchainBlockchain
Blockchain
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
 
Blockchain in industry 4.0
Blockchain in industry 4.0Blockchain in industry 4.0
Blockchain in industry 4.0
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Leveraging IOT and Latest Technologies
Leveraging IOT and Latest TechnologiesLeveraging IOT and Latest Technologies
Leveraging IOT and Latest Technologies
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
Blockchain
Blockchain Blockchain
Blockchain
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdf
 
Blockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNGBlockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNG
 

More from Ahmed Banafa

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergenceAhmed Banafa
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AIAhmed Banafa
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingAhmed Banafa
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet ExplainedAhmed Banafa
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum TeleportationAhmed Banafa
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingAhmed Banafa
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain managementAhmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ahmed Banafa
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain ApplicationsAhmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU Ahmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AIAhmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 

More from Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 

Recently uploaded

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 

Recently uploaded (12)

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 

IoT and Blockchain Convergence

  • 1. IoT and Blockchain Convergence Prof. Ahmed Banafa College of Engineering San Jose State University San Jose, CA USA
  • 2. • The Internet of Things (IoT) as a concept is fascinating and exciting, but one of the major challenging aspects of IoT is having a secure ecosystem encompassing all building blocks of IoT-architecture.
  • 3. • Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
  • 5. IoT architecture can be represented by four building blocks: • Things: These are defined as uniquely identifiable nodes, primarily sensors that communicate without human interaction using different connectivity methods.
  • 6. • Gateways: These act as intermediaries between things and the cloud to provide the needed connectivity, security, and manageability.
  • 7. • Network infrastructure: This is comprised of routers, aggregators, gateways, repeaters and other devices that control and secure data flow.
  • 8. • Cloud infrastructure: Cloud infrastructure contains large pools of virtualized servers and storage that are networked together with computing and analytical capabilities
  • 9. Challenges to secure IoT deployments • Existing security technologies will play a role in mitigating IoT risks but they are not enough. The goal is to get data securely to the right place, at the right time, in the right format. It's easier said than done for many reasons, and here is a list of some of the challenges:
  • 10. • Many IoT Systems are poorly designed and implemented, using diverse protocols and technologies that create complex and sometimes conflicting configurations. • Limited guidance for life cycle maintenance and management of IoT devices • IoT privacy concerns are complex and not always readily evident.
  • 11. • There is a lack of standards for authentication and authorization of IoT edge devices. • Security standards, for platform configurations, involving virtualized IoT platforms supporting multi-tenancy is immature. • The uses for Internet of Things technology are expanding and changing—often in uncharted waters.
  • 12. • In addition to the above list, new security technologies will be required to protect IoT devices and platforms from both information attacks and physical tampering, to encrypt their communications, and to address new challenges such as impersonating "things" or denial-of-sleep attacks that drain batteries, to denial-of-service attacks (DoS).
  • 13. • But IoT security will be complicated by the fact that many "things" use simple processors and operating systems that may not support sophisticated security approaches.
  • 14. • A prime example of the urgent need for such new security technologies is the recent massive distributed denial of service attack (DDoS) that crippled the servers of popular services like Twitter, Netflix, NYTimes, and PayPal across the U.S. on October 21st, 2016. It was the result of an immense assault that involved millions of internet addresses and malicious software. • One source of the traffic for the attacks was devices infected by the Mirai malware.
  • 15. • The attack comes amid heightened cybersecurity fears and a rising number of internet security breaches. All indications suggest that countless IoT devices that power everyday technology like closed-circuit cameras and smart-home devices were hijacked by the malware, and used against the servers.
  • 16. The problem with the current centralized model • Current IoT ecosystems rely on centralized, brokered communication models, otherwise known as the server/client paradigm.
  • 17. • All devices are identified, authenticated and connected through cloud servers that sport huge processing and storage capacities. Connections between devices have to exclusively go through the internet, even if they happen to be a few feet apart.
  • 18. • While this model has connected generic computing devices for decades and will continue to support small-scale IoT networks as we see them today, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
  • 19. • Existing IoT solutions are expensive because of the high infrastructure and maintenance cost associated with centralized clouds, large server farms, and networking equipment. • The sheer amount of communications that will have to be handled when there are tens of billions of IoT devices will increase those costs substantially.
  • 20. • Even if the unprecedented economic and engineering challenges are overcome, cloud servers will remain a bottleneck and point of failure that can disrupt the entire network.
  • 21. Decentralizing IoT networks • A decentralized approach to IoT networking would solve many of the issues above.
  • 22. • Adopting a standardized peer-to-peer communication model to process the hundreds of billions of transactions between devices will significantly reduce the costs associated with installing and maintaining large centralized data centers and will distribute computation and storage needs across the billions of devices that form IoT networks.
  • 23. • This will prevent failure in any single node in a network from bringing the entire network to a halting collapse.
  • 24. • However, establishing peer-to-peer communications will present its own set of challenges, chief among them the issue of security. And as we all know, IoT security is much more than just about protecting sensitive data. • The proposed solution will have to maintain privacy and security in huge IoT networks and offer some form of validation and consensus for transactions to prevent spoofing and theft.
  • 25. To perform the functions of traditional IoT solutions without a centralized control, any decentralized approach must support three foundational functions: • Peer-to-peer messaging; • Distributed file sharing; • Autonomous device coordination.
  • 26. The Blockchain Approach • Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond. Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
  • 27. • The technology is young and changing very rapidly; widespread commercialization is still a few years off. Nonetheless, to avoid disruptive surprises or missed opportunities, strategists, planners, and decision makers across industries and business functions should pay heed now and begin to investigate applications of the technology.
  • 28. What is Blockchain? • Blockchain is a database that maintains a continuously growing set of data records. It is distributed in nature, meaning that there is no master computer holding the entire chain. Rather, the participating nodes have a copy of the chain. It’s also ever-growing — data records are only added to the chain.
  • 29. A blockchain consists of two types of elements: • Transactions are the actions created by the participants in the system. • Blocks record these transactions and make sure they are in the correct sequence and have not been tampered with.
  • 30. What are some advantages of blockchain? • The big advantage of blockchain is that it's public. Everyone participating can see the blocks and the transactions stored in them. This doesn't mean everyone can see the actual content of your transaction, however; that's protected by your private key.
  • 31. • A blockchain is decentralized, so there is no single authority that can approve the transactions or set specific rules to have transactions accepted. • That means there's a huge amount of trust involved since all the participants in the network have to reach a consensus to accept transactions.
  • 32. • Most importantly, it's secure. The database can only be extended and previous records cannot be changed (at least, there's a very high cost if someone wants to alter previous records).
  • 33. How does it work? • When someone wants to add a transaction to the chain, all the participants in the network will validate it. They do this by applying an algorithm to the transaction to verify its validity.
  • 34. • What exactly is understood by "valid" is defined by the blockchain system and can differ between systems. Then it is up to a majority of the participants to agree that the transaction is valid.
  • 35. • A set of approved transactions is then bundled in a block, which gets sent to all the nodes in the network. They, in turn, validate the new block. Each successive block contains a hash, which is a unique fingerprint, of the previous block.
  • 37. • Blockchain technology is the missing link to settle privacy and reliability concerns in the Internet of Things. Blockchain technology could perhaps be the silver bullet needed by the IoT industry.
  • 38. • It can be used in tracking billions of connected devices, enabling the processing of transactions and coordination between devices; this allows for significant savings for IoT industry manufacturers.
  • 39. • This decentralized approach would eliminate single points of failure, creating a more resilient ecosystem for devices to run on. The cryptographic algorithms used by blockchains would make consumer data more private.
  • 40. • The ledger is tamper-proof and cannot be manipulated by malicious actors because it doesn't exist in any single location, and man- in-the-middle attacks cannot be staged because there is no single thread of communication that can be intercepted.
  • 41. • Blockchain makes trustless, peer-to-peer messaging possible and has already proven its worth in the world of financial services through cryptocurrencies such as bitcoin, providing guaranteed peer-to-peer payment services without the need for third-party brokers.
  • 42. • The decentralized, autonomous, and trustless capabilities of the blockchain make it an ideal component to become a foundational element of IoT solutions. • It is no surprise that enterprise IoT technologies have quickly become one of the early adopters of blockchain technology.
  • 43. • In an IoT network, the blockchain can keep an immutable record of the history of smart devices. This feature enables the autonomous functioning of smart devices without the need for centralized authority. • As a result, the blockchain opens the door to a series of IoT scenarios that were remarkably difficult, or even impossible to implement without it.
  • 44. • For example, by leveraging the blockchain, IoT solutions can enable secure, trustless messaging between devices in an IoT network.
  • 45. • In this model, the blockchain will treat message exchanges between devices similar to financial transactions in a bitcoin network. To enable message exchanges, devices will leverage smart contracts which then model the agreement between the two parties
  • 46. • One of the most exciting capabilities of the blockchain is the ability to maintain a duly decentralized, trusted ledger of all transactions occurring in a network.
  • 47. • This capability is essential to enable the many compliances and regulatory requirements of industrial IoT (IIoT) applications without the need to rely on a centralized model.
  • 48. What are the challenges?
  • 49. In spite of all its benefits, the blockchain model is not without its flaws and shortcomings: • Scalability issues pertaining to the blockchain that might lead to centralization, which is casting a shadow over the future of the cryptocurrency.
  • 50. • Processing power and time required to perform encryption for all the objects involved in a blockchain-based ecosystem. IoT ecosystems are very diverse. In contrast to generic computing networks, IoT networks are comprised of devices that have very different computing capabilities, and not all of them will be capable of running the same encryption algorithms at the desired speed.
  • 51. • Storage too will be a hurdle. Blockchain eliminates the need for a central server to store transactions and device IDs, but the ledger has to be stored on the nodes themselves. And the ledger will increase in size as time passes. That is beyond the capabilities of a wide range of smart devices such as sensors, which have very low storage capacity.
  • 52. • Lack of skills: few people understand how blockchain technology really works and when you add IoT to the mix that number will shrink drastically.
  • 53. • Legal and compliance issues: It's a new territory in all aspects without any legal or compliance code to follow, which is a serious problem for manufacturers and service providers. This challenge alone will scare off many businesses from using blockchain technology.
  • 54. The Optimum Platform Developing solutions for the Internet of Things requires unprecedented collaboration, coordination, and connectivity for each piece in the ecosystem, and throughout the ecosystem as a whole.
  • 55. All devices must work together and be integrated with all other devices, and all devices must communicate and interact seamlessly with connected systems and infrastructures. It's possible, but it can be expensive, time- consuming, and difficult.
  • 56. The optimum platform for IoT can: • Acquire and manage data to create a standards-based, scalable, and secure platform. • Integrate and secure data to reduce cost and complexity while protecting your investment. • Analyze data and act by extracting business value from data, and then acting on it.
  • 57. • Security needs to be built in as a foundation of IoT systems, with rigorous validity checks, authentication, data verification, and all the data needs to be encrypted.
  • 58. • At the application level, software development organizations need to be better at writing code that is stable, resilient and trustworthy, with better code development standards, training, threat analysis and testing
  • 59. • As systems interact with each other, it's essential to have an agreed interoperability standard, which is safe and valid. Without a solid bottom-top structure we will create more threats with every device added to the IoT. What we need is a secure and safe IoT with privacy protected.
  • 60. • That's a tough trade off but not impossible and blockchain technology is an attractive option if we can overcome its drawbacks.