Blockchain Is The New IoT Standard

The Internet of Things (IoT)  receives huge interest from academics, researchers, and entrepreneurs,  thanks to its capacity to offer innovative services across various electronic applications and now Blockchain is claimed to be the new solution for Internet of Things (IoT) inter-operability.

Furthermore, eliminating technical barriers and enabling heterogeneous entities to communicate with global standards make possible global trade, economic growth, and local communities worldwide to prosper.

As the IoT underlies all the sensors and smart devices that use the Internet to communicate data, Blockchain identity standardisation is critical to ensure inter-operability and communications between Internet of Things (IoT) devices, people, and businesses. 

As it will be hard for devices to communicate with each other if there’s no standard way to exchange information around identity, the Institute of Electrical and Electronics Engineers (IEEE) has formed a new task force to develop global standards for blockchain-based decentralised identities (DIDs) for IoT devices.

The IEEE sees this standard being applied to communicate climate, geography, traffic and other data, however, one of the examples it gave is for cars to communicate with humans, toll booths, parking meters, and e-charging pods. Researchers and scientists from Lockheed Martin, Ericsson, Lenovo, Huawei, Bosch, IoTeX, and China Academy of Information and Communications Technology are developing the global standards for blockchain decentralised identities, in an attempt to formulate a universal specification.

The world is already seeing smart cities and highways built globally. In the not-so-distant future, machines will be the primary workforce. The IEEE Identity of Things Standard will make sure vehicles can seamlessly communicate with humans, with toll booths, parking meters, gasoline stations, and e-charging pods. 
And to enable people to order self-driving taxis, punctually pick them up, and drop them off where indicated, making payment digitally. These are just a few use cases, but the possibilities are endless.

The Identity of Things standard will help provide a decentralised identity and access management (IAM) framework for IoT device management and help with the creation of IoT security services, such as device authentication, data authorisation, and access management.

It’s also believed that with global DIDs, people will be able to contribute valuable real-time weather, geography, traffic, and other data to society. Many users will discover the five IoT-Blockchain implementation patterns that enterprises can enable for seamless communication between IoT devices, IoT Smart Gateways, and IoT platforms. These patterns help achieve trust, interoperability, and extendibility. 

Science Direct:     I-HLS:      Springer / Venkatesg Upadistra:   Light Reading:    Ledger Insights:   Stacey on IoT:

You Might Also Read: 

Millions Of IoT Devices At Risk To Malware:

 

« Pivoting Customers' Mindsets For Cloud Security
Denmark Wins 2022 European Cyber Security Challenge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.