Blockchain Is The New IoT Standard

The Internet of Things (IoT)  receives huge interest from academics, researchers, and entrepreneurs,  thanks to its capacity to offer innovative services across various electronic applications and now Blockchain is claimed to be the new solution for Internet of Things (IoT) inter-operability.

Furthermore, eliminating technical barriers and enabling heterogeneous entities to communicate with global standards make possible global trade, economic growth, and local communities worldwide to prosper.

As the IoT underlies all the sensors and smart devices that use the Internet to communicate data, Blockchain identity standardisation is critical to ensure inter-operability and communications between Internet of Things (IoT) devices, people, and businesses. 

As it will be hard for devices to communicate with each other if there’s no standard way to exchange information around identity, the Institute of Electrical and Electronics Engineers (IEEE) has formed a new task force to develop global standards for blockchain-based decentralised identities (DIDs) for IoT devices.

The IEEE sees this standard being applied to communicate climate, geography, traffic and other data, however, one of the examples it gave is for cars to communicate with humans, toll booths, parking meters, and e-charging pods. Researchers and scientists from Lockheed Martin, Ericsson, Lenovo, Huawei, Bosch, IoTeX, and China Academy of Information and Communications Technology are developing the global standards for blockchain decentralised identities, in an attempt to formulate a universal specification.

The world is already seeing smart cities and highways built globally. In the not-so-distant future, machines will be the primary workforce. The IEEE Identity of Things Standard will make sure vehicles can seamlessly communicate with humans, with toll booths, parking meters, gasoline stations, and e-charging pods. 
And to enable people to order self-driving taxis, punctually pick them up, and drop them off where indicated, making payment digitally. These are just a few use cases, but the possibilities are endless.

The Identity of Things standard will help provide a decentralised identity and access management (IAM) framework for IoT device management and help with the creation of IoT security services, such as device authentication, data authorisation, and access management.

It’s also believed that with global DIDs, people will be able to contribute valuable real-time weather, geography, traffic, and other data to society. Many users will discover the five IoT-Blockchain implementation patterns that enterprises can enable for seamless communication between IoT devices, IoT Smart Gateways, and IoT platforms. These patterns help achieve trust, interoperability, and extendibility. 

Science Direct:     I-HLS:      Springer / Venkatesg Upadistra:   Light Reading:    Ledger Insights:   Stacey on IoT:

You Might Also Read: 

Millions Of IoT Devices At Risk To Malware:

 

« Pivoting Customers' Mindsets For Cloud Security
Denmark Wins 2022 European Cyber Security Challenge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ANS Group

ANS Group

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

NSW IT Support

NSW IT Support

NSW IT Support: Your exclusive hub for comprehensive Business IT services in Sydney. Our skilled team ensures seamless technology solutions nationwide, consistently delivering top-tier IT support.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.