Blockchain Tech Promises Better Security For IoT

A new blockchain-based method for enhancing IoT devices security may be under development. 

IBM has won a patent for the autonomous self-servicing of networked devices that form part of its Autonomous Decentralised Peer-to-Peer Telemetry (ADEPT) environment. 

The system uses a blockchain protocol as a basis for a distributed network of devices, what Samsung has called “a sort of decentralised Internet of Things (IoT).”

The patent, first filed in late June 2016, was awarded by the US Patent and Trademark Office (USPTO).

The proof-of-concept (PoC) for ADEPT was first exposed in partnership with Samsung in March 2016. 

Suggesting that a decentralised architecture can offer improved cost and operational efficiency, IBM explained that “IoT controllers are often centralised with different IoT solution vendors [providing] proprietary solutions that follow similar centralised architectures.” 

According to IBM, self-servicing devices can further boost the improved efficiency of a decentralised system, as they can diagnose and automate the solution for a range of situations such as “self-diagnosis, predicting equipment failure and anticipating service needs.”

IBM has been steadily diversifying its involvement in blockchain across multiple fields, including a new blockchain-related patent filed by IBM that would harness the technology to tackle privacy and security concerns for drones.

iHLS:

You Might Also Read:

How Blockchain Can Protect IoT Devices

« Financial Sector Breaches Soar Despite Heavy Security Spending
Google Is Building A Search Engine For Fact Checks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

KnowBe4

KnowBe4

KnowBe4 is an integrated platform for security awareness training combined with simulated phishing attacks.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

Nuance Communications

Nuance Communications

From revolutionizing the doctor-patient relationship to reinventing the way brands connect with their customers, Nuance technology helps organizations push the boundaries of what’s possible.

Effectiv

Effectiv

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs.