Blockchain Is The New IoT Standard

The Internet of Things (IoT)  receives huge interest from academics, researchers, and entrepreneurs,  thanks to its capacity to offer innovative services across various electronic applications and now Blockchain is claimed to be the new solution for Internet of Things (IoT) inter-operability.

Furthermore, eliminating technical barriers and enabling heterogeneous entities to communicate with global standards make possible global trade, economic growth, and local communities worldwide to prosper.

As the IoT underlies all the sensors and smart devices that use the Internet to communicate data, Blockchain identity standardisation is critical to ensure inter-operability and communications between Internet of Things (IoT) devices, people, and businesses. 

As it will be hard for devices to communicate with each other if there’s no standard way to exchange information around identity, the Institute of Electrical and Electronics Engineers (IEEE) has formed a new task force to develop global standards for blockchain-based decentralised identities (DIDs) for IoT devices.

The IEEE sees this standard being applied to communicate climate, geography, traffic and other data, however, one of the examples it gave is for cars to communicate with humans, toll booths, parking meters, and e-charging pods. Researchers and scientists from Lockheed Martin, Ericsson, Lenovo, Huawei, Bosch, IoTeX, and China Academy of Information and Communications Technology are developing the global standards for blockchain decentralised identities, in an attempt to formulate a universal specification.

The world is already seeing smart cities and highways built globally. In the not-so-distant future, machines will be the primary workforce. The IEEE Identity of Things Standard will make sure vehicles can seamlessly communicate with humans, with toll booths, parking meters, gasoline stations, and e-charging pods. 
And to enable people to order self-driving taxis, punctually pick them up, and drop them off where indicated, making payment digitally. These are just a few use cases, but the possibilities are endless.

The Identity of Things standard will help provide a decentralised identity and access management (IAM) framework for IoT device management and help with the creation of IoT security services, such as device authentication, data authorisation, and access management.

It’s also believed that with global DIDs, people will be able to contribute valuable real-time weather, geography, traffic, and other data to society. Many users will discover the five IoT-Blockchain implementation patterns that enterprises can enable for seamless communication between IoT devices, IoT Smart Gateways, and IoT platforms. These patterns help achieve trust, interoperability, and extendibility. 

Science Direct:     I-HLS:      Springer / Venkatesg Upadistra:   Light Reading:    Ledger Insights:   Stacey on IoT:

You Might Also Read: 

Millions Of IoT Devices At Risk To Malware:

 

« Pivoting Customers' Mindsets For Cloud Security
Denmark Wins 2022 European Cyber Security Challenge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

EmergIn Risk

EmergIn Risk

EmergIn Risk specializes in providing innovative insurance solutions for the global marketplace including solutions for complex Cyber Risks.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Archivo

Archivo

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.