Blockchain Is The New IoT Standard

The Internet of Things (IoT)  receives huge interest from academics, researchers, and entrepreneurs,  thanks to its capacity to offer innovative services across various electronic applications and now Blockchain is claimed to be the new solution for Internet of Things (IoT) inter-operability.

Furthermore, eliminating technical barriers and enabling heterogeneous entities to communicate with global standards make possible global trade, economic growth, and local communities worldwide to prosper.

As the IoT underlies all the sensors and smart devices that use the Internet to communicate data, Blockchain identity standardisation is critical to ensure inter-operability and communications between Internet of Things (IoT) devices, people, and businesses. 

As it will be hard for devices to communicate with each other if there’s no standard way to exchange information around identity, the Institute of Electrical and Electronics Engineers (IEEE) has formed a new task force to develop global standards for blockchain-based decentralised identities (DIDs) for IoT devices.

The IEEE sees this standard being applied to communicate climate, geography, traffic and other data, however, one of the examples it gave is for cars to communicate with humans, toll booths, parking meters, and e-charging pods. Researchers and scientists from Lockheed Martin, Ericsson, Lenovo, Huawei, Bosch, IoTeX, and China Academy of Information and Communications Technology are developing the global standards for blockchain decentralised identities, in an attempt to formulate a universal specification.

The world is already seeing smart cities and highways built globally. In the not-so-distant future, machines will be the primary workforce. The IEEE Identity of Things Standard will make sure vehicles can seamlessly communicate with humans, with toll booths, parking meters, gasoline stations, and e-charging pods. 
And to enable people to order self-driving taxis, punctually pick them up, and drop them off where indicated, making payment digitally. These are just a few use cases, but the possibilities are endless.

The Identity of Things standard will help provide a decentralised identity and access management (IAM) framework for IoT device management and help with the creation of IoT security services, such as device authentication, data authorisation, and access management.

It’s also believed that with global DIDs, people will be able to contribute valuable real-time weather, geography, traffic, and other data to society. Many users will discover the five IoT-Blockchain implementation patterns that enterprises can enable for seamless communication between IoT devices, IoT Smart Gateways, and IoT platforms. These patterns help achieve trust, interoperability, and extendibility. 

Science Direct:     I-HLS:      Springer / Venkatesg Upadistra:   Light Reading:    Ledger Insights:   Stacey on IoT:

You Might Also Read: 

Millions Of IoT Devices At Risk To Malware:

 

« Pivoting Customers' Mindsets For Cloud Security
Denmark Wins 2022 European Cyber Security Challenge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

PrivateVPN

PrivateVPN

PrivateVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

SkillsDA

SkillsDA

SkillsDA is pureplay company in cyber security involved in capacity building towards National Security.