Blockchain Is The New IoT Standard

The Internet of Things (IoT)  receives huge interest from academics, researchers, and entrepreneurs,  thanks to its capacity to offer innovative services across various electronic applications and now Blockchain is claimed to be the new solution for Internet of Things (IoT) inter-operability.

Furthermore, eliminating technical barriers and enabling heterogeneous entities to communicate with global standards make possible global trade, economic growth, and local communities worldwide to prosper.

As the IoT underlies all the sensors and smart devices that use the Internet to communicate data, Blockchain identity standardisation is critical to ensure inter-operability and communications between Internet of Things (IoT) devices, people, and businesses. 

As it will be hard for devices to communicate with each other if there’s no standard way to exchange information around identity, the Institute of Electrical and Electronics Engineers (IEEE) has formed a new task force to develop global standards for blockchain-based decentralised identities (DIDs) for IoT devices.

The IEEE sees this standard being applied to communicate climate, geography, traffic and other data, however, one of the examples it gave is for cars to communicate with humans, toll booths, parking meters, and e-charging pods. Researchers and scientists from Lockheed Martin, Ericsson, Lenovo, Huawei, Bosch, IoTeX, and China Academy of Information and Communications Technology are developing the global standards for blockchain decentralised identities, in an attempt to formulate a universal specification.

The world is already seeing smart cities and highways built globally. In the not-so-distant future, machines will be the primary workforce. The IEEE Identity of Things Standard will make sure vehicles can seamlessly communicate with humans, with toll booths, parking meters, gasoline stations, and e-charging pods. 
And to enable people to order self-driving taxis, punctually pick them up, and drop them off where indicated, making payment digitally. These are just a few use cases, but the possibilities are endless.

The Identity of Things standard will help provide a decentralised identity and access management (IAM) framework for IoT device management and help with the creation of IoT security services, such as device authentication, data authorisation, and access management.

It’s also believed that with global DIDs, people will be able to contribute valuable real-time weather, geography, traffic, and other data to society. Many users will discover the five IoT-Blockchain implementation patterns that enterprises can enable for seamless communication between IoT devices, IoT Smart Gateways, and IoT platforms. These patterns help achieve trust, interoperability, and extendibility. 

Science Direct:     I-HLS:      Springer / Venkatesg Upadistra:   Light Reading:    Ledger Insights:   Stacey on IoT:

You Might Also Read: 

Millions Of IoT Devices At Risk To Malware:

 

« Pivoting Customers' Mindsets For Cloud Security
Denmark Wins 2022 European Cyber Security Challenge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

DreamIt Ventures

DreamIt Ventures

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of Healthtech, Securetech, and Urbantech.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.