Blockchain Tech Promises Better Security For IoT

A new blockchain-based method for enhancing IoT devices security may be under development. 

IBM has won a patent for the autonomous self-servicing of networked devices that form part of its Autonomous Decentralised Peer-to-Peer Telemetry (ADEPT) environment. 

The system uses a blockchain protocol as a basis for a distributed network of devices, what Samsung has called “a sort of decentralised Internet of Things (IoT).”

The patent, first filed in late June 2016, was awarded by the US Patent and Trademark Office (USPTO).

The proof-of-concept (PoC) for ADEPT was first exposed in partnership with Samsung in March 2016. 

Suggesting that a decentralised architecture can offer improved cost and operational efficiency, IBM explained that “IoT controllers are often centralised with different IoT solution vendors [providing] proprietary solutions that follow similar centralised architectures.” 

According to IBM, self-servicing devices can further boost the improved efficiency of a decentralised system, as they can diagnose and automate the solution for a range of situations such as “self-diagnosis, predicting equipment failure and anticipating service needs.”

IBM has been steadily diversifying its involvement in blockchain across multiple fields, including a new blockchain-related patent filed by IBM that would harness the technology to tackle privacy and security concerns for drones.

iHLS:

You Might Also Read:

How Blockchain Can Protect IoT Devices

« Financial Sector Breaches Soar Despite Heavy Security Spending
Google Is Building A Search Engine For Fact Checks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.