PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



Securing IoT enabled Smart Cities with Blockchain Technology .pdf



Original filename: Securing IoT enabled Smart Cities with Blockchain Technology.pdf
Title: Securing IoT-enabled Smart Cities with Blockchain-powered Cybersecurity
Author: Dell-98

This PDF 1.5 document has been generated by Microsoft® PowerPoint® 2016, and has been sent on pdf-archive.com on 15/04/2019 at 16:21, from IP address 178.168.x.x. The current document download page has been viewed 99 times.
File size: 2.8 MB (10 pages).
Privacy: public file




Download original PDF file









Document preview


w w w . i o t a r m o u r. c o m

Securing IoT-enabled Smart Cities with Blockchain-powered
Cybersecurity
Blockchain-based digital identity for
connected devices

Locked-down & secured access to
critical IoT systems

Tamper-proof logging of all
identity and access

1

w w w . Ii o tT aArrm
moouurr..ccoom
m

Smart, connected devices are now an integral part of
our lives, in business and at home
The Internet of Things connects numerous everyday devices, opening up previously closed
systems to remote access & control

Smart homes and
offices enabled with a
host of connected and
smart devices

Connected cars,
autonomous trucks,
unmanned
aerial vehicles, etc

Industrial control systems
w/ cyber-physical
platforms managing
critical infrastructure

Smart Cities with sensors
and digital mgmt. systems
for energy, utilities,
transportation, etc

The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025

2

w w w . i o t a r m o u r. c o m

In 2016, botnet armies DDoS attack of DNS infrastructure
sent major internet platforms and services offline

However, the rapidly
growing world of
perpetually-connected
smart devices presents
proportionally large
security risks

Since 2016, researchers have shown how attackers could
hijack a vehicle. In 2017, US Homeland Security cyber
sleuths hacked a Boeing 757 as it sat on the runway

In 2017, criminals hacked a connected fish tank
and stole data from a casino

In late 2016, ‘Crash Override’ malware took down the
power grid in Kiev, Ukraine for over an hour before
Christmas
Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world

3

w w w . i o t a r m o u r. c o m

Software Defined Perimeter (SDP) architecture & Blockchain technology
provide us credible new options to secure IoT Systems
SDP architecture render devices invisible to attackers; and customized agents along with Blockchain technology can
deliver a new breed of digital identity and access control for connected devices in the IoT

Software Defined Perimeter (SDP)

Decentralization

1. Centralized Controller
SDP
Controller

4. List of authorized
Accepting Hosts determined

3. Mutual secure comm. to
Controller

6. Receive list of IP’s of
Accepting Hosts

Initiating SDP
Host

Control Channel

Cryptographic Encryption

5. Accept communication from
Initiating Host
Accepting SDP
Host
7. Mutual secure
comm. channels

2. Mutual secure comm. to
Controller

Immutability

Accepting SDP
Host

Blockchain
Technology

Data Channel

Consensus-based Control
Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD

Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways

4

w w w . i o t a r m o u r. c o m

Leveraging emerging
technologies, security
solutions can be designed
explicitly for connected
devices and critical
infrastructure
IOT Armour, for example, leverages digital
signature based identity and authentication for
humans, machines and data; securing connected
devices and tightly ring-fencing critical
infrastructure

IOT Armour delivers an enhanced SoftwareDefined Perimeter using private permissioned
Blockchain and TLS technology
5

w w w . i o t a r m o u r. c o m

IOT Armour harnesses digital signatures to identify, authenticate and
authorize devices thereby also securing IoT Communication
INTERNET OF THINGS
Identity & Access
Validation Nodes

REGISTRATION and
ID of new device
AUTHENTICATION
& AUTHORIZATION
of devices

CORE
SYSTEMS

SECURE CHANNELS
for inter-device
communication
SECURED ACCESS
to core systems
Identity & Access
Validation Nodes

The solution utilizes Blockchain-based digital signatures to secure connected devices as
well as the communication channels

6

w w w . Ii o tT aArrm
moouurr..ccoom
m

IOT Armour’s Zero Trust
setup allows for micro
segmentation of
connected devices as
well as associated users

The platform facilitates fine-grained resources’
access and comprehensive management of the
policy engine on the Blockchain
7

w w w . Ii o tT aArrm
moouurr..ccoom
m

The Result: A next-gen military-grade security system to protect
connected devices and critical infrastructure against cyber threats

Cryptographicallysecure digital identity
for users, connected
devices and central
servers/services

Invisible & locked down
critical systems

Best-in-class militarygrade encryption

Immutable & tamperproof logs

with micro segmentation
and fine-grain access control

for secured access to
connected devices and IoT
communication

stored securely on the
Blockchain for instant
access / analysis

Its time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology!

8

w w w . Ii o tT aArrm
moouurr..ccoom
m

Four high-impact areas that smart cities can quickly get started with on
their journey to Blockchain-powered cybersecurity

Digital IDs for all and
everything
identify, authenticate and
authorize residents as well
as every one of the
connected devices within a
smart city network

Decentralize control and
plan for scalability

Lock down infrastructure,
isolate infected devices

Get instant visibility to
unauthorized access

effectively removing single
points of failure that can be
taken down or
compromised in a cyber
attack

ring-fence and render critical
infrastructure invisible while
isolating and immediately
addressing any potential
threats to the system

with immutable & tamperproof logs stored securely
on the Blockchain for
instant access / analysis and
remedy

A recommended approach: Start with a lab like environment -> roll-out within a limited network -> scale in phases

9

w w w . i o t a r m o u r. c o m

Reach Us

Learn how you can secure IoT
devices and critical Smart City
infrastructure with Blockchainenabled next gen cybersecurity
Drop us a line or reach us via any of the channels below:

www.blockarmour.com

+91 9820386446
+65 96536243

info@blockarmour.com

@blockarmour

IOT Armour is a product by award-winning cybersecurity venture, Block Armour

10


Related documents


securing iot enabled smart cities with blockchain technology
physical security market
smart safe automotive electronic1410
radjavexecutivebriefonproofofcompetitionconsensusmethodology
blockchain
precisely what is blockchain


Related keywords