In the IoT context, blockchain can be used to make sure that the IoT devices are successful-
ly able to process tracking, transactions, and coordination. Basically, investment in blockchain
can make sure the ecient management of data. Due to blockchain’s dependence on cryptog-
raphy, you can leverage many of its inherent functionalities and features to improve the securi-
ty and privacy of your IoT infrastructure. Moreover, blockchain records transactions securely
and orderly. Hence, you can store all the history of your connected devices. Furthermore, since
there is no central authority in blockchain, therefore you can avoid being hampered by the com-
mon integration hurdles.
Examples
There are two cases in which you can use blockchain to improve the network security of your
IoT system. Firstly, an organization can integrate its IoT devices in such a way that they can send
and receive data while establishing a connection with a blockchain network. With blockchain,
the IoT devices of a company can make orders, exchange messages, and engage in transactions.
In the second scenario, you can leverage smart contracts, a technology which was introduced
by Ethereum, the most popular crypto currency after Bitcoin. Smart contracts are a special type
of digital contracts which can automate a wide range of processes. A user just needs to set up a
number of conditions in the smart contract and confirm the approval of two parties. After, then
the contract starts and automatically assesses whether its users are following the conditions or
not. However, what truly makes it revolutionizing is that it can run without the interference of a
third party. Hence, this automation makes it extremely well-suited for IoT devices which can run
and perform various tasks and procedures without requiring any manual intervention.
Quick Challenge
List all the uses of blockchain
IDENTITY MANAGEMENT FOR DEVICES
Traditionally, internet access management was always about cyber security but now things
are dierent such as how businesses are managing their digital identities, particularly with IoT
devices.
For a long period of time, identity access management revolved around two components.
Identity: Is the individual who plans to get access to your business data is actually an
authentic person?
Access: Does the individual who requested access to business data carry the required
permission?
In the past, before the birth of modern technological solutions, IAM (identity and access
management) circled around blocking individuals ‘physically’ from accessing anything from
oces. When a junior employee attempted to get a ‘sensitive’ document which was created for
upper management, they were not allowed to read it. As workplaces adopted modern technol-
ogy they purchased IAM software to achieve greater productivity. However, at the same time,
IAM discovered its domain security.
316 Internet of Things
Internet_of_Things_CH12_pp309-326.indd 316 9/3/2019 10:16:42 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.27.244