SlideShare una empresa de Scribd logo
1 de 35
IoT and Blockchain: Challenges
and Risks
Prof. Ahmed Banafa
IoT Expert | Faculty | Author | Keynote Speaker
College of Engineering
San Jose State University
San Jose, CA USA
• The Internet of Things (IoT) is an ecosystem of
ever-increasing complexity; it’s the next wave
of innovation that will humanize every object
in our life, and it is the next level of
automation for every object we use.
• IoT is bringing more and more things into the
digital fold every day, which will likely make
IoT a multi-trillion dollar industry in the near
future.
• To understand the scale of interest in the
internet of things (IoT) just check how many
conferences, articles, and studies conducted
about IoT recently, this interest has hit fever
pitch point in 2016 as many companies see big
opportunity and believe that IoT holds the
promise to expand and improve businesses
processes and accelerate growth.
• However, the rapid evolution of the IoT market
has caused an explosion in the number and
variety of IoT solutions, which created real
challenges as the industry evolves, mainly, the
urgent need for a secure IoT model to perform
common tasks such as sensing, processing,
storage, and communicating.
• Developing that model will never be an easy task
by any stretch of the imagination, there are many
hurdles and challenges facing a real secure IoT
model.
• The biggest challenge facing IoT security is
coming from the very architecture of the
current IoT ecosystem; it’s all based on a
centralized model known as the server/client
model.
• All devices are identified, authenticated and
connected through cloud servers that support
huge processing and storage capacities.
• The connection between devices will have to
go through the cloud, even if they happen to
be a few feet apart.
• While this model has connected computing
devices for decades and will continue to
support today IoT networks, it will not be able
to respond to the growing needs of the huge
IoT ecosystems of tomorrow.
The Blockchain Model
• Blockchain is a database that maintains a
continuously growing set of data records. It is
distributed in nature, meaning that there is no
master computer holding the entire chain.
Rather, the participating nodes have a copy of
the chain. It’s also ever-growing — data
records are only added to the chain.
• When someone wants to add a transaction to the
chain, all the participants in the network will
validate it. They do this by applying an algorithm
to the transaction to verify its validity.
• What exactly is understood by “valid” is defined
by the Blockchain system and can differ between
systems. Then it is up to a majority of the
participants to agree that the transaction is valid.
• A set of approved transactions is then bundled
in a block, which gets sent to all the nodes in
the network. They, in turn, validate the new
block. Each successive block contains a hash,
which is a unique fingerprint, of the previous
block.
Principles of Blockchain Technology
Here are five basic principles underlying the
technology.
1. Distributed Database
Each party on a blockchain has access to the entire
database and its complete history. No single party
controls the data or the information.
Every party can verify the records of its transaction
partners directly, without an intermediary.
2. Peer-to-Peer Transmission
Communication occurs directly between peers
instead of through a central node. Each node
stores and forwards information to all other
nodes.
3. Transparency
Every transaction and its associated value are
visible to anyone with access to the system.
Each node, or user, on a blockchain has a unique
30-plus-character alphanumeric address that
identifies it. Users can choose to remain
anonymous or provide proof of their identity to
others. Transactions occur between blockchain
addresses.
4. Irreversibility of Records
Once a transaction is entered in the database and
the accounts are updated, the records cannot be
altered, because they’re linked to every transaction
record that came before them (hence the term
“chain”). Various computational algorithms and
approaches are deployed to ensure that the
recording on the database is permanent,
chronologically ordered, and available to all others
on the network.
5. Computational Logic
The digital nature of the ledger means that
blockchain transactions can be tied to
computational logic and in essence
programmed. So users can set up algorithms
and rules that automatically trigger transactions
between nodes.
Public vs. Private Blockchain
• Blockchain technology implementation can be
public or private with clear differences, for
example the benefits offered by a private
blockchain are: faster transaction verification
and network communication, the ability to fix
errors and reverse transactions, and the ability
to restrict access and reduce the likelihood of
outsider attacks.
• The operators of a private blockchain may
choose to unilaterally deploy changes with
which some users disagree. To ensure both
the security and the utility of a private
blockchain system, operators must consider
the recourse available to users who disagree
with changes to the system’s rules or are slow
to adopt the new rules.
• While, developers who work to maintain
public blockchain systems like bitcoin still rely
on individual users to adopt any changes they
propose, which serves to ensure that changes
are only adopted if they are in the interest of
the entire system.
• Just as a business will decide which of its systems
are better hosted on a more secure private
intranet or on the internet, but will likely use
both, systems requiring fast transactions, the
possibility of transaction reversal, and central
control over transaction verification will be better
suited for private blockchains, while those that
benefit from widespread participation,
transparency, and third-party verification will
flourish on a public blockchain.
Challenges of Blockchain in IoT
In spite of all its benefits, the Blockchain model
is not without its flaws and shortcomings:
• Scalability issues; relating to the size of
Blockchain ledger that might lead to
centralization as it's grown over time and
required some kind of record management
which is casting a shadow over the future of
the Blockchain technology.
• Processing power and time; required to
perform encryption algorithms for all the
objects involved in Blockchain -based IoT
ecosystem given the fact that IoT ecosystems
are very diverse and comprised of devices that
have very different computing capabilities,
and not all of them will be capable of running
the same encryption algorithms at the desired
speed.
• Storage will be a hurdle; Blockchain eliminates
the need for a central server to store
transactions and device IDs, but the ledger has
to be stored on the nodes themselves, and the
ledger will increase in size as time passes. That
is beyond the capabilities of a wide range of
smart devices such as sensors, which have
very low storage capacity.
Risks of Using Blockchain in IoT
It goes without saying that any new technology
comes with new risks. An organization’s risk
management team should analyze, assess and
design mitigation plans for risks expected to
emerge from implementation of blockchain
based frameworks.
• Vendor Risks: Practically speaking, most
present organizations, looking to deploy
blockchain based applications, lack the
required technical skills and expertise to
design and deploy a blockchain based system
and implement smart contracts completely in-
house, i.e. without reaching out for vendors of
blockchain applications.
• The value of these applications is only as
strong as the credibility of the vendors
providing them. Given the fact that the
Blockchain-as-a-Service (BaaS) market is still a
developing market, a business should
meticulously select a vendor that can perfectly
sculpture applications that appropriately
address the risks that are associated with the
blockchain.
• Credential Security: Even though the blockchain is
known for its high security levels, a blockchain
based system is only as secure as the system’s
access point. When considering a public
blockchain based system, any individual has
access to the private key of a given user, which
enables him/her to “sign” transactions on the
public ledger, will effectively become that user,
because most current systems do not provide
multi-factor authentication.
• Also, loss of an account’s private keys can lead
to complete loss of funds, or data, controlled
by this account; this risk should be thoroughly
assessed.
• Legal and Compliance: It’s a new territory in
all aspects without any legal or compliance
precedents to follow, which poses a serious
problem for IoT manufacturers and services
providers. This challenge alone will scare off
many businesses from using Blockchain
technology
The Optimum Secure IoT Model
• In order for us to achieve that optimal secure
model of IoT, security needs to be built-in as
the foundation of IoT ecosystem, with
rigorous validity checks, authentication, data
verification, and all the data needs to be
encrypted at all levels, without a solid bottom-
top structure we will create more threats with
every device added to the IoT.
• What we need is a secure and safe IoT with
privacy protected. That’s a tough trade-off but
possible with Blockchain technology if we can
overcome its drawbacks.
References
• http://www.treasuryandrisk.com/2017/03/09
/blockchain-technology-balancing-benefits-
and-evolv?slreturn=1507334668&page=4
• http://www.livebitcoinnews.com/three-risks-
assess-company-considering-blockchain/
• https://hbr.org/2017/03/how-safe-are-
blockchains-it-depends
•
Thank you!
@BanafaAhmed
https://www.linkedin.com/in/ahmedbanafa
ahmed.banafa@sjsu.edu

Más contenido relacionado

La actualidad más candente

Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain SecurityITU
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
Blockchain in supply chain conference Jul19 - Christina Patsioura
Blockchain in supply chain conference Jul19 - Christina Patsioura Blockchain in supply chain conference Jul19 - Christina Patsioura
Blockchain in supply chain conference Jul19 - Christina Patsioura Christina Patsioura
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
 
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Simplilearn
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain workShishir Aryal
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyPalakGulati10
 
Consensus Algorithms.pptx
Consensus Algorithms.pptxConsensus Algorithms.pptx
Consensus Algorithms.pptxRajapriya82
 
Blockchain, cryptography, and consensus
Blockchain, cryptography, and consensusBlockchain, cryptography, and consensus
Blockchain, cryptography, and consensusITU
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyhellygeorge
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology FundamentalsExperfy
 
Blockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricBlockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricAraf Karsh Hamid
 

La actualidad más candente (20)

Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 
BLOCKCHAIN
BLOCKCHAINBLOCKCHAIN
BLOCKCHAIN
 
Blockchain in supply chain conference Jul19 - Christina Patsioura
Blockchain in supply chain conference Jul19 - Christina Patsioura Blockchain in supply chain conference Jul19 - Christina Patsioura
Blockchain in supply chain conference Jul19 - Christina Patsioura
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
 
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Consensus Algorithms.pptx
Consensus Algorithms.pptxConsensus Algorithms.pptx
Consensus Algorithms.pptx
 
Blockchain, cryptography, and consensus
Blockchain, cryptography, and consensusBlockchain, cryptography, and consensus
Blockchain, cryptography, and consensus
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
Introduction to Blockchain
Introduction to Blockchain Introduction to Blockchain
Introduction to Blockchain
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Blockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricBlockchain - HyperLedger Fabric
Blockchain - HyperLedger Fabric
 
Blockchain
BlockchainBlockchain
Blockchain
 

Similar a IoT and Blockchain Challenges and Risks

IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Blockchain in industry 4.0
Blockchain in industry 4.0Blockchain in industry 4.0
Blockchain in industry 4.0Mujahid Hussain
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain TechnologyAhmed Banafa
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxMohamedMansour421585
 
Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology Chapter247 Infotech
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyIRJET Journal
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 
Getting Started with Blockchain Development: The Complete Guide
Getting Started with Blockchain Development: The Complete GuideGetting Started with Blockchain Development: The Complete Guide
Getting Started with Blockchain Development: The Complete GuideBpointerTechnologies
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
Blockchain implications on global business ecosystem
Blockchain implications on global business ecosystemBlockchain implications on global business ecosystem
Blockchain implications on global business ecosystemWorld Web Technology Pvt Ltd
 
Blockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNGBlockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNGRids Vazi
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptxJackTheMan1
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Dr. Kotrappa Sirbi
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhtonmasukmia.com
 

Similar a IoT and Blockchain Challenges and Risks (20)

Blockchain
BlockchainBlockchain
Blockchain
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Blockchain in industry 4.0
Blockchain in industry 4.0Blockchain in industry 4.0
Blockchain in industry 4.0
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain Technology
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
 
Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology Ultimate guide to understand- What is Blockchain Technology
Ultimate guide to understand- What is Blockchain Technology
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
Getting Started with Blockchain Development: The Complete Guide
Getting Started with Blockchain Development: The Complete GuideGetting Started with Blockchain Development: The Complete Guide
Getting Started with Blockchain Development: The Complete Guide
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Blockchain implications on global business ecosystem
Blockchain implications on global business ecosystemBlockchain implications on global business ecosystem
Blockchain implications on global business ecosystem
 
Blockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNGBlockchains For The IOT - EVRYTHNG
Blockchains For The IOT - EVRYTHNG
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhton
 

Más de Ahmed Banafa

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergenceAhmed Banafa
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AIAhmed Banafa
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingAhmed Banafa
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet ExplainedAhmed Banafa
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum TeleportationAhmed Banafa
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingAhmed Banafa
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain managementAhmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world editedAhmed Banafa
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ahmed Banafa
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain ApplicationsAhmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU Ahmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AIAhmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 

Más de Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 

Último

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Último (20)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

IoT and Blockchain Challenges and Risks

  • 1. IoT and Blockchain: Challenges and Risks Prof. Ahmed Banafa IoT Expert | Faculty | Author | Keynote Speaker College of Engineering San Jose State University San Jose, CA USA
  • 2. • The Internet of Things (IoT) is an ecosystem of ever-increasing complexity; it’s the next wave of innovation that will humanize every object in our life, and it is the next level of automation for every object we use. • IoT is bringing more and more things into the digital fold every day, which will likely make IoT a multi-trillion dollar industry in the near future.
  • 3. • To understand the scale of interest in the internet of things (IoT) just check how many conferences, articles, and studies conducted about IoT recently, this interest has hit fever pitch point in 2016 as many companies see big opportunity and believe that IoT holds the promise to expand and improve businesses processes and accelerate growth.
  • 4. • However, the rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions, which created real challenges as the industry evolves, mainly, the urgent need for a secure IoT model to perform common tasks such as sensing, processing, storage, and communicating. • Developing that model will never be an easy task by any stretch of the imagination, there are many hurdles and challenges facing a real secure IoT model.
  • 5. • The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. • All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities.
  • 6. • The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. • While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
  • 8. • Blockchain is a database that maintains a continuously growing set of data records. It is distributed in nature, meaning that there is no master computer holding the entire chain. Rather, the participating nodes have a copy of the chain. It’s also ever-growing — data records are only added to the chain.
  • 9. • When someone wants to add a transaction to the chain, all the participants in the network will validate it. They do this by applying an algorithm to the transaction to verify its validity. • What exactly is understood by “valid” is defined by the Blockchain system and can differ between systems. Then it is up to a majority of the participants to agree that the transaction is valid.
  • 10. • A set of approved transactions is then bundled in a block, which gets sent to all the nodes in the network. They, in turn, validate the new block. Each successive block contains a hash, which is a unique fingerprint, of the previous block.
  • 12. Here are five basic principles underlying the technology. 1. Distributed Database Each party on a blockchain has access to the entire database and its complete history. No single party controls the data or the information. Every party can verify the records of its transaction partners directly, without an intermediary.
  • 13. 2. Peer-to-Peer Transmission Communication occurs directly between peers instead of through a central node. Each node stores and forwards information to all other nodes.
  • 14. 3. Transparency Every transaction and its associated value are visible to anyone with access to the system. Each node, or user, on a blockchain has a unique 30-plus-character alphanumeric address that identifies it. Users can choose to remain anonymous or provide proof of their identity to others. Transactions occur between blockchain addresses.
  • 15. 4. Irreversibility of Records Once a transaction is entered in the database and the accounts are updated, the records cannot be altered, because they’re linked to every transaction record that came before them (hence the term “chain”). Various computational algorithms and approaches are deployed to ensure that the recording on the database is permanent, chronologically ordered, and available to all others on the network.
  • 16. 5. Computational Logic The digital nature of the ledger means that blockchain transactions can be tied to computational logic and in essence programmed. So users can set up algorithms and rules that automatically trigger transactions between nodes.
  • 17. Public vs. Private Blockchain • Blockchain technology implementation can be public or private with clear differences, for example the benefits offered by a private blockchain are: faster transaction verification and network communication, the ability to fix errors and reverse transactions, and the ability to restrict access and reduce the likelihood of outsider attacks.
  • 18. • The operators of a private blockchain may choose to unilaterally deploy changes with which some users disagree. To ensure both the security and the utility of a private blockchain system, operators must consider the recourse available to users who disagree with changes to the system’s rules or are slow to adopt the new rules.
  • 19. • While, developers who work to maintain public blockchain systems like bitcoin still rely on individual users to adopt any changes they propose, which serves to ensure that changes are only adopted if they are in the interest of the entire system.
  • 20. • Just as a business will decide which of its systems are better hosted on a more secure private intranet or on the internet, but will likely use both, systems requiring fast transactions, the possibility of transaction reversal, and central control over transaction verification will be better suited for private blockchains, while those that benefit from widespread participation, transparency, and third-party verification will flourish on a public blockchain.
  • 21.
  • 22. Challenges of Blockchain in IoT In spite of all its benefits, the Blockchain model is not without its flaws and shortcomings: • Scalability issues; relating to the size of Blockchain ledger that might lead to centralization as it's grown over time and required some kind of record management which is casting a shadow over the future of the Blockchain technology.
  • 23. • Processing power and time; required to perform encryption algorithms for all the objects involved in Blockchain -based IoT ecosystem given the fact that IoT ecosystems are very diverse and comprised of devices that have very different computing capabilities, and not all of them will be capable of running the same encryption algorithms at the desired speed.
  • 24. • Storage will be a hurdle; Blockchain eliminates the need for a central server to store transactions and device IDs, but the ledger has to be stored on the nodes themselves, and the ledger will increase in size as time passes. That is beyond the capabilities of a wide range of smart devices such as sensors, which have very low storage capacity.
  • 25.
  • 26. Risks of Using Blockchain in IoT It goes without saying that any new technology comes with new risks. An organization’s risk management team should analyze, assess and design mitigation plans for risks expected to emerge from implementation of blockchain based frameworks.
  • 27. • Vendor Risks: Practically speaking, most present organizations, looking to deploy blockchain based applications, lack the required technical skills and expertise to design and deploy a blockchain based system and implement smart contracts completely in- house, i.e. without reaching out for vendors of blockchain applications.
  • 28. • The value of these applications is only as strong as the credibility of the vendors providing them. Given the fact that the Blockchain-as-a-Service (BaaS) market is still a developing market, a business should meticulously select a vendor that can perfectly sculpture applications that appropriately address the risks that are associated with the blockchain.
  • 29. • Credential Security: Even though the blockchain is known for its high security levels, a blockchain based system is only as secure as the system’s access point. When considering a public blockchain based system, any individual has access to the private key of a given user, which enables him/her to “sign” transactions on the public ledger, will effectively become that user, because most current systems do not provide multi-factor authentication.
  • 30. • Also, loss of an account’s private keys can lead to complete loss of funds, or data, controlled by this account; this risk should be thoroughly assessed.
  • 31. • Legal and Compliance: It’s a new territory in all aspects without any legal or compliance precedents to follow, which poses a serious problem for IoT manufacturers and services providers. This challenge alone will scare off many businesses from using Blockchain technology
  • 32. The Optimum Secure IoT Model • In order for us to achieve that optimal secure model of IoT, security needs to be built-in as the foundation of IoT ecosystem, with rigorous validity checks, authentication, data verification, and all the data needs to be encrypted at all levels, without a solid bottom- top structure we will create more threats with every device added to the IoT.
  • 33. • What we need is a secure and safe IoT with privacy protected. That’s a tough trade-off but possible with Blockchain technology if we can overcome its drawbacks.