SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
w w w . i o t a r m o u r. c o m
1
Securing IoT-enabled Smart Cities with Blockchain-powered
Cybersecurity
Blockchain-based digital identity for
connected devices
Tamper-proof logging of all
identity and access
Locked-down & secured access to
critical IoT systems
w w w . i o t a r m o u r. c o m
2
The Internet of Things connects numerous everyday devices, opening up previously closed
systems to remote access & control
Smart, connected devices are now an integral part of
our lives, in business and at home
Smart homes and
offices enabled with a
host of connected and
smart devices
Connected cars,
autonomous trucks,
unmanned
aerial vehicles, etc
Industrial control systems
w/ cyber-physical
platforms managing
critical infrastructure
Smart Cities with sensors
and digital mgmt. systems
for energy, utilities,
transportation, etc
The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025
w w w . I o TA r m o u r. c o m
w w w . i o t a r m o u r. c o m
3
However, the rapidly
growing world of
perpetually-connected
smart devices presents
proportionally large
security risks
In 2016, botnet armies DDoS attack of DNS infrastructure
sent major internet platforms and services offline
Since 2016, researchers have shown how attackers could
hijack a vehicle. In 2017, US Homeland Security cyber
sleuths hacked a Boeing 757 as it sat on the runway
In 2017, criminals hacked a connected fish tank
and stole data from a casino
In late 2016, ‘Crash Override’ malware took down the
power grid in Kiev, Ukraine for over an hour before
Christmas
Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world
w w w . i o t a r m o u r. c o m
4
Software Defined Perimeter (SDP) architecture & Blockchain technology
provide us credible new options to secure IoT Systems
SDP architecture render devices invisible to attackers; and customized agents along with Blockchain technology can
deliver a new breed of digital identity and access control for connected devices in the IoT
Software Defined Perimeter (SDP)
Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD
Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways
Blockchain
Technology
Decentralization
Cryptographic Encryption
Immutability
Consensus-based Control
SDP
Controller
Accepting SDP
Host
Accepting SDP
Host
Initiating SDP
Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication from
Initiating Host
2. Mutual secure comm. to
Controller
Control Channel
Data Channel
6. Receive list of IP’s of
Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
w w w . i o t a r m o u r. c o m
5
Leveraging emerging
technologies, security
solutions can be designed
explicitly for connected
devices and critical
infrastructure
IOT Armour, for example, leverages digital
signature based identity and authentication for
humans, machines and data; securing connected
devices and tightly ring-fencing critical
infrastructure
IOT Armour delivers an enhanced Software-
Defined Perimeter using private permissioned
Blockchain and TLS technology
w w w . i o t a r m o u r. c o m
6
IOT Armour harnesses digital signatures to identify, authenticate and
authorize devices thereby also securing IoT Communication
AUTHENTICATION
& AUTHORIZATION
of devices
REGISTRATION and
ID of new device
SECURE CHANNELS
for inter-device
communication
SECURED ACCESS
to core systems
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
CORE
SYSTEMS
The solution utilizes Blockchain-based digital signatures to secure connected devices as
well as the communication channels
INTERNET OF THINGS
w w w . i o t a r m o u r. c o m
7
IOT Armour’s Zero Trust
setup allows for micro
segmentation of
connected devices as
well as associated users
The platform facilitates fine-grained resources’
access and comprehensive management of the
policy engine on the Blockchain
7
w w w . I o TA r m o u r. c o m
w w w . i o t a r m o u r. c o m
8
The Result: A next-gen military-grade security system to protect
connected devices and critical infrastructure against cyber threats
Cryptographically-
secure digital identity
for users, connected
devices and central
servers/services
Best-in-class military-
grade encryption
for secured access to
connected devices and IoT
communication
Invisible & locked down
critical systems
with micro segmentation
and fine-grain access control
Immutable & tamper-
proof logs
stored securely on the
Blockchain for instant
access / analysis
Its time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology!
w w w . I o TA r m o u r. c o m
w w w . i o t a r m o u r. c o m
9
Four high-impact areas that smart cities can quickly get started with on
their journey to Blockchain-powered cybersecurity
A recommended approach: Start with a lab like environment -> roll-out within a limited network -> scale in phases
w w w . I o TA r m o u r. c o m
Digital IDs for all and
everything
identify, authenticate and
authorize residents as well
as every one of the
connected devices within a
smart city network
Lock down infrastructure,
isolate infected devices
ring-fence and render critical
infrastructure invisible while
isolating and immediately
addressing any potential
threats to the system
Decentralize control and
plan for scalability
effectively removing single
points of failure that can be
taken down or
compromised in a cyber
attack
Get instant visibility to
unauthorized access
with immutable & tamper-
proof logs stored securely
on the Blockchain for
instant access / analysis and
remedy
w w w . i o t a r m o u r. c o m
10
Learn how you can secure IoT
devices and critical Smart City
infrastructure with Blockchain-
enabled next gen cybersecurity
Drop us a line or reach us via any of the channels below:Reach Us
+91 9820386446
+65 96536243
@blockarmourinfo@blockarmour.com
www.blockarmour.com
IOT Armour is a product by award-winning cybersecurity venture, Block Armour

Contenu connexe

Tendances

Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital VaultBlock Armour
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture Block Armour
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlock Armour
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...PROFIBUS and PROFINET InternationaI - PI UK
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? Forescout Technologies Inc
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
 

Tendances (19)

Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 

Similaire à Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity

Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)NUS-ISS
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...ieeepondy
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlockArmour1
 
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE Global Summit - BIIOT: Blockchain In Internet of ThingsFIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE Global Summit - BIIOT: Blockchain In Internet of ThingsFIWARE
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxinfosec train
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxInfosectrain3
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBiagio Botticelli
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
 
How Blockchain can be used in IoT
How Blockchain can be used in IoTHow Blockchain can be used in IoT
How Blockchain can be used in IoTceline anderson
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewGokul Alex
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
 

Similaire à Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity (20)

Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE Global Summit - BIIOT: Blockchain In Internet of ThingsFIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
eMsecure
eMsecureeMsecure
eMsecure
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
 
How Blockchain can be used in IoT
How Blockchain can be used in IoTHow Blockchain can be used in IoT
How Blockchain can be used in IoT
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A Review
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 

Plus de Block Armour

Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Block Armour
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview PresentationBlock Armour
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureBlock Armour
 
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 finalBlock Armour
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital VaultBlock Armour
 
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityIoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityBlock Armour
 
IoT Armour: the Solution
IoT Armour: the SolutionIoT Armour: the Solution
IoT Armour: the SolutionBlock Armour
 

Plus de Block Armour (10)

Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
 
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityIoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT Security
 
IoT Armour: the Solution
IoT Armour: the SolutionIoT Armour: the Solution
IoT Armour: the Solution
 

Dernier

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Dernier (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity

  • 1. w w w . i o t a r m o u r. c o m 1 Securing IoT-enabled Smart Cities with Blockchain-powered Cybersecurity Blockchain-based digital identity for connected devices Tamper-proof logging of all identity and access Locked-down & secured access to critical IoT systems
  • 2. w w w . i o t a r m o u r. c o m 2 The Internet of Things connects numerous everyday devices, opening up previously closed systems to remote access & control Smart, connected devices are now an integral part of our lives, in business and at home Smart homes and offices enabled with a host of connected and smart devices Connected cars, autonomous trucks, unmanned aerial vehicles, etc Industrial control systems w/ cyber-physical platforms managing critical infrastructure Smart Cities with sensors and digital mgmt. systems for energy, utilities, transportation, etc The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025 w w w . I o TA r m o u r. c o m
  • 3. w w w . i o t a r m o u r. c o m 3 However, the rapidly growing world of perpetually-connected smart devices presents proportionally large security risks In 2016, botnet armies DDoS attack of DNS infrastructure sent major internet platforms and services offline Since 2016, researchers have shown how attackers could hijack a vehicle. In 2017, US Homeland Security cyber sleuths hacked a Boeing 757 as it sat on the runway In 2017, criminals hacked a connected fish tank and stole data from a casino In late 2016, ‘Crash Override’ malware took down the power grid in Kiev, Ukraine for over an hour before Christmas Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world
  • 4. w w w . i o t a r m o u r. c o m 4 Software Defined Perimeter (SDP) architecture & Blockchain technology provide us credible new options to secure IoT Systems SDP architecture render devices invisible to attackers; and customized agents along with Blockchain technology can deliver a new breed of digital identity and access control for connected devices in the IoT Software Defined Perimeter (SDP) Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways Blockchain Technology Decentralization Cryptographic Encryption Immutability Consensus-based Control SDP Controller Accepting SDP Host Accepting SDP Host Initiating SDP Host 1. Centralized Controller 4. List of authorized Accepting Hosts determined 5. Accept communication from Initiating Host 2. Mutual secure comm. to Controller Control Channel Data Channel 6. Receive list of IP’s of Accepting Hosts 3. Mutual secure comm. to Controller 7. Mutual secure comm. channels
  • 5. w w w . i o t a r m o u r. c o m 5 Leveraging emerging technologies, security solutions can be designed explicitly for connected devices and critical infrastructure IOT Armour, for example, leverages digital signature based identity and authentication for humans, machines and data; securing connected devices and tightly ring-fencing critical infrastructure IOT Armour delivers an enhanced Software- Defined Perimeter using private permissioned Blockchain and TLS technology
  • 6. w w w . i o t a r m o u r. c o m 6 IOT Armour harnesses digital signatures to identify, authenticate and authorize devices thereby also securing IoT Communication AUTHENTICATION & AUTHORIZATION of devices REGISTRATION and ID of new device SECURE CHANNELS for inter-device communication SECURED ACCESS to core systems Identity & Access Validation Nodes Identity & Access Validation Nodes CORE SYSTEMS The solution utilizes Blockchain-based digital signatures to secure connected devices as well as the communication channels INTERNET OF THINGS
  • 7. w w w . i o t a r m o u r. c o m 7 IOT Armour’s Zero Trust setup allows for micro segmentation of connected devices as well as associated users The platform facilitates fine-grained resources’ access and comprehensive management of the policy engine on the Blockchain 7 w w w . I o TA r m o u r. c o m
  • 8. w w w . i o t a r m o u r. c o m 8 The Result: A next-gen military-grade security system to protect connected devices and critical infrastructure against cyber threats Cryptographically- secure digital identity for users, connected devices and central servers/services Best-in-class military- grade encryption for secured access to connected devices and IoT communication Invisible & locked down critical systems with micro segmentation and fine-grain access control Immutable & tamper- proof logs stored securely on the Blockchain for instant access / analysis Its time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology! w w w . I o TA r m o u r. c o m
  • 9. w w w . i o t a r m o u r. c o m 9 Four high-impact areas that smart cities can quickly get started with on their journey to Blockchain-powered cybersecurity A recommended approach: Start with a lab like environment -> roll-out within a limited network -> scale in phases w w w . I o TA r m o u r. c o m Digital IDs for all and everything identify, authenticate and authorize residents as well as every one of the connected devices within a smart city network Lock down infrastructure, isolate infected devices ring-fence and render critical infrastructure invisible while isolating and immediately addressing any potential threats to the system Decentralize control and plan for scalability effectively removing single points of failure that can be taken down or compromised in a cyber attack Get instant visibility to unauthorized access with immutable & tamper- proof logs stored securely on the Blockchain for instant access / analysis and remedy
  • 10. w w w . i o t a r m o u r. c o m 10 Learn how you can secure IoT devices and critical Smart City infrastructure with Blockchain- enabled next gen cybersecurity Drop us a line or reach us via any of the channels below:Reach Us +91 9820386446 +65 96536243 @blockarmourinfo@blockarmour.com www.blockarmour.com IOT Armour is a product by award-winning cybersecurity venture, Block Armour