A Journey Into the Emotions of Software Developers
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
1. w w w . i o t a r m o u r. c o m
1
Securing IoT-enabled Smart Cities with Blockchain-powered
Cybersecurity
Blockchain-based digital identity for
connected devices
Tamper-proof logging of all
identity and access
Locked-down & secured access to
critical IoT systems
2. w w w . i o t a r m o u r. c o m
2
The Internet of Things connects numerous everyday devices, opening up previously closed
systems to remote access & control
Smart, connected devices are now an integral part of
our lives, in business and at home
Smart homes and
offices enabled with a
host of connected and
smart devices
Connected cars,
autonomous trucks,
unmanned
aerial vehicles, etc
Industrial control systems
w/ cyber-physical
platforms managing
critical infrastructure
Smart Cities with sensors
and digital mgmt. systems
for energy, utilities,
transportation, etc
The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025
w w w . I o TA r m o u r. c o m
3. w w w . i o t a r m o u r. c o m
3
However, the rapidly
growing world of
perpetually-connected
smart devices presents
proportionally large
security risks
In 2016, botnet armies DDoS attack of DNS infrastructure
sent major internet platforms and services offline
Since 2016, researchers have shown how attackers could
hijack a vehicle. In 2017, US Homeland Security cyber
sleuths hacked a Boeing 757 as it sat on the runway
In 2017, criminals hacked a connected fish tank
and stole data from a casino
In late 2016, ‘Crash Override’ malware took down the
power grid in Kiev, Ukraine for over an hour before
Christmas
Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world
4. w w w . i o t a r m o u r. c o m
4
Software Defined Perimeter (SDP) architecture & Blockchain technology
provide us credible new options to secure IoT Systems
SDP architecture render devices invisible to attackers; and customized agents along with Blockchain technology can
deliver a new breed of digital identity and access control for connected devices in the IoT
Software Defined Perimeter (SDP)
Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD
Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways
Blockchain
Technology
Decentralization
Cryptographic Encryption
Immutability
Consensus-based Control
SDP
Controller
Accepting SDP
Host
Accepting SDP
Host
Initiating SDP
Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication from
Initiating Host
2. Mutual secure comm. to
Controller
Control Channel
Data Channel
6. Receive list of IP’s of
Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
5. w w w . i o t a r m o u r. c o m
5
Leveraging emerging
technologies, security
solutions can be designed
explicitly for connected
devices and critical
infrastructure
IOT Armour, for example, leverages digital
signature based identity and authentication for
humans, machines and data; securing connected
devices and tightly ring-fencing critical
infrastructure
IOT Armour delivers an enhanced Software-
Defined Perimeter using private permissioned
Blockchain and TLS technology
6. w w w . i o t a r m o u r. c o m
6
IOT Armour harnesses digital signatures to identify, authenticate and
authorize devices thereby also securing IoT Communication
AUTHENTICATION
& AUTHORIZATION
of devices
REGISTRATION and
ID of new device
SECURE CHANNELS
for inter-device
communication
SECURED ACCESS
to core systems
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
CORE
SYSTEMS
The solution utilizes Blockchain-based digital signatures to secure connected devices as
well as the communication channels
INTERNET OF THINGS
7. w w w . i o t a r m o u r. c o m
7
IOT Armour’s Zero Trust
setup allows for micro
segmentation of
connected devices as
well as associated users
The platform facilitates fine-grained resources’
access and comprehensive management of the
policy engine on the Blockchain
7
w w w . I o TA r m o u r. c o m
8. w w w . i o t a r m o u r. c o m
8
The Result: A next-gen military-grade security system to protect
connected devices and critical infrastructure against cyber threats
Cryptographically-
secure digital identity
for users, connected
devices and central
servers/services
Best-in-class military-
grade encryption
for secured access to
connected devices and IoT
communication
Invisible & locked down
critical systems
with micro segmentation
and fine-grain access control
Immutable & tamper-
proof logs
stored securely on the
Blockchain for instant
access / analysis
Its time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology!
w w w . I o TA r m o u r. c o m
9. w w w . i o t a r m o u r. c o m
9
Four high-impact areas that smart cities can quickly get started with on
their journey to Blockchain-powered cybersecurity
A recommended approach: Start with a lab like environment -> roll-out within a limited network -> scale in phases
w w w . I o TA r m o u r. c o m
Digital IDs for all and
everything
identify, authenticate and
authorize residents as well
as every one of the
connected devices within a
smart city network
Lock down infrastructure,
isolate infected devices
ring-fence and render critical
infrastructure invisible while
isolating and immediately
addressing any potential
threats to the system
Decentralize control and
plan for scalability
effectively removing single
points of failure that can be
taken down or
compromised in a cyber
attack
Get instant visibility to
unauthorized access
with immutable & tamper-
proof logs stored securely
on the Blockchain for
instant access / analysis and
remedy
10. w w w . i o t a r m o u r. c o m
10
Learn how you can secure IoT
devices and critical Smart City
infrastructure with Blockchain-
enabled next gen cybersecurity
Drop us a line or reach us via any of the channels below:Reach Us
+91 9820386446
+65 96536243
@blockarmourinfo@blockarmour.com
www.blockarmour.com
IOT Armour is a product by award-winning cybersecurity venture, Block Armour