SlideShare a Scribd company logo
1 of 9
Blockchain Convergence with 5G/LTE and IoT
Clint Smith, P.E.
csmith@nextgconnect.com
Abstract:
The convergence of blockchain technology with Fifth Generation Wireless (5G), Long
Term Evolution (LTE), Internet of Things (IoT) and cloud services fosters in a host of
new services that were not possible before. The proliferation of devices in a distributed
architecture has many challenges including ensuring the device configuration
management and cybersecurity. This paper discusses how smart contracts can be used
for configure, operate and protect IoT devices.
Next G Connect
www.nextgconnect.com 1 September 15, 2019
The convergence of blockchain technology with Fifth Generation Wireless (5G), Long Term Evolution
(LTE), Internet of Things (IoT) and cloud services fosters in a host of new services that were not possible
before. Distributed architectures for providing services in a communication ecosystem is common to 5G,
LTE, IoT,cloud servicesand blockchain. The convergence of these unique technologies facilitates a neutral
host environment and network slicing for service delivery that is extended to the industrial, utility,
enterprise and smart home environments.
Presently there is a large focus on blockchain solutions, 5G/LTE solutions, IoT solutions and cloud
solutions. Some cross pollination between these four pillars are emerging. However,these four seemingly
diverse technologies when brought together will enable the next communication system of the future and
with added location awareness will foster new services and concepts which are not even imaginable right
now.
5G is being deployed as both Standalone (SA) and non standalone (NSA) with LTE as the access method
for IoT devices. The virtualization of the wireless network using Network Function Virtualization (NFV)
with Software Defined Networks (SDN) is enabling a low latency flat distributed network. The use of
Containers for VNFs is being used in a virtual environment to quickly and efficiently scale servicesenabling
logical network slices across multiple domains and technologies.
5G and LTE utilize narrowband, Cat-NB1 (NB) or wideband Cat-M1 (CAT-M) devices as the primary
access technologies supporting IoT devices. However, there are other wireless access techniques and
protocols that support IoT devices including WiFi and ZigBee.
IoT is often considered the next great industrial revolution and is pervasive with more and more devices
being deployed for a vastamount of applications. IoT devices and their supported applications cover a huge
range of industries and use cases that scale from a single constrained device to massive cross-platform
deployments of embedded technologies and cloud systems connecting in real-time.
IoT devices can be currently found in consumer applications, smart homes, enterprise, infrastructure
management, industrial applications, military, agriculture, energy management,environmental monitoring,
medical, transportation, food services, insurance, retail, city infrastructure, banking as well as in oil, gas
and mining.
Next G Connect
www.nextgconnect.com 2 September 15, 2019
Although eachof the before mentioned industries hasunique IoT applications, the common theme is sensors
and devices connected via machine-to-machine, or machine-to-infrastructure to deliver the use case,
monitor assets, collect data, analyze processes, and improve efficiency.
The need to have low latency for device to device communication is becoming essential for IoT devices as
well as smart vehicles and others. 5G access for IoT devices is still being defined with LTE (4G) having
solutions which continue to evolve. Smart vehicles are currently using DSCR also known as 802.11p as
well as LTE/5G to facilitate low latency device to device communication.
However, tying the diverse IoT ecosystem together which includes numerous legacy and emerging
communication protocols that allow devices and servers to talk to each other in new and more
interconnected ways is a daunting task. At the same time, dozens of alliances and coalitions are forming in
hopes of unifying the fractured and organic IoT landscape. However, the IoT ecosystem has created
artificial barriers either by design or because of the legacy platforms themselves.
IoT devices as part of the Industrial IoT 4 (IIoT) are utilizing wireless as the connectivity method as
compared to wired connections. IoT devices use both licensed and unlicensed spectrum for their wireless
connectivity. 5G/LTE can use both licensed and unlicensed spectrum. The use of 5G as the wireless
connectivity method fosters in a vast array of enhancements from capability, installation ease, and future
proofing.
Blockchain and Hyperledger, asits name implies is a collection of blocks. Blockchain while initially known
for cybercurrencyprovides many other key factors.Blockchains are basedon a distributed ledger and smart
contracts. A distributed ledger is a shared history or record of all previous actions within the blockchain
that is immutable due to its cryptographic security. Blockchains also utilize smart contracts which are used
to provide information, usually a contract, where all parties associated with the contract interact and record
their particular transactions. Smart contracts are also referred to as a transaction-based state. Smart
contracts can be proof of work (PoW), proof of stake (PoS), utilize container technology.
However smart contracts can also be used to provide software, configuration, scripts, authentication and
other important features used in machine to machine communication.
Figure 1 is a brief illustration of an IoT device using a 5G/LTE network to connect to a data center or cloud
service. In Figure 1 the IoT device uses a NB-IoT modem. The NB-IoT modem uses a 5G/LTE wireless
Next G Connect
www.nextgconnect.com 3 September 15, 2019
network for connectivity to the internet or private network. The IoT device is then able to send and receive
telemetry from the control or data center.
However, security and especially cybersecurity have and continues to be a major concern not only in all
aspects of telecommunications but of unique concern for IoT. The threat of a cybersecurity attack on IoT
devices continues to be a serious concern for governments, industry and consumers. The current method
of detecting a cybersecurity attackis to utilize monitoring for post intrusion detection asillustrated in Figure
1.
Figure 1: IoT Malicious Attack
In Figure 1 the IoT device code is compromised leading to upstream contamination. The current detection
methods commonly used are post detection using pattern detection methods which may or may not prevent
damage from the intrusion.
However,a more robust method is needed involving a proactive method whereby the cybersecurity breach
and or intrusion attempt is stopped from the onset. Blockchain technology utilizing smart contracts can be
used to robustly secure IoT devices. Smart contract is a piece of software that resides on the blockchain to
Next G Connect
www.nextgconnect.com 4 September 15, 2019
enforce a contract. The use of blockchain smart contract technology can involve both wired and wireless
technologies that communicate with either a private, public or a consortium blockchain.
Smart contracts can also be used to deliver or run software and or configuration files for IoT devices.
Because smart contracts in a blockchain are immutable they can be used for a more effective way of
delivering and verifying contracts which can also include the software code and or configuration of an IoT
device. Smart contracts can also be used to provide automated configuration changes where the network is
dynamically changed in near real time meeting particular service, performance or contract requirements.
With 5G and LTE, smart contracts can also be used to facilitate dynamic roaming or network selection
either between operators,between assets or a particular radio spectrum that is allowed to be used. This can
also be used by subscribers to determine their network of choice by utilizing smart contractsto selectwhich
operator to use and provide a method of payment or authentication for payment enabling their use of the
network without having to utilize a third-party clearing organization.
Smart contractstherefore can be used to manage devices whether they are IoT devices,smallcells,or macro
cells. Figure 2 is a depiction of how a smart contract, associated with block 84, references other smart
contracts for delivery of the software,configuration scripts or any other function. The smart contract can
also be updated referencing other blocks to facilitate code updates, bug fixes, configuration changes and
other items.
Next G Connect
www.nextgconnect.com 5 September 15, 2019
Figure 2: Smart Contact Blocks
In Figure 3 the device uses the master smart contract in block 84 and then assembles its required
configuration and software from the various other blocks, smart contracts, as instructed in the master smart
contract.
Figure 3: IoT Device Configuration and Software using Smart Contracts
Smart
Contract 1
Code
Smart
Contract 2
Code
Smart
Contract 3
Code
Smart
Contract N
Config Script
Smart
Contract M
Config Script
Genesis 6 7 8 80 81 82 83 84 85 100 200
Sub 1 Sub 3 Contract Sub NSub 2
Smart Contract 1
Contract Recipients
Sub1
Sub2
Sub3
Configuration 1
Configuration 2
Duration
Token Info
Other
Sub
M
IoT Device Contract
84
Sub3Sub1 Sub2Resident Config1 Config2
6 80 7 100 200
Next G Connect
www.nextgconnect.com 6 September 15, 2019
The proliferation of IoT devices has fostered the big data phenomena where the mining of mega data is
being promoted as essentialfor any business. However,having all the data available for third parties is not
necessarily a good thing.
Any IoT enabled device, regardless of its function, is meant to collect, send and or receive telemetry. It is
essential from the onset, that it is understood by all relevant parties involved what is the telemetry, data,
that the IoT device will collect, send and receive. In particular what needs to be understood is how the
device manufacturer plans to protect the IoT device and its data from being compromised and or how it is
going to be used. The voracious volume of data that these devices generate can lead to cyber criminals
stealing it and hold it hostage for ransom or use it to run subsequent schemes, such as identity theft.
However, relying on the manufacturer to provide the protection since they are potentially collecting and
using the data for their own purposes hasmany reservations and is not practical from a security perspective.
It is not practical due to the company and or manufacturers desire to monetize metadata and the low cost of
the IoT devices which makes following more stringent security tampering requirements not cost effective
because the price can easily make the IoT devices unattractive.
The other issue about security being embedded on the devices is manufacturing copycatswhich have spread
in many sections of the electronics industry. Stenciling and other markings make the device appear it is
legitimate however it can be a rogue device that has other purposes.
Smart contracts however can also be used to provide a unique level of security preventing unwanted and
unintended actors from disrupting those devices and their intended functions. Specifically, smart contract
technology can also be used to robustly secure IoT devices due to its immutability.
Figure 4 is similar that shown in Figure 1 with the inclusion of a blockchain using smart contracts. In the
depiction shown in Figure 4 the IoT device is using a smart contract which prevents the intrusion in a
proactive method.
Next G Connect
www.nextgconnect.com 7 September 15, 2019
Figure 4: IoT devices using Smart Contracts.
In conclusion 5G/LTE and IoT devices leveraging blockchain coupled with cloud services provides a
wholistic ecosystem that enables low latency applications in a secure manner.
I trust that you found this article useful.
Clint Smith, P.E.
Next G Connect
CTO
csmith@nextgconnect.com
Who we are:
NGC is a consulting team of highly skilled and experienced professionals. Our background is in wireless
communications for both the commercial and public safety sectors. The team has led deployment and
operations spanning decades in the wireless technology. We have designed software and hardware for
both network infrastructure and edge devices from concept to POC/FOA. Our current areas of focus
include 4G/5G, IoT and security.
Blockchain
Hyperledger
Malicious
Attack
Control and/or
Data Center
Control and/or
Data Center
Blockchain
Hyperledger
Rejected due to
incorrect hash
Normal Operation
Accepted due to
correct hash
IoTDevice
or
Gateway/Hub
1
80 81 82 83 84 85
Code
Contract
Code
Blockchain/Hyperledger
IoTDevice
or
Gateway/Hub
1
Genesis 80 81 82 83 84 85
Contract
Code
Blockchain/Hyperledger
Genesis
Next G Connect
www.nextgconnect.com 8 September 15, 2019
The teamhascollectivelybeengrantedover160patentsinthe wirelesscommunicationspace duringtheir
careers. We have alsowrittenmultiplebooksusedextensivelyinthe industryonwirelesstechnologyand
published by McGraw-Hill.
Feel free to utilize this information in any presentation or article with the simple request you reference
its origin.
If you see something that should be added, changed or simplywant to talk about your potential needs
please contact us at info@nextgconnect.com or call us at 1.845.987.1787.

More Related Content

What's hot

The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncAntenna Manufacturer Coco
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-NetworkBelal Ashraf
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalElliot Charles Willcox
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021Antenna Manufacturer Coco
 
Simple things about Internet of Things
Simple things about Internet of ThingsSimple things about Internet of Things
Simple things about Internet of ThingsMuhammad Nasr
 
IoT Standards_ALICON_SE_2017_02_25_Rev_D
IoT Standards_ALICON_SE_2017_02_25_Rev_DIoT Standards_ALICON_SE_2017_02_25_Rev_D
IoT Standards_ALICON_SE_2017_02_25_Rev_DIke Alisson
 
New Opportunities for Industry Growth (NXP)
New Opportunities for Industry Growth (NXP)New Opportunities for Industry Growth (NXP)
New Opportunities for Industry Growth (NXP)COMPUTEX TAIPEI
 
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Jollen Chen
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Mah Khan
 
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...South Tyrol Free Software Conference
 
How telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case studyHow telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case studyMd. Kamrul Islam
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)NUS-ISS
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlSylvain Maret
 

What's hot (19)

The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas Inc
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 Final
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021
 
Telecom industry trends for 2021
Telecom industry trends for 2021Telecom industry trends for 2021
Telecom industry trends for 2021
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
Simple things about Internet of Things
Simple things about Internet of ThingsSimple things about Internet of Things
Simple things about Internet of Things
 
IOT Networks
IOT NetworksIOT Networks
IOT Networks
 
IoT Standards_ALICON_SE_2017_02_25_Rev_D
IoT Standards_ALICON_SE_2017_02_25_Rev_DIoT Standards_ALICON_SE_2017_02_25_Rev_D
IoT Standards_ALICON_SE_2017_02_25_Rev_D
 
New Opportunities for Industry Growth (NXP)
New Opportunities for Industry Growth (NXP)New Opportunities for Industry Growth (NXP)
New Opportunities for Industry Growth (NXP)
 
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124
 
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
 
How telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case studyHow telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case study
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
 
Deploying IoT: A Telco Perspective
Deploying IoT: A Telco PerspectiveDeploying IoT: A Telco Perspective
Deploying IoT: A Telco Perspective
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
 

Similar to Blockchain, 5G/LTE & IoT Convergence

Paving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of ThingsPaving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of ThingsQualcomm Research
 
5 g as a service (5gaas)
5 g as a service (5gaas)5 g as a service (5gaas)
5 g as a service (5gaas)Luke Wang
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityKAILASH CHAUHAN
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
What is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdfWhat is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdfCiente
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...FrenchWeb.fr
 
Samsung 5g vision white paper
Samsung 5g vision white paperSamsung 5g vision white paper
Samsung 5g vision white paperTaeho Im
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communicationijtsrd
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docxherminaprocter
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docxRAJU852744
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docxaulasnilda
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docxjesusamckone
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 

Similar to Blockchain, 5G/LTE & IoT Convergence (20)

Paving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of ThingsPaving the path to Narrowband 5G with LTE Internet of Things
Paving the path to Narrowband 5G with LTE Internet of Things
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
5 g as a service (5gaas)
5 g as a service (5gaas)5 g as a service (5gaas)
5 g as a service (5gaas)
 
Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
 
Cor review2018-a
Cor review2018-aCor review2018-a
Cor review2018-a
 
Quick Quote App Portfolio
Quick Quote App PortfolioQuick Quote App Portfolio
Quick Quote App Portfolio
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivity
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
What is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdfWhat is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdf
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...
 
Samsung 5g vision white paper
Samsung 5g vision white paperSamsung 5g vision white paper
Samsung 5g vision white paper
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
 
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Blockchain, 5G/LTE & IoT Convergence

  • 1. Blockchain Convergence with 5G/LTE and IoT Clint Smith, P.E. csmith@nextgconnect.com Abstract: The convergence of blockchain technology with Fifth Generation Wireless (5G), Long Term Evolution (LTE), Internet of Things (IoT) and cloud services fosters in a host of new services that were not possible before. The proliferation of devices in a distributed architecture has many challenges including ensuring the device configuration management and cybersecurity. This paper discusses how smart contracts can be used for configure, operate and protect IoT devices.
  • 2. Next G Connect www.nextgconnect.com 1 September 15, 2019 The convergence of blockchain technology with Fifth Generation Wireless (5G), Long Term Evolution (LTE), Internet of Things (IoT) and cloud services fosters in a host of new services that were not possible before. Distributed architectures for providing services in a communication ecosystem is common to 5G, LTE, IoT,cloud servicesand blockchain. The convergence of these unique technologies facilitates a neutral host environment and network slicing for service delivery that is extended to the industrial, utility, enterprise and smart home environments. Presently there is a large focus on blockchain solutions, 5G/LTE solutions, IoT solutions and cloud solutions. Some cross pollination between these four pillars are emerging. However,these four seemingly diverse technologies when brought together will enable the next communication system of the future and with added location awareness will foster new services and concepts which are not even imaginable right now. 5G is being deployed as both Standalone (SA) and non standalone (NSA) with LTE as the access method for IoT devices. The virtualization of the wireless network using Network Function Virtualization (NFV) with Software Defined Networks (SDN) is enabling a low latency flat distributed network. The use of Containers for VNFs is being used in a virtual environment to quickly and efficiently scale servicesenabling logical network slices across multiple domains and technologies. 5G and LTE utilize narrowband, Cat-NB1 (NB) or wideband Cat-M1 (CAT-M) devices as the primary access technologies supporting IoT devices. However, there are other wireless access techniques and protocols that support IoT devices including WiFi and ZigBee. IoT is often considered the next great industrial revolution and is pervasive with more and more devices being deployed for a vastamount of applications. IoT devices and their supported applications cover a huge range of industries and use cases that scale from a single constrained device to massive cross-platform deployments of embedded technologies and cloud systems connecting in real-time. IoT devices can be currently found in consumer applications, smart homes, enterprise, infrastructure management, industrial applications, military, agriculture, energy management,environmental monitoring, medical, transportation, food services, insurance, retail, city infrastructure, banking as well as in oil, gas and mining.
  • 3. Next G Connect www.nextgconnect.com 2 September 15, 2019 Although eachof the before mentioned industries hasunique IoT applications, the common theme is sensors and devices connected via machine-to-machine, or machine-to-infrastructure to deliver the use case, monitor assets, collect data, analyze processes, and improve efficiency. The need to have low latency for device to device communication is becoming essential for IoT devices as well as smart vehicles and others. 5G access for IoT devices is still being defined with LTE (4G) having solutions which continue to evolve. Smart vehicles are currently using DSCR also known as 802.11p as well as LTE/5G to facilitate low latency device to device communication. However, tying the diverse IoT ecosystem together which includes numerous legacy and emerging communication protocols that allow devices and servers to talk to each other in new and more interconnected ways is a daunting task. At the same time, dozens of alliances and coalitions are forming in hopes of unifying the fractured and organic IoT landscape. However, the IoT ecosystem has created artificial barriers either by design or because of the legacy platforms themselves. IoT devices as part of the Industrial IoT 4 (IIoT) are utilizing wireless as the connectivity method as compared to wired connections. IoT devices use both licensed and unlicensed spectrum for their wireless connectivity. 5G/LTE can use both licensed and unlicensed spectrum. The use of 5G as the wireless connectivity method fosters in a vast array of enhancements from capability, installation ease, and future proofing. Blockchain and Hyperledger, asits name implies is a collection of blocks. Blockchain while initially known for cybercurrencyprovides many other key factors.Blockchains are basedon a distributed ledger and smart contracts. A distributed ledger is a shared history or record of all previous actions within the blockchain that is immutable due to its cryptographic security. Blockchains also utilize smart contracts which are used to provide information, usually a contract, where all parties associated with the contract interact and record their particular transactions. Smart contracts are also referred to as a transaction-based state. Smart contracts can be proof of work (PoW), proof of stake (PoS), utilize container technology. However smart contracts can also be used to provide software, configuration, scripts, authentication and other important features used in machine to machine communication. Figure 1 is a brief illustration of an IoT device using a 5G/LTE network to connect to a data center or cloud service. In Figure 1 the IoT device uses a NB-IoT modem. The NB-IoT modem uses a 5G/LTE wireless
  • 4. Next G Connect www.nextgconnect.com 3 September 15, 2019 network for connectivity to the internet or private network. The IoT device is then able to send and receive telemetry from the control or data center. However, security and especially cybersecurity have and continues to be a major concern not only in all aspects of telecommunications but of unique concern for IoT. The threat of a cybersecurity attack on IoT devices continues to be a serious concern for governments, industry and consumers. The current method of detecting a cybersecurity attackis to utilize monitoring for post intrusion detection asillustrated in Figure 1. Figure 1: IoT Malicious Attack In Figure 1 the IoT device code is compromised leading to upstream contamination. The current detection methods commonly used are post detection using pattern detection methods which may or may not prevent damage from the intrusion. However,a more robust method is needed involving a proactive method whereby the cybersecurity breach and or intrusion attempt is stopped from the onset. Blockchain technology utilizing smart contracts can be used to robustly secure IoT devices. Smart contract is a piece of software that resides on the blockchain to
  • 5. Next G Connect www.nextgconnect.com 4 September 15, 2019 enforce a contract. The use of blockchain smart contract technology can involve both wired and wireless technologies that communicate with either a private, public or a consortium blockchain. Smart contracts can also be used to deliver or run software and or configuration files for IoT devices. Because smart contracts in a blockchain are immutable they can be used for a more effective way of delivering and verifying contracts which can also include the software code and or configuration of an IoT device. Smart contracts can also be used to provide automated configuration changes where the network is dynamically changed in near real time meeting particular service, performance or contract requirements. With 5G and LTE, smart contracts can also be used to facilitate dynamic roaming or network selection either between operators,between assets or a particular radio spectrum that is allowed to be used. This can also be used by subscribers to determine their network of choice by utilizing smart contractsto selectwhich operator to use and provide a method of payment or authentication for payment enabling their use of the network without having to utilize a third-party clearing organization. Smart contractstherefore can be used to manage devices whether they are IoT devices,smallcells,or macro cells. Figure 2 is a depiction of how a smart contract, associated with block 84, references other smart contracts for delivery of the software,configuration scripts or any other function. The smart contract can also be updated referencing other blocks to facilitate code updates, bug fixes, configuration changes and other items.
  • 6. Next G Connect www.nextgconnect.com 5 September 15, 2019 Figure 2: Smart Contact Blocks In Figure 3 the device uses the master smart contract in block 84 and then assembles its required configuration and software from the various other blocks, smart contracts, as instructed in the master smart contract. Figure 3: IoT Device Configuration and Software using Smart Contracts Smart Contract 1 Code Smart Contract 2 Code Smart Contract 3 Code Smart Contract N Config Script Smart Contract M Config Script Genesis 6 7 8 80 81 82 83 84 85 100 200 Sub 1 Sub 3 Contract Sub NSub 2 Smart Contract 1 Contract Recipients Sub1 Sub2 Sub3 Configuration 1 Configuration 2 Duration Token Info Other Sub M IoT Device Contract 84 Sub3Sub1 Sub2Resident Config1 Config2 6 80 7 100 200
  • 7. Next G Connect www.nextgconnect.com 6 September 15, 2019 The proliferation of IoT devices has fostered the big data phenomena where the mining of mega data is being promoted as essentialfor any business. However,having all the data available for third parties is not necessarily a good thing. Any IoT enabled device, regardless of its function, is meant to collect, send and or receive telemetry. It is essential from the onset, that it is understood by all relevant parties involved what is the telemetry, data, that the IoT device will collect, send and receive. In particular what needs to be understood is how the device manufacturer plans to protect the IoT device and its data from being compromised and or how it is going to be used. The voracious volume of data that these devices generate can lead to cyber criminals stealing it and hold it hostage for ransom or use it to run subsequent schemes, such as identity theft. However, relying on the manufacturer to provide the protection since they are potentially collecting and using the data for their own purposes hasmany reservations and is not practical from a security perspective. It is not practical due to the company and or manufacturers desire to monetize metadata and the low cost of the IoT devices which makes following more stringent security tampering requirements not cost effective because the price can easily make the IoT devices unattractive. The other issue about security being embedded on the devices is manufacturing copycatswhich have spread in many sections of the electronics industry. Stenciling and other markings make the device appear it is legitimate however it can be a rogue device that has other purposes. Smart contracts however can also be used to provide a unique level of security preventing unwanted and unintended actors from disrupting those devices and their intended functions. Specifically, smart contract technology can also be used to robustly secure IoT devices due to its immutability. Figure 4 is similar that shown in Figure 1 with the inclusion of a blockchain using smart contracts. In the depiction shown in Figure 4 the IoT device is using a smart contract which prevents the intrusion in a proactive method.
  • 8. Next G Connect www.nextgconnect.com 7 September 15, 2019 Figure 4: IoT devices using Smart Contracts. In conclusion 5G/LTE and IoT devices leveraging blockchain coupled with cloud services provides a wholistic ecosystem that enables low latency applications in a secure manner. I trust that you found this article useful. Clint Smith, P.E. Next G Connect CTO csmith@nextgconnect.com Who we are: NGC is a consulting team of highly skilled and experienced professionals. Our background is in wireless communications for both the commercial and public safety sectors. The team has led deployment and operations spanning decades in the wireless technology. We have designed software and hardware for both network infrastructure and edge devices from concept to POC/FOA. Our current areas of focus include 4G/5G, IoT and security. Blockchain Hyperledger Malicious Attack Control and/or Data Center Control and/or Data Center Blockchain Hyperledger Rejected due to incorrect hash Normal Operation Accepted due to correct hash IoTDevice or Gateway/Hub 1 80 81 82 83 84 85 Code Contract Code Blockchain/Hyperledger IoTDevice or Gateway/Hub 1 Genesis 80 81 82 83 84 85 Contract Code Blockchain/Hyperledger Genesis
  • 9. Next G Connect www.nextgconnect.com 8 September 15, 2019 The teamhascollectivelybeengrantedover160patentsinthe wirelesscommunicationspace duringtheir careers. We have alsowrittenmultiplebooksusedextensivelyinthe industryonwirelesstechnologyand published by McGraw-Hill. Feel free to utilize this information in any presentation or article with the simple request you reference its origin. If you see something that should be added, changed or simplywant to talk about your potential needs please contact us at info@nextgconnect.com or call us at 1.845.987.1787.