SlideShare a Scribd company logo
THE ROLE
OF BLOCKCHAINS
IN IoT
W W W . I N N O D A F O O D . C O M
WHAT IS BLOCKCHAIN
Originally created for
trading digital
currency
Blocks store
information about
transactions
Based on Distributed
Ledger Technology
A reliable, difficult-
to-hack record of
transactions
Transaction is combined
with other transactions
to create a data block
A provider &
customer agree a
transaction
The transaction
is confirmedto
both parties
Verified block is stacked
with other blocks creating a
blockchain
Data block is stored in
decentralised global
network & thus verified
HOW DOES IT WORK
Database of transactions shared &
synchronised across all parties– without
centralised control.
DISTRIBUTED LEDGER TECHNOLOGY
Self-executing agreements or rules based on
blockchain technology that automatically trigger
actions or payments once conditions are met.
SMART CONTRACTS:
Source: Blockgeeks, ResearchGate
KEY TERMS ASSOCIATED WITH BLOCKCHAIN
Option contract written as
code into a blockchain.
Contract is part of the
public blockchain.
Parties involved in the
contract are anonymous
Contract executes itself when
the conditions are met.
Regulators use blockchain to
keep an eye on contracts.
Clearinghouse
Centralised
Ledger
Distributed
Ledger
0
2
4
6
8
10
12
14
2017 2018 2019* 2022*
0.95
1.5
2.9
12.4
WORLDWIDE SPEND ON BLOCKCHAIN
Worldwide spending on
blockchain solutions in
2019
$2.9 bn
increase from the $1.5
billion spent in 2018
88.7%
CAGR of Blockchain
spending between
2018-2022
76%
Worldwide spending on blockchain solutions 2017-2022
(in billion U.S. dollars)
Source: IDC
10 INDUSTRIES BLOCKCHAIN IS LIKELY TO DISRUPT
Banking
Healthcare
Education
Politics
Legal
Industry
Security
Government
Rentalsand
Ride sharing
Charitiesand
Ride sharing
Real Estate
Source: Forbes
01
02
03
04
05
06
07
08
09
10
IoT SECURITY
IoT SECURITY: A GROWING CONCERN
The wide array of connected
devices difficult to monitor &
keep hackers away
A comprehensive IT security
policy is crucial for successful
IoT implementation
Growing threat to security of
Consumer & Industrial IoT
products
BLOCKCHAINS
FOR IoT SECURITY
Reduce Costs
by removing overhead
associated with
intermediaries
Accelerate Transactions
by reduced settlement time
from days to near
instantaneous
Build Trust
between parties and devices with
reduced risk of collusion and
tampering
HOW CAN BLOCKCHAIN IMPROVE IoT SECURITY
Source: IBM
BLOCKCHAINS CAN BE USED TO SOLVE
SOME OF IoT NETWORK PAIN POINTS.
LET US SEE HOW…
LACK OF SCALABILITY & VALIDATION OF TRANSACTIONS
The traditional “Client Server” architecture with
central authorities is difficult to scale in a growing
IoT network.
Solution
Each transaction is validated by other nodes
before it gets added to the blockchain. Thus, they
are scalable & fault-resilient.
Pain point
INSECURITY & COST OF SECURITY
It is expensive & insecure to purchase trusted
certificates for each device or use locally-hosted
Client Authentication Servers in an IoT network.
Solution
Creating a new block requires high computational
time. As the participating nodes increase, the
network becomes secure without increasing costs.
Pain point
VULNERABLE CENTRALIZED AUTHORITIES
The Centralized IoT authority in a network is
susceptible to attacks & the servers can be hacked
resulting in complete device compromise.
Solution
Since each node serves as a Centralized Authority,
if some of the nodes are compromised, the
network recognizes this & discards the fake block.
Pain point
TANGIBLE DAMAGE
With Consumer & Industrial IoT products on the rise,
any malicious IoT command & control messages may
cause damage to tangible resources.
Solution
Using Smart Contracts, multiple rules &
authorization entities are created before a
transaction executes to avoid tangible damage.
Pain point
REFERENCES
• https://www.crn.com/news/internet-of-
things/300103786/survey-iot-security-is-a-
growing-concern-for-companies-but-few-
are-taking-action.htm
• https://www.statista.com/statistics/804775/
worldwide-market-share-of-blockchain-by-
sector/
• https://www.statista.com/statistics/800426/
worldwide-blockchain-solutions-spending/
• https://www.statista.com/statistics/800561/
worldwide-blockchain-solutions-spending-
by-region/
• https://www.i-scoop.eu/blockchain-
distributed-ledger-technology/blockchain-
iot/
• https://hsc.com/Blog/The-many-roles-of-
Block-chains-in-the-Internet-of-Things

More Related Content

What's hot

Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and PrivacyAnil John
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiScott Strang
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchainCeline George
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of TrustMacha Pujitha
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewGokul Alex
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work Blockchain Council
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101Karthikeyan VK
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyhellygeorge
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoTMat Keep
 
BLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGYBLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGYCANiharikaGarg
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed IntelligenceNuri Cankaya
 
How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?Blockchain Council
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for BlockchainASPEX_BE
 
Banking on a Blockchain
Banking on a BlockchainBanking on a Blockchain
Banking on a BlockchainAltoros
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Hila Bar
 

What's hot (20)

Blockchain Security and Privacy
Blockchain Security and PrivacyBlockchain Security and Privacy
Blockchain Security and Privacy
 
1. ibm blockchain explained
1. ibm blockchain explained1. ibm blockchain explained
1. ibm blockchain explained
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
 
Security and privacy with blockchain
Security and privacy with blockchainSecurity and privacy with blockchain
Security and privacy with blockchain
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A Review
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoT
 
BLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGYBLOCK CHAIN TECHNOLOGY
BLOCK CHAIN TECHNOLOGY
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
 
How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for Blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
Banking on a Blockchain
Banking on a BlockchainBanking on a Blockchain
Banking on a Blockchain
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
 

Similar to Role of Blockchains in Internet of Things

Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTURohit Verma
 
От прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компанийОт прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компанийPositive Hack Days
 
How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance
How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance
How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance Kellton Tech Solutions Ltd
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on AzureNuri Cankaya
 
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...Vishnu Pendyala
 
All You Need To Know About Transactions in Blockchain
All You Need To Know About Transactions in BlockchainAll You Need To Know About Transactions in Blockchain
All You Need To Know About Transactions in BlockchainBlockchain Council
 
Blockchains for Business 101
Blockchains for Business 101Blockchains for Business 101
Blockchains for Business 101Gordon Haff
 
Accelerate Blockchain slideshare
Accelerate Blockchain slideshareAccelerate Blockchain slideshare
Accelerate Blockchain slideshareCertus Solutions
 
Blockchain and Smart Contracts
Blockchain and Smart ContractsBlockchain and Smart Contracts
Blockchain and Smart ContractsFinancial Poise
 
BlockChain Technology By Deep Akabari.pptx
BlockChain Technology By Deep Akabari.pptxBlockChain Technology By Deep Akabari.pptx
BlockChain Technology By Deep Akabari.pptxDeepAkabari
 
Iata blockchain presentation icaew suisse branch
Iata blockchain presentation   icaew suisse branchIata blockchain presentation   icaew suisse branch
Iata blockchain presentation icaew suisse branchTim Moss
 
Blockchain and Smart Contracts (Series: Blockchain Basics 2020)
Blockchain and Smart Contracts (Series: Blockchain Basics 2020)   Blockchain and Smart Contracts (Series: Blockchain Basics 2020)
Blockchain and Smart Contracts (Series: Blockchain Basics 2020) Financial Poise
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4Capgemini
 
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCapgemini
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications ABHISHEK JAIN
 
Blockchain and Distributed Ledgers Lecture
Blockchain and Distributed Ledgers LectureBlockchain and Distributed Ledgers Lecture
Blockchain and Distributed Ledgers LectureDean Demellweek, MFA
 

Similar to Role of Blockchains in Internet of Things (20)

Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
От прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компанийОт прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компаний
 
How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance
How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance
How Blockchain & Cryptocurrencies Redefining Financial Instruments in Finance
 
Blockchain on Azure
Blockchain on AzureBlockchain on Azure
Blockchain on Azure
 
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
Cisco ICON Speaker Series: Blockchain - Technology that is revolutionizing th...
 
All You Need To Know About Transactions in Blockchain
All You Need To Know About Transactions in BlockchainAll You Need To Know About Transactions in Blockchain
All You Need To Know About Transactions in Blockchain
 
75
7575
75
 
Blockchains for Business 101
Blockchains for Business 101Blockchains for Business 101
Blockchains for Business 101
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
The Education Blockchain
The Education BlockchainThe Education Blockchain
The Education Blockchain
 
Accelerate Blockchain slideshare
Accelerate Blockchain slideshareAccelerate Blockchain slideshare
Accelerate Blockchain slideshare
 
Blockchain and Smart Contracts
Blockchain and Smart ContractsBlockchain and Smart Contracts
Blockchain and Smart Contracts
 
BlockChain Technology By Deep Akabari.pptx
BlockChain Technology By Deep Akabari.pptxBlockChain Technology By Deep Akabari.pptx
BlockChain Technology By Deep Akabari.pptx
 
Iata blockchain presentation icaew suisse branch
Iata blockchain presentation   icaew suisse branchIata blockchain presentation   icaew suisse branch
Iata blockchain presentation icaew suisse branch
 
Blockchain and Smart Contracts (Series: Blockchain Basics 2020)
Blockchain and Smart Contracts (Series: Blockchain Basics 2020)   Blockchain and Smart Contracts (Series: Blockchain Basics 2020)
Blockchain and Smart Contracts (Series: Blockchain Basics 2020)
 
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
 
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchainCWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
CWIN17 Frankfurt / ibm_watson_iot_platform_and_blockchain
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications
 
Blockchain and Distributed Ledgers Lecture
Blockchain and Distributed Ledgers LectureBlockchain and Distributed Ledgers Lecture
Blockchain and Distributed Ledgers Lecture
 

More from Hughes Systique Corporation

Major Benefits of Managed Security Operations Centre.pptx
Major Benefits of Managed Security Operations Centre.pptxMajor Benefits of Managed Security Operations Centre.pptx
Major Benefits of Managed Security Operations Centre.pptxHughes Systique Corporation
 
Digital Transformation of industries post COVID-19
Digital Transformation of industries post COVID-19Digital Transformation of industries post COVID-19
Digital Transformation of industries post COVID-19Hughes Systique Corporation
 
Global OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenon
Global OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenonGlobal OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenon
Global OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenonHughes Systique Corporation
 
Robotic Process Automation and its future- Hyperautomation
Robotic Process Automation and its future- HyperautomationRobotic Process Automation and its future- Hyperautomation
Robotic Process Automation and its future- HyperautomationHughes Systique Corporation
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityHughes Systique Corporation
 
Virtual and Augmented Reality: State of Technology, Market & Trends
Virtual and Augmented Reality: State of Technology, Market & TrendsVirtual and Augmented Reality: State of Technology, Market & Trends
Virtual and Augmented Reality: State of Technology, Market & TrendsHughes Systique Corporation
 
Overcoming online video streaming challenges with better Quality-of-Experience
Overcoming online video streaming challenges with better Quality-of-ExperienceOvercoming online video streaming challenges with better Quality-of-Experience
Overcoming online video streaming challenges with better Quality-of-ExperienceHughes Systique Corporation
 

More from Hughes Systique Corporation (16)

Major Benefits of Managed Security Operations Centre.pptx
Major Benefits of Managed Security Operations Centre.pptxMajor Benefits of Managed Security Operations Centre.pptx
Major Benefits of Managed Security Operations Centre.pptx
 
The Importance of Cloud Migration
The Importance of Cloud MigrationThe Importance of Cloud Migration
The Importance of Cloud Migration
 
Leveraging the Power of Image Tokens
Leveraging the Power of Image TokensLeveraging the Power of Image Tokens
Leveraging the Power of Image Tokens
 
Digital Transformation of industries post COVID-19
Digital Transformation of industries post COVID-19Digital Transformation of industries post COVID-19
Digital Transformation of industries post COVID-19
 
An Introduction to OpenRAN
An Introduction to OpenRANAn Introduction to OpenRAN
An Introduction to OpenRAN
 
OpenRoaming- A Global Wi-Fi Roaming Enabler
OpenRoaming- A Global Wi-Fi Roaming EnablerOpenRoaming- A Global Wi-Fi Roaming Enabler
OpenRoaming- A Global Wi-Fi Roaming Enabler
 
Global OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenon
Global OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenonGlobal OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenon
Global OTT Video Business fuelled by COVID-19 and sustaining the OTT phenomenon
 
MAC Randomization
MAC RandomizationMAC Randomization
MAC Randomization
 
IoT Security Trends during COVID-19
IoT Security Trends during COVID-19IoT Security Trends during COVID-19
IoT Security Trends during COVID-19
 
Robotic Process Automation and its future- Hyperautomation
Robotic Process Automation and its future- HyperautomationRobotic Process Automation and its future- Hyperautomation
Robotic Process Automation and its future- Hyperautomation
 
DevOps - Transforming the Traditional SDLC
DevOps - Transforming the Traditional SDLCDevOps - Transforming the Traditional SDLC
DevOps - Transforming the Traditional SDLC
 
5G: The Evolution and Tech Trends Today
5G: The Evolution and Tech Trends Today5G: The Evolution and Tech Trends Today
5G: The Evolution and Tech Trends Today
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation Connectivity
 
WiFi Technologies - Hotspot 2.0 and Beyond
WiFi Technologies - Hotspot 2.0 and BeyondWiFi Technologies - Hotspot 2.0 and Beyond
WiFi Technologies - Hotspot 2.0 and Beyond
 
Virtual and Augmented Reality: State of Technology, Market & Trends
Virtual and Augmented Reality: State of Technology, Market & TrendsVirtual and Augmented Reality: State of Technology, Market & Trends
Virtual and Augmented Reality: State of Technology, Market & Trends
 
Overcoming online video streaming challenges with better Quality-of-Experience
Overcoming online video streaming challenges with better Quality-of-ExperienceOvercoming online video streaming challenges with better Quality-of-Experience
Overcoming online video streaming challenges with better Quality-of-Experience
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Role of Blockchains in Internet of Things

  • 1. THE ROLE OF BLOCKCHAINS IN IoT W W W . I N N O D A F O O D . C O M
  • 2. WHAT IS BLOCKCHAIN Originally created for trading digital currency Blocks store information about transactions Based on Distributed Ledger Technology A reliable, difficult- to-hack record of transactions
  • 3. Transaction is combined with other transactions to create a data block A provider & customer agree a transaction The transaction is confirmedto both parties Verified block is stacked with other blocks creating a blockchain Data block is stored in decentralised global network & thus verified HOW DOES IT WORK
  • 4. Database of transactions shared & synchronised across all parties– without centralised control. DISTRIBUTED LEDGER TECHNOLOGY Self-executing agreements or rules based on blockchain technology that automatically trigger actions or payments once conditions are met. SMART CONTRACTS: Source: Blockgeeks, ResearchGate KEY TERMS ASSOCIATED WITH BLOCKCHAIN Option contract written as code into a blockchain. Contract is part of the public blockchain. Parties involved in the contract are anonymous Contract executes itself when the conditions are met. Regulators use blockchain to keep an eye on contracts. Clearinghouse Centralised Ledger Distributed Ledger
  • 5. 0 2 4 6 8 10 12 14 2017 2018 2019* 2022* 0.95 1.5 2.9 12.4 WORLDWIDE SPEND ON BLOCKCHAIN Worldwide spending on blockchain solutions in 2019 $2.9 bn increase from the $1.5 billion spent in 2018 88.7% CAGR of Blockchain spending between 2018-2022 76% Worldwide spending on blockchain solutions 2017-2022 (in billion U.S. dollars) Source: IDC
  • 6. 10 INDUSTRIES BLOCKCHAIN IS LIKELY TO DISRUPT Banking Healthcare Education Politics Legal Industry Security Government Rentalsand Ride sharing Charitiesand Ride sharing Real Estate Source: Forbes 01 02 03 04 05 06 07 08 09 10
  • 8. IoT SECURITY: A GROWING CONCERN The wide array of connected devices difficult to monitor & keep hackers away A comprehensive IT security policy is crucial for successful IoT implementation Growing threat to security of Consumer & Industrial IoT products
  • 10. Reduce Costs by removing overhead associated with intermediaries Accelerate Transactions by reduced settlement time from days to near instantaneous Build Trust between parties and devices with reduced risk of collusion and tampering HOW CAN BLOCKCHAIN IMPROVE IoT SECURITY Source: IBM
  • 11. BLOCKCHAINS CAN BE USED TO SOLVE SOME OF IoT NETWORK PAIN POINTS. LET US SEE HOW…
  • 12. LACK OF SCALABILITY & VALIDATION OF TRANSACTIONS The traditional “Client Server” architecture with central authorities is difficult to scale in a growing IoT network. Solution Each transaction is validated by other nodes before it gets added to the blockchain. Thus, they are scalable & fault-resilient. Pain point
  • 13. INSECURITY & COST OF SECURITY It is expensive & insecure to purchase trusted certificates for each device or use locally-hosted Client Authentication Servers in an IoT network. Solution Creating a new block requires high computational time. As the participating nodes increase, the network becomes secure without increasing costs. Pain point
  • 14. VULNERABLE CENTRALIZED AUTHORITIES The Centralized IoT authority in a network is susceptible to attacks & the servers can be hacked resulting in complete device compromise. Solution Since each node serves as a Centralized Authority, if some of the nodes are compromised, the network recognizes this & discards the fake block. Pain point
  • 15. TANGIBLE DAMAGE With Consumer & Industrial IoT products on the rise, any malicious IoT command & control messages may cause damage to tangible resources. Solution Using Smart Contracts, multiple rules & authorization entities are created before a transaction executes to avoid tangible damage. Pain point
  • 16. REFERENCES • https://www.crn.com/news/internet-of- things/300103786/survey-iot-security-is-a- growing-concern-for-companies-but-few- are-taking-action.htm • https://www.statista.com/statistics/804775/ worldwide-market-share-of-blockchain-by- sector/ • https://www.statista.com/statistics/800426/ worldwide-blockchain-solutions-spending/ • https://www.statista.com/statistics/800561/ worldwide-blockchain-solutions-spending- by-region/ • https://www.i-scoop.eu/blockchain- distributed-ledger-technology/blockchain- iot/ • https://hsc.com/Blog/The-many-roles-of- Block-chains-in-the-Internet-of-Things