Presentation by Mr. Floyd DCosta, Co-founder @Block Armour, CEO @Blockchain Worx at NUS-ISS SkillsFuture Series Seminar: How the world is experimenting with Blockchain
Nell’iperspazio con Rocket: il Framework Web di Rust!
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
1. Smart City, Secure
City
Securing connected devices and critical IoT
infrastructure with Blockchain-enabled Cybersecurity
Blockchain-based digital identity for
connected devices
Tamper-proof logging of all identity
and access
Locked-down & secured access to
critical IoT systems
2. www.IoTArmour.com
2 The Internet of Things connects numerous everyday devices,
opening up previously closed systems to remote access & control
The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025*
Smart, connected devices are now an integral part of our lives, in business and at home
* Source: IHS Markit
Smart homes and
offices enabled
with a host of
connected and
smart devices
Connected cars,
autonomous
trucks, unmanned
aerial vehicles,
etc
Industrial control
systems w/ cyber-
physical platforms
managing critical
infrastructure
Smart Cities with
sensors and digital
mgmt. systems for
energy, utilities,
transportation, etc
3. www.IoTArmour.com
3 However, the rapidly growing world of perpetually-connected
smart devices presents proportionally large security risks
Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world
* Source: DarkTrace, Wired, ZdNet
In 2016, botnet armies DDoS attack of DNS infrastructure sent major
internet platforms and services offline
Since 2016, researchers have shown how attackers could hijack a
vehicle. In 2017, US Homeland Security cyber sleuths hacked a Boeing
757 as it sat on the runway
In 2017, criminals hacked a connected fish tank and stole data from a
casino
In late 2016, ‘Crash Override’ malware took down the power grid in Kiev,
Ukraine for over an hour before Christmas
4. www.IoTArmour.com
4
While blockchain technology is today predominantly being used within the ‘fintech’ context , organizations - both public and private-
are starting to look at use cases beyond financial services
How a blockchain works
ImmutableCryptographically
Secure
Blockchain
Consensus
driven
Open source
value transfer
protocol
Distributed
P2P network
Secure
math-based
system
Decentralized
The first electronic value transfer protocol
A wants to send
money to B
The transaction is
represented online
as a `block’
The block is broadcast to
every party in the network
Those in the network approve
the transaction is valid
The block that can be
added to the chain, which
provides an indelible and
transparent record of
transactions
The money moves
from A to B
1 2 3 4 5 6
Key features of Blockchain technology
Blockchain technology, by its very nature, lends itself to integrated
decentralized security monitoring efforts
The blockchain, a cryptographic ledger comprising of a digital log of transactions shared across a public or
private network, can address many of the pitfalls of existing IT systems
5. www.IoTArmour.com
5
Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways
Decentralization
Cryptographic Encryption
Immutability
Software Defined Perimeter (SDP) architecture & Blockchain
technology provide us credible options to secure IoT Systems
Consensus-based Control
Software Defined Perimeter (SDP) Blockchain Technology
Developed at the Defense Information Systems Agency
(DISA). Used by the DHS & DoD
SDP
Controller
Accepting
SDP Host
Accepting
SDP Host
Initiating
SDP Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication
from Initiating Host
2. Mutual secure comm. to
Controller
Control Channel
Data Channel
6. Receive list of IP’s of
Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
SDP architecture render devices invisible to attackers; and customized agents along with Blockchain
technology delivers a new breed of digital identity and access control for connected devices in the IoT
6. www.IoTArmour.com
6 Leveraging emerging technologies, security solutions can be
designed explicitly for connected devices and critical infrastructure
IoT Armour, for example, leverages digital signature based identity and authentication for humans,
machines and data; securing connected devices and tightly ring-fencing critical infrastructure
IoT Armour delivers an enhanced Software-Defined Perimeter using private permissioned Blockchain and TLS technology
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
BlockArmour Enterprise
Security Ring
Central Infrastructure
Admin
B
B
B
B
B
B
B
B
BB
B
B
7. www.IoTArmour.com
7 IoT Armour harnesses digital signatures to identify, authenticate
and authorize devices thereby also securing IoT Communication
The solution utilizes Blockchain-based digital signatures to secure connected devices as well as the communication channels
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
Internet of
Things
AUTHENTICATION
& AUTHORIZATION
of devices
REGISTRATION and
ID of new device
SECURE CHANNELS
for inter-device
communication
SECURED ACCESS
to core systems
CORE
SYSTEMS
8. www.IoTArmour.com
8 The Result: A next-gen military-grade security system to protect
connected devices and critical infrastructure against cyber threats
Its time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology!
Cryptographically
-secure digital
identity
– for users,
connected devices
and central
servers/services
Best-in-class
military-grade
encryption
– for secured
access to connected
devices and IoT
communication
Invisible & locked
down critical
systems
– with micro-
segmentation and
fine-grain access
control
Immutable &
tamper-proof
logs
– stored securely
on the Blockchain
for instant access /
analysis
Smarter, faster and ready to scale for tomorrow’s networks
9. www.IoTArmour.com
9 Learn how you can secure IoT devices and critical systems with
Blockchain-enabled next gen cybersecurity
Drop us a line or reach us via any of the channels below:
+65 96536243
+91 9820386446
@blockarmour
info@blockarmour.com
www.IoTArmour.com
Reach Us
IoT Armour is a product by award-winning cyber security venture, Block Armour