1 / 9

Blockchain based cyber security for IoT

IoT Armour is a Blockchain powered cybersecurity solution designed to secure connected devices, networks and critical systems in the Internet of things (IoT). Visit: https://iotarmour.com/

Télécharger la présentation

Blockchain based cyber security for IoT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. w w w. i o t a r m o u r. c o m Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Tamper-proof logging of all identity and access Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems 1

  2. w w w. i o t a r m o u r. c o m w w w. i o t a r m o u r. c o m Smart, connected devices are now an integral part of our lives, in business and at home The Internet of Things connects numerous everyday devices, opening up previously closed systems to remote access and control Smart homes and offices enabled with a host of connected and smart devices Connected cars, autonomous trucks, unmanned aerial vehicles, etc Industrial control systems w/ cyber-physical platforms managing critical infrastructure Smart Cities with sensors and digital mgmt. systems for energy, utilities, transportation, etc The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025 2

  3. w w w. i o t a r m o u r. c o m In 2016, botnet armies DDoS attack of DNS infrastructure sent major internet platforms and services offline However, the rapidly growing world of perpetually-connected smart devices presents proportionally large security risks Since 2016, researchers have shown how attackers could hijack a vehicle. In 2017, US Homeland Security cyber sleuths hacked a Boeing 757 as it sat on the runway In 2017, criminals hacked a connected fish tank and stole data from a casino In late 2016, ‘Crash Override’ malware took down the power grid in Kiev, Ukraine for over an hour before Christmas Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world 3

  4. w w w. i o t a r m o u r. c o m The Solution: IOT Armour, a next-gen security solution designed explicitly for connected devices and critical infrastructure The platform leverages digital signature based identity and authentication for humans, machines and data; securing connected devices and tightly ring-fencing critical infrastructure IOT Armour delivers an enhanced Software- Defined Perimeter using private permissioned Blockchain and TLS technology 4

  5. w w w. i o t a r m o u r. c o m IOT Armour harnesses digital signatures to identify, authenticate and authorize devices thereby also securing IoT Communication INTERNET OF THINGS Identity & Access Validation Nodes REGISTRATION and ID of new device AUTHENTICATION & AUTHORIZATION of devices CORE SYSTEMS SECURE CHANNELS for inter-device communication SECURED ACCESS to core systems Identity & Access Validation Nodes The solution utilizes Blockchain-based digital signatures to secure connected devices as well as the communication channels 5

  6. w w w. i o t a r m o u r. c o m The Building Blocks: IOT Armour is powered by Software Defined Perimeter (SDP) architecture & Blockchain technology SDP architecture render devices invisible to attackers; and customized agents along with Blockchain technology delivers a new breed of digital identity and access control for connected devices in the IoT Software Defined Perimeter (SDP) Decentralization 1. Centralized Controller SDP 4. List of authorized Accepting Hosts determined Controller Cryptographic Encryption 5. Accept communication from Initiating Host 3. Mutual secure comm. to Controller 6. Receive list of IP’s of Accepting Hosts Accepting SDP Host Immutability 2. Mutual secure comm. to Controller Blockchain Technology 7. Mutual secure comm. channels Initiating SDP Host Accepting SDP Host Control Channel Data Channel Consensus-based Control Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD 6 Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways

  7. w w w. i o t a r m o u r. c o m w w w. i o t a r m o u r. c o m IOT Armour’s Zero Trust setup allows for micro segmentation of connected devices as well as associated users The platform facilitates fine-grained resources’ access and comprehensive management of the policy engine on the Blockchain 7 7

  8. w w w. i o t a r m o u r. c o m w w w. i o t a r m o u r. c o m The Result: A next-gen military-grade security system to protect connected devices and critical infrastructure against cyber threats Cryptographically-secure digital identity for users, connected devices and central servers/ services Best-in-class military- grade encryption for secured access to connected devices and IoT communication Invisible & locked down critical systems with micro segmentation and fine-grain access control Immutable & tamper- proof logs stored securely on the Blockchain for instant access / analysis It’s time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology! 8

  9. w w w. i o t a r m o u r. c o m Learn how you can secure IoT devices and critical systems with Blockchain-enabled next gen cybersecurity Reach Us Drop us a line or reach us via any of the channels below: +91 9820386446 +65 96536243 www.blockarmour.com info@blockarmour.com @blockarmour IOT Armour is a product by award-winning cybersecurity venture, Block Armour 9

More Related