Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

9/5/2018
08:00 PM

7 Ways Blockchain is Being Used for Security

Blockchain is being used as a security tool. If you haven't thought about adopting it, you might want to reconsider your take.
2 of 8

Distributed Identity
Identity on the network comes in two flavors: One is the identity of the user; the other, the identity of the device. In the case of the IoT, where there often is no user in the traditional sense, authenticating the identity of the device itself is critical, and a blockchain has been introduced to establish and maintain those device identities.
IOTA is a 'permissionless blockchain' that seeks to do a number of things around the IoT, including establishing the identity of devices. It does this in the context of providing a micro-payment infrastructure to allow consumers and organizations to pay for IoT services on a per-use basis, but the payments aren't required for the identities to be authenticated.
The basis of the IOTA model is the 'tangle,' which is a combination of Full Nodes (defined as a full peer-to-peer member of the network) and Light Nodes (which must connect to Full Nodes in order to complete transactions). It is a variation on the traditional flat blockchain, but it does allow less powerful IoT devices to be part of the verified chain and remain fully identified and trusted.
(Image: Radu Bercan VIA SHUTTERSTOCK)

Distributed Identity

Identity on the network comes in two flavors: One is the identity of the user; the other, the identity of the device. In the case of the IoT, where there often is no user in the traditional sense, authenticating the identity of the device itself is critical, and a blockchain has been introduced to establish and maintain those device identities.

IOTA is a "permissionless blockchain" that seeks to do a number of things around the IoT, including establishing the identity of devices. It does this in the context of providing a micro-payment infrastructure to allow consumers and organizations to pay for IoT services on a per-use basis, but the payments aren't required for the identities to be authenticated.

The basis of the IOTA model is the "tangle," which is a combination of Full Nodes (defined as a full peer-to-peer member of the network) and Light Nodes (which must connect to Full Nodes in order to complete transactions). It is a variation on the traditional flat blockchain, but it does allow less powerful IoT devices to be part of the verified chain and remain fully identified and trusted.

(Image: Radu Bercan VIA SHUTTERSTOCK)

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Jesussavesme@1
50%
50%
[email protected],
User Rank: Apprentice
11/6/2018 | 12:16:34 AM
Helpful article
Thanks for your article .really helpms me a lot

https://socialprachar.com/31-10-18-what-is-blockchain-technology/?ref=sudheer
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
TPM-Fail: What It Means & What to Do About It
Ari Singer, CTO at TrustPhi,  11/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5541
PUBLISHED: 2019-11-20
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service...
CVE-2019-5542
PUBLISHED: 2019-11-20
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM.
CVE-2010-4660
PUBLISHED: 2019-11-20
Unspecified vulnerability in statusnet through 2010 due to the way addslashes are used in SQL string escapes..
CVE-2011-0529
PUBLISHED: 2019-11-20
Weborf before 0.12.5 is affected by a Denial of Service (DOS) due to malformed fields in HTTP.
CVE-2019-10765
PUBLISHED: 2019-11-20
iobroker.admin before 3.6.12 allows attacker to include file contents from outside the `/log/file1/` directory.