Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective!
|
|
- Dayna Fowler
- 6 years ago
- Views:
Transcription
1 SESSION ID: CCS-T08 Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! Dr. Hilal Houssain hilal.hussein@gmail.com
2 Agenda Internet of Things (IoT) IoT Security Requirements IoT Security Issues Blockchain Technology Blockchain for Securing IoT Way forward and Conclusion 2
3 Internet of Things (IoT) 3
4 Internet of Things (IoT) The Term IoT was first coined by Kevin Ashton in 1999 Network of devices able to: Configure themselves automatically, Generate, process, and exchange data as we as Request a service or start an action without human intervention at many levels. 4
5 Important Areas of Research for IoT Smart devices, sensors in real-time, Energy Saving WiFi, Bluetooth, ZigBee, etc Big-data, Machine learning, Predictive analytics, Security/Privacy, Trust, Authenticity/Identity, Anonymity, 5
6 Security Requirements for IoT Devices 6
7 Security Requirements for IoT Devices IoT adoption is set to rise exponentially in the coming years, but security, and a lack of in-house skills to manage that security risk, still feature at the top of business leaders concerns. IoT devices can generate, process, and exchange vast amounts of critical data as well as privacy-sensitive information, and hence are appealing targets of various cyber attacks. The IoT devices interact with each other and connected systems and infrastructures in a secure manner. 7
8 Security Requirements for IoT Devices Authentication & Data integrity Confidentiality (Encryption) is a NOT always required! Secure against node(s) key leakage 8
9 Security Issues for IoT Devices 9
10 Security Issues for IoT Devices Can be lost and stolen (security difficult ) Not reachable (mostly disconnected) Finite life (Credentials tied to lifetime) Resource Constrained (no processing power for crypto) 10
11 Security Issues for IoT Devices Studies Reveal 70% Of IOT Devices Are Vulnerable To Attack. Majority of IoT devices had the following security issues: Privacy concerns Lacked encryption (processed/exchanged data and Firmware upgrades) Insecure updates Lack of mutual authentication (device, gateway) 11
12 Security Issues for IoT Devices IoT Network Security More challenging than traditional network security. A wider range of communication protocols, standards, and device capabilities. Pose significant issues and increased complexity! 12
13 Security Issues for IoT Devices IoT Authentication IoT standards are important catalysts but still need time to mature. Authentication with no human intervention. Mostly authenticating embedded sensors (deviceto-device communication). 13
14 Security Issues for IoT Devices IoT Encryption Encryption is an absolute must Encrypting data at rest and in transit. Limited capability to have standard encryption processes and protocols. Encryption key lifecycle management processes. Data integrity and confidentiality. 14
15 Security Issues for IoT Devices IoT PKI Digital certificate, and key (generation, distribution, management, and revocation). Limited ability to utilize PKI. Digital certificates securely loaded onto IoT devices at the time of manufacture or installed post-manufacture. Data integrity and confidentiality. 15
16 Security Issues for IoT Devices Security Incidents Visibility: Caused by the scale and scope of IoT deployments!!! Low energy and lightweight (in terms of resources) IoT devices must allocate most of their available resources to executing core application functionality. Thus, supporting security and privacy is quite challenging. 16
17 Security Issues for IoT Devices More IoT-specific security threats will definitely drive innovative Security Solutions mainly in new Cryptographic Primitives and Blockchain-based Approaches 17
18 Blockchain Technology 18
19 Blockchain Technology Bitcoin Whitepaper * 19
20 Blockchain Technology What is the problem that Blockchain attempts to solve? A technology that enables moving digital assets from one node to another node. 20
21 Blockchain Technology Traditional way Trusted third party 21
22 Blockchain Technology A Blockchain is an append-only distributed ledger that stores a time-ordered set of facts, aka transactions. Transactions are grouped into blocks and form a cryptographic hashchain, hence the name Blockchain. Role of Cryptography in Blockchain!!!! Integrity of ledger (Cryptographic hash function) Authenticity of transactions (Ellitpic Curve Digital Signature Alg.) Privacy of transactions (Pseudonymity through crypto tools) Identity of participants (Cryptographic signatures) Auditability and Transparency (Cryptographic hash chain) Exploit advanced cryptographic techniques, trust in Blockchain is shifted to Technology (not in participants or nodes) 22
23 Blockchain Technology Digitally signing (using Elliptic Curve Digital Signature Algorithm) a hash digest of the previous transaction and the public key of the recipient. Every viable transaction is stored in a public ledger Transactions are placed in blocks, which are linked by SHA256 hashes. 23
24 Blockchain for Securing IoT 24
25 Blockchain for Securing IoT Traditional security and privacy approaches are not applicable for IoT Blockchain-based approaches provide security and privacy in peer-to-peer networks with similar topologies to IoT Computationally expensive and involve high bandwidth overhead, delays, and significant energy. Not suitable for most resource-constrained IoT devices!!!! 25
26 Blockchain for Securing IoT Eliminate the Proof of Work (POW) and the concept of coins. Miners, as high resource device, are routers to manage communication between Private and Public Blockchain network. As a result: Traffic volume, processing time and energy consumption reduced noticeably. Security is preserved!!!,,, but what about IoT device authentication? 26
27 Blockchain for Securing IoT Combining Blockchain and Physical Unclonable Function (PUF) technology PUF Technology to: Authenticate an IoT device and Register that IoT device (including its ownership information) on the Blockchain,,, but still PKI is needed for securing IoT devices!!! 27
28 Blockchain for Securing IoT Reply PKI Digital Signature with Hash based signatures (or other Merkle tree schemes),,, anonymous IoT devices Joining & Leaving the network!!! 28
29 Blockchain for Securing IoT Group signatures using one or multiple pre shared group Key. This will remove anonymity in the IoT network.,,, what about secure firmware update for IoT devices? 29
30 Blockchain for Securing IoT Management all the updates in terms of integrity and source authenticity using blockchain. This is in addition to managing the IoT devices standardization and compliances auditing, device and cryptographic key management, etc IoT devices will need to freely (also securely with lowcost) buy, sell and trade their digital assets using Blockchain technology. 30
31 Way Forward and Conclusion A Standardized Lightweight Cryptographic Primitive is Needed for recourse constrained IoT devices. As blockchain-based solutions and technology become widespread, expect to see sophisticated attacks on Blockchain using weaknesses in its cryptographic primitives (design & implementation) Example, collision in hash, solution to increase the hash bit length! 31
32 Apply What You Have Learned Today First, have a better understanding of the Bitcoin Blockchain Technology, i.e., mastering the Satoshi while paper Bitcoin: A Peer-to-Peer Electronic Cash System. Then Conduct a survey of the Lightweight Cryptographic Primitive suitable for recourse constrained IoT devices. Finally, select three to five IoT applications, and review its security issues, and then assess the implication of deploying lightweight cryptosystem with Blockchain technology to secure these IoT applications. 32
33 Q & A Thank You 33
Blockchain: A revolutionary change or not?
: A revolutionary change or not? History of The was first defined in the original source code for Bitcoin. Thus, it is worth looking at the history the two, together. Creation of Bitcoin October 2008 Bitcoin:
More informationOpenBank - banking platform for e-money management based on blockchain technology (version 0.2)
OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple
More informationSecond Generation of Bitcoin
1 Second Generation of Bitcoin www.bitclassic.org White Paper The BitClassic Team info@bitclassic.org 2 CONTENTS 1. Abstract 3 What is BitClassic? 3 2. Blockchain 4 3. Mathematical Representation 5 4.
More informationcurrencies face. We will also articulate the roadmap how it will be used by masses for all of their payment need. 2. Introduction to MCX Coin
2017 Index: 1. Abstract: 2. Introduction to MCX Coin 3. Problems MCX Solves 4. The players affecting crypto markets 5. Hybrid technology 6. Powerful Blockchain 7. Volatility management 8. Stability 9.
More informationSWISSCOIN Whitepaper
SWISSCOIN Whitepaper Revision 0.1 Abstract. January 3, 2009 has marked the beginning of a new era of globalisation and world interconnection: the first Bitcoin transaction 1 has occurred. Satoshi Nakamoto
More information(Draft version 2.0) The blockchain is an undeniably ingenious invention the brainchild of a person or group of people
(Draft version 2.0) The blockchain is an undeniably ingenious invention the brainchild of a person or group of people known by the pseudonym, Satoshi Nakamoto. But since then, it has evolved into something
More informationVersion 3:
1 Version 3: 09-01-2018 / THE INDEX / THE INDEX... 2 / HOW WE ROLL... 3 / THE BASICS... 4 / WHAT S IN IT FOR ME?... 5 / ADCOIN FOR ONLINE AD NETWORKS... 6 / ADCOIN FOR ADVERTISERS... 7 /ADCOIN FOR PUBLISHERS...
More informationX12 Coin Whitepaper 1 / 18
X12 Coin Whitepaper 1 / 18 Introduction 3 X12 Ecosystem 4 Wallets 5 Graphical Desktop wallet 5 Web wallet 6 Mobile wallet 7 Merchants 7 ATM 8 Payment plugin 9 Mining 10 Debitcard 11 X12 Coin 12 Technical
More informationA Highly Customizable Blockchain Infrastructure
1 / 15 2 / 15 Abstract NULS is a blockchain that architecturally enables extendibility using smart contracts, modules and sub-chains. It is an open-source project that separates its features into customizable
More information5 ways blockchain is transforming Financial Services
5 ways blockchain is transforming Financial Services Introduction The Financial Services industry is fundamentally about facilitating the trusted exchange of value between multiple, untrusting parties.
More informationCryptoBank WHITEPAPER v. 0.1
CryptoBank WHITEPAPER v. 0.1 CryptoBank is a decentralized global payment system based on blockchain technology and including СryptoYuan, СryptoDollar, СryptoEuro, СryptoRuble Introduction There are a
More informationMIT GLOBAL ENTREPRENEURSHIP BOOTCAMP MARCH 26-31, 2017 BRISBANE, AUSTRALIA
1 OCTOBER 27, 2017 CAMBRIDGE, MA Discussion on how Blockchain and Conversational Commerce can strengthen your Supply Chain 3 Some problems with cash Convenience Fraud Government and central banks tinkering
More informationAdvanced Blockchain and Digital Currency Technology This course is presented in London on: 07 February 2018, 11 June 2018
Advanced Blockchain and Digital Currency Technology This course is presented in London on: 07 February 2018, 11 June 2018 The Banking and Corporate Finance Training Specialist Course Objectives Participants
More informationBitcoin White Paper Made Simple. A guide to understanding the Bitcoin white paper for people without an advanced degree in computer geekery
Bitcoin White Paper Made Simple A guide to understanding the Bitcoin white paper for people without an advanced degree in computer geekery CONTENTS 2 WTF Incentive 3 23 Background 7 Reclaiming Disk Space
More informationIgnition Coin and The Ignition Network Engineered for Value, Sustainability, and Growth
Ignition Coin and The Ignition Network Engineered for Value, Sustainability, and Growth Learn more at https://ignitioncoin.org - The Ignition Coin Project :: Introduction:: The Ignition Network and its
More informationDistributed ledger technologies services. Distributed ledger technologies services Using the power of blockchain
Distributed ledger technologies services Distributed ledger technologies services Using the power of blockchain 1 Distributed ledger technologies services What is blockchain? What is blockchain? Blockchain
More informationOLYMPIC COIN IT CHANGES EVERYTHING
OLYMPIC COIN IT CHANGES EVERYTHING 1 Whitepaper Table of Contents Table of Contents...2 Introduction 3 Olympic Coin.4 POS/MN based cryptoccurency....4 Why Olympic Coin 4 Proof of Stake.5 Masternodes 5
More informationHISTORY... 3 EVOLUTION OF OTHER PAYMENT METHODS... 5 THE TECHNOLOGY... 8 WHAT IS BLOCKCHAIN ADVANTAGES OF JUST PAY COIN HOW IS JUST PAY
1 HISTORY... 3 EVOLUTION OF OTHER PAYMENT METHODS... 5 THE TECHNOLOGY... 8 WHAT IS BLOCKCHAIN... 11 ADVANTAGES OF JUST PAY COIN... 13 HOW IS JUST PAY COIN DIFFERENT... 15 JUST PAY COIN WALLETS... 18 DISCLAIMER...
More informationBitcoin Risk Analysis
Bitcoin Risk Analysis Mariam Kiran School of Electrical Engineering & Computer Science, University of Bradford, Bradford BD7 1DP, United Kingdom m.kiran@bradford.ac.uk Mike Stannett Department of Computer
More informationBitcoin- An innovation. By - Rajitha Devabhaktuni - Ravali Chennamneni
Bitcoin- An innovation By - Rajitha Devabhaktuni - Ravali Chennamneni What is a Cryptocurrency? Decentralized Network Uses cryptographic principles to secure the transactions The holder of the currency
More informationUtilizing CipherShare within Pharmaceutical and Biotechnology Industries
Utilizing CipherShare within Pharmaceutical and Biotechnology Industries Table of Contents Table of Contents... 2 1. Securing High-Value Intellectual Property... 3 2. Regulatory Pressure to Secure Privacy
More informationKcash Digital Currency Wallet Whitepaper V4.0
Kcash Digital Currency Wallet Whitepaper V4.0 Dec.2017 Catalogue 1 SUMMARY... 2 2 BACKGROUND... 3 2.1 DEVELOPMENT STEP... 3 2.2 USERS AND MARKET BOTTLENECK... 4 2.3 MISSION AND VISION... 7 3 SERVICE INTRODUCTION...
More informationSecurity issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University
More informationCryptoCarbon (CCRB):
CryptoCarbon (CCRB): A NEW TYPE OF CRYPTOCURRENCY WHITEPAPER - FEBRUARY 2018 Contact Information: CRYPTOCARBON GLOBAL LTD info@cryptocarbon.co.uk Table of Contents 1. ABSTRACT 2. INTRODUCTION 3. CRYPTOCARBON
More informationMoney Back Coin [MNBK] Whitepaper 2018 ProjectMoneyBack.org
Money Back Coin [MNBK] Whitepaper 2018 ProjectMoneyBack.org Contents Introduction... 4 Definitions... 5 Project Money Back... 6 Phase One... 6 Phase Two... 7 Phase Three... 7 Phase Four... 8 Coin Details...
More informationLOOKREV. A Winning Solution For Creativity. Grace Tang LOOKREV WHITEPAPER V2.2 HTTPS://LOOKREV.COM!1
LOOKREV A Winning Solution For Creativity Grace Tang grace@lookrev.com LOOKREV WHITEPAPER V2.2 HTTPS://LOOKREV.COM!1 LOOKREV OVERVIEW An Open Network LookRev provides an open network in a space traditionally
More informationCyber Security - a New Challenge for Production (Management) Heiko Wolf, Manager R&D Program PSImetals FutureLab
Cyber Security - a New Challenge for Production (Management) Heiko Wolf, Manager R&D Program PSImetals FutureLab The Challenge Complexity of IT-Systems is rising Landing on the moon with 7.500 lines of
More informationBitcoin: Back to the Future
Bitcoin: Back to the Future About the course: This course is a general introduction to the emerging world of distributed ledgers and internet-based value exchange systems. We focus specifically on bitcoin
More informationBLOCKCHAIN CLOUD SERVICE. Integrate Your Business Network with the Blockchain Platform
BLOCKCHAIN CLOUD SERVICE Your Business Network with the Blockchain Platform Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud
More informationBlockchain Unleashed: Petrochemical Industry Impact
Blockchain Unleashed: Petrochemical Industry Impact 1 Business networks, wealth and markets Business Networks benefit from connectivity Participants are customers, suppliers, partners Cross geography &
More informationTrusted Bitcoin Ecosystem White Paper
Trusted Bitcoin Ecosystem White Paper A non-technical summary of the proof-of-concept to enable regulatory compliant Bitcoin transactions June 2017 Table of Contents # Section Contents Page 1 Introduction
More informationDigital Fiat Currency. The true alternative to physical currency
Digital Fiat Currency The true alternative to physical currency The single largest opportunity for Central Banks in fintech is to digitize cash $75 trillion worth of cash transactions globally 85% of global
More informationPROJECT PAI TECHNICAL WHITEPAPER OVERVIEW PAI BLOCKCHAIN PROTOCOL: A DECENTRALIZED ARTIFICIAL INTELLIGENCE NETWORK. October 2017 ProjectPAI.
PROJECT PAI TECHNICAL WHITEPAPER OVERVIEW PAI BLOCKCHAIN PROTOCOL: A DECENTRALIZED ARTIFICIAL INTELLIGENCE NETWORK October 2017 ProjectPAI.com ABSTRACT Personal Artificial Intelligence, or PAI, gives humans
More informationMaking the Case for Governance IoT Data
Making the Case for Governance IoT Data CloudExpo / ThingsExpo New York June 7 th, 2017 By Bassam Zarkout IGnPower Inc. Copyright 2017 Page 1 Making the Case for the Governance of Internet of Things Data
More informationWHITE PAPER UNICOIN. the first decentralized unicorn. ever.
WHITE PAPER UNICOIN the first decentralized unicorn. ever. ᵅ Background THE FUTURE OF MONEY IS DIGITAL CURRENCY (Bill Gates, co-founder of Microsoft, investor, author, and philanthropist) The advent of
More informationSTENEUM. The unique Saving program Of Cryptocurrency
STENEUM The unique Saving program Of Cryptocurrency CONTENTS 1. INTRODUCTION 1.1 What is Steneum 2. SPECIFICATIONS 2.1 Algorithm Scrypt 3. ICO (INITIAL COIN OFFERING) 3.1 ICO Target 3.2 ICO Parameters
More informationBitcoin (Part 2) Ken Calvert Keeping Current Seminar 12 February Keeping Current 1
Bitcoin (Part 2) Ken Calvert Keeping Current Seminar 12 February 2014 2014.02.12 Keeping Current 1 Outline I. Recap what, why, technical guts (briefly) II. Ecosystem how to get them, what to do with them
More informationJetstream Certification and Testing
PJM Interconnection 02/01/2016 This page is intentionally left blank. PJM 2016 www.pjm.com 2 P age Introduction Document Description PJM maintains and publishes a list of certified devices, software packages
More informationSOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY. Overview of CA Management Cloud for Mobility
SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY Overview of CA Management Cloud for Mobility CA Management Cloud for Mobility from CA Technologies enables companies to create and manage their mobile environments,
More informationDigital Currencies. Virtual Currencies Cryptocurrencies
Digital Currencies Digital Currencies An Internet-based medium of exchange No need for a physical representation Allow for instantaneous and borderless transactions Digital Currencies can fall into several
More informationCHAPTER 3 CLASSIFICATION AND REQUIREMENTS OF ELECTRONIC PAYMENT SYSTEM
CHAPTER 3 CLASSIFICATION AND REQUIREMENTS OF ELECTRONIC PAYMENT SYSTEM 32 3. CLASSIFICATION AND REQUIREMENTS OF ELECTRONIC PAYMENT SYSTEM In this chapter, we discuss various electronic payment systems
More informationIoT Onboarding A DEVICE MANUFACTURER S PERSPECTIVE
IoT Onboarding A DEVICE MANUFACTURER S PERSPECTIVE Addressing a key customer need to onboard IoT devices securely and efficiently METHODOLOGY Intel sponsored a primary research study to gain insights into
More informationHyperledger Fabric. the architecture of the permissioned ledger. Artem Barger
Hyperledger Fabric the architecture of the permissioned ledger rtem Barger (bartem@il.ibm.com) 1 bout me IBM Haifa Lab Cloud Foundation Research 10+ years of experience in design and development of distributed
More informationLequa's four principles for digital communication. Overview
Lequa's four principles for digital communication Overview Copyright 2015 Lequa AB - All rights reserved All rights reserved. Unless otherwise specified, no part of this document may be reproduced or utilised
More informationHow DLTs might impact the financial sector
Andrea Pinna Market Infrastructure Expert DG MIP/Market Integration Division How DLTs might impact the financial sector P2PFISY 2016 8 September The views expressed are those of the author and do not necessarily
More informationPrincipals and Practice of Cryptocurrencies
Principals and Practice of Cryptocurrencies Cornell CS 5437, Spring 2016 Introduction Principals and Practice of Cryptocurrencies Probability Distributed systems Game theory Cryptography Design choices
More informationVote Coin. Anonymous Crypto Democracy
Anonymous Crypto Democracy VoteCoin is an anonymous crypto currency best suitable for elections and other voting purposes, based on Zerocoin protocol. Whitepaper 2017 VoteCoin team - 1 - Summary Preface...
More informationThe Future of Blockchain in Quality Measurement. Jason C. Goldwater, MA, MPA Senior Director
The Future of Blockchain in Quality Measurement Jason C. Goldwater, MA, MPA Senior Director September 7, 2017 Topics for Today What is Blockchain, exactly? How Did This Become Important in Health IT? The
More informationBitcoin Growth Bot Whitepaper
Bitcoin Growth Bot Whitepaper Nucleus Coin Jordan Lindsey, Founder, CEO September 29, 2017 Index of contents Abstract... 2 Background...... 3 The Bitcoin Trading Bot Algorithm. 3 What is Nucleus Coin?....
More informationBITCOIN FORENSICS. Peter Theobald
Peter Theobald peter@tcforensics.com PART I: Bitcoin overview 1) Why is Bitcoin worth anything? 2) Cryptography, blockchain ledger and incentives 3) Bitcoin ecosystem today 4) Altcoins - Bitcoin 2.0 or
More informationCorda Solution Guide. The Corda Platform Q3 2017
Corda Solution Guide The Corda Platform Q3 2017 Table of Contents Introduction... 3 Solution Overview... 4 Needless friction hampers business transactions... 4 Corda creates frictionless business... 4
More informationDeveloping Connected Products - What s needed? Driven to enable your success!
Developing Connected Products - What s needed? Driven to enable your success! What s a Connected Product Smart, connected products are products, assets and other things embedded with processors, sensors,
More informationPrivacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader
Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Byunggil Lee and Howon Kim Electronics and Telecommunications Research Institute bglee@etri.re.kr Abstract
More informationSamsung SDS Nexledger. A Blockchain Platform and Solution
Samsung SDS Nexledger A Blockchain Platform and Solution Blockchain is a trustworthy record or ledger of all transactions that have taken place. It uses the Consensus Protocol for validating processes
More informationTHE BITCOIN PROJECT AND THE FREE MARKET
THE BITCOIN PROJECT AND THE FREE MARKET Mihaela Iavorschi * Abstract: The human innovation in the field of monetary freedom takes shape in the virtual communities. Developed and implemented through a decentralized
More informationDecentralization and Incoordination
Decentralization and Incoordination Thaddeus Dryja Blockchain Protocol Analysis and Security Engineering 2017-01-26 Decentralize everything Are we really talking about decentralization?
More informationCopyright 2018 PornX. All right reserved.
We - the team of developers of the project PORNX, were interested in the introduction of blockchain technologies in everyday life. Some areas are already occupied by interesting projects, but in the porn
More informationMASTER S THESIS. An implementation of the Millicent micro-payment protocol and its application in a pay-per-view business model
MASTER S THESIS An implementation of the Millicent micro-payment protocol and its application in a pay-per-view business model Michael Pührerfellner December 2000 Advisors: Prof. Mehdi Jazayeri, Dr. Manfred
More informationExternal Supplier Control Obligations. Information Security
External Supplier Control Obligations Information Security Version 7.0 December 2016 Control Area / Title Control Description Why this is important Roles and Responsibilities The Supplier must define and
More informationAccounts Payable on Campus: An Update
Accounts Payable on Campus: An Update 1 Mark Krawczyk, CTP Principal, CZYK & Associates 31ST NATIONAL COLLEGE & UNIVERSITY BURSARS SFS CONFERENCE APRIL 23-26, 2017 PONTE VEDRA BEACH, FL SAWGRASS MARRIOTT
More informationDECENTRALIZED NETWORK FOR DATA EXCHANGE AND STORAGE "MASTERCHAIN" Version 1.1 WHITEPAPER
DECENTRALIZED NETWORK FOR DATA EXCHANGE AND STORAGE "MASTERCHAIN" Version 1.1 WHITEPAPER Association for Financial Technologies Development Moscow, 2017 A. Arkhipov alexey.arkhipov@fintechru.org T. Bilyk
More informationMulti-Level µtesla: A Broadcast Authentication System for Distributed Sensor Networks
Multi-Level µtesla: A Broadcast Authentication System for Distributed Sensor Networks Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh,
More informationCryptography lecture 12
Cryptography lecture 12 Bitcoin and friends Jonathan Jogenfors Our money versus the Internet Many everyday things have moved to the Internet. Communications, relations, entertainment... but not money.
More informationGlobal Partner Summit 2017: Competing to Win
February 14 17 Napa, California Global Partner Summit 2017: Competing to Win Global Partner Summit 2017: Competing to Win 1 Guaranteeing IoT Data Integrity with Blockchain: Rail Use Case Jonathan H. King
More informationICT Security Certification 2017
Contribution ID: a9732940-3290-4da8-95c4-19ec8df869c3 Date: 19/05/2017 15:46:13 ICT Security Certification 2017 Fields marked with are mandatory. Files 1. Type of organisation: National authority / Agency
More informationWORLD WI-FI BOARD AND & ADVISORS FREE DECENTRALIZED WI-FI NETWORK TOKEN SALE STARTS ON 18 APRIL 2018 ILYA YASHIN YAN SEPIASHVILI FRED LEDBETTER
TOKEN SALE STARTS ON 18 APRIL 2018 FREE DECENTRALIZED WI-FI NETWORK World Wi-Fi is a global project built through the collective efforts of the community. The network will be based on privately owned routers
More informationThe future of finance: Coming technologies
IBM Global Services Executive Tek Report June 20, 2002 The future of finance: Coming technologies Executive Summary - Real world issues have often driven the financial sector into a leadership position
More informationIOT Analytics and business assurance. Ericsson-wedo perspectives October 2017
IOT Analytics and business assurance Ericsson-wedo perspectives October 2017 agenda IOT FRAMEWORK AND ARCHITECTURE USE CASES Automotive / Transport / Fleet Management Smart Energy / Utilities Connected
More informationThe Internet of Things Platform
The Internet of Things Platform 2018 Platform Overview kaleidoscopeiot.com 1 WHO WE ARE Today, IoT devices have out-numbered the world s population - by 2030 over 125 billion IoT devices will have invaded
More informationSecurity Analysis of Bitcoin
Security Analysis of Bitcoin 1 Dibyojyoti Mukherjee, Jaswant Katragadda, Yashwanth Gazula Department of Electronics and Computer Engineering, Volgenau School of Engineering George Mason University Fairfax,
More informationBeyond Bitcoin: What to do with Blockchain?
Beyond Bitcoin: What to do with Blockchain? Nelson Petracek Office of the CTO, Strategic Enablement Group TIBCO Software Inc. 1 http://ericsammons.com/what-is-the-blockchain/ 2 Beyond Bitcoin: The Tip
More informationINTRODUCING BIT4G. Bitcoin is Digital Gold Bit4G is Digital Growth Fund
INTRODUCING BIT4G Bitcoin is Digital Gold Bit4G is Digital Growth Fund The power of supercomputer driven trading, once available only to the largest of hedge funds has been unlocked. It is now available
More informationIOTA. Decentralized Economy of Things platform A Distributed Ledger Technology
IOTA Decentralized Economy of Things platform A Distributed Ledger Technology www.iotatoken.com The Team David Sønstebø Sergey Ivancheglo Serguei Popov, Ph.D Dominik Schiener Management & Strategy Development
More informationConnectivity key to efficient, safe, and convenient mobility
Connectivity key to efficient, safe, and convenient mobility Dr. Markus Heyn Member of the board of management, Robert Bosch GmbH 1 Invented for life means connected for life Combining cross-domain know-how
More informationDigital Manufacturing Services
Digital Manufacturing Services Helping to steer your digital transformation journey to smart, connected products and plants, while keeping your mobility, connectivity, analytics and cloud solutions inherently
More informationGlobal Trade Digitalization
Global Trade Digitalization Blockchain in the Domain of Customs Agencies WCO Brussels, April 4 2017, Stewart Jeacocke, Global Business Services Norbert Kouwenhoven, IBM GTD Colm Leonard, IBM Supply Chain
More informationTHE KAICOIN WHITE PAPER
THE KAICOIN WHITE PAPER KAICOIN, Which is the Cryptocurrency Platform Changing The Value of Currency www.kaicoin.io Initial Ver. 1.0: May 1, 2017 Last Updated Ver. 1.2: August 18, 2017 CONTENTS 1. Summary
More informationBlockchain aus 2 Sichten
AIT AUSTRIAN INSTITUTE OF TECHNOLOGY Blockchain aus 2 Sichten Blockchain Village Workshop 2017-06-22, Wien Dr. Ross King Senior Scientist Thematic Coordinator Data Science AIT Austrian Institute of Technology
More informationWHITEPAPER. Art of Code-Free Blockchain Platform
WHITEPAPER Art of Code-Free Blockchain Platform! Abstract A blockchain platform for experimentation can provide enterprises the much-needed capability to test and validate blockchain use cases rapidly.
More informationDONCOIN (DCNX) Whitepaper
DONCOIN (DCNX) Whitepaper 1 WHAT IS DONCOIN (DCNX)? Every Cryptocurrency that emerges is like a company which emerges to solve a pending world problem by proffering a lasting solution and raising funds
More informationFrequently Asked Questions
Frequently Asked Questions ABOUT exer Q: Which are exer main areas? A: Mining, Investments, Education and Networking Q: Where do I find information about exer, areas and products? A: On www.exervipclub.com.
More informationSeven Ways to Create an Unbeatable Enterprise Mobility Strategy
Seven Ways to Create an Unbeatable Enterprise Mobility Strategy A practical guide to what business and IT leaders need to do NOW to manage their business s mobile future By Arun Bhattacharya, CA Technologies
More informationCourse Syllabus. Mode of Delivery Work Placement Corequisites Distance Learning N/A None
Course Syllabus Course Code Course Title ECTS Credits COMP-541DL Digital Currency Programming 10 Prerequisites Department Semester DFIN-511, DFIN-524 Computer Science Fall Type of Course Field Language
More informationWHITE PAPER. Assuring success in blockchain implementations by engineering quality in validation
WHITE PAPER Assuring success in blockchain implementations by engineering quality in validation Arvind Sundarraman, Business Development Executive, Infosys Validation Solutions Introduction to blockchain
More informationRFID and Privacy Impact Assessment (PIA)
RFID and Privacy Impact Assessment (PIA) JOURNÉES SCIENTIFIQUES URSI 25 ET 26 MARS 2014 1 Agenda Introduction: RFID everywhere? RFID and security issues RFID threats The European Recommendation Privacy
More informationContractnet. The global exchange for IoT data. contractnet.com
Contractnet The global exchange for IoT data contractnet.com Contents 4 INTRODUCING CONTRACTNET 5 WHY IS IOT THE RIGHT FIELD TO BE IN? 10 WHAT MAKES CONTRACTNET UNIQUE? 14 CONCLUSION 15 APPENDIX 1: CONTRACTNET
More informationSIMPLE FUND 360: AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE.
Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE www.bglcorp.com Prepared by BGL Corporate Solutions Pty Ltd March 2018 CONTENTS 1.0 Overview of BGL s Web Applications 2.0 Data Sources and
More informationIoT Business Brief Industrial Manufacturing Business
IoT Brief Industrial Manufacturing picture: shutterstock.com/de POWERING THE SMART FACTORY To secure a smarter future for manufacturing, the disconnects between OT and IT must be bridged. Selecting the
More informationSupplier Security Directives
Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia
More informationOur Mission... Strategic management consulting for competitive advantage in global markets
PLM Leadership Blockchain Technology and PLM Usage CIMdata PLM Leadership Educational Webinar Series 8 February 2018 Michael Fry, Director, Manufacturing Systems Engineering Email: m.fry@cimdata.com Tel:
More informationIntroduction. What is Cryptocurrency?
Table of Contents 1. Introduction 1.1. Cryptocurrency 1.2. ERC20 Standard 1.3. P2P Networks 2. Adverx (AVX) 2.1. Token Specifications 2.2. Token Allocation 3. Real-time bidding (RTB) 3.1. How RTB works
More informationTrade Digitization. Client Advisory Board Treasury and Trade Solutions
Trade Digitization Client Advisory Board Treasury and Trade Solutions Blockchain: What is it? Append only distributed system of record shared across business network Immutability means transactions can
More informationA Secured Mutual Authentication Protocol For RFID System
A Secured Mutual Authentication Protocol For RFID System Rajarshi Roy Chowdhury, Md. Abdul Awal Ansary Abstract: Contactless automatic RFID system is intended to replace existing barcode scheme, since
More informationBelieve in a higher level of IT Security SECUDE Business White Paper. How to Improve Business Results through Secure Single Sign-on to SAP
Believe in a higher level of IT Security SECUDE Business White Paper How to Improve Business Results through Secure Single Sign-on to SAP Executive Summary CIOs and IT managers face tremendous demands
More informationGOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.
GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,
More informationLINDACOIN WHITEPAPER
LINDACOIN WHITEPAPER TABLE OF CONTENT ABSTRACT 3 Introduction 4 About Lindacoin 6 Coin Specification 7 features 8 Roadmap 15 Marketing plan 16 ABSTRACT January 3rd, 2009, the world recorded the beginning
More informationLECTURE NOTES. Bitcoins. 1. What is Bitcoin? METROPOLITAN STATE UNIVERSITY OF DENVER INTERMEDIATE MACROECONOMICS
LECTURE NOTES Bitcoins 1. What is Bitcoin? Is one of many crypto-currencies o Currency: (1) common means of exchange, (2) store of value, (3) unit of account o Crypto: from cryptography applied to a digital
More informationDigital Industries Apprenticeship: Occupational Brief. Unified Communications Trouble Shooter. March 2016
Digital Industries Apprenticeship: Occupational Brief Unified Communications Trouble Shooter March 2016 1 Digital Industries Apprenticeships: Occupational Brief Level 4 Unified Communications Trouble Shooter
More informationBUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and Getting Started with Multi-factor Authentication Solutions
BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and Getting Started with Multi-factor Authentication Solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard
More informationWE ARE PART OF THE GLOBAL PAYMENT REVOLUTION
WE ARE PART OF THE GLOBAL PAYMENT REVOLUTION Table of contents Page no. 1. What Is ClickGem? 2 2. Disadvantages Of Traditional Money Transaction Methods & The Breakthroughs Of ClickGem 3. Key Applications
More information