IoT and Blockchain

IoT and Blockchain

It seems like everyone is now talking about blockchain. It’s all over the net! What is blockchain? What’s it used for? And how can it be helpful with IoT?

In order to understand what blockchain is, let’s first discuss another buzzword, bitcoin. According to Wikipedia (, Satoshi Nakamoto invented bitcoin in 2008 in order to create the world’s first decentralized digital currency. This means that the currency is not controlled by a central bank, but rather, by people themselves. Unlike traditional currency, which is based on gold or silver, and printed by a central bank, bitcoin is based on a mathematical formula and is owned by the people. This means that no nation on Earth can just print more of it in order to cover their national debt, which will devaluate the currency. This also means that a country’s central bank can’t just decide to take away your money. It’s out on the internet, out of their reach and control.

Which leads us to a new problem. If the currency is managed by the internet, how can you keep it safe from hackers and other online bad guys who want to steal your money? Also, how do you prevent counterfeiting? If the money is virtual currency, what prevents someone from just making a copy of your bitcoins, which will devaluate the currency? How will anyone even know the difference?

To solve the problem, Satoshi Nakamoto invented blockchain. Blockchain is a distributed public ledger, which contains blocks of data. This means that there are numerous copies of the ledger, all over the internet, and all linked together. Each block contains a pointer to the previous block (except for the very first one!), a timestamp, and the transaction data. Once data is recorded to the ledger, it is permanent and unalterable. Should someone try to tamper with a block chain’s data, it will no longer match the publicly available versions on the internet, and will become invalidated. The public provides the ultimate security. You can alter one single copy of data; however, you can’t simultaneously alter millions and millions of copies. Therefore, the one that’s different will get ousted, leaving your data safe and secure.

Let’s now see how blockchain is applied to bitcoin. Every bitcoin (or part of it, the smallest portion is called a Satoshi, in honor of its founder) has a unique signature and can not be copied. Every bitcoin transaction is stored in a blockchain. The blockchain records that these specific Satoshis or bitcoins belong to you. If a hacker tries to alter the blockchain data to have it show that it belongs to him, his blockchain will get rejected by the public, as being tampered with. The rest of the publicly available copies of the blockchain will retain its data integrity and remain unaltered. With regards to the encryption of blockchain, I’ve seen figures that state it would take 60 years of constant computing power to break a single Bitcoin address. This assumes that computing speeds double every year. If we go by today’s computing power, it would take about 500 million years to do the same hack!

The reason why blockchain is so popular is due to its nature of being impervious to tampering. This creates a wealth of cybersecurity opportunities that would affect entire industries. For example, in IoT, you have companies that are building entire ecosystems of products and solutions and are vying to become industry leaders in their niche. For example, with smart homes, smart cities, and in the Industrial IoT (IIoT) space, integrators are building IoT Gateways and applications that operate with many different vendors’ sensors and devices. Let’s not forget connected autonomous vehicles and passenger drones!  The question is, how truly secure are all these devices?

According to Cisco (, it estimates that the number of connected devices is expected to grow exponentially, to 50 billion by 2020. Some of the challenges, mentioned by Cisco, that we are facing with this exponential growth, include:

  • Many IoT devices are small, inexpensive devices with little to no physical security.
  • Crypto algorithms have a limited lifetime before they are broken. This means that the best algorithms can get hacked, and it’s only a matter of time before hackers adapt and learn how to get around them.

In short, it would seem that many, if not all, of IoT’s ecosystems are not truly secure.

One way of securing IoT ecosystems would be through the use of microchips. For example, Amazon Web Services (AWS) partnered with Microchip Technology (based out of Long Island, New York) to develop a secure provisioning platform, and associated microchip to streamline IoT security.

A current challenge with chip manufacturers is that they want to keep their technology to themselves, and lock out anyone else from integrating with it. This makes sense from their perspective, as these companies have invested considerable resources into developing their product, and want to reap the rewards of being the only one who has access to it. However, this approach is short sighted for two reasons:

  1. Preventing others from playing in your sand box stifles innovation.
  2. This keeps an ambitious person from creating a killer app (that will sell millions or billions of your microchips).

San Francisco blockchain company Chronicled ( introduced a blockchain-based platform that enables companies and manufacturers to register and verify physical items (i.e., IoT Devices) in an irrefutable and decentralized network (i.e., public blockchain). Chronicle’s platform serves companies that manufacture Bluetooth Low Energy (BLE) and Near Field Communication (NFC) microchips.

Companies that want to integrate their solutions with these microchips are able to do so in a secure and tamper-proof way, via Chronicled’s block chain platform. The blockchain will serve as a central authority for registration of the IoT device, as well as verifying its identity (i.e., to ensure you’re not a hacker).

In conclusion, by leveraging publicly verifiable technology such as blockchain, we are able to build secure, interoperable ecosystems for IoT that will support the exponential growth of connected devices for years to come.

My question for you is, how will blockchain technology secure your business?


Struggling with IoT? Don’t know what your strategy should be, or not seeing the business results you need from your current strategy?

Schedule an  IoT Workshop for your team today! Half-day and full-day sessions are available, customized to your specific needs to help you to achieve your business’ objectives with the IoT best practices for the smart homesmart enterprise, and smart city solutions being implemented by top global companies and government agencies right now in Singapore, Dubai, and Germany. 

For more information, or to book your 2017 IoT Workshop in Israel, Canada, or the US, contact


By | 2017-12-07T15:59:35+00:00 December 7th, 2017|Categories: Artificial Intelligence, IoT|Tags: , , , , |0 Comments

About the Author:

Avrohom Gottheil
Avrohom helps businesses use intelligent IoT messaging to grow revenues and reduce costs. When's the next bus? How long's the check-in line? He enables companies to answer these questions.