All articles

How to Secure the Internet of Things with Blockchain

Secure the Internet of Things with blockchain

Interested in how to secure the internet of things with blockchain? 

You’ve come to the right place.

Besides all the profits to be made, innovating in blockchain solutions represents a chance to make a real difference to people’s quality of life. Here’re a few amazing case studies of companies who hired DevTeam.Space to build their software products:

  1. Dencenture – Blockchain Mobile App and Web Application
  2. Medicoin – Healthcare Blockchain-Based Web Application
  3. DDKOIN – Leading Cryptocurrency


Internet of Things (IoT)
How to secure IoT with blockchain: The problem of centralization
Secure IoT devices using blockchain
Create a trustworthy IoT environment
Prevent Physical Theft
My Final Thoughts

Internet of Things (IoT)

An infographic of the Internet of Things use cases

The Internet of Things (IoT) allows for the creation of networks of sophisticated smart devices such as phones, smart cars, and smart home appliances. The potential benefits of such networks are too many to list here, but examples include everything from allowing homes to learn their occupant‘s behavior patterns so that they can increasingly automate chores such as reordering food, etc., to allowing smart cars to be ready and waiting outside your door to drive to you to work in the morning.

Granted, these examples might be a little way off, but already a huge range of smart devices are available to consumers. There are roughly 9 billion smart devices of one type or another online today. This figure is set to rise to around 30 billion by 2020, which will equate to almost 3 smart devices per person in the world.

A key component of IoT is data. In order to operate, an IoT network must send and receive large amounts of sensitive data. One such example is the security access data that is required for the August Smart Lock. This smart lock allows homeowners to unlock their home just by using their phone, without the need for a key.

Naturally, homeowners need to be assured that no unauthorized person is going to be able to steal entry code data and gain access to their home. This means that the IoT network must be secure at all times. Not only that, data is often transferred between devices that have different administrators and data usage policies, thereby creating a challenging management environment that also requires close attention to data security.

According to an article published in eSecurity Planet, 48 Percent of U.S. Companies Using IoT Have Suffered Security Breaches. This is a staggering figure, particularly when we consider that this includes some of the biggest and most secure company networks in the world. The figure emphasizes the need for a new approach to data security.


An infographic showing how blockchain works

Blockchain has the potential to dramatically increase both the security and level of automation of certain data transactions. The technology allows for the creation of individual blocks of data in the form of a chain. As each new block is added to the last, it forms what is, in essence, a digital ledger containing all the information ever added to the blockchain.

Since the data on each new block is partly calculated from information held on the previous block in the blockchain, in order to alter a block, an unauthorized individual would have to change the information on all the blocks linked to it to prevent the change from being immediately noticed. In the case of a cryptocurrency blockchain, for example, this may well mean having to change every single block on the chain.

The really exciting thing about blockchain technology is that it operates as a peer-to-peer decentralized network. As such a network, blockchains don’t require any controlling party to function. This has enormous implications for many of the business processes we all rely on today.

More than any other example, bitcoin and has shown that it is possible to create blockchain-based solutions that allow us to circumnavigate powerful institutions, which until now have had a monopoly on these processes.

Another key factor in this decentralized approach is that all the peers or ’nodes‘ involved in the network must agree on whatever changes are to be made. So should a hacker or other unauthorized party attempt to make a change to the digital ledger without permission, the other nodes will resist this change and prevent the data from being altered.

The only way it would be possible for someone to alter the blockchain would be to gain control over the majority of the nodes on the network at the same time in order to successfully complete the change. When contemplating how difficult this would be just kept in mind that each node has its own unique access key code also.

Just to give you an idea of the enormity of the task, as of May 2016, Ethereum‘s network had 25,000 active nodes meaning that any attempt to alter data in this way would be next to impossible.

Key Characteristics of Blockchain:

  • Decentralized – No controlling power or point of failure.
  • Immutable – Ledgers can‘t be altered without the network agreeing to it.
  • Facilitates trustless transactions – Unalterable ledger means transactions can be made to unknown parties with the minimum of risk.
  • Distributed processing power – Decentralized nature means the network shares the load.

Advantages of Blockchain:

  • Increased trust
  • Removes the need for a controlling power
  • Better security
  • Complete records of all transactions

How to secure IoT with blockchain: The problem of centralization

Secure IoT devices using blockchain

IoT operates a distributed client/server model that requires an administrator to manage the network. This centralized authority is the weak point when it comes to IoT cybersecurity. To operate normally, IoT devices rely on this authority to determine how they behave.

If there is a breach of security at the central authority then the information being sent by the smart devices is largely at the mercy of the hackers. This makes attacking the central authority very appealing to cyber hackers as large amounts of data can be collected in one go.  A series of cyber-attacks occurred in 2017, many of which exploited this weakness and allowed hackers to make off with sensitive data relating to 100‘s of millions of American citizens.

Since the decentralized nature of blockchain technology would negate any central attack, hackers would have to target individual nodes on the network in order to try to obtain the data they want. In a blockchain network, smart devices are able to actively participate in validating transactions.

This means that the network would be able to guard against any hack by validating predetermined ’acceptable‘ behavior for any irregularities. Once a device on the network was identified as not behaving correctly, it could be isolated to prevent it from being used to access further sensitive data or being used to unlock a person‘s home, etc.

Create a trustworthy IoT environment

Blockchain ledgers require users to enter a unique key code in order to access the network. This means that all the interactions/transactions have accountability built-in.

Any changes made have to be signed and therefore can be traced back to whoever made them. Any unauthorized changes will be prevented by the network as none of the other nodes attached to the network will accept the change.

So when it comes to the supply chain industry, for example, smart devices could be used to track items for the entire length of the supply chain. Since items would be signed for at each step of the chain, tracking their progress could be done in real-time too. Any missing or delayed deliveries could be tracked in seconds. This would improve both the efficiency and reliability of any supply chain blockchain technology was applied to.

One such company to realize the enormous value of integrating blockchain into its supply chain management is Taiwanese company OwlTing. You can read more about their project to use blockchain technology to increase food safety here.

In the public domain, such a blockchain-based IoT system could, for example, be used in schools or universities to ensure pupils were in class at the appropriate times and even making sure they were doing their homework too. Since the parents could also be included in the school blockchain, they would also be able to view their children‘s progress via an authorized smart app.

The ability of teachers to leave feedback and report any wrongdoings would empower parents by allowing them to motivate/reward their children on a real-time basis. This kind of system could also finally signal the end of those dreary parent evenings that students, parents, and teachers alike all hate going to.

Prevent Physical Theft

Using blockchain to secure IoT deployments in this way would also help to tackle the physical theft of smart devices. A smart device that is either reported to the IoT blockchain network as being stolen or identified by the network as behaving according to a set of criteria that correlates as having been stolen, could immediately be quarantined by the network and have its important data forwarded to the police and owners, etc.

Information such as the smart devices’ current location and even secret pictures taken of the operator could be automatically sent to the nearest police officers without any need for 3rd party intervention.

The devices’ unique manufacturing number could also be shared with such organizations as the OS provider and other application platforms automatically, which would enable them to blacklist the device. This would make the current problem of thieves simply performing a factory reset and using the device for themselves a thing of the past.

My Final Thoughts

The application of blockchain into IoT networks is one of the most exciting long-term uses of this great new technology. Individuals, as well as businesses all around the globe, stand to benefit from more secure IoT networks. It will help secure all aspects of IoT use and allow everyone to feel more trust that their data is safe.

The enhanced security environment that blockchain facilitates will massively help to overcome people’s apprehensions when it comes to using an increasing number of smart devices in their daily lives.

Knowing that using a smart lock for your home is safer than using a physical key, for example, will greatly speed up the transition we all make to using such smart technology.

In the same way that self-driving cars promise to make driving part of what we now call ‘leisure time’, smart devices using blockchain technology will help automate many more aspects of our daily chores, leaving us all with more time to sit back and enjoy life.

Frequently Asked Questions

What is IoT?

IoT stands for Internet of Things. It is a network of interconnected smart devices that allow the user to benefit from cross functional control and features. An example is a child baby monitor that can be remote accessed via any authorized smart devices.

Is blockchain secure?

Blockchain is very secure provided that the blockchain code is of good quality and the data is encrypted. Since the network is decentralized and any changes require approval from 51% of the network, data is extremely hard to alter.

Can IoT be secured with blockchain?

Blockchain is the ideal solution for IoT networks since it removes control of the data from any single authority. Since IoT networks are for individual networks of devices, the decentralized nature of blockchain gives the user complete control over their data.


Hire Expert Developers

DevTeam.Space is a vetted community of expert dev teams supported by an AI-powered agile process.

Companies like Samsung, Airbus, NEC, and startups rely on us to build great online products. We can help you too, by enabling you to hire and effortlessly manage expert developers.

LinkedIn Facebook Twitter Facebook Messenger Whatsapp Skype Telegram