(The Conversation is an independent and nonprofit source of news, analysis and commentary from academic experts.)
<a target=”—blank” href=”https://theconversation.com/profiles/nir-kshetri-227377″>Nir Kshetri</a>, <a target=”—blank” href=”http://theconversation.com/institutions/university-of-north-carolina-greensboro-2069″>University of North Carolina – Greensboro</a>
(THE CONVERSATION) The world is full of connected devices – and more are coming. In 2017, there were an <a target=”—blank” href=”https://www.imeche.org/news/news-article/smart-world-lockdown-preparing-for-a-truly-connected-world”>estimated 8.4 billion</a> internet-enabled thermostats, cameras, streetlights and other electronics. By 2020 that number could exceed 20 billion, and by 2030 there could be <a target=”—blank” href=”https://www.cisco.com/c/r/en/us/internet-of-everything-ioe/internet-of-things-iot/index.html”>500 billion</a> or more. Because they’ll all be online all the time, each of those devices – whether a voice-recognition personal assistant or a pay-by-phone parking meter or <a target=”—blank” href=”http://blogs.wsj.com/cio/2013/04/05/cyber-attackers-target-building-management-systems/”>a temperature sensor</a> deep in an industrial robot – will be vulnerable to a cyberattack and could even be part of one.
Today, many “smart” internet-connected devices are made by large companies with well-known brand names, like Google, Apple, Microsoft and Samsung, which have both the technological systems and the marketing incentive to fix any security problems quickly. But that’s not the case in the increasingly crowded world of <a target=”—blank” href=”https://www.sciencealert.com/this-crazy-cyber-attack-shows-that-even-our-light-bulbs-aren-t-safe-from-hackers”>smaller internet-enabled devices</a>, like light bulbs, doorbells and even packages shipped by UPS. Those devices – and their digital “brains” – are typically made by unknown companies, many in developing countries, without the funds or ability – or the brand-recognition need – to incorporate strong security features.
Insecure “internet of things” devices have already <a target=”—blank” href=”http://www.nytimes.com/2016/10/22/business/internet-problems-attack.html?%E2%80%94r=0″>contributed to major cyber-disasters</a>, such as the <a target=”—blank” href=”http://www.nbcnewyork.com/news/local/Major-Websites-Taken-Down-by-Internet-Attack-397905801.html”>October 2016 cyberattack on internet routing company Dyn</a> that took down more than <a target=”—blank” href=”https://www.rt.com/usa/363714-ddos-dns-attacks-hackers/”>80 popular websites and stalled internet traffic</a> across the U.S. The solution to this problem, in my view as a scholar of <a target=”—blank” href=”http://www.tandfonline.com/doi/abs/10.1080/01436597.2016.1191942″>“internet of things” technology</a>, <a target=”—blank” href=”https://theconversation.com/can-blockchain-technology-help-poor-people-around-the-world-76059″>blockchain systems</a> and <a target=”—blank” href=”https://theconversation.com/after-the-nsa-hack-cybersecurity-in-an-even-more-vulnerable-world-64090″>cybersecurity</a>, could be a new way of tracking and distributing security software updates using blockchains.
Making security a priority
Today’s big technology companies work hard to keep users safe, but they have set themselves a daunting task: Thousands of complex software packages running on systems all over the world will <a target=”—blank” href=”https://theconversation.com/what-are-software-vulnerabilities-and-why-are-there-so-many-of-them-77930″>invariably have errors</a> that make them vulnerable to hackers. They also have <a target=”—blank” href=”https://www.nytimes.com/2016/09/29/technology/yahoo-data-breach-hacking.html”>teams of researchers and security analysts</a> who try to identify and fix flaws before they cause problems.
When those teams find out about vulnerabilities (whether from their own or others’ work, or from users’ reports of malicious activity), they are well positioned to program updates, and to <a target=”—blank” href=”https://theconversation.com/the-petya-ransomware-attack-shows-how-many-people-still-dont-install-software-updates-77667″>send them out to users</a>. These companies’ computers, phones and even many software programs connect periodically to their manufacturers’ sites to check for updates, and can <a target=”—blank” href=”https://support.apple.com/en-sg/HT204204″>download and even install them automatically</a>.
Beyond the staffing needed to track problems and create fixes, that effort requires enormous investment. It requires software to respond to the automated inquiries, storage space for new versions of software, and network bandwidth to send it all out to millions of users quickly. That’s how people’s iPhones, PlayStations and copies of Microsoft Word all stay fairly seamlessly up to date with security fixes.
None of that is happening with the manufacturers of the next generation of internet devices. Take, for example, <a target=”—blank” href=”http://www.xiongmaitech.com/en/”>Hangzhou Xiongmai Technology</a>, based near Shanghai, China. Xiongmai <a target=”—blank” href=”http://qz.com/819391/a-collision-of-chinese-manufacturing-globalization-and-consumer-ignorance-could-ruin-the-internet-for-everyone/”>makes internet-connected cameras and accessories</a> under its brand and <a target=”—blank” href=”https://www.flashpoint-intel.com/blog/cybercrime/when-vulnerabilities-travel-downstream/”>sells parts to other vendors</a>.
Many of its products – and those of many other similar companies – contained administrative passwords that were <a target=”—blank” href=”http://www.wsj.com/articles/security-experts-question-chinese-webcam-makers-response-to-cyberattack-1477404426″>set in the factory</a> and were difficult or impossible to change. That left the door open for hackers to connect to Xiongmai-made devices, enter the preset password, take control of webcams or other devices, and <a target=”—blank” href=”https://www.wsj.com/articles/security-experts-question-chinese-webcam-makers-response-to-cyberattack-1477404426″>generate enormous amounts of malicious internet traffic</a>.
When the problem – and its global scope – became clear, there was <a target=”—blank” href=”http://www.wsj.com/articles/security-experts-question-chinese-webcam-makers-response-to-cyberattack-1477404426″>little Xiongmai and other manufacturers</a> could do to update their devices. The ability to prevent future cyberattacks like that depends on creating a way these companies can quickly, easily and cheaply issue software updates to customers when flaws are discovered.
A potential answer
Put simply, a blockchain is a transaction-recording computer database that’s <a target=”—blank” href=”https://theconversation.com/can-blockchain-technology-help-poor-people-around-the-world-76059″>stored in many different places at once</a>. In a sense, it’s like a public bulletin board where people can post notices of transactions. Each post must be <a target=”—blank” href=”http://www.lexology.com/library/detail.aspx?g=cf0c71c5-055a-4d57-92f8-c75d1e282414″>accompanied by a digital signature</a>, and can never be changed or deleted.
I’m not the only person suggesting using blockchain systems to <a target=”—blank” href=”https://cointelegraph.com/news/the-unbreachable-data-made-possible-with-bitcoin-ethereum-blockchain-heres-how”>improve internet-connected devices’ security</a>. In January 2017, a <a target=”—blank” href=”http://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/”>group including U.S. networking giant Cisco</a>, German engineering firm Bosch, Bank of New York Mellon, Chinese electronics maker Foxconn, Dutch cybersecurity company Gemalto and a number of blockchain startup companies formed to <a target=”—blank” href=”http://www.coindesk.com/cisco-bosch-reveal-new-details-iot-blockchain-projects/”>develop just such a system</a>.
It would be available for device makers to use in place of creating their own software update infrastructure the way the tech giants have. These smaller companies would have to program their products to check in with a blockchain system periodically to see if there was new software. Then they would securely upload their updates as they developed them. Each device would have a strong cryptographic identity, to ensure the manufacturer is communicating with the right device. As a result, device makers and their customers would know the equipment would efficiently keep its security up to date.
These sorts of systems would have to be easy to program into small devices with limited memory space and processing power. They would need <a target=”—blank” href=”http://doi.org/10.5220/0006353903440349″>standard ways to communicate and authenticate updates</a>, to tell official messages from hackers’ efforts. Existing blockchains, including <a target=”—blank” href=”https://medium.com/@jonaldfyookball/why-every-bitcoin-user-should-understand-spv-security-520d1d45e0b9″>Bitcoin SPV</a> and <a target=”—blank” href=”https://github.com/ethereum/wiki/wiki/Light-client-protocol”>Ethereum Light Client Protocol</a>, look promising. And blockchain innovators will continue to find better ways, making it even easier for billions of “internet of things” devices to check in and update their security automatically.
The importance of external pressure
It will not be enough to develop blockchain-based systems that are capable of protecting “internet of things” devices. If the devices’ manufacturers don’t actually use those systems, everyone’s cybersecurity will still be at risk. Companies that make cheap devices with small profit margins, so they won’t add these layers of protection without help and support from the outside. They’ll need technological assistance and pressure from government regulations and consumer expectations to make the shift from their current practices.
If it’s clear their products won’t sell unless they’re more secure, the unknown “internet of things” manufacturers will step up and make users and the internet as a whole safer.
This article was originally published on The Conversation. Read the original article here: <a target=”—blank” href=”http://theconversation.com/using-blockchain-to-secure-the-internet-of-things-90002″>http://theconversation.com/using-blockchain-to-secure-the-internet-of-things-90002</a>.
<div><img src=”https://counter.theconversation.com/content/90002/count.gif?distributor=ap” width=”1″ height=”1″ /></div>