Category Archives: DAG

Auto Added by WPeMatico

Could Blockchain Solve IoT Security Bottlenecks?

Could Blockchain Solve IoT Security Bottlenecks?

In 1982, the idea of the internet of things (IoT) started with a soda vending machine that was connected to the internet, allowing the machine to report its inventory and whether the drinks were cold or not. This increased the efficiency of the vending machine, allowing a worker to be sent out whenever it was actually needed, and ensuring that the machine was always stocked with cold drinks.

Since then, IoT has expanded to integrate any device with internet or radio connectivity, and it is estimated that 8.6 billion devices are connected as of 2018. For example, via Apple Home, a person can control their air conditioning, heating, light, speakers, outlet, switches, windows, fans, humidifiers, air purifiers, security sensors, security cameras, locks, doorbells, and garage doors with an iPhone app. This technology has the potential to make someone’s life much easier, and it sounds like something from a futuristic sci-fi movie. However, there is a major caveat: security.

IoT security concerns

With everything in someone’s home connected to the internet, a hacker could theoretically gain access to everything in someone’s home. Imagine if a hacker who intends to rob someone’s house gains control of the garage door, windows, locks, security cameras and sensors. This hacker could literally watch via the camera and wait for a family to leave their house, and then open up the windows or garage door and turn off all the security sensors, and rob the house blind without being caught. Also, having cameras connected to IoT could allow a hacker to spy on someone, compromising the basic human need for privacy.

A real-life example of IoT being compromised by hackers is the Mirai botnet, which took control of cameras, home routers, and DVRs. This botnet was leveraged to perform DDoS attacks, and also led to device connectivity problems and the exposure of private data.

Imad Labbadi is the CEO of VeCap, a company that focuses on securing IoT powered smart homes. He says:

“There is insufficient protection, several devices from well-known companies and other vendors have serious breaches in their security systems: insufficient encryption, weak authentication requirements — for example, auto-login, possibility of external connections via VPN. All it takes is one unprotected device to compromise the security of your smart system or smart home. Hackers only need to find that one breaking point to bring down the whole network. It takes hackers less than a minute to get access to smart home devices, from phones and TVs to routers and consoles; all these machines are connected to the internet. Vast numbers of devices with zero-day vulnerabilities will be hacked as soon as the breaches become known before manufacturers will be able to update all vulnerable smart devices. Short-term thinking compromises long-term security.”

Blockchain to the rescue?

This security caveat has prevented widespread adoption of IoT. However, the security and encryption of blockchain technology have the potential to make it completely secure, which would allow it to reach its full potential and be used by people worldwide without fear of hackers.

Data stored in a properly built blockchain cannot be modified or deleted, nor accessed by anyone who does not have permission. This is because blockchain technology is built with powerful cryptography. Smart contracts on the blockchain can then be used to run IoT devices.

Cyber-Trust is a blockchain-based platform which focuses on securing the IoT. It uses HyperLedger Fabric from IBM, which is a blockchain that can handle up to 100,000 transactions per second, quite necessary for global scalability considering the number of IoT devices is expected to reach 22 billion by 2024. The updated history of an IoT device’s integrity state is stored in the blockchain, which minimizes the risk of cyber attacks by ensuring that devices have the most up to date security software. Also, in general, all IoT device actions are performed via blockchain smart contracts, which prevents hackers from accessing the devices.

Another company which is using blockchain technology to secure IoT devices is VeCap. Smart contracts are used to secure all internal communications within a home IoT system, and all data is stored on the blockchain to prevent hacking.

The need for securing the internet of things (IoT) becomes even more essential due to industrial and government applications. For example, the power company CenterPoint has 7 million customers and they have installed digital meters and internet connected sensors for a 5,000 square mile area around Houston, Texas. This allowed CenterPoint to restore power more rapidly than usual after Hurricane Harvey, but it is essential that this connected grid of devices is secured from hackers. Also, medical devices in hospitals, industrial robots, and self-driving cars use the IoT, and it could be life-threatening and costly if hackers compromised those systems.

AI and computing

Hewlett Packard has invested USD 4 billion into edge computing, which uses a combination of blockchain technology and artificial intelligence (AI) to strengthen industrial uses of IoT. For example, X-ray machines across the US download data to the blockchain every 10 minutes or so, ensuring the data and the devices are secure, and then the data is analyzed by AI to help identify diseases like tuberculosis and pneumonia. This combination of blockchain technology and IoT is being called swarm computing.

Perhaps the greatest endeavor which has combined blockchain technology with the internet of things (IoT) is IOTA, which has a cryptocurrency called MIOTA that has a market cap of nearly USD 1 billion and is ranked #18 on CoinMarketCap (at time of writing). IOTA’s developers foresee that global data pipelines will inevitably become congested, preventing IoT devices from communicating and storing all the data they produce. The IOTA network prevents that problem by funneling all of this IoT traffic into their blockchain, which has the additional effect of providing higher security and decentralizing the network, so centralized points of failure are eliminated.

IOTA uses a unique variation of blockchain called Directed Acyclic Graph (DAG), and in the specific case of IOTA this DAG blockchain is nicknamed “The Tangle”. With a classical blockchain such as Bitcoin, all previous blockchain history is required in order to issue a new transaction. With DAG however, a node only needs two previous transactions in order to issue a new transaction. This makes IOTA fast and efficient while providing the same cryptographic security as a classical blockchain.

Aside from providing a medium which can handle the storage and communication of data for all IoT devices, IOTA also creates a new system where individuals and machines pay micro-transactions for exactly what bandwidth they consume and when they consume it instead of subscription models. Also, individuals maintain ownership over their data, and they can sell their data to make money, which has applications for the big data industry.

Thus, the proliferation of IoT, which has the potential to revolutionize the way people live, has encountered a roadblock due to security concerns. However, blockchain technology appears to be the solution, and companies and organizations like IOTA, Hewlett Packard, CyberTrust, and VeCap have already successfully integrated blockchain technology with IoT, which prevents hackers from accessing IoT devices.

This merger of blockchain technology and IoT is paving the way for a future where all the devices in the world are connected, leading to a more efficient life and a more efficient economy. is committed to unbiased news and upholding journalistic codes of ethics. For more information please read our Editorial Policy here.

Follow on Twitter: @bitcoinnewscom

Telegram Alerts from

Image Courtesy: Pixabay

The post Could Blockchain Solve IoT Security Bottlenecks? appeared first on

Sidetangle Attack on IOTA Reveals DAG Susceptibility

The IOTA network, referred to as the tangle, has been under siege recently by a sidetangle, which is a parasitic chain of transactions produced by a hacker. The sidetangle has been stitched to the maintangle, causing nodes to crash and slowing down the entire network. This has revealed a susceptibility for directed acyclic graph (DAG) based cryptocurrencies.

IOTA is the most popular and widely used DAG cryptocurrency, with a market cap of USD 2.7 billion and trading volume in excess of USD 50 million per day. Most cryptocurrencies use a blockchain, which requires adding transactions to a chain of all previous transactions. Each Bitcoin node must use the full transaction history of Bitcoin to confirm new transactions. With IOTA’s DAG, users only need to verify two previous transactions, which is deemed far more computationally efficient and allows for a fee-free system.

Apparently, the nature of IOTA’s transaction verification system can be exploited by hackers by creating a sidetangle, which is considered a parasite chain. A sidetangle is built by selecting tips that only reference themselves, making the transactions unlikely to confirm. The hacker can create millions of transactions like this, which forms the sidetangle, and these transactions never confirm.

The sidetangle would normally stay distinct from the maintangle and have no effect, but hackers have built software which stitches the sidetangle to the main tangle. This results in nodes including the sidetangle in their database. The sidetangle is filled with so many transactions that the nodes crash, according to Ralf Rottman who is on the IOTA Foundation Board of Directors. Ralf Rottman says, “People continually try to attack the tangle, and we learn from these attacks to make it more resilient over time. Remeber, IOTA is an early-stage project and these kinds of events are par for the course. As long as someone can get such a large percentage of hash power, they can do whatever they like. This is true for any DLT, and the exact reason we have the coordinator ensuring that tokens are safe during this early period.”

Head of engineering at the IOTA Foundation, Edward Greve, says, “The current sidechain and syncing issues are a new phenomenon for the Tangle, and we’re taking the opportunity to acquire data about how the Tangle is responding and performing. We will keep you posted and share new information as we are able to. Please understand, these new phenomena are not always obvious, and investigation takes time.”

No IOTA has been lost from the sidetangle attack but nodes crashing has slowed the network and reveals a general susceptibility for DAG cryptocurrencies that needs to be addressed. This is somewhat similar to a distributed denial of service (DDoS) attack. No solution for sidetangles has been formulated yet.


Follow on Twitter at

Telegram Alerts from at

Image Courtesy: Pixabay

The post Sidetangle Attack on IOTA Reveals DAG Susceptibility appeared first on