British universities collaborate in the exploration of Internet of Things security solutions


nnnWrestling: The alliance of network security engineers from UK, Indian academia and related industries explores the possibility of providing a secure solution for Internet of Things medical data sharing applications in exploring the block chain architecture. The participants include the University of London City College, one of the world’s best Polytechnic Institute of Indian Institute of Technology. The cooperation background is some time ago famous WannaCry extortion software attack.n
nnTranslation: Annie_Xun
nUK, the Indian academy and related industry network security engineers to explore the possibility of providing a secure solution for Internet of Things (IOT) medical data sharing applications in exploring the block chain architecture.n
nUniversity of London Communications Department, University of London media report quoted the University of London City College (City, University of London) network engineering professor, Union member of the United Kingdom Muttukrishnan Rajarajan words:n
nn”Our federation explores how to protect the privacy of the block chain architecture for IoT medical data sharing applications, using attribute-based encryption (ABE) for the device to provide greater security.As IoT for a large number of devices to accumulate low-voltage, these The use of equipment is often affected by advanced security measures are not in place. “n
nnThe background of the study was the Wanna Cry blackmail attack on May 12, 2017, which seriously affected the British National Health Service, which had to run some emergency services during the attack.n
nIoT is a computing system, mechanical and digital equipment, physical, animal, human interconnection system, each have a unique identity, you can transfer data on the network, do not need people or people interact with the computer.n
nThe block chain is a distributed book technology (DTL) that preserves permanent tamper-resistant records. Block chain through the point-to-point network maintenance records, or information blocks, there is no central control, everyone in the network to share data control.n
nReferring to Professor Rajarajan’s words, IoT uses the block chain to have three main security advantages:n
nnThe sensor data generated by the IoT device will be rigorously verified by a large number of data miners in the block chain network, confirming its legitimacy before receiving, and eliminating some security attacks, such as data manipulation.n
nnnOnce the data is recognized, added to the block chain, it can not be intercepted. There is no centralization or storage server, so the trust of each node will come from the credibility.n
nnnIf there are malicious nodes to spread the wrong data, you can identify the data miners, the node’s reputation will be destroyed.n
nnProfessor Sudip Misra of the Indian Institute of Technology Kharagpur is also a member of the collaborative research project.n

Leave a Reply

Your email address will not be published. Required fields are marked *