Download PDF
Case Studies > Security for Edge Computing and Mesh Network

Security for Edge Computing and Mesh Network

 Security for Edge Computing and Mesh Network - IoT ONE Case Study
Technology Category
  • Application Infrastructure & Middleware - Blockchain
  • Cybersecurity & Privacy - Network Security
The Challenge

An enterprise security client wanted to develop a security product to address decentralized IoT security. Numerous reports and articles have been written on the security vulnerability of Industrial Internet of Things (IoT), smart cities, smart buildings, smart home automation, and healthcare. The standard best practices and solutions for cloud security and application security do not adequately address the specific nuances of the Internet of Things, especially for edge-to-edge computing and networking.

About The Customer
An International Security Company
The Solution

Amyx+ worked with the leading security and privacy firm to explore how to secure messaging and transactions in a trustless peer-to-peer decentralized world, regardless of connected devices, e.g., desktops, laptops, smartphones, tablets, wearables, IoT, M2M or any connected devices. First, Amyx+ developed a masterless P2P network backbone to handle data, CPU, storage, caching, and bandwidth sharing in an open decentralized, near real-time resource sharing platform. The decentralized network is able to handle persistence/ caching nodes, routing nodes, compute nodes, and composite nodes. Moreover the consensus and coordination is handled in a dynamic, ad hoc fashion, i.e., knowing when some nodes are dead and others are still alive and making local decision and assigning nodes to active nodes. Second, on top of the P2P decentralized network backbone, Amyx+ then implemented blockchain technologies to secure signed updates and patches for distribution and installation automatically through the network. Blockchain ensures the lineage of signing nodes descending from original trusted nodes. All participants on the network are registered and signed with blockchain to prevent imposter nodes from joining. Consensus- and analytics-based system was developed to filter and prevent unauthorized nodes from cloning other existing nodes to join the network.

Data Collected
Data Security, Network Coverage, Number Of Connected Devices, Security and access
Operational Impact
  • [Data Management - Connectivity Stability]
    In simulated testing, the network was able to handle massive video content, messaging and communication
  • [Data Management - Connectivity Stability]
    The network showed strong resiliency to self-heal and continue even in various failure scenarios
  • [Data Management - Cyber Security]
    Imposter nodes were detected and prevented from joining the network
Quantitative Benefit
  • Quantitative testing is still in progress

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.