The great physicist Albert Einstein once said, “The measure of intelligence is the ability to change.”
This makes me think that Einstein would have been a big proponent of extensibility had he ever written code – as opposed to his awesome decoding of the universe.
Who knows… there might be a parallel universe out there some place in space and time where criminal thoughts never come to mind. But back here on earth, in this version of the universe, cyber criminals and other bad actors seem to thrive. So we’ve dedicated years trying to secure computational devices – with special emphasis on the billions of devices that make up the Internet of Things.
We created our Atonomi Network to provide a security protocol and infrastructure to enable billions of IoT devices to have trusted interoperability for both data and commerce. Atonomi accomplishes this by building and deploying an ecosystem of participants designed to maintain decentralized consensus for device transactions on the Atonomi Network.
And a major design decision we made along the way was to create an extensible architecture so developers across IoT verticals could secure the vast realm of IoT devices ranging from healthcare and home automation systems, to smart-city infrastructure, to industrial sensors and controllers. When you look at the billions of IoT devices that have already been deployed and the billions more coming (Gartner estimates that the number of IoT devices will more than double to some 20.4 billion by 2020) the variety of use cases challenges the imagination.
From HVAC and building maintenance, to insurers and bankers, to automating the paper flow of a container of goods moving from one continent to another, smart contracts and autonomous devices communicating throughout a massively interconnected world will change the way business is conducted. Smart contracts and IoT will change much else about our lives.
At Atonomi, our goal is to provide layered IoT security through trusted immutable identity of devices as well and reputation tracking and machine learning to detect behavioral aberrations. The goal of protecting against hackers gaining control of the sensors, controllers, and other devices that regulate the operation of essential infrastructure is a big one, and essential to unleashing the power of IoT.
Creating Your Own with the SDK
Rather than attempting to become experts in every vertical within which IoT devices are deployed, we recognized that the intricacies of protecting a sensor mounted on a hydraulic pump might differ from the needs of a blood chemistry monitor sent home with patients to wear. This is why we are creating a software development kit (SDK) for original equipment manufacturers (OEMs) and original device manufacturers (ODMs).
Atonomi provides for free shared-source services for OEMs and ODMs, allowing them to easily participate in the Atonomi Network. Our SDK gives developers extensibility to help them meet security needs and considerations that may be unique to the IoT vertical in which they work. The SDK includes calls to Atonomi service layers – including our Identity Registration Service, Device Activation Service, Attributes Registration Service, Transaction Service, and Reputation Service. The SDK also supports the easy addition of other network calls to support the sending of high granularity, device-specific log data to third-party services.
By giving third-party developers the power to craft their own security solutions upon the foundation of the Atonomi Protocol and the Atonomi Network, we hope to create a more secure global IoT infrastructure.
We believe that IoT can never reach its full potential without an independent service that establishes immutable identity, handles reputation and trust, and allows autonomous devices to exchange payment for services.
This is why we are creating Atonomi.
Thanks for reading,
Rob Strickland attends TD Ameritrade's The Watch List...
The CENTRI Technology and Atonomi leadership attended Mobile World Congress 2019...
The future is fast approaching in the form of smart cities. But at the same time, a global horde of hackers are close behind, ready...
Read the entire blog from Vaughan Emery, Founder and CEO, Atonomi on Medium...
Earlier this summer a long-time Bluetooth Low Energy (BLE) key exposure vulnerability reared its ugly head again. For me, the event just...