Identity of Things (IDoT)

This article is a translation of the German IOTA Beginner’s Guide by Schmucklos.

In order for IoT to grow safely to its full potential we need to fundamentally change our thinking about machines / devices. Instead of perceiving them as lifeless fusions of metal and plastic for a specific purpose, we need to focus on seeing each device as its own identity with different attributes.

For example, a sensor should not only have its unique identifier, but also attributes such as: Who manufactured it, when it was used, what is its expected life cycle, who owns it now, what kind of sensor data does it collect and with what granularity, does it sell the data and if so, for how much? This is essential for an efficient way to index and enable machine economies and predictive maintenance.

Because the devices are connected to each other on the Internet, they are basically at the mercy of external attacks or unauthorized use. The abuse scenarios range from unauthorized reading and spying out of personal data to the execution of unwanted actions to sabotage and destruction of entire industrial plants. This is why IDoT also plays an important role in securing the connected world. If every device has its own ID, reputation systems can be set up, which are essential for anomaly and attack detection systems. By observing whether a device acts according to its ID or not, which indicates that malware is spreading, neighboring devices can quarantine it.

It is important that IDoT becomes the standard, as such an ID is necessary for as many devices as possible. One thing is for sure: IOTA’s technology will ensure that the attributes and reputation of the device are tamperproof.

Original source

Last Updated on 16. February 2021