Case Studies Security for Edge Computing and Mesh Network

Security for Edge Computing and Mesh Network

Security for Edge Computing and Mesh Network -  Industrial IoT Case Study
Application Infrastructure & Middleware - Blockchain
Cybersecurity & Privacy - Network Security

An enterprise security client wanted to develop a security product to address decentralized IoT security. Numerous reports and articles have been written on the security vulnerability of Industrial Internet of Things (IoT), smart cities, smart buildings, smart home automation, and healthcare. The standard best practices and solutions for cloud security and application security do not adequately address the specific nuances of the Internet of Things, especially for edge-to-edge computing and networking.

Read More
An International Security Company
Read More
Read More

Amyx+ worked with the leading security and privacy firm to explore how to secure messaging and transactions in a trustless peer-to-peer decentralized world, regardless of connected devices, e.g., desktops, laptops, smartphones, tablets, wearables, IoT, M2M or any connected devices. First, Amyx+ developed a masterless P2P network backbone to handle data, CPU, storage, caching, and bandwidth sharing in an open decentralized, near real-time resource sharing platform. The decentralized network is able to handle persistence/ caching nodes, routing nodes, compute nodes, and composite nodes. Moreover the consensus and coordination is handled in a dynamic, ad hoc fashion, i.e., knowing when some nodes are dead and others are still alive and making local decision and assigning nodes to active nodes. Second, on top of the P2P decentralized network backbone, Amyx+ then implemented blockchain technologies to secure signed updates and patches for distribution and installation automatically through the network. Blockchain ensures the lineage of signing nodes descending from original trusted nodes. All participants on the network are registered and signed with blockchain to prevent imposter nodes from joining. Consensus- and analytics-based system was developed to filter and prevent unauthorized nodes from cloning other existing nodes to join the network.

Read More
Data Security, Network Coverage, Number Of Connected Devices, Security and access
Read More
[Data Management - Connectivity Stability]
In simulated testing, the network was able to handle massive video content, messaging and communication
[Data Management - Connectivity Stability]
The network showed strong resiliency to self-heal and continue even in various failure scenarios
[Data Management - Cyber Security]
Imposter nodes were detected and prevented from joining the network

Quantitative testing is still in progress

Download PDF Version
test test