www.extremenetworks.com Open in urlscan Pro
104.154.197.154  Public Scan

Submitted URL: http://go.extremenetworks.com/NjQxLVZNVi02MDIAAAGAgGCvrRbzwY5AaKFoZRz0K3Bv9uMDjDXWGpJL4Us2E_vlYEl_7TbnFGivuLmZrIRoHIAtWx4=
Effective URL: https://www.extremenetworks.com/extreme-networks-blog/blockchain-for-smart-communities-infrastructure/?utm_campaign=22_000_Block...
Submission: On November 04 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form id="mktoForm_2751" __bizdiag="196388259" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 229px;">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoRound .mktoButton {
      color: #fff;
      border: 1px solid #a3bee2;
      -webkit-border-radius: 5px;
      -moz-border-radius: 5px;
      border-radius: 5px;
      background-color: #779dd5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
      background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
      background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
      background-image: linear-gradient(to bottom, #779dd5, #5186cb);
      padding: 0.4em 1em;
      font-size: 1em;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
      outline: none;
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
      background-color: #5186cb;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
      background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
      background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
      background-image: linear-gradient(to bottom, #5186cb, #779dd5);
    }
  </style>
  <div class="mktoTemplateBox">Thank you for subscribing!<br><br><em>You can adjust/withdraw your consent at any time by
      <a href="https://learn.extremenetworks.com/UnsubscribePage.html" title="https://learn.extremenetworks.com/UnsubscribePage.html">clicking on this link</a>.</em><br><br></div><input type="hidden" name="formid"
    class="mktoField mktoFieldDescriptor" value="2751"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="641-VMV-602">
</form>

<form __bizdiag="313041014" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

Text Content

Solutions
 * Cloud Managed Networking
 * Applications
 * Service Provider
 * Switching
 * Wireless
 * Routing

Services
 * Training & Courses
 * Maintenance Services
 * Premiere Services
 * Professional Services
 * Managed Services

Learn
 * Customer Stories
 * Academy
 * Webinars
 * Blogs
 * Guides
 * Events
 * Analyst Reports
 * At a Glance
 * Request a Demo

Support
 * Support Portal
 * Knowledge Base
 * Documentation
 * Policies & Warranties
 * Community
 * End of Sale

Partners
 * Partner Portal Login
 * Find a Reseller
 * Technology Partners
 * Become a Reseller
 * Find a Distributor
 * Consultant Relations Program

 * Demo
 * Quote
 * Chat
 * Contact

 *  * AUSTRALIA
   
    * CHINA
   
    * FRANCE
   
    * GERMANY
   
    * ITALY
   
    * JAPAN
   
    * KOREA
   
    * LATIN AMERICA
   
    * META
   
    * NETHERLANDS
   
    * NORDICS & EASTERN EUROPE
   
    * POLAND
   
    * RUSSIA
   
    * SPAIN
   
    * TURKEY
   
    * UNITED KINGDOM

 *  * AUSTRALIA
   
    * CHINA
   
    * FRANCE
   
    * GERMANY
   
    * ITALY
   
    * JAPAN
   
    * KOREA
   
    * LATIN AMERICA
   
    * META
   
    * NETHERLANDS
   
    * NORDICS & EASTERN EUROPE
   
    * POLAND
   
    * RUSSIA
   
    * SPAIN
   
    * TURKEY
   
    * UNITED KINGDOM

 *  * EXTREMECLOUD™ IQ
   
    * EXTREMECLOUD™
   
    * PARTNERENGAGE
   
    * SUPPORT PORTAL

 * Solutions
   
   PRODUCTS
   
    * CLOUD MANAGED NETWORKING
   
    * APPLICATIONS
   
    * SERVICE PROVIDER
   
    * SD-WAN
   
    * SWITCHING
   
    * WIRELESS
   
    * ROUTING
   
   SERVICES
   
    * MAINTENANCE SERVICES
   
    * PREMIER SERVICES
   
    * PROFESSIONAL SERVICES
   
    * MANAGED SERVICES
   
   INFINITE ENTERPRISE
   
   INFINITELY DISTRIBUTED
   CONSUMER-CENTRIC
   AT SCALE

 * Learn
   
   LEARN
   
    * CUSTOMER STORIES
   
    * EXTREME ACADEMY
   
    * TRAINING AND COURSES
   
    * WEBINARS
   
    * BLOGS
   
    * GUIDES
   
    * EVENTS
   
    * ANALYST REPORTS
   
    * AT-A-GLANCE
   
    * REQUEST A DEMO
   
   SADDLE UP AND GET READY FOR WI-FI 6E – EVERYTHING IS BIGGER IN 6 GHZ!
   
   A TECHNICAL DEEP-DIVE WEBINAR

 * Support
   
   SUPPORT
   
    * SUPPORT PORTAL
   
    * KNOWLEDGE BASE
   
    * DOCUMENTATION
   
    * POLICIES & WARRANTIES
   
    * COMMUNITY
   
    * END OF SALE

 * Partners
   
   PARTNERS
   
    * PARTNER PORTAL LOGIN
   
    * FIND A RESELLER
   
    * TECHNOLOGY PARTNERS
   
    * BECOME A RESELLER
   
    * FIND A DISTRIBUTOR
   
    * CONSULTANT RELATIONS PROGRAM





‹ Blog ‹ Mobility


BLOCKCHAIN FOR SMART COMMUNITIES & INFRASTRUCTURE

Ed Koehler Distinguished Principal Engineer Published 14 Oct 2021
 * 
 * 
 * 
 * 

This is the fourth in a series of blogs dedicated to discussing the future of
smart communities and infrastructure in our modern society.

Unless you live in a cave or under a rock, you have likely heard of a form
of cryptocurrency called Bitcoin (BTC). Or perhaps you have read about other
alternative cryptocurrencies (altcoins) such as Ethereum (ETH) or Dogecoin
(DOGE). However, you might not know is that these currencies are built on a
technology known as blockchain. Even if you are aware of blockchain, you might
not grasp the immense importance of blockchain technology in the security of
information storage and information movement. In other words, blockchain has
many applications well beyond cryptocurrency. For example, smart cities can use
blockchain technology to exchange data between network participants at a high
degree of trust and transparency without requiring a central administrator.
Smart cities have a wide range of stakeholders, and the exchange of data among
them is essential within a shared urban infrastructure.

In this blog, I will use cryptocurrency to explain blockchain technology;
however, before I do that, I need to tease out the difference between hashing
and encryption in cryptography. It’s important to understand the subtle but
profound differences between the two.

The ‘key’ is the difference

At a higher level, the difference is actually quite simple. Encryption is a
reversible mathematical process. Hashing is not and instead is a one-way
mathematical process. We could leave it at that, but we would not do justice to
the subject. Both encryption and hashing utilize a secret code called a cipher
(also known as a cypher), although for different reasons. Ciphers are, in
essence, a mathematical process that converts cleartext data
into cryptographic data. One of the main differences with encryption is that in
order to provide a reversible function we require another element commonly
referred to as the key. When using a symmetric key, both the encrypting and
decrypting parties share the same key. Instead of using a single shared key,
asymmetric encryption methods use a pair of keys such as the well-known Public
Key Infrastructure (PKI).



Figure 1 – Encryption

Figure 1 depicts two use cases for encryption of content. You can see a virtual
private networking (VPN) use case that protects data in motion. Note the usage
of the key to provide for both encryption and decryption of the content. Also,
note that the PC will use its own private key (in the case of PKI) to encrypt
the data which the VPN gateway would use the PC’s public key to decrypt the
content, hence the term asymmetric keys. Note also that the PC could have an
encrypted disk which provides for the protection of data at rest. A symmetric
key is used internally within the system to provide access to the data storage
in the clear.

But this blog is not about encryption and instead is more so about hashing.
While encryption can provide data privacy, it cannot provide assurance of data
integrity. That is where hashing comes in. Hashing uses a one-way cipher to
create a standard-length cryptographic string. I mention the standard length
because the string is always the same length regardless of the length or volume
of the content.



Figure 2 – Hashing

Figure 2 illustrates the use case of hashing. In this instance, we have a file
server that is providing data as a secure file set. The server will run a
standard hashing algorithm such as SHA-256 and generate a hash string that
represents the data. The user PC downloads both the file set as well as the hash
string. Using the same algorithm, the user PC can validate that the content has
not been altered, and as a result, the integrity of the data is assured. There
are many other uses for hashing, such as digital signing to provide for the
integrity of origin.

Keep in mind that encryption and hashing are not mutually exclusive. As a simple
example, the user downloading the file and hash string could be using an
encrypted VPN tunnel and store the downloaded code on the encrypted drive. The
hashing provides the integrity of the data and its signing. Encryption provides
for the protection of the data in transit as well as in storage. Wi-Fi
communications also use both encryption and hashing. The payload of 802.11 data
frames can be encrypted by a transmitting radio and decrypted by the receiver.
Additionally, multiple data integrity hash capabilities are used for Wi-Fi
transmissions to ensure the data is not altered in while in transit.

Blockchain

Blockchain is essentially an evolved form of hashing. In simple terms, it is a
content ledger system that can be either closed or open. Blockchain is not a new
technology and has been around since the mid to late 1990s, with Bitcoin only
coming into existence in 2009. Blockchain is based on the concept of a
distributed ledger, available to all parties in a given system. The ledger
entries are known as blocks, and transactions are linked together by the chain,
hence the technologies title. The integrity of the blocks and chains is assured
by the use of hashing, typically SHA-256. As a result, the chain becomes
immutable. Money is the most accessible way to understand a blockchain ledger
system. However, this article is not about cryptocurrencies.

Figure 3 shows an example of a closed or centralized ledger environment. Note
that there is a central authority for the control and management of the ledger.
In this case, it could be a bank. We have five parties in the example. Starting
with ‘A’, we see the allocation of ten dollars. In turn, ‘A’ then gives five
dollars to ‘B’ and so forth with different subsets of amounts to ‘C’ and ‘D’.
All of this syncs with the ledger. But as ‘A’ attempts to send fifteen dollars
to ‘E’, the ledger triggers it as an invalid transaction. Note that the central
authority is the one that denies the transaction.



Figure 3 – Blockchain centralized ledger

Most cryptocurrency utilizes an open ledger system due to the need for scale and
independence. All parties hold the last updated copy of the ledger. Due to the
immutability of the blocks and chains, any modification attempt will result in a
calculation error. These key nodes are referred to as bit miners. The bit miners
validate where the modification occurred and whether it should be allowed into
the ledger. Various parties will ‘vote’ according to their latest ledger
entries. This distributed participation establishes the reputation within the
chain ecosystem. In the example of Figure 4, transactions are validated by these
voting methods to synchronize the ledger so that all parties can agree. Notice
that the transactions are validated without a central manager; however, it comes
at the cost of computation.



Figure 4 – Bit Miners

So how can we use blockchain in smart cities and their underlying
infrastructure? Although open ledger systems support a cryptocurrency economy,
blockchain in smart infrastructure generally requires closed ledger
environments, particularly for critical systems. For example, the use of
blockchain to continually validate voltage usage measurements at various points
within the power grid. Or the condition of water levels at a reservoir.

Critical data needs to have two things. First, the data requires a digital
signing for a root of origin to the chain. Second, the data points need to be
assured by the use of a hash of the content. Figure 5 depicts a close-up of the
structure of a block as well as a chain sequence. Note how the open (non-hashed)
data is embedded within the block. The initial block is generated by signing a
unique starting sequence to the hash. Each hash sequence in the chain is then
mathematically linked to the nonce value and the ledger contents. They must
match the starting sequence. By using these sequenced calculations, any changes
to the chain are automatically detected. In some cases, such as a detected
identity modification, the chain might be made invalid altogether.

 

Figure 5 – Blockchaining

A chain of custody is created by linking the chain to the digital signing of the
participating systems or parties. Figure 5 illustrates that as the data moves
through different systems, the content of the ledger is updated with the
generation of a new hash as well as a signing of the block within the chain.
This creates a blockchain environment that assures data integrity, the root of
origin of the data, and the data history. Blockchain establishes a chain of
custody that becomes immutable, which means that it cannot be changed or
modified in any way. Only added to.

There are numerous use cases for blockchain in smart cities. For example, the
availability of more user-friendly services is one of the expected benefits of
smart cities. One of the services is mobility as a service (MaaS), which
seamlessly links multiple transportation systems. There is a push to use
blockchain to make MaaS a reality. It may be possible to use blockchain
technology to provide the public and the waste collection service with real-time
information about containers so that they are always informed of their status.
As previously mentioned, blockchain provides assurance of the data integrity of
critical infrastructure systems such as electrical grids and water resource
management.

Blockchain-based smart contracts might be used to trade surplus electricity
automatically between solar-powered homes and other grid members. These smart
contracts allow multiple signing parties to agree on the legal text within the
ledger and sign appropriately within the chain. A smart contract becomes
immutable, and all parties can refer to it at any time in the future. This is a
less intuitive way of using the technology: on recording history. By putting
events into the chain, the story becomes immutable. It can’t be rewritten.

Another example is its value in supply chain management. A product is signed
into the chain, allowing for consistency, and tracking as it moves from the
source through the distribution and is eventually available to the consumer.
Using blockchain for supply chain management applies to any type of product,
including food perishables, to ensure the chain of custody and holding time,
thus indicating freshness. And, of course, blockchain can also be used in the
code development process to ensure the integrity of the code as it moves between
engineering teams before it becomes a software product.

There are many more uses for blockchain technologies, just as there are many
more types of blockchains; I have only covered just a few of them in this blog.
But by now, it should be evident that encryption, hashing, and blockchain
technologies can work hand in hand in providing protection, integrity, and chain
of custody for our data. As we move forward into a digitally transformed
society, these technologies can assist us in moving, storing, and using data in
smart communities and infrastructure.

 * Posted in
 * Mobility
 * OCTO
 * Thought Leadership

 * 
 * 
 * 
 * 


GET THE LATEST STORIES SENT STRAIGHT TO YOUR INBOX!

Thank you for subscribing!

You can adjust/withdraw your consent at any time by clicking on this link.




RELATED ENTERPRISE STORIES

A Familiar Way of Doing Business: An Interview with Roberto Rodríguez Torres
Extreme Networks Named as One of Inc.’s Best-Led Companies
Can We Stop Comparing 5G with Wi-Fi 6?
Enabling the Future – Extreme’s Intern Program
How far will Wi-Fi 6E travel in 6 GHz?
A Familiar Way of Doing Business: An Interview with Roberto Rodríguez Torres
Extreme Networks Named as One of Inc.’s Best-Led Companies
Can We Stop Comparing 5G with Wi-Fi 6?
Enabling the Future – Extreme’s Intern Program
How far will Wi-Fi 6E travel in 6 GHz?
A Familiar Way of Doing Business: An Interview with Roberto Rodríguez Torres

TOPICS

 * Access Control
 * Automation
 * Data
 * Enhanced User Experience
 * Extreme Connect
 * Fabric Connect
 * Infinite Enterprise
 * Mobility
 * Network Packet Broker
 * Partner Ecosystem
 * Routing
 * Shortest Path Bridging

 * AI & ML
 * Cloud
 * Digital Transformation
 * Events
 * Extreme Team
 * Improve Efficiency
 * Infographic
 * Network Fabrics
 * News
 * Partners
 * Security
 * Switching

 * Analyst Perspective
 * Customer Success
 * Drive Top Line
 * Executive Viewpoint
 * Fabric
 * Industry Trends
 * IoT
 * Network Management
 * OCTO
 * Reduce Risk
 * Service & Support
 * Thought Leadership

 // 
Home › Extreme Networks Blog › Blockchain for Smart Communities & Infrastructure

Infrastructure

 * ExtremeSwitching
 * ExtremeRouting
 * ExtremeWireless

Applications

 * Cloud
 * Analytics & Visibility
 * Orchestration
 * Security

Log In

 * ExtremeCloud™ IQ
 * ExtremeCloud™
 * MyHive
 * Support Portal
 * Partner Portal
 * Developer Portal

News

 * Newsroom
 * Blog
 * Events

Company

 * About Extreme
 * Leadership
 * Investor Relations
 * Careers
 * Extreme Elements™

NASDAQ: EXTR

Contact

 * Sales
 * Support
 * Office Locations

--------------------------------------------------------------------------------

© 2021 Extreme Networks

 * 
 * 
 * 
 * 
 * 

Privacy Policy
Legal Notices
Global
 * Global✓
 * Latin America
 * France
 * Germany
 * Italy
 * Spain
 * Australia
 * Korea
 * Turkey
 * China
 * Japan

close [x]

We use cookies for traffic analytics and ad and content personalization. By
clicking on any of the content or interacting with any section of this website,
you are agreeing to this use of cookies in the manner described in our Privacy
and Cookies Policy.