ArticlePDF Available

A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology

Authors:

Abstract

Communicating Things Network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is dependent on human interference. Interconnected physical objects in the network communicate with each other and facilitate intelligent decision-making by monitoring and analyzing their surroundings. In today's era, CTNs are playing a significant role in daily activities by providing a substantial reduction in costs with increased visibility and efficiency in all aspects of businesses and individuals. In this manuscript, we have considered an important application of CTNs (i.e., IoT) and have proposed a secure hybrid industrial IoT framework using the Blockchain technique. We have used a hybrid industrial architecture where different branches of a company are located in more than one country. Although IoT devices are used in many organizations and assist in reducing their production costs along with improving quality, several threats can occur in IoT devices initiated by various intruders. Intruders may compromise IoT devices with the purpose of performing malicious activities. For example, a company's employee may steal some product or may rest during working hours. To prevent these issues, the Blockchain technology is considered as the best technique that provides secrecy and protects the control system in real-time conditions. In this manuscript, we have used a Blockchain mechanism to extract information from IoT devices and store extracted records into Blockchain to maintain transparency among various users located at different places. Furthermore, the experimentation of the proposed framework has been performed against the internal communication of Blockchain where IoT devices are compromised by several intruders. Results have been analyzed against the conventional approach and validated with improved simulated results that offer an 89% success rate over user request time, falsification attack, black hole attack, and probabilistic authentication scenarios because of the Blockchain technology.
... Logika di balik penciptaan Industri 4.0 di Jerman melibatkan kerjasama antara perusahaan swasta dan universitas untuk mengembangkan sistem-sistem tersebut, serta anggaran penelitian dan pengembangan yang disediakan oleh pemerintah (Roblek et al, 2020). Baru-baru ini, banyak sistem yang efisien dan efektif yang menggunakan teknologi seperti kecerdasan buatan, Internet of Things (IoT), dan sistem fisik siber telah diperkenalkan (Rathee et al, 2019). Layanan seperti 'Internet Industri' oleh General Electric, 'Industri 4.0' oleh IBM, 'Internet Segalanya' oleh Cisco, dan Lumada oleh Hitachi, digunakan untuk infrastruktur negara dan perusahaan. ...
Article
Dalam literatur, penelitian yang cukup terbatas mengenai topik Society 5.0. Penelitian ini menguji keberadaan Society 5.0 dan efektivitas Industry 4.0, serta mengevaluasi efisiensi Tujuan Pembangunan Berkelanjutan PBB (SDGs) dalam proses tersebut, terutama di Indonesia. Penelitian ini dilakukan berdasarkan data yang diperoleh melalui kuesioner berisi 30 pertanyaan yang dilakukan kepada 335 akademisi yang bekerja di Universitas X. Data tersebut dianalisis menggunakan analisis faktor eksploratori dengan program SPSS, analisis faktor konfirmatori dengan AMOS, dan pemodelan persamaan struktural dengan Smart PLS. Hasil analisis menunjukkan bahwa SDG9, SDG10, SDG11, SDG12, SDG13, dan SDG14 memiliki pengaruh rendah (yaitu, R2: 0,172) terhadap penerapan Industry 4.0 dan Society 5.0. Selain itu, juga ditemukan bahwa para peserta sangat dipengaruhi oleh situasi yang ada dan memberikan tanggapan sesuai dengan dampak tersebut. Studi ini juga mengungkapkan bahwa Indonesia tidak memiliki filosofi unggulan dalam bidang Society 5.0 dan Industry 4.0, dan kemajuannya terhambat karena terlalu fokus pada proses-proses yang sudah ketinggalan zaman.
... In addition, the combination with the Internet of Things (IoT) is one of the latest application trends in blockchain technology. Rathee et al. [50] proposed a framework for industrial IoT based on blockchain technology, which significantly reduces the rate of product loss, black hole attacks, and falsification among different nodes. Similarly, Cao et al. [51] developed a blockchain-based IoT quality traceability system for steel. ...
Article
Full-text available
This paper analytically explores the value of blockchain technology in building consumer trust in recyclers. We focus on an e-commerce closed-loop supply chain composed of an online platform and a manufacturer. In the forward chain, the platform selects a reselling or marketplace model to sell products. In the reverse chain, the platform collects used products, and the unknown whereabouts of the used products will cause consumer mistrust and be detrimental to the corporate image. Blockchain technology can address these challenges by improving the visibility of the recycling chain. By constructing differential game models, we specify the conditions for blockchain implementation and explore its impact on the online sales model choice and the E-CLSC performance. The findings show that the manufacturer consistently benefits from blockchain technology, while the platform decides to adopt it when the long-term profits outweigh the initial investment costs. Interestingly, the sales model selection will not change with the advent of blockchain technology. We further show the benefits of blockchain-enabled recycling and provide tangible insights for related practitioners.
... Rathee et al. [24] proposed a blockchain technologybased secure hybrid "Industrial Internet of Things (IIoT)" framework. In this framework, the activities of employees are collected and stored by blockchain-based industrial IoT devices to maintain the security, transparency, and tracing of all work by producing the hash of each record for IoT devices. ...
... The actuators and sensors in IoT devices enable them to interact with other devices and be aware of their surroundings [4]. Their service clients can access these physical items at any time and from any place owing to a connection to the Internet, directly or via another device [5]. However, for the safety of patients, efficient patient care, and patient privacy, confidentiality, and security measures for IoT systems are essential. ...
Article
Full-text available
Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges. However, the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes. There is the biggest challenge of data integrity and scalability, including significant computing complexity and inapplicable latency on regional network diversity, operating system diversity, bandwidth diversity, node diversity, etc., for decision-making of data transactions across blockchain-based heterogeneous networks. Data security and privacy have also become the main concerns across the heterogeneous network to build smart IoT ecosystems. To address these issues, today’s researchers have explored the potential solutions of the capability of heterogeneous network devices to perform data transactions where the system stimulates their integration reliably and securely with blockchain. The key goal of this paper is to conduct a state-of-the-art and comprehensive survey on cybersecurity enhancement using blockchain in the heterogeneous network. This paper proposes a full-fledged taxonomy to identify the main obstacles, research gaps, future research directions, effective solutions, and most relevant blockchain-enabled cybersecurity systems. In addition, Blockchain based heterogeneous network framework with cybersecurity is proposed in this paper to meet the goal of maintaining optimal performance data transactions among organizations. Overall, this paper provides an in-depth description based on the critical analysis to overcome the existing work gaps for future research where it presents a potential cybersecurity design with key requirements of blockchain across a heterogeneous network.
Article
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0 revolution, which is projected to continue accelerating and realizing digital transformations. The IIoT is becoming indispensable, providing the means through which modern communication is conducted across industries and offering improved efficiency, scalability, and robustness. However, the structural and dynamic complexity introduced by the continuous integration of the IIoT has widened the scope for cyber-threats, as the processes and data generated by this integration are susceptible and vulnerable to attacks. This article presents an in-depth analysis of the state of the art in the IIoT ecosystem from security and digital forensics perspectives. The dimensions of this study are twofold: first, we present an overview of the cutting-edge security of IIoT ecosystems, and second, we survey the literature on digital forensics. The key achievements, open challenges, and future directions are identified in each case. The challenges and directions for future studies that we identify will provide important guidance for cybersecurity researchers and practitioners.
Article
Full-text available
The Internet of Things (IoT) is evolving in various sectors such as industries, healthcare, smart homes, and societies. Billions and trillions of IoT devices are used in e-health systems, known as the Internet of Medical Things (IoMT), to improve communication processes in the network. Scientists and researchers have proposed various methods and schemes to ensure automatic monitoring, communication, diagnosis, and even operating on patients at a distance. Several researchers have proposed security schemes and approaches to identify the legitimacy of intelligent systems involved in maintaining records in the network. However, existing schemes have their own performance issues, including delay, storage efficiency, costs, and others. This paper proposes trusted schemes that combine mean and subjective logic aggregation methods to compute the trust of each communicating device in the network. Additionally, the network maintains a blockchain of legitimate devices to oversee the trusted devices in the network. The proposed mechanism is further verified and analyzed using various security metrics, such as reliability, trust, delay, beliefs, and disbeliefs, in comparison to existing schemes.
Article
Full-text available
Industry 4.0 is a concept devised for improving the way modern factories operate through the use of some of the latest technologies, like the ones used for creating Industrial Internet of Things (IIoT), robotics or Big Data applications. One of such technologies is blockchain, which is able to add trust, security and decentralization to different industrial fields. This article focuses on analyzing the benefits and challenges that arise when using blockchain and smart contracts to develop Industry 4.0 applications. In addition, this paper presents a thorough review on the most relevant blockchain-based applications for Industry 4.0 technologies. Thus, its aim is to provide a detailed guide for future Industry 4.0 developers that allows for determining how blockchain can enhance the next generation of cybersecure industrial applications.
Article
Full-text available
Factories use many manufacturing processes that consume a lot of energy and highly contribute in greenhouse gas emissions. The introduction of the concept of Industrial Internet in USA and Industry 4.0 in Europe offers many opportunities to reduce energy consumption in these factories. Introducing and utilizing smart techniques for the applications pertinent to manufacturing processes within the Industry 4.0 domain can offer many benefits for reducing energy consumption in smart factories. This paper investigates and discusses these opportunities and benefits. The paper also discusses the roles of Industry 4.0 technologies in enabling these opportunities. Consequently, introducing these capabilities will help significantly reduce both production costs and greenhouse gas emissions. The paper then provides a benefit analysis that shows the advantages of such leverage. In addition, the paper offers an enabling architecture and its components that includes cyber-physical system (CPS) manufacturing services layer, fog manufacturing services layer, cloud manufacturing services layer, and blockchain-based service-oriented middleware to support such opportunities.
Article
Full-text available
In the last century the automotive industry has arguably transformed society, being one of the most complex, sophisticated and technologically advanced industries, with innovations ranging from hybrid, electric and self-driving smart cars to the development of IoT-connected cars. Due to its complexity, it requires the involvement of many Industry 4.0 technologies, like robotics, advanced manufacturing systems, cyber-physical systems or augmented reality. One of the latest technologies that can benefit the automotive industry is blockchain, which can enhance its data security, privacy, anonymity, traceability, accountability, integrity, robustness, transparency, trustworthiness and authentication, as well as provide long-term sustainability and a higher operational efficiency to the whole industry. This review analyzes the great potential of applying blockchain technologies to the automotive industry emphasizing its cybersecurity features. Thus, the applicability of blockchain is evaluated after examining the state-of-the-art and devising the main stakeholders’ current challenges. Furthermore, the article describes the most relevant use cases, since the broad adoption of blockchain unlocks a wide area of short- and medium-term promising automotive applications that can create new business models and even disrupt the car-sharing economy as we know it. Finally, after a Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis, some recommendations are enumerated with the aim of guiding researchers and companies in future cyberresilient automotive industry developments.
Article
Full-text available
This article introduces the concept of proof of authentication (PoAh) for the lightweight implementation of blockchains in the Internet of Things (IoT). The PoAh can replace existing consensus algorithms, such as proof of work (PoW), proof of stake (PoS), and proof of activity (PoA), for resource- and energyconstrained infrastructures, such as the IoT.
Article
Full-text available
With the recent increase in the number of IoT devices and the development of centralized management systems, risks in cyber space, including personal information phishing, malicious code infection, hacking and DDos attack, are becoming major issues in the real world. The recently developed distributed data management technology, blockchain, provides reliability in transactions without the intervention of a third party. This new technology, blockchain, promotes integrity and reliability of transaction records by allowing for all network participants to jointly own and verify data, which was previously done by a central server. Due to distributed data management, the technology can reduce brokerage fees and construction costs, and guarantees high levels of integrity and security of data. This paper examines the effective identifier management using blockchain technology under the NDN(Named Data Networking) environment. The proposed system does not expose a specific user's identifier by creating a transaction using the content name of the identifier. The identifier can be safely stored and managed through such an identifier split management technique.
Article
Full-text available
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructure. However, UAV networks raise security challenges because of its dynamic topology. This paper proposes a technique for maintaining security in UAV networks in the context of surveillance, by corroborating information about events from different sources. In this way, UAV networks can conform peer-to-peer information inspired by the principles of blockchain, and detect compromised UAVs based on trust policies. The proposed technique uses a secure asymmetric encryption with a pre-shared list of official UAVs. Using this technique, the wrong information can be detected when an official UAV is physically hijacked. The novel agent based simulator ABS-SecurityUAV is used to validate the proposed approach. In our experiments, around 90% of UAVs were able to corroborate information about a person walking in a controlled area, while none of the UAVs corroborated fake information coming from a hijacked UAV.
Article
Full-text available
Wireless communication environments comprise passive objects that cause performance degradation and eavesdropping concerns due to anomalous scattering. This paper proposes a new paradigm, where scattering becomes software-defined and, subsequently, optimizable across wide frequency ranges. Through the proposed programmable wireless environments, the path loss, multi-path fading and interference effects can be controlled and mitigated. Moreover, the eavesdropping can be prevented via novel physical layer security capabilities. The core technology of this new paradigm is the concept of metasurfaces, which are planar intelligent structures whose effects on impinging electromagnetic waves are fully defined by their micro-structure. Their control over impinging waves has been demonstrated to span from 1 GHz to 10 THz. This paper contributes the software-programmable wireless environment, consisting of several HyperSurface tiles (programmable metasurfaces) controlled by a central server. HyperSurfaces are a novel class of metasurfaces whose structure and, hence, electromagnetic behavior can be altered and controlled via a software interface. Multiple networked tiles coat indoor objects, allowing fine-grained, customizable reflection, absorption or polarization overall. A central server calculates and deploys the optimal electromagnetic interaction per tile, to the benefit of communicating devices. Realistic simulations using full 3D ray-tracing demonstrate the groundbreaking performance and security potential of the proposed approach in 2.4 GHz and 60 GHz frequencies.
Article
To guarantee secure transmissions is an important target of passive optical networks (PONs). Modern standards for PONs, however, impose the adoption of symmetric encryption algorithms in downstream but do not do the same in upstream, where the secret keys may be transmitted in clear. Because of non-ideal optical network components, this exposes the PON to the risk of eavesdropping. In this paper, a novel technique for securely generating and sharing secret keys in passive optical networks is proposed. It exploits randomness at the physical layer and key distillation based on coding techniques. The main attack strategies are considered and the design parameters of the proposed protocol are discussed, both in analytical terms and through numerical examples. The cost in terms of complexity with respect to standard approaches affected by possible vulnerabilities is also assessed.
Article
Recently, there are growing interests in cognitive radio vehicular ad hoc networks (CR-VANETs), which is a kind of intelligent cyber-physical systems. In CR-VANETs, there are two main processes: spectrum sensing and data transmission. Although some excellent works have been done to address spectrum sensing security and data transmission security in CR-MANETs, these two important areas have traditionally been addressed separately in the literature. In this paper, we propose to use a common framework to study trust management so as to enhance security for both spectrum sensing and data transmission processes in CR-VANETs. We identify a new attack, named joint spectrum sensing and data transmission (JSSDT) attack, in which an attacker can report fake sensing data in the spectrum sensing process as well as drop packets in the data transmission process. Then, using recent advances in the theory of uncertain reasoning, we propose a unified trust management scheme for both spectrum sensing and data transmission processes in CR-VANETs. In addition, based on the unified trust model, we present a weighted consensus-based spectrum sensing scheme to protect the spectrum sensing process. Moreover, we apply the trust value derived from the unified trust model to enhance the security of the data transmission process in CR-VANETs. Simulation results show the effectiveness of the proposed trust-based security schemes.
Article
The Internet of Things (IoT) contains a diverse set of sensors, actuators and other Internet-connected devices communicating, processing data and performing a multitude of functions. It is emerging as an integral part of societal infrastructure enabling smart services. However, these connected objects might have various vulnerabilities that can lead to serious security compromises and breaches. Securing and hardening of IoT systems is thus of vital importance. In that regard, attack graphs provide analytical support to prevent multistep network attacks by showing all possible sequences of vulnerabilities and their interactions. Since attack graphs generally consist of a very large number of nodes, it is computationally challenging to analyze them for network hardening. In this paper, we propose a greedy algorithm using compact attack graphs to find a cost-effective solution to protect IoT systems. First, we extract all possible attack paths which reach predetermined critical resources embedded in the network. Then, exploit or initial condition with minimum effective cost is selected to be removed. This cost is calculated as a function of contribution to attack paths (the higher, the better) and removal cost (the lower, the better). This process continues iteratively until the total cost exceeds the allocated budget. The experimental results show that our algorithm scales almost linearly with the network size and it can be applied to large-scale graphs with a very large number of IoT nodes. In addition to network-hardening, our proposal measures the security level of the network in every step to demonstrate the vulnerability grade of the system.