scholarly journals Blockchains as security-enabler for industrial IoT-applications

2017 ◽  
Vol 11 (3) ◽  
pp. 301-311 ◽  
Author(s):  
Volker Skwarek

Purpose This paper aims to describe a method for Internet-of-Things-devices to achieve industrial grade reliability for information transfer from wireless sensor systems to production systems using blockchain technologies. Design/methodology/approach An increased security and reliability of submitted data within the sensor network could be achieved on an application level. Therefore, a lightweight, high-level communication protocol based on blockchain principles was designed. Findings Blockchain mechanisms can secure the wireless communication of Internet-of-Things-devices in a lightweight and scalable manner. Originality/value The innovation of this research is the successful application of general blockchain mechanisms to increase security of a wireless sensor system without binding to a dedicated blockchain technology.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ravinder Kumar ◽  
Rahul Sindhwani ◽  
Punj Lata Singh

Purpose The purpose of this methodology is to categorise the challenges into cause and effect group. The modern scenario of customization, personalization and multi-restrictive working because of pandemics has affected the operations of manufacturing small and medium enterprises (SMEs). In the new normal, the digitalization of manufacturing SMEs can be the path breaker. Modern digitalization includes a mix of technologies such as the industrial internet of things (IIoT), the internet of things, cyber-physical system and big data analytics. This digitalization can help in achieving new design changes, efficient production scheduling, smart manufacturing and unrestricted on-time delivery of quality products. This research paper aims to recognize and analyze the challenges faced while implementing IIoT technologies in manufacturing SMEs and tries to find the possibility of mitigating challenges by blockchain technology. Design/methodology/approach There were ten challenges of IIoT implementation identified from the literature review and experts’ opinions. To collect information from Indian manufacturing SMEs, a survey tool was formed in the form of a questionnaire. On the fundament of responses received from industrial experts, the Decision-Making Trial and Evaluation Laboratory (DEMATEL) technique has been used for categorizing these challenges into cause and effect groups. Further, the authors tried to mitigate observed challenges with the help of blockchain technology. Findings With the implementation of IIoT technologies, the manufacturing processes become conciliatory, effective and traceable in real time. Observation of the current study states that the top effect group challenges such as the security of data and reliability of technologies can be mitigated by enabling blockchain technologies. The authors conclude that blockchain-enabled IIoT technologies will be highly beneficial for the Indian SMEs strategically and practically in the current scenario. Research limitations/implications Methodology of DEMATEL focuses on responses received from experts. The broader approach of survey from manufacturing organizations is compromised due to small sample size in this methodology. Experts approached for survey were from manufacturing SMEs of Delhi National Capital Region only. Broader survey-based techniques may be applied covering different sectors of SMEs in future work. Practical implications Technologies such as blockchain can facilitate advanced security in the application of IIoT and other such practices. While dealing with significant issues and challenges of new technologies, blockchain gives an edge of balance in the current scenario. Its properties of fixity, temper evident and circumvent fraud make this technology ideal for the digitalization of the manufacturing systems in SMEs. Originality/value Digitalization of manufacturing facilities is the need of the hour. Pandemic challenges have highlighted the urgency of it. This research will motivate and guide the manufacturing SMEs in planning strategies and long-term policies in implementing modern technologies and coping up with the pandemic challenges.


2021 ◽  
Vol 28 (5) ◽  
pp. 1883-1908 ◽  
Author(s):  
Santosh B. Rane ◽  
Yahya Abdul Majid Narvel

Purpose Blockchain and Internet of Things (IoT) technologies have recently gained much attention for Industry 4.0. With the emergence of disruptive technologies, it has become essential to redesign the business for innovations based on blockchain–IoT integrated architecture that helps organizations to improve agility in their operations. The paper aims to discuss this issue. Design/methodology/approach An industrial pump was Sensorized and IoTized to monitor its operations on real time and take predictive measures for managing these assets with more agility. The developed architecture was further extended for proposing the use of blockchain and how it can benefit the organization. Findings The known features of blockchain such as increasing the capacity of decentralization, trust-less transactions, security and allowing autonomous coordination of the devices along with the boons of IoT will help achieve the motto of improving agility in Industry 4.0. Originality/value This paper gives a new dimension to utilization of blockchain technology. blockchain along with IoT that gives a way forward for industries like manufacturing, oil and gas, engineering and construction, utilities, etc. to re-designing the business organization in a more agile way.


2020 ◽  
Vol 5 (5) ◽  
pp. 588-593
Author(s):  
Brian Parker ◽  
Christian Bach

This paper is an exploration of several theories on the synthesis of the Blockchain(BC), the Internet of Things (IoT), and Artificial Intelligence(AI) through a literature review. Blockchain technology is a decentralized peer-to-peer network that stores records and transactions in immutable blocks secured by cryptography. The decentralization aspect of blockchain eliminates the need for trusted third party interceder. Internet of Things(IoT) is an interrelated computer system that makes a connection between computers and humans to communicate in several areas; smart devices like homes, cars, radio are just a few examples. IoT challenges are security, connectivity, issues with the analysis of big data, centralization, and vulnerability to attacks.  Artificial Intelligence(AI) machine learning technology is the advanced decision-making process that influences daily routines such as banking, healthcare, gaming, transportation, and space exploration, among others. AI’s challenges are; security, centralized architecture, and resource limitations. The methodology will be a comprehensive quantitative analysis of the existing research and how these technologies can be a transformative impact on how information is accessed through enterprise and society. The convergence of BC, AI, and IoT will provide scalable, secure high-level intellectual functioning that will be the new paradigm of digital information.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Y.P. Tsang ◽  
C.H. Wu ◽  
W.H. Ip ◽  
Wen-Lung Shiau

PurposeDue to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and industrial practitioners and is regarded as a future trend in technological development. Although several authors have conducted literature reviews on the topic, none have examined the development of the knowledge structure of BIoT, resulting in scattered research and development (R&D) efforts.Design/methodology/approachThis study investigates the intellectual core of BIoT through a co-citation proximity analysis–based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies. Subsequently, we apply a series of statistical analyses, including exploratory factor analysis (EFA), hierarchical cluster analysis (HCA), k-means clustering (KMC) and multidimensional scaling (MDS) to establish the intellectual core.FindingsOur findings indicate that there are nine categories in the intellectual core of BIoT: (1) data privacy and security for BIoT systems, (2) models and applications of BIoT, (3) system security theories for BIoT, (4) frameworks for BIoT deployment, (5) the fusion of BIoT with emerging methods and technologies, (6) applied security strategies for using blockchain with the IoT, (7) the design and development of industrial BIoT, (8) establishing trust through BIoT and (9) the BIoT ecosystem.Originality/valueWe use the CPASR method to examine the intellectual core of BIoT, which is an under-researched and topical area. The paper also provides a structural framework for investigating BIoT research that may be applicable to other knowledge domains.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mazen El-Masri ◽  
Eiman Mutwali Abdelmageed Hussain

PurposeBlockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.Design/methodology/approachAn approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.FindingsThe literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.Research limitations/implicationsResults suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.Practical implicationsPractitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.Originality/valueThis study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.


Author(s):  
Mohamed M. Samy ◽  
◽  
Wagdy R. Anis. ◽  
Ahmed A. Abdel-Hafez ◽  
Haitham D. Eldemerdash

The Internet of Things (IoT) consists of sensors, networks, and services to connect and control production systems. Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices are enabled to exchange information with each other in an autonomous way without human intervention. Resource-Constrained Devices (RCD) have found an expanding demand in the Internet of Things (IoT) applications as these gadgets are essentially working with delicate information. Thus, information security has ended up vital for both makers and clients. However, the creation of defenseless gadgets still challenging regarding the restriction of involved assets especially with the attackers ‘continuous trials to misuse these restrictions chasing important information. Hence, connecting an open key crypto-system becomes a must to extend gadget proficiency and relieve the chance of touchy data loss. Deployments of Elliptic curve cryptography (ECC) are fundamentally an open key crypto-system with the basic distinction of speedier advancing capacity whereas yielding an assortment of distinctive approaches to the arrangement of the cryptographic calculation. We will submit a proposed protocol to overcome the demands of information security and the speed of data circulation. The proposed protocol is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against various attacks.


Technologies ◽  
2021 ◽  
Vol 9 (4) ◽  
pp. 99
Author(s):  
Ramiro Sámano-Robles ◽  
Tomas Nordström ◽  
Kristina Kunert ◽  
Salvador Santonja-Climent ◽  
Mikko Himanka ◽  
...  

This paper presents the High-Level Architecture (HLA) of the European research project DEWI (Dependable Embedded Wireless Infrastructure). The objective of this HLA is to serve as a reference framework for the development of industrial Wireless Sensor and Actuator Networks (WSANs) based on the concept of the DEWI Bubble. The DEWI Bubble constitutes a set of architecture design rules and recommendations that can be used to integrate legacy industrial sensor networks with a modern, interoperable and flexible IoT (Internet-of-Things) infrastructure. The DEWI Bubble can be regarded as a high-level abstraction of an industrial WSAN with enhanced interoperability (via standardized interfaces), dependability, technology reusability and cross-domain development. The DEWI Bubble aims to resolve the issue on how to integrate commercial WSAN technology to match the dependability, interoperability and high criticality needs of industrial domains. This paper details the criteria used to design the HLA and the organization of the infrastructure internal and external to the DEWI Bubble. The description includes the different perspectives, models, or views of the architecture: the entity model, the layered perspective of the entity model and the functional model. This includes an overview of software and hardware interfaces. The DEWI HLA constitutes an extension of the ISO/IEC 29182 SNRA (Sensor Network Reference Architecture) towards the support of wireless industrial applications in different domains: aeronautics, automotive, railway and building. To improve interoperability with existing approaches, the DEWI HLA also reuses some features from other standardized technologies and architectures. The DEWI HLA and the concept of Bubble allow networks with different industrial sensor technologies to exchange information between them or with external clients via standard interfaces, thus providing consolidated access to sensor information of different industrial domains. This is an important aspect for smart city applications, Big Data, Industry 4.0 and the Internet-of-Things (IoT). The paper includes a non-exhaustive review of the state of the art of the different interfaces, protocols and standards of this architecture. The HLA has also been proposed as the basis of the European projects SCOTT (Secure Connected Trustable Things) for enhanced security and privacy in the IoT and InSecTT (Intelligent Secure Trustable Things) for the convergence of artificial intelligence (AI) and the IoT.


Author(s):  
S. Liu ◽  
D. Roy ◽  
S. Hennequin

Aims: The purpose of this research paper is the study of the applicability of Blockchain technology and Smart Contracts to manage, control and secure an industrial Internet of Things network (IoT) for pooled warehouses with multiple actors and activities (not only restricted to transport and storage as currently developed in enterprises). Problem: IoT technology enables things to connect and exchange data, resulting in efficiency improvements, economic benefits, reduced human intervention and enabled interactions (information exchange and analysis) between human/machine to machine. However, the main difficulties lie in the definition of a robust global mechanism to secure the IoT, the awareness of resources diversity (heterogeneity of devices), and physical management of IoT. This article will attempt to answer these questionings. Results: To respond to these questions, we propose a hybrid architecture based on blockchains and multi-agents system to secure an industrial IoT corresponding to a pooled warehouse system. The proposed hybrid architecture completely represents our system, with all actors and connected objects in the pooled warehouse strategy. It is composed by two parts: a centralized part based on the multi-agents system to represent dynamic evolutions of actors’ behavior and a decentralized part, which corresponds to our block chain and smart contracts network to dynamically connect actors’ agents to pooled resources. The multi-agent system is coupled with game theory (cooperative game) to have a good systemic representation of our pooled warehouse management problem.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jiabao Sun ◽  
Ting Yang ◽  
Zhiying Xu

PurposeThe increasing demands for customized services and frequent market variations have posed challenges to managing and controlling the manufacturing processes. Despite the developments in literature in this area, less consideration has been devoted to the growth of business social networks, cloud computing, industrial Internet of things and intelligent production systems. This study recognizes the primary factors and their implications for intelligent production systems' success. In summary, the role of cloud computing, business social network and the industrial Internet of things on intelligent production systems success has been tested.Design/methodology/approachIntelligent production systems are manufacturing systems capable of integrating the abilities of humans, machines and processes to lead the desired manufacturing goals. Therefore, identifying the factors affecting the success of the implementation of these systems is necessary and vital. On the other hand, cloud computing and the industrial Internet of things have been highly investigated and employed in several domains lately. Therefore, the impact of these two factors on the success of implementing intelligent production systems is examined. The study is descriptive, original and survey-based, depending on the nature of the application, its target and the data collection method. Also, the introduced model and the information collected were analyzed using SMART PLS. Validity has been investigated through AVE and divergent validity. The reliability of the study has been checked out through Cronbach alpha and composite reliability obtained at the standard level for the variables. In addition, the hypotheses were measured by the path coefficients and R2, T-Value and GOF.FindingsThe study identified three variables and 19 sub-indicators from the literature associated that impact improved smart production systems. The results showed that the proposed model could describe 69.5% of the intelligence production systems' success variance. The results indicated that business social networks, cloud computing and the industrial Internet of things affect intelligent production systems. They can provide a novel procedure for intelligent comprehensions and connections, on-demand utilization and effective resource sharing.Research limitations/implicationsStudy limitations are as below. First, this study ignores the interrelationships among the success of cloud computing, business social networks, Internet of things and smart production systems. Future studies can consider it. Second, we only focused on three variables. Future investigations may focus on other variables subjected to the contexts. Ultimately, there are fewer experimental investigations on the impact of underlying business social networks, cloud computing and the Internet of things on intelligent production systems' success.Originality/valueThe research and analysis outcomes are considered from various perspectives on the capacity of the new elements of Industry 4.0 for the manufacturing sector. It proposes a model for the integration of these elements. Also, original and appropriate guidelines are given for intelligent production systems investigators and professionals' designers in industry domains.


Author(s):  
Ambika N.

The internet of things is the technology that aims to provide a common platform to the devices of varying capabilities to communicate. Industrial internet of things (IIoT) systems can perform better using these devices in combination with SDN network and blockchain technology. The suggestion uses random space learning (RSL) comprising three stages. The random subspace learning strategy is a troupe learning procedure called attributes bagging. It improves forecast and order errands as it utilizes group development of base classifiers rather than a solitary classifier, and it takes arbitrary subsets of properties rather than the whole arrangement of attributes. The system uses the blockchain methodology to secure the system. SDN networks aim to better the transmission of data in industrial IoT devices. Misrouting and forged attacks are some of the common attacks in these systems. The proposal provides better reliability than the previous contribution by 2.7%.


Sign in / Sign up

Export Citation Format

Share Document