A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory

Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture. First, the major problems of the traditional IIoT architecture are analyzed, and the existing improvements are summarized. Second, we introduce a security and privacy model to help design the Blockchain-based architecture. On this basis, we decompose and reorganize the original IIoT architecture to form a new multicenter partially decentralized architecture. Then, we introduce some relative security technologies to improve and optimize the new architecture. After that we design the data interaction process and the algorithms of the architecture. Finally, we use an automatic production platform to discuss the specific implementation. The experimental results show that the proposed architecture provides better security and privacy protection than the traditional architecture. Thus, the proposed architecture represents a significant improvement of the original architecture, which provides a new direction for the IIoT development.

[1]  Xinyu Yang,et al.  Typical DoS/DDoS Threats under IPv6 , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[2]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[3]  Juergen Jasperneite,et al.  The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 , 2017, IEEE Industrial Electronics Magazine.

[4]  Jiafu Wan,et al.  Fog Computing for Energy-Aware Load Balancing and Scheduling in Smart Factory , 2018, IEEE Transactions on Industrial Informatics.

[5]  Ian T. Foster,et al.  A Multipolicy Authorization Framework for Grid Security , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[6]  Jemal H. Abawajy,et al.  Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.

[7]  Kevin Leahy,et al.  An industrial big data pipeline for data-driven analytics maintenance applications in large-scale smart manufacturing facilities , 2015, Journal of Big Data.

[8]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[9]  Liu Chuan,et al.  Dynamic Trustworthiness Verification Mechanism for Trusted Cloud Execution Environment , 2014 .

[10]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[11]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[12]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[13]  Robert Harrison,et al.  Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach , 2014 .

[14]  Antonio Celesti,et al.  An Ontology-Based Resource Reconfiguration Method for Manufacturing Cyber-Physical Systems , 2018, IEEE/ASME Transactions on Mechatronics.

[15]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[16]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.

[17]  Sven Helmer,et al.  A Decision Framework for Blockchain Platforms for IoT and Edge Computing , 2018, IoTBDS.

[18]  Athanasios V. Vasilakos,et al.  A Manufacturing Big Data Solution for Active Preventive Maintenance , 2017, IEEE Transactions on Industrial Informatics.

[19]  Ralph Deters,et al.  Internet of Smart Things - IoST: Using Blockchain and CLIPS to Make Things Autonomous , 2017, 2017 IEEE International Conference on Cognitive Computing (ICCC).

[20]  Xiaojiang Du,et al.  An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).

[21]  Zurina Mohd Hanapi,et al.  Comparison of ECC and RSA Algorithm in Resource Constrained Devices , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).

[22]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[23]  Dazhong Wu,et al.  Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation , 2015, Comput. Aided Des..

[24]  Zhibo Pang,et al.  Reconfigurable Smart Factory for Drug Packing in Healthcare Industry 4.0 , 2019, IEEE Transactions on Industrial Informatics.

[25]  Dale C. Rowe,et al.  A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.

[26]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[27]  Lei Shu,et al.  Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges , 2018, IEEE Access.

[28]  Salvatore J. Stolfo,et al.  A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan , 2010, ACSAC '10.

[29]  Tullio Tolio,et al.  Impact of Quality Control on Production System Performance , 2006 .

[30]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[31]  Chen Wei Access control security model based on behavior in cloud computing environment , 2012 .