Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions

Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when blockchain is combined with digital signatures, it verifies the identity of the participants with its non-repudiation capabilities. One of the weaknesses of blockchain is the difficulty of preventing malicious participants from gaining access to public–private key pairs. Groups of opponents often interact freely with the network, and this is a security concern when cloud-based methods manage the key pairs. Therefore, we are proposing end-to-end security schemes by both inserting tamper-resistant devices in the hardware of the peripheral devices and using ternary cryptography. The tamper-resistant devices, which are designed with nanomaterials, act as Physical Unclonable Functions to generate secret cryptographic keys. One-time use public–private key pairs are generated for each transaction. In addition, the cryptographic scheme incorporates a third logic state to mitigate man-in-the-middle attacks. The generation of these public–private key pairs is compatible with post quantum cryptography. The third scheme we are proposing is the use of noise injection techniques used with high-performance computing to increase the security of the system. We present prototypes to demonstrate the feasibility of these schemes and to quantify the relevant parameters. We conclude by presenting the value of blockchains to secure the logistics of additive manufacturing operations.

[1]  E. O. Kiktenko,et al.  Quantum-secured blockchain , 2017, Quantum Science and Technology.

[2]  Yier Jin,et al.  Introduction to Hardware Security , 2015, Electronics.

[3]  Bin Chen,et al.  A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[4]  Tera Introduction to Post-Quantum Cryptography in scope of NIST ' s Post-Quantum Competition , 2019 .

[5]  Si Chen,et al.  A Blockchain-Based Supply Chain Quality Management Framework , 2017, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).

[6]  Daniel Apon,et al.  Status report on the first round of the NIST post-quantum cryptography standardization process , 2019 .

[7]  Fei Tao,et al.  Blockchain-Based Trust Mechanism for IoT-Based Smart Manufacturing System , 2019, IEEE Transactions on Computational Social Systems.

[8]  George Suciu,et al.  Comparative Analysis of Distributed Ledger Technologies , 2018, 2018 Global Wireless Summit (GWS).

[9]  An Chen,et al.  Comprehensive assessment of RRAM-based PUF for hardware security applications , 2015, 2015 IEEE International Electron Devices Meeting (IEDM).

[10]  Arnab Banerjee,et al.  Chapter Three - Blockchain Technology: Supply Chain Insights from ERP , 2018, Adv. Comput..

[11]  Ravikiran Vatrapu,et al.  Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning , 2018, HICSS.

[12]  Josip Stjepandic,et al.  Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology , 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).

[13]  Sumeet Dua,et al.  Data Mining and Machine Learning in Cybersecurity , 2011 .

[14]  Takeshi Fujino,et al.  A stable key generation from PUF responses with a Fuzzy Extractor for cryptographic authentications , 2013, 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE).

[15]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[16]  Jennifer Xu,et al.  Are blockchains immune to all malicious attacks? , 2016 .

[17]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[18]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[19]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[20]  Paul G. Flikkema,et al.  Can Ternary Computing Improve Information Assurance? , 2018, Cryptogr..

[21]  Axel Küpper,et al.  Blockchain-Based Supply Chain Traceability: Token Recipes Model Manufacturing Processes , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[22]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[23]  Yohei Hori,et al.  Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.

[24]  Zhenfei Zhang,et al.  Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU , 2019 .

[25]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[26]  Alfred Menezes,et al.  A Riddle Wrapped in an Enigma , 2016, IEEE Security & Privacy.

[27]  Tim Güneysu,et al.  Security analysis of index-based syndrome coding for PUF-based key generation , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[28]  Bradford Nichols,et al.  Pthreads programming - a POSIX standard for better multiprocessing , 1996 .

[29]  Luigi Lo Iacono Understanding Cryptography , 2018, CCNA® Security Study Guide.

[30]  Mostafa Belkasmi,et al.  Bitcoin Security with Post Quantum Cryptography , 2019, NETYS.

[31]  George Q. Huang,et al.  Blockchain-based ubiquitous manufacturing: a secure and reliable cyber-physical system , 2020, Int. J. Prod. Res..

[32]  D. Blayney,et al.  Challenges and solutions. , 2007, Journal of oncology practice.

[33]  B. Cambou,et al.  Response-Based Cryptographic Methods with Ternary Physical Unclonable Functions , 2019, Lecture Notes in Networks and Systems.

[34]  R. Monfared,et al.  Blockchain ready manufacturing supply chain using distributed ledger , 2016 .

[35]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[36]  Robert Campbell,et al.  Evaluation of Post-Quantum Distributed Ledger Cryptography , 2019, The Journal of the British Blockchain Association.

[37]  Joshua Lubell,et al.  Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives , 2019, IEEE Access.

[38]  S. Jagannatha,et al.  Analysis of Blockchain technology: pros, cons and SWOT , 2018, Cluster Computing.

[39]  Jing Shi,et al.  Consensus-oriented cloud manufacturing based on blockchain technology: An exploratory study , 2020, Pervasive Mob. Comput..

[40]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[41]  G. Edward Suh,et al.  Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations , 2011, TRUST.

[42]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[43]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[44]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[45]  Dawu Gu,et al.  Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[46]  Tancrède Lepoint,et al.  CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation , 2017 .

[47]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[48]  Mark Mohammad Tehranipoor,et al.  An Aging-Resistant RO-PUF for Reliable Key Generation , 2016, IEEE Transactions on Emerging Topics in Computing.

[49]  Joseph Sarkis,et al.  Blockchain technology and its relationships to sustainable supply chain management , 2018, Int. J. Prod. Res..

[50]  Dimitrios Sikeridis,et al.  Two Post-Quantum Signature Use-cases: Non-issues, Challenges and Potential Solutions , 2019 .

[51]  David Swanson,et al.  The Supply Chain Has No Clothes: Technology Adoption of Blockchain for Supply Chain Transparency , 2018 .

[52]  Saša Aksentijević,et al.  Blockchain Technology Implementation in Logistics , 2019, Sustainability.

[53]  Derek Abbott,et al.  Emerging Physical Unclonable Functions With Nanotechnology , 2016, IEEE Access.

[54]  Salil S. Kanhere,et al.  Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.

[55]  Sattar Mirzakuchaki,et al.  PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI) , 2017, Int. J. Commun. Syst..

[56]  Nikil D. Dutt,et al.  Post-Quantum Lattice-Based Cryptography Implementations , 2019, ACM Comput. Surv..

[57]  Joseph E. Kasten,et al.  Engineering and Manufacturing on the Blockchain: A Systematic Review , 2020, IEEE Engineering Management Review.

[58]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[59]  Alan T. Litchfield,et al.  A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology , 2015, ACSC.

[60]  Paulo S. L. M. Barreto,et al.  The Lattice-Based Digital Signature Scheme qTESLA , 2020, IACR Cryptol. ePrint Arch..

[61]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[62]  Mark Mohammad Tehranipoor,et al.  Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..