Secure Cyber-Physical Object Identification in Industrial IoT-Systems

Abstract Production systems equipped with industrial internet-of-things devices are on the rise allowing smart manufacturing within the trend of industry 4.0 by implementing decentralized decision making. The interconnected devices allow for high transparency in systems by tracking environmental data and actions performed by the actors of the systems. However, they are an easy target for attackers to tamper the authenticity, accountability, and integrity of systems. Therefore, trusted data within systems is required. The trust bases on well-behavior over a period of time of a dedicated entity. Therefore, entities have to be identified to track their behavior. Here, a system of verifiable distributed identities is presented and verified by a simulation. Using a newly introduced zero-knowledge-proof with only two packages exchanged a secure replacement of parts of a product such as a production machine can be achieved without relying on a central authority during the product’s utilization phase.

[1]  Qiang Liu,et al.  ManuChain: Combining Permissioned Blockchain With a Holistic Optimization Model as Bi-Level Intelligence for Smart Manufacturing , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[2]  Fei Tao,et al.  Digital twin-driven product design, manufacturing and service with big data , 2017, The International Journal of Advanced Manufacturing Technology.

[3]  Ronald V. Kalafsky,et al.  Geographies of production in 3D: Theoretical and research implications stemming from additive manufacturing , 2015 .

[4]  Volker Skwarek,et al.  Blockchains as security-enabler for industrial IoT-applications , 2017 .

[5]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[6]  Morteza Ghobakhloo,et al.  The future of manufacturing industry: a strategic roadmap toward Industry 4.0 , 2018, Journal of Manufacturing Technology Management.

[7]  K. Blind,et al.  The Impact of Product Piracy on Corporate IP Strategy , 2016 .

[8]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[9]  Rodrigo Franco Gonçalves,et al.  Blockchain in manufacturing revolution based on machine to machine transaction: a systematic review , 2019, Brazilian Journal of Operations & Production Management.

[10]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[11]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[12]  Jiafu Wan,et al.  Implementing Smart Factory of Industrie 4.0: An Outlook , 2016, Int. J. Distributed Sens. Networks.

[13]  Eli Ben-Sasson,et al.  Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..

[14]  Pandian Vasant,et al.  Industry 4.0 framework for management and operations: a review , 2017, Journal of Ambient Intelligence and Humanized Computing.

[15]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[16]  Günther Schuh,et al.  Highly Iterative Product Development Process for Engineering Projects , 2015 .

[17]  E. Abele,et al.  Challenges for Future Production/Manufacturing , 2018, Learning Factories.

[18]  Zhuming Bi,et al.  New Blockchain-Based Architecture for Service Interoperations in Internet of Things , 2019, IEEE Transactions on Computational Social Systems.

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.