Advertisement

Towards a Secure Data Exchange in IIoT

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1238)

Abstract

Industrial Internet of Things (IIoT) plays a central role in the Fourth Industrial Revolution, with many specialists working towards implementing large scalable, reliable and secure industrial environments. However, existing environments are lacking security standards and have limited resources per component which results in various security breaches, e.g., trust in between the components, partner factories or remote control units with the system. Due to the resilience and its security properties, combining blockchain-based solutions with IIoT environments is gaining popularity. Despite that, chain-structured classic blockchain solutions are extremely resource-intensive and are not suitable for power-constrained IoT devices. To mitigate the referred security challenges, a secure architecture is proposed by using a DAG-structured asynchronous blockchain that can provide system security and transactions efficiency at the same time. Use-cases and sequence diagrams were created to model the solution. The achieved results are robust, supported by an extensive security evaluation, which foster future developments over the proposed architecture. Therefore, as the proposed architecture is generic and flexible, its deployment in diverse customized industrial environments and scenarios, as well as the incorporation of future hardware and software, is possible.

Keywords

Blockchain IoT Industrial IoT Cybersecurity 

Notes

Acknowledgements

This work has been supported by FCT – Fundação para a Ciência e Tecnologia within the Project Scope: UIDB/05757/2020.

References

  1. 1.
    Cisco. Annual cybersecurity report (2018)Google Scholar
  2. 2.
    Fan, X., Fan, K., Wang, Y., Zhou, R.: Overview of cyber-security of industrial control system. In: Proceedings of the 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, pp. 1–7 (2015).  https://doi.org/10.1109/SSIC.2015.7245324
  3. 3.
    Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE IoT J. 5(4), 2483–2495 (2018). ISSN: 23274662Google Scholar
  4. 4.
    Neumann, P.: Communication in industrial automation-what is going on? Control Eng. Pract. 15(11), 1332–1347 (2007).  https://doi.org/10.1016/j.conengprac.2006.10.004. ISSN: 09670661CrossRefGoogle Scholar
  5. 5.
    Hong, S., Lee, M.: Challenges and direction toward secure communication in the SCADA system. In: CNSR 2010 Proceedings - 8th Annual Conference on Communication Networks and Services Research (2010)Google Scholar
  6. 6.
    Baliga, A.: Understanding blockchain consensus models. Whitepaper, no. April, pp. 1–14 (2017). https://www.persistent.com/wp-content/uploads/2017/04/WP-Understanding-Blockchain-Consensus-Models.pdf
  7. 7.
    Williamson, Z.J.: The AZTEC protocol. Whitepaper, pp. 1–24 (2018)Google Scholar
  8. 8.
    Huang, J., Kong, L., Chen, G., Wu, M.-Y., Liu, X., Zeng, P.: Towards secure industrial IoT: blockchain system with credit-based consensus mechanism. IEEE Trans. Ind. Inf. 15(6), 3680–3689 (2019)CrossRefGoogle Scholar
  9. 9.
    Sukiasyan, A.: Secure data exchange in IIoT. Master thesis in Information Systems – Polytechnic Institute of Bragança (2019)Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Research Centre in Digitalization and Intelligent Robotics (CeDRI)Instituto Politécnico de BragançaBragançaPortugal

Personalised recommendations