scholarly journals Security Audit of a Blockchain-Based Industrial Application Platform

Algorithms ◽  
2021 ◽  
Vol 14 (4) ◽  
pp. 121
Author(s):  
Jan Stodt ◽  
Daniel Schönle ◽  
Christoph Reich ◽  
Fatemeh Ghovanlooy Ghajar ◽  
Dominik Welte ◽  
...  

In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indisputable logging. Ideally, the level of security for these IoT devices shall be very high, as they are specifically designed for this autonomous and networked environment. This paper discusses a use case of a company with legacy devices that wants to benefit from the features and functionality of blockchain technology. In particular, the implications of retrofit solutions are analyzed. The use of the BISS:4.0 platform is proposed as the underlying infrastructure. BISS:4.0 is intended to integrate the blockchain technologies into existing enterprise environments. Furthermore, a security analysis of IoT and blockchain present attacks and countermeasures are presented that are identified and applied to the mentioned use case.

Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 752 ◽  
Author(s):  
Ye-Jin Choi ◽  
Hee-Jung Kang ◽  
Il-Gu Lee

The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Yang Xu ◽  
Guojun Wang ◽  
Jidian Yang ◽  
Ju Ren ◽  
Yaoxue Zhang ◽  
...  

The emerging network computing technologies have significantly extended the abilities of the resource-constrained IoT devices through the network-based service sharing techniques. However, such a flexible and scalable service provisioning paradigm brings increased security risks to terminals due to the untrustworthy exogenous service codes loading from the open network. Many existing security approaches are unsuitable for IoT environments due to the high difficulty of maintenance or the dependencies upon extra resources like specific hardware. Fortunately, the rise of blockchain technology has facilitated the development of service sharing methods and, at the same time, it appears a viable solution to numerous security problems. In this paper, we propose a novel blockchain-based secure service provisioning mechanism for protecting lightweight clients from insecure services in network computing scenarios. We introduce the blockchain to maintain all the validity states of the off-chain services and edge service providers for the IoT terminals to help them get rid of untrusted or discarded services through provider identification and service verification. In addition, we take advantage of smart contracts which can be triggered by the lightweight clients to help them check the validities of service providers and service codes according to the on-chain transactions, thereby reducing the direct overhead on the IoT devices. Moreover, the adoptions of the consortium blockchain and the proof of authority consensus mechanism also help to achieve a high throughput. The theoretical security analysis and evaluation results show that our approach helps the lightweight clients get rid of untrusted edge service providers and insecure services effectively with acceptable latency and affordable costs.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


History has always been a great indicator of past behaviour as well as of future trends. However, when you think of what future jobs may look like, you do not certainly expect to find a plausible response in the past. Technologies and scientific advancements in general make it almost impossible to predict what you will be required to know in order to get—or maintain—your job in the next six months, let alone in the next couple of years. Whilst disruption seems such a new concept nowadays, we will learn that disruptive innovations have always been part of our story. The authors look at the major industrial revolutions known to humans and discuss patterns to help us prepare for the forthcoming future.


2020 ◽  
Vol 29 (4) ◽  
pp. 1067-1073
Author(s):  
Jan Fagerberg ◽  
Bart Verspagen

Abstract According to Christopher Freeman technological revolutions play a key role in capitalist development. In this article, we ask to what extent more recent developments are consistent with the perspective advanced by Freeman. We focus on two issues in particular, the climate challenge and what has been dubbed “A Fourth Industrial Revolution” that is, advances in artificial intelligence and the proliferation of the internet of things.


2020 ◽  
Vol 9 (5) ◽  
pp. 42
Author(s):  
Afam I. O. Jideani ◽  
Awelani P. Mutshinyani ◽  
Ntsako P. Maluleke ◽  
Zwivhuya P. Mafukata ◽  
Mkateko V. Sithole ◽  
...  

The industrial revolutions occurring at specific periods impacted differently on food industry machinery, including analytical and innovative scientific equipment, and had significant effects on food manufacturing. The fourth industrial revolution (4IR) unlike the other industrial revolutions (1IR, 2IR, and 3IR) has a faster significant impact and niches on artificial intelligence (AI), machine learning (ML), blockchain, robotics, the internet of things (IoT), digitalization, big data, autonomous vehicles, additive manufacturing, nanotechnology, biotechnology, and 3D food printing technologies. Going forward would require more mechatronic engineers as process technicians, particularly in paperless processes and automation of the digital rich future.


Author(s):  
Seong-Kyu Kim ◽  
Jun-Ho Huh

Abstract This paper deals with the current Blockchain adopted in the various types of trading markets supporting smart contracts that process text-based transaction information only when exchanging cryptocurrencies. Even though the Blockchain itself is decentralized, services can still be provided through a centralized system in order to provide adequate services to the users. It also allows the Autochain to apply Blockchain technology to existing businesses conducted under the Fourth Industrial Revolution to realize higher productivity or competitiveness and improve profitability to a remarkable extent. The Autochain is adaptable to all Blockchain technologies, companies, or research works around the world to overcome the limitations of the existing Blockchain technology. It creates the Blockchain-platform ecology chain and ecosystem, making our lives more convenient while revolutionizing every industry. In addition, it automates all Blockchain-based systems and offers a base for constructing a system wherein everyone can easily provide, operate, and maintain Blockchain services. This paper discusses a number of Blockchain-related technologies and presents a decentralized Application (dApp) exclusively designed for mobile use, taking house rental service as an example. It also presents the existing Blockchain and the Blockchain database storage method and proposes the dApp based on it.


Proceedings ◽  
2018 ◽  
Vol 2 (19) ◽  
pp. 1231 ◽  
Author(s):  
Davide Pedrini ◽  
Mauro Migliardi ◽  
Carlo Ferrari ◽  
Alessio Merlo

Recently blockchain technology has been advocated as a solution fitting many different problems in several applicative fields; among these fields there is the Internet of Things (IoT) too. In this paper we show the most significant properties of a blockchain, how they suite the use case of a cryptocurrency and how they map onto the needs of IoT systems. We claim that a blockchain does not provide a significant advantage with respect to other database technologies in a field such as Internet of Things where computational power comes at a premium, energy is often scarce and storage scalability is a major challenge.


Author(s):  
Ravdeep Kour

The convergence of information technology (IT) and operational technology (OT) and the associated paradigm shift toward fourth industrial revolution (aka Industry 4.0) in companies has brought tremendous changes in technology vision with innovative technologies such as robotics, big data, cloud computing, online monitoring, internet of things (IoT), cyber-physical systems (CPS), cognitive computing, and artificial intelligence (AI). However, this transition towards the fourth industrial revolution has many benefits in productivity, efficiency, revenues, customer experience, and profitability, but also imposes many challenges. One of the challenges is to manage and secure large amount of data generated from internet of things (IoT) devices that provide many entry points for hackers in the form of a threat to exploit new and existing vulnerabilities within the network. This chapter investigates various cybersecurity issues and challenges in Industry 4.0 with more focus on three industrial case studies.


Author(s):  
Maria Guida

The 21st century has witnessed the development of the fourth industrial revolution that means cutting-edge technologies including artificial intelligence and the internet of things. The special quality of this epochal revolution lies in a rapid acceleration of the speed of change, never seen before. This is happening at the most challenging time ever faced by our species, due to existential threats. This scenario begs big questions to professionals in the field of mathematics education. Can mathematics education contribute to build a better world? The chapter reports on a participatory research conducted by a researcher in mathematics education together with 11 mathematics teachers. Therefore, the research benefits from a double point of view, coming from different cultures so gaining a double verisimilitude, which makes the results acceptable for all the professionals involved.


Sign in / Sign up

Export Citation Format

Share Document