scholarly journals A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things

Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 175 ◽  
Author(s):  
Prince Waqas Khan ◽  
Yungcheol Byun

Smart cameras and image sensors are widely used in industrial processes, from the designing to the quality checking of the final product. Images generated by these sensors are at continuous risk of disclosure and privacy breach in the industrial Internet of Things (IIoT). Traditional solutions to secure sensitive data fade in IIoT environments because of the involvement of third parties. Blockchain technology is the modern-day solution for trust issues and eliminating or minimizing the role of the third party. In the context of the IIoT, we propose a permissioned private blockchain-based solution to secure the image while encrypting it. In this scheme, the cryptographic pixel values of an image are stored on the blockchain, ensuring the privacy and security of the image data. Based on the number of pixels change rate (NPCR), the unified averaged changed intensity (UACI), and information entropy analysis, we evaluate the strength of proposed image encryption algorithm ciphers with respect to differential attacks. We obtained entropy values near to an ideal value of 8, which is considered to be safe from brute force attack. Encrypted results show that the proposed scheme is highly effective for data leakage prevention and security.

Author(s):  
Rinki Sharma

Over the years, the industrial and manufacturing applications have become highly connected and automated. The incorporation of interconnected smart sensors, actuators, instruments, and other devices helps in establishing higher reliability and efficiency in the industrial and manufacturing process. This has given rise to the industrial internet of things (IIoT). Since IIoT components are scattered all over the network, real-time authenticity of the IIoT activities becomes essential. Blockchain technology is being considered by the researchers as the decentralized architecture to securely process the IIoT transactions. However, there are challenges involved in effective implementation of blockchain in IIoT. This chapter presents the importance of blockchain in IIoT paradigm, its role in different IIoT applications, challenges involved, possible solutions to overcome the challenges and open research issues.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 244 ◽  
Author(s):  
Jong Park

After the emergence of the Internet and mobile communication networks, the IoT has been considered as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years. In the future, people and objects will be connected at any time, any place, with anything and anyone and will utilize any network and services. IIoT is creating a new world in which people and businesses can manage their assets in more informed ways and can make more opportune and better-informed decisions. Many advanced IIoT and 5G technologies have been successfully applied in everyday life, but there are still many practical problems tackled by traditional methods which are generally difficult to experimentally solve in the advanced Industrial Internet of Things. Therefore, in this special issue, we accepted five articles in three different dimensions: communication networks, optimized resource provisioning and data forwarding, privacy and security.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jianwen Hu ◽  
Yuling Chen ◽  
Xiaojun Ren ◽  
Yixian Yang ◽  
Xiaobin Qian ◽  
...  

As the technical support of the industrial Internet of Things, blockchain technology has been widely used in energy trading, data transactions, and Internet of Vehicles. However, most of the existing energy trading models only address the transaction security and transaction privacy issues that arise in the energy trading process, ignoring the fairness of resource allocation and transaction equity in the trading process. In order to tackle those problems, an energy trading scheme called HO-TRAD is proposed in this paper to improve the efficiency of model trading while ensuring the fairness of energy trading. We propose a new trading strategy in the HO-TRAD energy trading scheme that guarantees fairness in the allocation of trading resources by introducing an entity’s active reputation value. Use smart contracts to achieve transparency and ensure fairness in the transaction process. Based on the identity verification foundation of the consortium chain, the scheme enhances the existing PBFT consensus algorithm and improves the efficiency of model transactions. The experimental simulation indicates that the scheme requires less transaction time and has higher transaction fairness and security.


MEST Journal ◽  
2018 ◽  
Vol 6 (2) ◽  
pp. 39-47 ◽  
Author(s):  
Zoran Cekerevac ◽  
◽  
Lyudmila Prigoda ◽  
Jelena Maletic

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nils Siegfried ◽  
Tobias Rosenthal ◽  
Alexander Benlian

Purpose The purpose of this paper is to investigate the suitability of Blockchain technology for applications in the Industrial Internet of Things (IIOT). It provides a taxonomy of system requirements for such applications and maps these requirements against the Blockchain’s technological idiosyncrasies. Design/methodology/approach A requirement taxonomy is built in an iterative process based on a descriptive literature review. In total, 223 studies have been screened leading to a relevant sample of 48 publications that were analyzed in detail regarding posed system requirements. Subsequently, Blockchain’s capabilities are discussed for each requirement dimension. Findings The paper presents a taxonomy of six requirement dimensions. In the mapping process, areas of greater fit (e.g., reliability, nonrepudiation and adaptability) were identified. However, there are also several constraints (e.g., scalability, confidentiality and performance) that limit the use of Blockchain. Research limitations/implications Due to the limited amount of studies and the vibrant development of Blockchain technology, the results may benefit from practical evidence. Researchers are encouraged to validate the results in qualitative practitioner interviews. Focusing on literature-backed public Blockchain, idiosyncrasies of private implementations and specific distributed ledger technologies may be discussed in future studies. Practical implications The paper includes use cases for Blockchain in manufacturing and IIOT applications. Potential caveats for practitioners are presented. Originality/value This paper addresses the need to understand to which degree Blockchain is a suitable technology in manufacturing, especially in context of the IIOT. It contributes a requirement taxonomy which serves as the foundation for a systematic fit assessment.


Blockchain technology uses the cryptographic technique to create expanding list of data records called blocks. Along with transaction and timestamp data, each block holds a hash value obtained using cryptographic technique. Blockchain gains importance for its decentralized data transaction and authorization without the need for third-party intervention. Although, it is mostly used in Finance sector these days, due to its inherent ability to protect data it can be applied to every field of computation especially in fields where data transaction is voluminous. Internet of Things (IoT) is one such area where it involves collection, transfer and processing of real time data from objects, humans and sensors to automate various tasks. Hence, this paper reviews the blockchain technology, and how it can be coupled with IoT to overcome the privacy and security issues. This paper first systematically introduces the concept of blockchain technology, its applications along with the need for IoT devices and its implementation. Finally, it discusses the blockchain based IoT (BIoT) its architecture, advantages, challenges in implementation


Author(s):  
Ricardo Raimundo ◽  
Albérico Travassos Rosário

Nowadays, people live amidst the smart home domain, business opportunities in the industrial smart city and health care, though, along with concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited in what comes to machine resources. In this way, traditional security does not fit in IoT systems. In this vein, the issue of cyber security has become paramount to the Internet of Things (IoT) and Industrial Internet of Things (IIoT) in mitigating cyber security risk for organizations and end users. New cyber security technologies / applications present improvements for IoT security management. Nevertheless, there is a gap on the effectiveness of IoT cyber risk solutions. This review article discusses the, trends around opportunities and threats in cyber security for IIoT.


Sign in / Sign up

Export Citation Format

Share Document