Intuitive Development to Examine Collaborative IoT Supply Chain System Underlying Privacy and Security Levels and Perspective Powering through Proactive Blockchain

被引:29
作者
Shahzad, Aamir [1 ]
Zhang, Kaiwen [1 ]
Gherbi, Abdelouahed [1 ]
机构
[1] Ecole Technol Super, Dept Software & IT Engn, Montreal, PQ H3C 1K3, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Internet of Things; supply chain system; privacy and security issues; cryptography; digital signature; blockchain; THINGS IOT; INTERNET; MANAGEMENT; WAREHOUSE; SMART; CLOUD;
D O I
10.3390/s20133760
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Undoubtedly, the supply chain management (SCM) system is an important part of many organizations worldwide; over time, the technologies used to manage a supply chain ecosystem have, therefore, a great impact on businesses' effectiveness. Among others, numerous developments have been made that targeted to have robust supply chain systems to efficiently manage the growing demands of various supplies, considering the underlying requirements and main challenges such as scalability, specifically privacy and security, of various business networks. Internet of things (IoT) comes with a solution to manage a complex, scalable supply chain system, but to provide and attain enough security during information exchange, along with keeping the privacy of its users, is the great inherent challenge of IoT. To fulfill these limitations, this study designs and models a scaled IoT-based supply chain (IoT-SC) system, comprising several operations and participants, and deploys mechanisms to leverage the security, mainly confidentially, integrity, authentication (CIA), and a digital signature scheme to leverage potentially secured non-repudiation security service for the worst-case scenario, and to leverage privacy to keep users sensitive personal and location information protected against adversarial entities to the IoT-SC system. Indeed, a scaled IoT-SC system certainly opens new challenges to manage privacy and security while communicating. Therefore, in the IoT-SC system, each transaction writes from edge computing nodes to the IoT-SC controller is thoroughly examined to ensure the proposed solutions in bi-directional communication, and their robustness against adversarial behaviors. Future research works, employing blockchain and its integrations, are detailed as paces to accelerate the privacy and security of the IoT-SC system, for example, migrating IoT-centric computing to an immutable, decentralized platform.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 60 条
[1]   RETRACTED: Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems (Retracted article. See vol. 128, pg. 568, 2022) [J].
Abdel-Basset, Mohamed ;
Manogaran, Gunasekaran ;
Mohamed, Mai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :614-628
[2]  
Abomhara M., 2014, P IEEE INT C PRIV SE, P1, DOI [10.1109/PRISMS.2014.6970594, DOI 10.1109/PRISMS.2014.6970594]
[3]   Applications of Blockchains in the Internet of Things: A Comprehensive Survey [J].
Ali, Muhammad Salek ;
Vecchio, Massimo ;
Pincheira, Miguel ;
Dolui, Koustabh ;
Antonelli, Fabio ;
Rehmani, Mubashir Husain .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1676-1717
[4]  
[Anonymous], P 11 INT C WIR COMM
[5]  
Ardagna CA, 2007, LECT NOTES COMPUT SC, V4602, P47
[6]  
Argyropoulou M, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), P1673, DOI 10.1109/IEEM.2015.7385932
[7]   The Shapley weighting vector-based neutrosophic aggregation operator in DEMATEL method [J].
Awang, A. ;
Ab Ghani, A. T. ;
Abdullah, L. ;
Ahmad, M. F. .
3RD INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND STATISTICS, 2018, 1132
[8]  
Aziz T., 2018, INT J COMPUT APPL, V179, P31, DOI [10.5120/ijca2018916607, DOI 10.5120/IJCA2018916607]
[9]   Internet of things and supply chain management: a literature review [J].
Ben-Daya, Mohamed ;
Hassini, Elkafi ;
Bahroun, Zied .
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2019, 57 (15-16) :4719-4742
[10]  
Benaini A., 2016, Proceedings of the 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, P1, DOI DOI 10.1109/AICCSA.2016.7945828