FUSION-Fog Computing and Blockchain for Trusted Industrial Internet of Things

被引:13
作者
Ceccarelli, Andrea [1 ]
Cinque, Marcello [2 ]
Esposito, Christian [3 ]
Foschini, Luca [4 ]
Giannelli, Carlo [5 ]
Lollini, Paolo [1 ]
机构
[1] Univ Florence, I-50121 Florence, Italy
[2] Univ Naples Federico II, I-80138 Naples, Italy
[3] Univ Salerno, I-84084 Fisciano, Italy
[4] Univ Bologna, I-40126 Bologna, Italy
[5] Univ Ferrara, I-44121 Ferrara, Italy
关键词
Internet of Things; Cloud computing; Industries; Maintenance engineering; Software; Blockchain; fog; edge computing; industrial Internet of Things (IIoT); SOFTWARE; ARCHITECTURE; MANAGEMENT; NETWORK; IOT;
D O I
10.1109/TEM.2020.3024105
中图分类号
F [经济];
学科分类号
02 ;
摘要
The industrial Internet of Things (IIoT) is currently foreseen as a foundation to implement the Industry 4.0 vision. However, device heterogeneity and the need of integration and configuration exposes the industrial infrastructure to potential threats, such as black-hole, man-in-the-middle, and malicious configuration attacks. In this article, we investigate how to manage distributed trust information and to enable trusted configuration actions in the IIoT, by opportunistically intermingling blockchain with the software defined networking and container orchestration technologies. In particular, we focus on how the joint and coordinated adoption of such technologies can make technicians' interventions on industrial equipment both easier and more trusted. To this purpose, we present the design of a software architecture to simplify the management, configuration, and assessment of IIoT systems, and we discuss our experiences with the application of the proposed architecture in a railways use case.
引用
收藏
页码:2944 / 2958
页数:15
相关论文
共 54 条
[21]  
Grandison Tyrone, 2000, IEEE Commun. Surv. Tutorials, V3, P2, DOI [10.1109/COMST.2000.5340804, DOI 10.1109/COMST.2000.5340804]
[22]   A survey of autonomic computing - Degrees, models, and applications [J].
Huebscher, Markus C. ;
McCann, Julie A. .
ACM COMPUTING SURVEYS, 2008, 40 (03)
[23]  
Jeschke S, 2017, SP SER WIRELESS TECH, P1, DOI 10.1007/978-3-319-42559-7
[24]   Edge Computing in the Industrial Internet of Things Environment: Software-Defined-Networks-Based Edge-Cloud Interplay [J].
Kaur, Kuljeet ;
Garg, Sahil ;
Aujla, Gagangeet Singh ;
Kumar, Neeraj ;
Rodrigues, Joel J. P. C. ;
Guizani, Mohsen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) :44-51
[25]  
Kaushik A, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P2145, DOI 10.1109/RTEICT.2017.8256979
[26]   IoT security: Review, blockchain solutions, and open challenges [J].
Khan, Minhaj Ahmad ;
Salah, Khaled .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :395-411
[27]   Can Blockchain Strengthen the Internet of Things? [J].
Kshetri, Nir .
IT PROFESSIONAL, 2017, 19 (04) :68-72
[28]   Safe and efficient runtime testing framework applied in dynamic and distributed systems [J].
Lahami, Mariam ;
Krichen, Moez ;
Jmaiel, Mohamed .
SCIENCE OF COMPUTER PROGRAMMING, 2016, 122 :1-28
[29]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51
[30]   Improving rail network velocity: A machine learning approach to predictive maintenance [J].
Li, Hongfei ;
Parikh, Dhaivat ;
He, Qing ;
Qian, Buyue ;
Li, Zhiguo ;
Fang, Dongping ;
Hampapur, Arun .
TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2014, 45 :17-26