A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory

被引:222
作者
Wan, Jiafu [1 ]
Li, Jiapeng [1 ]
Imran, Muhammad [2 ]
Li, Di [1 ]
Fazal-e-Amin [2 ]
机构
[1] South China Univ Technol, Sch Mech & Automot Engn, Guangzhou 510641, Guangdong, Peoples R China
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh 11451, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Blockchain; Industrial Internet of Things (IIoT); security and privacy; smart factory; CHALLENGES;
D O I
10.1109/TII.2019.2894573
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture. First, the major problems of the traditional IIoT architecture are analyzed, and the existing improvements are summarized. Second, we introduce a security and privacy model to help design the Blockchain-based architecture. On this basis, we decompose and reorganize the original IIoT architecture to form a new multicenter partially decentralized architecture. Then, we introduce some relative security technologies to improve and optimize the new architecture. After that we design the data interaction process and the algorithms of the architecture. Finally, we use an automatic production platform to discuss the specific implementation. The experimental results show that the proposed architecture provides better security and privacy protection than the traditional architecture. Thus, the proposed architecture represents a significant improvement of the original architecture, which provides a new direction for the IIoT development.
引用
收藏
页码:3652 / 3660
页数:9
相关论文
共 32 条
[1]  
Abomhara M., 2014, P IEEE INT C PRIV SE, P1, DOI DOI 10.1109/PRISMS.2014.6970594
[2]  
Bafandehkar M., 2013, 2013 International Conference on IT Convergence and Security (ICITCS), P1
[3]  
Bahga A., 2016, Journal of Software Engineering and Applications, V9, P533, DOI DOI 10.4236/JSEA.2016.910036
[4]   Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges [J].
Chen, Baotong ;
Wan, Jiafu ;
Shu, Lei ;
Li, Peng ;
Mukherjee, Mithun ;
Yin, Boxin .
IEEE ACCESS, 2018, 6 :6505-6519
[5]   Impact of quality control on production system performance [J].
Colledani, M. ;
Tolio, T. .
CIRP ANNALS-MANUFACTURING TECHNOLOGY, 2006, 55 (01) :453-456
[6]  
Colombo AW, 2014, ERCIM NEWS, P15
[7]  
Cui A, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P97
[8]  
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
[9]   Introduction. Claim the right to the city in the American metropolis [J].
Gervais, Laurence ;
Diamond, Andrew .
REVUE FRANCAISE D ETUDES AMERICAINES, 2016, (148) :3-7
[10]  
Gilbert H, 2004, LECT NOTES COMPUT SC, V3006, P175