Security Audit of a Blockchain-Based Industrial Application Platform

被引:18
作者
Stodt, Jan [1 ]
Schoenle, Daniel [1 ]
Reich, Christoph [1 ]
Ghovanlooy Ghajar, Fatemeh [2 ]
Welte, Dominik [2 ]
Sikora, Axel [2 ]
机构
[1] Hsch Furtwangen Univ, Inst Data Sci, Cloud Comp & IT Secur IDACUS, D-78120 Furtwangen, Germany
[2] Offenburg Univ Appl Sci, Inst Reliable Embedded Syst & Commun Elect ivESK, D-77652 Offenburg, Germany
关键词
blockchain; distributed ledger; legacy machines; maintenance; shop floor; security; ATTACKS; THREATS;
D O I
10.3390/a14040121
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indisputable logging. Ideally, the level of security for these IoT devices shall be very high, as they are specifically designed for this autonomous and networked environment. This paper discusses a use case of a company with legacy devices that wants to benefit from the features and functionality of blockchain technology. In particular, the implications of retrofit solutions are analyzed. The use of the BISS:4.0 platform is proposed as the underlying infrastructure. BISS:4.0 is intended to integrate the blockchain technologies into existing enterprise environments. Furthermore, a security analysis of IoT and blockchain present attacks and countermeasures are presented that are identified and applied to the mentioned use case.
引用
收藏
页数:21
相关论文
共 62 条
[1]  
Ahemd MM, 2017, 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), P104, DOI 10.1109/COMTECH.2017.8065757
[2]   Covert Channels-Based Stealth Attacks in Industry 4.0 [J].
Alcaraz, Cristina ;
Bernieri, Giuseppe ;
Pascucci, Federica ;
Lopez, Javier ;
Setola, Roberto .
IEEE SYSTEMS JOURNAL, 2019, 13 (04) :3980-3988
[3]  
Alem S, 2019, I C COMP SYST APPLIC
[4]   Consumer IoT: Security Vulnerability Case Studies and Solutions [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Sikdar, Biplab ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) :17-25
[5]  
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[6]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[7]  
[Anonymous], 2011, Final Version of NIST Cloud Computing Definition
[8]  
[Anonymous], 2012, WORLD APPL SCI J, DOI DOI 10.5829/idosi.wasj.2012.19.04.1837
[9]  
Bongiorni L., REMOTELY CONTROLLED
[10]   SDTE: A Secure Blockchain-Based Data Trading Ecosystem [J].
Dai, Weiqi ;
Dai, Chunkai ;
Choo, Kim-Kwang Raymond ;
Cui, Changze ;
Zou, Deiqing ;
Jin, Hai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :725-737