The advent of the Internet of Things (IoT) together with its spread in industrial environments have changed production lines, by dramatically fostering the dynamicity of data sharing and the openness of machines. However, the increased flexibility and openness of the industrial environment (also pushed by the adoption of Edge devices) must not negatively affect the security and safety of production lines and its operational processes. In fact, opening industrial environments towards the Internet and increasing interactions among machines may represent a security threat, if not properly managed. The paper originally proposes the adoption of the Blockchain to securely store in distributed ledgers topology information and access rules, with the primary goal of maximizing the cyber-resiliency of industrial networks. In this manner, it is possible to store and query topology information and security access rules in a completely distributed manner, ensuring data availability even in case a centralized control point is temporarily down or the network partitioned. Moreover, Blockchain consensus algorithms can be used to foster a participative validation of topology information, to reciprocally ensure the identity of interacting machines/nodes, to securely distribute topology information and commands in a privacy-preserving manner, and to trace any past modification in a non-repudiable manner. The paper originally proposes the adoption of the Blockchain to securely store in distributed ledgers topology information and access rules, with the primary goal of maximizing the cyber-resiliency of industrial networks. In this manner, it is possible to store and query topology information and security access rules in a completely distributed manner, ensuring data availability even in case a centralized control point is temporarily down or the network partitioned. Moreover, Blockchain consensus algorithms can be used to foster a participative validation of topology information, to reciprocally ensure the identity of interacting machines/nodes, to securely distribute topology information and commands in a privacy-preserving manner, and to trace any past modification in a non-repudiable manner.
Blockchain for Increased Cyber-Resiliency of Industrial Edge Environments
Balistri E.Primo
;Casellato F.;Giannelli C.
;Stefanelli C.Ultimo
2020
Abstract
The advent of the Internet of Things (IoT) together with its spread in industrial environments have changed production lines, by dramatically fostering the dynamicity of data sharing and the openness of machines. However, the increased flexibility and openness of the industrial environment (also pushed by the adoption of Edge devices) must not negatively affect the security and safety of production lines and its operational processes. In fact, opening industrial environments towards the Internet and increasing interactions among machines may represent a security threat, if not properly managed. The paper originally proposes the adoption of the Blockchain to securely store in distributed ledgers topology information and access rules, with the primary goal of maximizing the cyber-resiliency of industrial networks. In this manner, it is possible to store and query topology information and security access rules in a completely distributed manner, ensuring data availability even in case a centralized control point is temporarily down or the network partitioned. Moreover, Blockchain consensus algorithms can be used to foster a participative validation of topology information, to reciprocally ensure the identity of interacting machines/nodes, to securely distribute topology information and commands in a privacy-preserving manner, and to trace any past modification in a non-repudiable manner. The paper originally proposes the adoption of the Blockchain to securely store in distributed ledgers topology information and access rules, with the primary goal of maximizing the cyber-resiliency of industrial networks. In this manner, it is possible to store and query topology information and security access rules in a completely distributed manner, ensuring data availability even in case a centralized control point is temporarily down or the network partitioned. Moreover, Blockchain consensus algorithms can be used to foster a participative validation of topology information, to reciprocally ensure the identity of interacting machines/nodes, to securely distribute topology information and commands in a privacy-preserving manner, and to trace any past modification in a non-repudiable manner.File | Dimensione | Formato | |
---|---|---|---|
Blockchain_IIoT_Edge_Cyber_resiliency-pdfa.pdf
solo gestori archivio
Descrizione: Pre-print
Tipologia:
Pre-print
Licenza:
NON PUBBLICO - Accesso privato/ristretto
Dimensione
1.99 MB
Formato
Adobe PDF
|
1.99 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
SMARTCOMP50058.2020.00021.pdf
solo gestori archivio
Descrizione: Full text editoriale
Tipologia:
Full text (versione editoriale)
Licenza:
NON PUBBLICO - Accesso privato/ristretto
Dimensione
464.37 kB
Formato
Adobe PDF
|
464.37 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in SFERA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.