The advent of the Internet of Things (IoT) and its spread in industrial environments has changed production lines, by dramatically fostering the dynamicity of data sharing and the connectivity of machines. However, such increased flexibility (also pushed by the adoption of edge devices) must not negatively affect the security and safety of industrial environments. The proposed solution adopts the Blockchain to securely store in distributed ledgers topology information and access rules, maximizing the cyber-resiliency of industrial networks. Topology information and access rules are stored and queried in a completely distributed manner, ensuring data availability even in case a centralized controller is temporarily down or the network partitioned. Moreover, Blockchain consensus algorithms foster a participative validation of topology information, to ensure the identity of interacting machines/nodes, to securely distribute topology information and commands in a privacy-preserving manner, and to trace any past modification in a non-repudiable manner. Finally, the adoption of configurable edge gateways allows to take prompt countermeasures in case potential threats are identified, by activating access rules stored in ledgers in a secure and distributed manner. In addition to solution design guidelines and architectural considerations, the paper also presents performance results achieved with our CyberChain working prototype, with the goal of not only demonstrating the feasibility of the proposed solution but also its suitability in industrial environments.
Design Guidelines and a Prototype Implementation for Cyber-Resiliency in IT/OT Scenarios based on Blockchain and Edge Computing
Balistri E.Primo
;Casellato F.Secondo
;Collura S.;Giannelli C.
;Riberto G.;Stefanelli C.Ultimo
2022
Abstract
The advent of the Internet of Things (IoT) and its spread in industrial environments has changed production lines, by dramatically fostering the dynamicity of data sharing and the connectivity of machines. However, such increased flexibility (also pushed by the adoption of edge devices) must not negatively affect the security and safety of industrial environments. The proposed solution adopts the Blockchain to securely store in distributed ledgers topology information and access rules, maximizing the cyber-resiliency of industrial networks. Topology information and access rules are stored and queried in a completely distributed manner, ensuring data availability even in case a centralized controller is temporarily down or the network partitioned. Moreover, Blockchain consensus algorithms foster a participative validation of topology information, to ensure the identity of interacting machines/nodes, to securely distribute topology information and commands in a privacy-preserving manner, and to trace any past modification in a non-repudiable manner. Finally, the adoption of configurable edge gateways allows to take prompt countermeasures in case potential threats are identified, by activating access rules stored in ledgers in a secure and distributed manner. In addition to solution design guidelines and architectural considerations, the paper also presents performance results achieved with our CyberChain working prototype, with the goal of not only demonstrating the feasibility of the proposed solution but also its suitability in industrial environments.File | Dimensione | Formato | |
---|---|---|---|
IEEE-IOTJ-Design_Guidelines_and_a_Prototype_Implementation_for_Cyber-Resiliency_in_IT_OT_Scenarios_based_on_Blockchain_and_Edge_Computing.pdf
accesso aperto
Descrizione: Post-print
Tipologia:
Post-print
Licenza:
PUBBLICO - Pubblico con Copyright
Dimensione
3.96 MB
Formato
Adobe PDF
|
3.96 MB | Adobe PDF | Visualizza/Apri |
Design_Guidelines_and_a_Prototype_Implementation_for_Cyber-Resiliency_in_IT_OT_Scenarios_Based_on_Blockchain_and_Edge_Computing.pdf
solo gestori archivio
Descrizione: Full text editoriale
Tipologia:
Full text (versione editoriale)
Licenza:
NON PUBBLICO - Accesso privato/ristretto
Dimensione
3.14 MB
Formato
Adobe PDF
|
3.14 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in SFERA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.