Actions
shareshare link cite add Please grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added 0 works in your ORCID record related to the merged Research product.
See an issue? Give us feedback
Please grant OpenAIRE to access and update your ORCID works.
This Research product is the result of merged Research products in OpenAIRE.
You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
Publication . Conference object . 2021
Scalability analysis of a blockchain-based security strategy for complex IoT systems
Marti Miquel Martinez; Eva Marin-Tordera; Xavi Masip-Bruin;
Marti Miquel Martinez; Eva Marin-Tordera; Xavi Masip-Bruin;
Restricted English
Published: 15 Jul 2021
Publisher: IEEE
Abstract
Supply chains constitute a type of IoT system that is becoming increasingly complex today. Providing supply chains with cybersecurity guarantees is becoming a highly topic in current research. This interest is mainly rooted on the fact that supply chains may include different vulnerable components, such as those residing in factories, distribution centres, logistics, or transportation, just to name a few. Moreover, most of these components are controlled by different IoT devices, such as sensors and actuators, also becoming well-known sources of vulnerabilities, easing attackers access to the whole system. In this scenario, cyberattacks that use this weak link in a supply chain are increasing in the last years, as it has been largely reported in the literature. In this heterogeneous scenario, the key trend to facilitate cybersecurity provisioning sits on guaranteeing cyber-security in the entire supply chain, handled as a whole, that is, not separately for each individual component of the chain. In this paper, we propose an authentication/access mechanism for the weaker elements in a supply chain, i.e., the IoT devices, leveraging blockchain as the baseline technology, based on considering the generation of temporal tickets to have a higher access control.
Subjects by Vocabulary
Microsoft Academic Graph classification: Provisioning Key (cryptography) Access control business.industry business Scalability Supply chain Authentication Baseline (configuration management) Component (UML) Computer security computer.software_genre computer Computer science
Microsoft Academic Graph classification: Provisioning Key (cryptography) Access control business.industry business Scalability Supply chain Authentication Baseline (configuration management) Component (UML) Computer security computer.software_genre computer Computer science
Related Organizations
See an issue? Give us feedback
Funded by
Download fromView all 2 sources
Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.