Secure Blockchain Integration Approach for Knowledge Discovery in Industrial Internet of Things

IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Rohan Tripathi;Ritam Rao;Vivekananda Bhat K.;Abhishek Kumar Pandey;Ashok Kumar Das
{"title":"Secure Blockchain Integration Approach for Knowledge Discovery in Industrial Internet of Things","authors":"Rohan Tripathi;Ritam Rao;Vivekananda Bhat K.;Abhishek Kumar Pandey;Ashok Kumar Das","doi":"10.1109/OJCOMS.2025.3574816","DOIUrl":null,"url":null,"abstract":"The field of Industrial Internet of Things (IIoT) is now being duly recognized as a revolutionary area in industrial automation. With the budding interest of knowledge discovery that helps the businesses in applying technology on a large scale, researchers are now faced with several major security concerns. Blockchain integration is one of the suggested applications of technology that could help secure the data during transmission, storage, and knowledge discovery. Moreover, by integrating smart contracts, a secure architecture could also assimilate accountability during data exchange. Thus, we propose a four-layer security architecture that isolates IIoT devices from user-oriented layers and maintains a record of all IIoT devices registered in the organization to prevent malicious devices from corrupting the database and discovery process. Further, by choosing proof of authority (PoA), we ensure the fair functioning of the Blockchain nodes. Through proxy re-encryption for clients, PoA consensus for Blockchain nodes, and Whitelist-based access control for IIoT Devices, we ensure the legitimacy of all participating nodes. We also implement a prototype using a private Ethereum network with proof of authority consensus and present the time taken for the entire exchange and the gas (ethereum currency) consumed per exchange by the contracts. Also we implemented the secure knowledge discovery to understand the significance of the developed scheme. The results show that the exchange can be implemented in an IIoT environment and work with a reasonable amount of resource consumption.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"4772-4787"},"PeriodicalIF":6.3000,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11017668","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/11017668/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

The field of Industrial Internet of Things (IIoT) is now being duly recognized as a revolutionary area in industrial automation. With the budding interest of knowledge discovery that helps the businesses in applying technology on a large scale, researchers are now faced with several major security concerns. Blockchain integration is one of the suggested applications of technology that could help secure the data during transmission, storage, and knowledge discovery. Moreover, by integrating smart contracts, a secure architecture could also assimilate accountability during data exchange. Thus, we propose a four-layer security architecture that isolates IIoT devices from user-oriented layers and maintains a record of all IIoT devices registered in the organization to prevent malicious devices from corrupting the database and discovery process. Further, by choosing proof of authority (PoA), we ensure the fair functioning of the Blockchain nodes. Through proxy re-encryption for clients, PoA consensus for Blockchain nodes, and Whitelist-based access control for IIoT Devices, we ensure the legitimacy of all participating nodes. We also implement a prototype using a private Ethereum network with proof of authority consensus and present the time taken for the entire exchange and the gas (ethereum currency) consumed per exchange by the contracts. Also we implemented the secure knowledge discovery to understand the significance of the developed scheme. The results show that the exchange can be implemented in an IIoT environment and work with a reasonable amount of resource consumption.
工业物联网知识发现的安全区块链集成方法
工业物联网(IIoT)领域现在被公认为工业自动化的一个革命性领域。随着知识发现帮助企业大规模应用技术的兴起,研究人员现在面临着几个主要的安全问题。区块链集成是建议的技术应用程序之一,它可以帮助在传输、存储和知识发现过程中保护数据。此外,通过集成智能合约,安全架构还可以在数据交换过程中吸收责任。因此,我们提出了一个四层安全架构,将工业物联网设备与面向用户的层隔离开来,并维护组织中注册的所有工业物联网设备的记录,以防止恶意设备破坏数据库和发现过程。此外,通过选择权威证明(PoA),我们确保区块链节点的公平运行。通过对客户端的代理重新加密、区块链节点的PoA共识以及基于白名单的IIoT设备访问控制,我们确保了所有参与节点的合法性。我们还使用具有权威共识证明的私有以太坊网络实现了一个原型,并展示了整个交换所花费的时间和合同每次交换消耗的gas(以太币)。同时,我们还实现了安全知识发现,以理解所开发方案的意义。结果表明,该交换可以在工业物联网环境中实现,并且可以在合理的资源消耗下工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
13.70
自引率
3.80%
发文量
94
审稿时长
10 weeks
期刊介绍: The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023. The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include: Systems and network architecture, control and management Protocols, software, and middleware Quality of service, reliability, and security Modulation, detection, coding, and signaling Switching and routing Mobile and portable communications Terminals and other end-user devices Networks for content distribution and distributed computing Communications-based distributed resources control.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信