Collaborative Trust Blockchain Based Unbiased Control Transfer Mechanism for Industrial Automation

被引:95
作者
Chen, Jianing [1 ]
Wu, Jun [1 ]
Liang, Haoran [1 ]
Mumtaz, Shahid [2 ]
Li, Jianhua [1 ]
Konstantin, Kostromitin [3 ]
Bashir, Ali Kashif [4 ,5 ]
Nawaz, Raheel [6 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyber Secur, Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[2] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[3] South Ural State Univ, Dept Phys Nanoscale Syst, Chelyabinsk 454080, Russia
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[5] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
[6] Manchester Metropolitan Univ, Dept Operat Technol Events & Hospitality Manageme, Manchester M15 6BH, Lancs, England
基金
中国国家自然科学基金;
关键词
Blockchain; Integrated circuits; Collaboration; Automation; Control systems; Cryptography; collaborative trust; control transfer; industrial control systems (ICS); security; INTERNET; SERVICE;
D O I
10.1109/TIA.2019.2959550
中图分类号
T [工业技术];
学科分类号
120111 [工业工程];
摘要
In industrial automation, numerous devices are interconnected in smart factories for further monitor and control. Various infrastructure devices in industrial automation are usually used for control instruction distribution, data collection, and collaboration of the industrial applications. Recent security threats on industrial automation are more frequent and the industrial control systems lack trust mechanism. Blockchain has been introduced due to its decentralization and security promise, but the election results in the original designs could be biased without collaboration trust, which leads the blockchain-based industry applications invalid. In addition, in existing solutions, neither supernodes nor normal nodes in blockchain can transfer their control authorities for disaster backup. To address the aforementioned challenges, this article proposes a collaborative trust based unbiased control transfer mechanism (CTM), which realizes a dynamic assignment of industrial control. First, a collaborative trust based delegated proof of stake consensus is proposed for determining the authorities of control dynamically and unbiasedly, by designing a lightweight trust propagation protocol. Second, a CTM for checking, alarming, and restarting CTM is devised for the disaster backup. The simulation results demonstrate the CTM, which is feasible and effective for industrial automation security.
引用
收藏
页码:4478 / 4488
页数:11
相关论文
共 28 条
[1]
[Anonymous], 2014, [No title captured]
[2]
[Anonymous], 2015, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, DOI DOI 10.1016/C2013-0-06836-3
[3]
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Green, Matthew ;
Tromer, Eran ;
Virza, Madars .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :287-304
[4]
Cascudo Ignacio, 2017, Applied Cryptography and Network Security. 15th International Conference, ACNS 2017. Proceedings: LNCS 10355, P537, DOI 10.1007/978-3-319-61204-1_27
[5]
Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks [J].
Chen, Jiming ;
Cao, Xianghui ;
Cheng, Peng ;
Xiao, Yang ;
Sun, Youxian .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (12) :4219-4230
[6]
A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry [J].
Fraga-Lamas, Paula ;
Fernandez-Carames, Tiago M. .
IEEE ACCESS, 2019, 7 :17578-17598
[7]
Stake-Bleeding Attacks on Proof-of-Stake Blockchains [J].
Gazi, Peter ;
Kiayias, Aggelos ;
Russell, Alexander .
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, :85-92
[8]
Hassanzadeh A, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P795, DOI 10.1109/WF-IoT.2015.7389155
[9]
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) [J].
Jarecki, Stanislaw ;
Kiayias, Aggelos ;
Krawczyk, Hugo ;
Xu, Jiayu .
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, :276-291
[10]
Kim JT, 2018, I C INF COMM TECH CO, P932, DOI 10.1109/ICTC.2018.8539561