Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Algorithms  /  Vol: 14 Par: 4 (2021)  /  Artículo
ARTÍCULO
TITULO

Security Audit of a Blockchain-Based Industrial Application Platform

Jan Stodt    
Daniel Schönle    
Christoph Reich    
Fatemeh Ghovanlooy Ghajar    
Dominik Welte and Axel Sikora    

Resumen

In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indisputable logging. Ideally, the level of security for these IoT devices shall be very high, as they are specifically designed for this autonomous and networked environment. This paper discusses a use case of a company with legacy devices that wants to benefit from the features and functionality of blockchain technology. In particular, the implications of retrofit solutions are analyzed. The use of the BISS:4.0 platform is proposed as the underlying infrastructure. BISS:4.0 is intended to integrate the blockchain technologies into existing enterprise environments. Furthermore, a security analysis of IoT and blockchain present attacks and countermeasures are presented that are identified and applied to the mentioned use case.

 Artículos similares

       
 
Maryam Mehrnezhad and Ehsan Toreini    
Mobile sensors have already proven to be helpful in different aspects of people?s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While th... ver más
Revista: Informatics

 
Oksana Mykoliuk, Nataliia Prylepa     Pág. 114 - 121
The subject matter of the research in the article is the energy security strategy of enterprise, the choice of which for the enterprise is the basis of full functioning, further economic and innovative development. The goal of this article is to identify... ver más

 
Viny Fadila,Nurul Mutiah,Renny Puspita Sari     Pág. 271 - 283
Tingginya penggunaan teknologi dan informasi saat ini mengakibatkan peningkatan risiko dan ancaman keamanan data dan informasi. Dinas Komunikasi dan Informatika Kota Pontianak, dinas pemerintahan yang memanfaatkan dan menggunakan banyak teknologi informa... ver más

 
Hendi Sama,Muhammad Rivaldy Hisham,Jumiliono Pratama,Luky Andito,Andy Kho,Hendry Wijaya     Pág. 340 - 354
The use of Information Technology for the information center on the COVID-19 web in Batam city and the COVID-19 web in Indonesia, must be supported by IT Governance which describes the most important factors in the use of IT. In addition, the development... ver más