2022
DOI: 10.1109/tii.2022.3140792
|View full text |Cite
|
Sign up to set email alerts
|

Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing

Abstract: Recent evolution of the Industrial Internet of Things (IIoT) empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloudbased controlling and real-time process monitoring, which is renowned as Cloud Manufacturing (CM). However, cloud integration exposes the entire manufacturing ecosystem to a new set of security risks and increments in end-to-end latency. Moving security services towards the edge e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(26 citation statements)
references
References 28 publications
0
26
0
Order By: Relevance
“…In [ 104 ], the authors have addressed the scalability and latency along with security and privacy challenges by proposing fog computing and blockchain-based security architecture for IIoT-enabled Cloud Manufacturing (CM). The authors have focused on addressing three main things that are lacking in the security of CM in the current literature, (1) trust between the network nodes to ensure the authenticity by using the blockchain-enabled Elliptic Curve Qu Vanstone (ECQV) certificates, (2) privacy of CM data over the internet, and (3) scalability requirements of security services to deal with future expansions.…”
Section: Key Iiot Requirements Emerging Technologies and Literature R...mentioning
confidence: 99%
“…In [ 104 ], the authors have addressed the scalability and latency along with security and privacy challenges by proposing fog computing and blockchain-based security architecture for IIoT-enabled Cloud Manufacturing (CM). The authors have focused on addressing three main things that are lacking in the security of CM in the current literature, (1) trust between the network nodes to ensure the authenticity by using the blockchain-enabled Elliptic Curve Qu Vanstone (ECQV) certificates, (2) privacy of CM data over the internet, and (3) scalability requirements of security services to deal with future expansions.…”
Section: Key Iiot Requirements Emerging Technologies and Literature R...mentioning
confidence: 99%
“…In [94], the authors have addressed the scalability and latency along with security and privacy challenges by proposing Fog Computing and Blockchain-based security architecture for IIoT enabled Cloud Manufacturing (CM). The authors have focused on addressing three main things which are lacking in the security of CM in current literature, (1) trust in manufacturing/monitoring equipment to ensure the authenticity, (2) privacy of CM data over the internet, (3) scalability requirement of security services to deal with future expansions.…”
Section: Blockchainmentioning
confidence: 99%
“…Although the IIoT architecture in [81] addresses all the features, the authors have presented this architecture based on the theoretical approach, not the practical. Conceptual [93] Conceptual [59] Conceptual [87] Conceptual [100] Conceptual [81] Conceptual [91] Experimental [96] Experimental [83] Experimental [84] Experimental [92] Experimental [99] Experimental [104] Experimental [79] Experimental [85] Experimental [94] Experimental [97] Experimental [58] Experimental [80] Experimental [86] Experimental [95] Experimental [101] Experimental [103] Experimental…”
Section: Experimental Vs Conceptual Architecturesmentioning
confidence: 99%
“…Payment channels [86], [87] Sidechains [41], [88] Cross-chain [89], [90], [91], [92], [93], [94], [69], [70] Off-chain [71], [95], [96], [97], [98], [99]…”
Section: Scalability Solutionsmentioning
confidence: 99%
“…The hash for the control measures recorded during the printing process is transmitted to the Attestation and Certification Authority accessed via IPFS to verify quality control measures. [70] In the case of the blockchain-based service architecture for Cloud manufacturing, the authors proposed to relay the dynamic elliptic curve certificate data on a distributed storage system (IPFS) to increase the storage scalability of the proposed architecture [95]. Dynamic certificates and elliptic curve integrated encryption schemes are proposed to enable blockchainbased security services for trust establishment.…”
Section: Off-chainmentioning
confidence: 99%