2022
DOI: 10.1109/mic.2021.3059320
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy Digital Twins in the Industrial Internet of Things With Blockchain

Abstract: Industrial processes rely on sensory data for critical decision-making processes. Extracting actionable insights from the collected data calls for an infrastructure that can ensure the trustworthiness of data. To this end, we envision a blockchainbased framework for the Industrial Internet of Things (IIoT) to address the issues of data management and security. Once the data collected from trustworthy sources are recorded in the blockchain, product lifecycle events can be fed into datadriven systems for process… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
83
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 107 publications
(83 citation statements)
references
References 17 publications
0
83
0
Order By: Relevance
“…This is a combination of all technologies, models and applicable regulations (e.g., GDPR) to ensure that data are generated, transmitted, and received among CDTs under a holistic trustworthy framework [31]. This includes data security, traceability, transparency, confidentiality and integrity.…”
Section: Trustworthinessmentioning
confidence: 99%
“…This is a combination of all technologies, models and applicable regulations (e.g., GDPR) to ensure that data are generated, transmitted, and received among CDTs under a holistic trustworthy framework [31]. This includes data security, traceability, transparency, confidentiality and integrity.…”
Section: Trustworthinessmentioning
confidence: 99%
“…While stringent security guarantees are inherited from the blockchain, ensuring the trustworthiness of data-generating sources is equally important for critical infrastructures. Because the data is input to other entities (such as DTs, TI) to make decisions, ignoring such measures may lead to the insertion of false data into the system resulting in Garbage-In, Garbage-Out (GIGO) problem [11]. Therefore, three-fold Integrity Checking Mechanisms (ICMs) (engineering knowledge and domain knowledge) is established by: collecting data only from registered devices; (ii) cross-validating the device data against threshold values; and (iii) minimizing the Age of Information (AoI) based on time elapsed since the generation of latest status update received at destination.…”
Section: A Data Integration and Interoperabilitymentioning
confidence: 99%
“…Nevertheless, in real-life scenarios, data breaches could occur due to several reasons, both maliciously or mistakenly [2]. Therefore, curating and mining actionable insights from the collected data calls for a data storage infrastructure that can manifest the dissemination of trustworthy and secure data [11]. In this regard, provenance-enabled blockchain-based DTs can facilitate digital identity and data traceability from disparate data repositories while reasoning about the current state and the chained actions on a data object (such as who, when, where, and how), thereby ensuring trustworthy DTs throughout the product lifecycle [11].…”
Section: Blockchain Empowered Digital Twinsmentioning
confidence: 99%
See 2 more Smart Citations