Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain
Abstract
:1. Introduction
2. Background
2.1. Smart Factory vs. Factory Automation
2.2. Blockchain System for IIoT
3. Related Works
4. An IoT Information Reinforcement Model Using Blockchain
4.1. Overview
4.2. Information Gathering for IIoT
4.3. IIoT Block Generation
Algorithm 1. IIoT block generation. |
Input: IIoT information generated at the industrial site Output: Create a k-bit blockchain based on odd/even |
1: Generate IIoT information 2: While receive IIoT information 3: if IoT information then 4: Compare IIoT information with IIoT information from each other IIoT sensor 5: Generate and store the IIoT information block 6: While the IIoT information block can be identified 7: if generate random blocks in n-bit form using from all IIoT information 8: Convert each block to replication 9: if generate hash values for odd/even 10: Add signature to first and last of hash chains 11: Verification of integrity of IIoT information 12: Interleaved process to exclude IIoT bit blocks and IIoT unique identification information 13: else 14: Regenerate hash values for odd/even 15: end if 16: else 17: Process computationally intensive information into a non-blockchain 18: reconfirm the IoT Informaiton 19: end if 20: do while 21: else 22: Request IoT information 23: end if 24: do while |
4.4. Information Processing in IIoT
Algorithm 2. IIoT link point build. |
Input: The IIoT’s new connectivity point Output: IIoT generation of linking pairs |
1: Creating IIot information links 2: for(i = 0; i ≤ n; i++): 3: for(j = 0; j ≤ n − 1; j++): 4: Create a triple link [, , ] 5: Correspondence estimates for the link pairs (, ) and (, ) from two link pairings 6: end for 7: end for |
Algorithm 3. Gathering algorithm of IIoT. |
Input: Information gathered from the IIoT Output: Calculate the offset of IIoT connection information |
1: Verify IIoT connection details 2: Set the number of IIoT connection parameters: 0 for initial value [0] 3: Set the IIoT connection index to zero 4: for(i = 0; i ≥ n; i++) 5: index = { i | GI ∈ Z, Z is integer} 6: Intitial_value[index] ± Initial_value[index] 7: offset [index] = Intitial_value[index] + linking_length 8: index ++ 9: end for |
Algorithm 4. IIoT information and blockchain setup. |
Input: The IIoT connectivity information utilizing offset Output: Using connection points , update IIoT data jointly (n − 1) |
1: Gather IIoT connectivity information 2: for i from 1 to n: 3: for each piece of linking information 4: To produce new IIoT connecting information, add offset[i] to each IIoT information 5. Refresh the link information of IIoT at linking information <, > ∈ 6: IoT data configuration on the blockchain 7: end for 8: end for |
4.5. IIoT Information Reinforcement Learning
5. Evaluation
5.1. Environment Setting
5.2. Configuring the Model
5.3. Performance Evaluation
5.3.1. Performance Evaluation by Category
5.3.2. Reinforcement Algorithm Evaluation
5.3.3. Comparison of Time Complexity
5.3.4. Discussions
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Lee, J.S. A Study on the Effects of the Cooperative Philosophy between SMEs to the Cooperative Activities and Performance. J. Korea Converg. Soc. 2017, 8, 301–309. [Google Scholar]
- Jeong, Y.S.; Yon, Y.H.; Ku, J.H. Hash-chain-based IoT authentication scheme suitable for small and medium enterprises. J. Converg. Inf. Technol. 2017, 7, 105–111. [Google Scholar]
- Cheng, L.; Kotoulas, S.; Ward, T.E.; Theodoropoulos, G. Improving the robustness and performance of parallel joins over distributed systems. J. Parallel Distrib. Comput. 2017, 109, 310–323. [Google Scholar] [CrossRef]
- Ye, H.; Li, G.Y. Deep reinforcement learning for resource allocation in v2v communications. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
- Shin, S.S.; Jeong, Y.S.; An, Y.J. A Study of Analysis and Response and Plan for National and International Security Practices using Fin-Tech Technologies. J. Converg. Soceity SMB 2015, 5, 1–7. [Google Scholar]
- Jeong, Y.S. A Study of An Efficient Clustering Processing Scheme of Patient Disease Information for Cloud Computing Environment. J. Converg. Soceity SMB 2016, 6, 33–38. [Google Scholar] [CrossRef]
- Ilic, D.; Karnouskos, S.; Silva, P.; Detzler, S. A system for enabling facility management to achieve deterministic energy behaviour in the smart grid era. In Proceedings of the International Conference on Smart Grids and Green IT systems Smart- Green 2014, Barcelona, Spain, 3–4 April 2014; pp. 1–9. [Google Scholar]
- Lai, C.F.; Lai, Y.X.; Yang, L.T.; Chao, H.C. Integration of IoT energy management system with appliance and activity recognition. In Proceedings of the 2012 IEEE International Conference on Green Computing and Communications (GreenCom), Besancon, France, 20–23 November 2012; pp. 66–71. [Google Scholar]
- Jeong, Y.S. An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP. J. Digit. Converg. 2010, 13, 227–234. [Google Scholar] [CrossRef]
- Yeow, K.; Gani, A.; Ahmad, R.W.; Rodrigues, J.J.P.C.; Ko, K. Decentralized consensus for edge-centric internet of things: A review, taxonomy, and research issues. IEEE Access 2018, 6, 1513–1524. [Google Scholar] [CrossRef]
- Reyna, A.; Mart´ın, C.; Chen, J.; Soler, E.; D´ıaz, M. On blockchain and its integration with iot. challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Xu, X.; Weber, I.; Staples, M.; Zhu, L.; Bosch, J.; Bass, L.; Pautasso, C.; Rimba, P. A Taxonomy of Blockchain-Based Systems for Architecture Design. In Proceedings of the 2017 IEEE International Conference on Software Architecture(ICSA 2017), Gothenburg, Sweden, 3–7 April 2017; pp. 243–252. [Google Scholar]
- Xu, L.D.; He, W.; Li, S. Internet of Things in industries: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
- Yu, F.R.; Liu, J.M.; He, Y.; Si, P.B.; Zhang, Y.H. Virtualization for distributed ledger technology (VDLT). IEEE Access 2018, 6, 25019–25028. [Google Scholar] [CrossRef]
- Miller, D. Blockchain and the Internet of Things in the industrial sector. IT Prof. 2018, 20, 15–18. [Google Scholar] [CrossRef]
- Liang, X.; Zhao, J.; Shetty, S.; Li, D. Towards data assurance and resilience in IoT using blockchain. In Proceedings of the IEEE Military Communications Conference, Gothenburg, Sweden, 3–7 April 2017; pp. 261–266. [Google Scholar]
- Aitzhan, N.Z.; Svetinovic, D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 2018, 15, 840–852. [Google Scholar] [CrossRef]
- Teslya, N.; Ryabchikov, I. Blockchain-based platform architecture for industrial IoT. In Proceedings of the 21st Conference of Open Innovations Association, Helsinki, Finland, 6–10 November 2017; pp. 321–329. [Google Scholar]
- Keping, Y.; Liang, T.; Moayad, A.; Hekun, Y.; Yaser, J. Blockchain-enhanced Data Sharing With Traceable and Direct Revocation in IIoT. IEEE Trans. Ind. Inform. 2021, 17, 7669–7678. [Google Scholar]
- Quansi, W.; Ying, G.; Zhiling, C.; Dapeng, W. A Blockchain-based Data Sharing Scheme in The Supply Chain by IIoT. In Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), Taipei, Taiwan, 6–9 May 2019; pp. 695–700. [Google Scholar]
- Aparna, K.; Sudeep, T.; Sudhanshu, T.; Neerja, K. Blockchain-Based Massive Data Dissemination Handling in IIoT Environment. IEEE Network 2021, 35, 318–325. [Google Scholar]
- Vinod, K. Integration of Next Generation IIoT with Blockchain for the Development of Smart Industries. Emerg. Sci. J. 2020, 4, 1–17. [Google Scholar]
- Shen, M.; Duan, J.; Zhu, L.; Zhang, J.; Du, X.; Guizani, M. Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Sel. Areas Commun. 2020, 38, 1229–1241. [Google Scholar] [CrossRef]
- Liu, C.H.; Lin, Q.; Wen, S. Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans. On Ind. Inform. 2019, 15, 3516–3526. [Google Scholar] [CrossRef]
- Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacypreserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
- Wang, S.; Zhang, Y.; Zhang, Y. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 2018, 6, 38437–38450. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Blockchain for secure EHRs sharing of mobile cloud based E-Health systems. IEEE Access 2019, 7, 66792–66806. [Google Scholar] [CrossRef]
- Sun, J.; Yao, X.; Wang, S.; Wu, Y. Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access 2020, 8, 59389–59401. [Google Scholar] [CrossRef]
Division | Smart Factory | Factory Automation |
---|---|---|
Definition | An intelligent automation platform that enhances quality and performance by automating environmental safety, marketing, design, process, and shipping at the plant. | A production system mechanism that manages the functioning of a machine without the need of people. |
Advantage | Scripted languages and compiler languages such as C++ are used to create available software components. | For automation and digitalization, integrate internet of things (IoT), Artificial Intelligence (AI), Big Data, and other technologies. |
Weakness | Make a substantial first investment. | Connection, collection, and analysis of data created during manufacturing are difficult. |
Object | Manufacturing’s procurement, logistics, and consumer. | Computers and robots are examples of equipment. |
Function | Automate unmanned and manufacturing operations across the plant utilizing computers and robots. | Provide each thing intelligence and link it to the internet of things to connect, gather, and analyze data autonomously (IoT). |
Range | ‘Smart’ horizontal integration. | Vertical integration, ‘manualizing’ and ‘factory’. |
Characteristics | Combine the newest technology to boost efficiency and productivity across management, from industrial operations to management. | Integrate corporate processes with an emphasis on production management. |
Related Works | Related Technique | Advantages | Limitations |
---|---|---|---|
Sharing cloud data [20,23] | Bitcoin, incentives for data sharing are highly valued. | Real-time data storage, ensure data integrity and information security, cloud data sharing should be rewarded fairly. | Collaboration between IIoT devices is required, blockchain is used to store shared data. |
Data gathering and sharing in the IIoT [24] | Deep reinforcement learning and mobile crowdsensing. | Collaborative data collection and sharing. | Blockchain is used to store shared data. |
secureSVM: Data exchange in smart cities [17,22,25] | Decision Making Trial and Evaluation Laboratory (DEMATEL) Support vector machine (SVM), Paillier, gradient descent. | Describe the many concerns and obstacles associated with IoT and blockchain implementation, IoT data transmission with privacy protection for SVM training. | Proactive government and other policies, blockchain is used to store shared data. |
Storage systems that share data [19,26] | Decisional Bilinear Diffie–Hellman (DBDH), attributed-based encryption, interplanetary file system (IPFS). | Integrate identity verification, and at any time, you may trace and terminate malicious users, decentralized storage and fine-grained access control for shared data. | Ensuring Decisional Bilinear Diffie–Hellman (DBDH) for system security, IPFS storage systems have no incentives. |
Sharing of electronic health records [27] | IPFS, smart contract. | Dependable access control, decentralized storage. | IPFS storage systems have no incentives. |
Sharing of electronic medical records [28] | IPFS, encryption system with attributes. | Data access control and decentralized storage without affecting retrieval. | IPFS storage systems have no incentives. |
IoT Platform and System [15,16,18] | Supply chain, autonomous vehicle solutions, manufacturing plant asset management. | New commercial prospects, regulatory restrictions, and measures to promote transparency and visibility are discussed. | Blockchain is used to store shared data. |
Smart Grid System [21] | P2P network, data load balancing. | Model efficacy is evaluated using energy management costs and transmission delay characteristics. | Assume P2P network is secure. |
Feature | Equation |
---|---|
Mean | = |
Variance | = |
Maximum | = |
Minimum | = |
Root mean square | = |
Division | Specification | |
---|---|---|
OS | OPNet simulation | |
VMware Workstation | VMware Workstation 14 | |
OS | Windows 10 Professional | |
CPU | 1 core | |
RAM/HDD | 8 GB/150 GB | |
Language | Python 3.9.5 | |
Tool | Google Colab | |
Library | Scikit-learn, matplot, numpy, pandas, etc. | |
0.1 W/0.15 W | ||
The network coverage radius | 100 m | |
The static circuit power | 0.01 W | |
The pathloss exponent | 1 | |
The subnet tree depth | 4 | |
5 MHz/2.5 MHz | ||
The power of noise | −174 dBm/Hz | |
Subnet storage capacity | 0.25 TB | |
Input data size | 3 kbits/s | |
Delay threshold | 8s | |
Link capacity | 5 Gbps | |
Poisson lambda | 85% | |
Data generation span | 5 min | |
Max access count | 20 | |
The unit price of energy | 0.2 Token/J |
Algorithm | Parameter Value |
---|---|
LR | Regularization strength(C): 5, 10, 15; solver: lbfgs; penalty: l2 |
MLP | Hidden_layer: 50; activation: relu; weight optimization: adam; learning rate: 0.001 |
SVM | Regularization parameter(C): 0.001, 0.01, 1, 10, 25, 50; kernel: rbf; probability: true |
KNN | Number of neighbors: 3∼5; weights: uniform |
RF | number of trees: 50 |
Category | The Count Number of Simulations | ||||||
---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | ||
Efficiency (%) | Not using blockchain | 24.2 | 23.3 | 22.9 | 25.1 | 27.3 | 26.5 |
Using blockchain | 33.7 | 40.2 | 39.2 | 36.8 | 38.7 | 35.6 | |
Throughput (%) | Not using blockchain | 1.21 | 1.44 | 1.33 | 1.47 | 1.29 | 1.39 |
Using blockchain | 2.21 | 2.11 | 1.99 | 1.83 | 2.06 | 2.14 | |
Overhead (%) | Not using blockchain | 16.73 | 20.31 | 19.26 | 21.05 | 18.97 | 17.47 |
Using blockchain | 9.32 | 10.04 | 9.98 | 12.65 | 11.65 | 13.11 |
LR | CN | 1 | 2 | 3 | 4 | 5 | 6 |
A | 79.15 | 82.08 | 81.74 | 83.77 | 82.17 | 84.08 | |
LT | 0.006 | 0.007 | 0.006 | 0.007 | 0.006 | 0.009 | |
F1 | 80.65 | 82.14 | 81.08 | 82.65 | 84.06 | 83.38 | |
MLP | CN | 1 | 2 | 3 | 4 | 5 | 6 |
A | 89.07 | 90.95 | 91.39 | 91.05 | 90.11 | 92.36 | |
LT | 0.004 | 0.005 | 0.003 | 0.006 | 0.007 | 0.005 | |
F1 | 91.30 | 89.47 | 87.98 | 90.43 | 88.12 | 90.61 | |
SVM | CN | 1 | 2 | 3 | 4 | 5 | 6 |
A | 84.71 | 86.37 | 85.02 | 89.01 | 86.98 | 85.49 | |
LT | 0.006 | 0.007 | 0.006 | 0.007 | 0.006 | 0.006 | |
F1 | 84.12 | 86.08 | 85.99 | 87.15 | 86.07 | 85.35 | |
KNN | CN | 1 | 2 | 3 | 4 | 5 | 6 |
A | 86.37 | 84.92 | 86.71 | 87.05 | 85.63 | 87.41 | |
LT | 0.003 | 0.004 | 0.005 | 0.004 | 0.006 | 0.005 | |
F1 | 83.03 | 86.32 | 82.98 | 85.02 | 83.84 | 85.69 | |
RF | CN | 1 | 2 | 3 | 4 | 5 | 6 |
A | 88.27 | 89.42 | 88.78 | 90.14 | 89.89 | 90.36 | |
LT | 0.004 | 0.003 | 0.003 | 0.005 | 0.004 | 0.006 | |
F1 | 87.09 | 85.47 | 88.14 | 90.41 | 87.38 | 86.25 |
Model | IIoT Edge Server Computation Complexity | IIoT Computation Complexity | Verifier Computation Complexity | Verifier Storage Complexity | Communication Complexity | Blockchain Generation Complexity |
---|---|---|---|---|---|---|
[20,23] | O(logn) | O(1) | O() | O() | O(1) | O() |
[24] | O(logn) | O(logn) | O(nlogn) | O(1) | O(nlogn) | O(logn) |
[17,22,25] | O() | O(logn) | O() | O(nlogn) | O(1) | O() |
[19,26] | O(nlogn) | O(logn) | O(1) | O(1) | O() | O(nlogn) |
[27] | O(1) | O(logn) | O(logn) | O(nlogn) | O() | O(logn) |
[28] | O(logn) | O(1) | O(logn) | O(nlogn) | O() | O(nlogn) |
[15,16,18] | O(nlogn) | O(1) | O(1) | O(1) | O(1) | O(1) |
Proposed model | O() | O() | O() | O() | O() | O() |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jeong, Y.-S. Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain. Sensors 2022, 22, 4645. https://doi.org/10.3390/s22124645
Jeong Y-S. Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain. Sensors. 2022; 22(12):4645. https://doi.org/10.3390/s22124645
Chicago/Turabian StyleJeong, Yoon-Su. 2022. "Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain" Sensors 22, no. 12: 4645. https://doi.org/10.3390/s22124645
APA StyleJeong, Y.-S. (2022). Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain. Sensors, 22(12), 4645. https://doi.org/10.3390/s22124645