Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction
Abstract
:1. Introduction
- IoT and Blockchain are used to reduce human intervention at the time of recording the supply chain transaction;
- Asymmetric key encryption technique ECC based Key distribution and key agreement are developed in SCM. ECC is used for managing the cryptographic operations and also for lightweight authentication of entities;
- Hyperleadger fabric based blockchain technology will ensure the transaction data privacy and security;
- Security and Privacy analysis illustrate the efficiency of the proposed method.
2. Related Work
2.1. Privacy by Design
2.2. IoT and Blockchain in Supply Chain
3. Preliminaries
3.1. Asymmetric-Key Encryption
3.2. Blockchain and Smart Contract
3.3. Elliptic Curve Cryptography
4. System Overview
4.1. System Model
- Registration
- Authentication
4.2. Threat Model
- might get all messages between two entities by initiating a passive attack.
- might execute any operation by initiating an active attack.
- might forge any message in a key agreement stage.
- might retrieve the session key of the entity.
4.3. Security Goals
- None of the participants can infer other participants’ privacy.
- None of the participants can breach other participants’ security.
- cannot forge any message in a key agreement stage.
- cannot retrieve the session key of the entity.
- cannot be successful with an impersonate attack.
- cannot be successful in forwarding secrecy.
- cannot be successful in a replay attack.
5. Model Construction
5.1. System Setup
5.2. Registration
5.2.1. Blockchain-Based Data Sharing (via Chain 1)
- Public key of the entities;
- Verifiable digital signatures of the entities;
- Sign of the service provider.
Algorithm 1: Working process of smart contract for registration. | ||
5.2.2. Security Analysis of Protocol
5.3. Authentication
5.3.1. Verification of and Corresponding
5.3.2. Authentication between and
- 1.
- Phase 1: chooses a nonce , , , . Then the message is sent to .
- 2.
- Phase 2: calculates and checks . If true, continues to select and calculates , , , and . Then the message is sent to .
- 3.
- Phase 3: calculates , , and checks and . If true, then the two IoT devices of and are the authenticated on the both side.
5.3.3. Blockchain Based Data Sharing (via Chain 2)
- Public key of the entities
- Hash of the shared messages
Algorithm 2: Working process of smart contract for authentication. | |||
5.3.4. Security Analysis of Protocol
6. Experimental Analysis
6.1. Testbed
6.2. Score and Scalability Evaluation Metric
Evaluation Metrics
- : The total amount of time (in seconds) consumed by a system to perform all transactions for a certain corpus, which is showed in Equation (6) shows the where is the total number of transactions.and represent the time when the transaction was made and the blockchain verified the transaction, respectively.
- : The average latency is the norm of the difference between and in a dataset for a bunch of transactions, which is shown in Equation (7).
- : The average throughput is the norm of successful transaction’s number per second over the execution time, which is shown in Equation (8).
6.3. Result Evaluation
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- da Silva, F.S.T.; da Costa, C.A.; Crovato, C.D.P.; da Rosa Righi, R. Looking at energy through the lens of Industry 4.0: A systematic literature review of concerns and challenges. Comput. Ind. Eng. 2020, 143, 106426. [Google Scholar] [CrossRef]
- Granell, C.; Kamilaris, A.; Kotsev, A.; Ostermann, F.O.; Trilles, S. Internet of things. In Manual of Digital Earth; Springer: Singapore, 2020; pp. 387–423. [Google Scholar]
- Akter, S.; Habib, A.; Islam, M.A.; Hossen, M.S.; Fahim, W.A.; Sarkar, P.R.; Ahmed, M. Comprehensive Performance Assessment of Deep Learning Models in Early Prediction and Risk Identification of Chronic Kidney Disease. IEEE Access 2021, 9, 165184–165206. [Google Scholar] [CrossRef]
- Bing, K.; Fu, L.; Zhuo, Y.; Yanlei, L. Design of an Internet of Things-based smart home system. In Proceedings of the 2011 2nd International Conference on Intelligent Control and Information Processing, Harbin, China, 25–28 July 2011; Volume 2, pp. 921–924. [Google Scholar]
- Langley, C.J.; Novack, R.A.; Gibson, B.; Coyle, J.J. Supply Chain Management: A Logistics Perspective; Cengage Learning: Boston, MA, USA, 2020. [Google Scholar]
- De Vass, T.; Shee, H.; Miah, S.J. The effect of “Internet of Things” on supply chain integration and performance: An organisational capability perspective. Australas. J. Inf. Syst. 2018, 22. [Google Scholar] [CrossRef] [Green Version]
- Khujamatov, K.; Reypnazarov, E.; Akhmedov, N.; Khasanov, D. IoT based centralized double stage education. In Proceedings of the 2020 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 4–6 November 2020; pp. 1–5. [Google Scholar]
- Sabah, S.; Hasan, A.S.M.T.; Daria, A. A Blockchain-based Approach to Detect Counterfeit Drugs in Medical Supply Chain. In Proceedings of the International Conference on Big Data, IoT and Machine Learning (BIM 2021), Cox’s Bazar, Bangladesh, 23–25 September 2021. [Google Scholar]
- Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef] [Green Version]
- Shahroz, M.; Mushtaq, M.F.; Ahmad, M.; Ullah, S.; Mehmood, A.; Choi, G.S. IoT-based smart shopping cart using radio frequency identification. IEEE Access 2020, 8, 68426–68438. [Google Scholar] [CrossRef]
- Kawano, Y.; Cao, M. Design of privacy-preserving dynamic controllers. IEEE Trans. Autom. Control 2020, 65, 3863–3878. [Google Scholar] [CrossRef]
- Li, C.; Palanisamy, B.; Xu, R. Scalable and privacy-preserving design of on/off-chain smart contracts. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), Macao, Macao, 8–12 April 2019; pp. 7–12. [Google Scholar]
- Sweeney, L. K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef] [Green Version]
- Kambourakis, G. Anonymity and closely related terms in the cyberspace: An analysis by example. J. Inf. Secur. Appl. 2014, 19, 2–17. [Google Scholar] [CrossRef]
- Pfitzmann, A.; Köhntopp, M. Anonymity, unobservability, and pseudonymity—A proposal for terminology. In Designing Privacy Enhancing Technologies; Springer: Berlin/Heidelberg, Germany, 2001; pp. 1–9. [Google Scholar]
- Pfitzmann, A.; Hansen, M. A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. 2010. Available online: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf (accessed on 20 October 2021).
- Hansen, M.; Smith, R.; Tschofenig, H. CA Privacy terminology and concepts. In Internet Draft, March 2012, Technical Report; Network Working Group; IETF: Fremont, CA, USA, 2011. [Google Scholar]
- Malik, S.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trustchain: Trust management in blockchain and iot supported supply chains. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 184–193. [Google Scholar]
- Tsang, Y.P.; Choy, K.L.; Wu, C.H.; Ho, G.T.S.; Lam, H.Y. Blockchain-driven iot for food traceability with an integrated consensus mechanism. IEEE Access 2019, 7, 129000–129017. [Google Scholar] [CrossRef]
- Shi, J.; Yi, D.; Kuang, J. Pharmaceutical supply chain management system with integration of iot and blockchain technology. In International Conference on Smart Blockchain; Springer: Berlin/Heidelberg, Germany, 2019; pp. 97–108. [Google Scholar]
- Caro, M.P.; Ali, M.S.; Vecchio, M.; Giaffreda, R. Blockchain-based traceability in agri-food supply chain management: A practical implementation. In Proceedings of the 2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany), Tuscany, Italy, 8–9 May 2018; pp. 1–4. [Google Scholar]
- Abdel-Basset, M.; Manogaran, G.; Mohamed, M. Internet of things (iot) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future Gener. Comput. Syst. 2018, 86, 614–628. [Google Scholar] [CrossRef] [Green Version]
- Cui, P.; Dixon, J.; Guin, U.; Dimase, D. A blockchain-based framework for supply chain provenance. IEEE Access 2019, 7, 157113–157125. [Google Scholar] [CrossRef]
- Cocco, L.; Mannaro, K.; Tonelli, R.; Mariani, L.; Lodi, M.B.; Melis, A.; Fanti, A. A Blockchain-Based Traceability System in Agri-Food SME: Case Study of a Traditional Bakery. IEEE Access 2021, 9, 62899–62915. [Google Scholar] [CrossRef]
- Benčić, F.M.; Skočir, P.; Žarko, I.P. DL-Tags: DLT and smart tags for decentralized, privacy-preserving, and verifiable supply chain management. IEEE Access 2019, 7, 46198–46209. [Google Scholar] [CrossRef]
- Bhutta, M.N.M.; Ahmad, M. Secure Identification, Traceability and Real-Time Tracking of Agricultural Food Supply During Transportation Using Internet of Things. IEEE Access 2021, 9, 65660–65675. [Google Scholar] [CrossRef]
- Grida, M.; Mohamed, R.; Zaid, A.H. A novel plithogenic MCDM framework for evaluating the performance of IoT based supply chain. Neutrosophic Sets Syst. 2020, 33, 323–341. [Google Scholar]
- Yadav, S.; Garg, D.; Luthra, S. Development of IoT based data-driven agriculture supply chain performance measurement framework. J. Enterp. Inf. Manag. 2020, 34, 292–327. [Google Scholar] [CrossRef]
- Yadav, S.; Luthra, S.; Garg, D. Internet of things (IoT) based coordination system in Agri-food supply chain: Development of an efficient framework using DEMATEL-ISM. Oper. Manag. Res. 2020. [Google Scholar] [CrossRef]
- Zhang, H.; Sakurai, K. Blockchain for iot-based digital supply chain: A survey. In Proceedings of the International Conference on Emerging Internetworking, Data & Web Technologies, Kitakyushu, Japan, 24–26 February 2020; Springer: Cham, Switzerland, 2020; pp. 564–573. [Google Scholar]
- Simmons, G.J. Symmetric and asymmetric encryption. ACM Comput. Surv. CSUR 1979, 11, 305–330. [Google Scholar] [CrossRef]
- Islam, T.; Youki, R.A.; Chowdhury, B.R.; Hasan, A.S.M. An ECC Based Secure Communication Protocol for Resource Constraints IoT Devices in Smart Home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning, Cox’s Bazar, Bangladesh, 23–25 September 2021; Springer: Singapore, 2022; pp. 431–444. [Google Scholar]
- Hao, X.; Yu, L.; Zhiqiang, L.; Zhen, L.; Dawu, G. Dynamic practical byzantine fault tolerance. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June 2018; pp. 1–8. [Google Scholar]
- Wu, F.; Xu, L.; Li, X.; Kumari, S.; Karuppiah, M.; Obaidat, M.S. A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography. IEEE Syst. J. 2018, 13, 2830–2838. [Google Scholar] [CrossRef]
- Haque, R.U.; Hasan, A.S.M.; Jiang, Q.; Qu, Q. Privacy-preserving K-nearest neighbors training over blockchain-based encrypted health data. Electronics 2020, 9, 2096. [Google Scholar] [CrossRef]
- Sidorov, M.; Ong, M.T.; Sridharan, R.V.; Nakamura, J.; Ohmura, R.; Khor, J.H. Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains. IEEE Access 2019, 7, 7273–7285. [Google Scholar] [CrossRef]
- Mujahid, U.; Islam, M.N.; Sarwar, S. A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP. Wirel. Pers. Commun. 2017, 94, 725–744. [Google Scholar] [CrossRef]
- Fan, K.; Gong, Y.; Liang, C.; Li, H.; Yang, Y. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Netw. 2016, 9, 3095–3104. [Google Scholar] [CrossRef] [Green Version]
- Jangirala, S.; Das, A.K.; Vasilakos, A.V. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Trans. Ind. Inform. 2019, 16, 7081–7093. [Google Scholar] [CrossRef]
Study | Year | State of the Art Technologies Adoption | Security Parameters Covered | |||
---|---|---|---|---|---|---|
Cryptography | Blockchain | Authentication | Confidentiality | |||
Light Weight | Heavy Weight | |||||
Caro [21] | 2018 | - | - | √ | - | - |
Abdel-Basset [22] | 2018 | - | - | √ | √ | - |
Malik [18] | 2019 | - | - | √ | - | - |
Tsang [19] | 2019 | - | - | √ | - | - |
Shi [20] | 2019 | - | √ | √ | √ | √ |
Cui [23] | 2019 | - | - | √ | - | - |
Matteo [25] | 2019 | - | - | √ | √ | - |
Cocco [24] | 2021 | - | - | √ | - | - |
Bhutta [26] | 2021 | - | - | √ | √ | - |
Proposed | 2021 | √ | - | √ | √ | √ |
Sign | Meanings | Sign | Meanings |
---|---|---|---|
manufacturer | distributor | ||
retailer | customer | ||
service provider | identity | ||
public key | private Key | ||
adversaries | two large primes | ||
elliptic curve | finite field | ||
multiplicative group | a generator | ||
n | security parameter | hash function | |
IoT device | decryption function | ||
nonce | encryption function | ||
registration protocol | authentication protocol | ||
session key | message | ||
digital signature | sign |
Entities | Roles |
---|---|
Manufacturer | produces the product and sells it to the |
Distributor | purchase the product from and sells it to the |
Retailer | buys the the product from and sells it to the |
Customer | are the end user who purchase the product from the |
Service Provider | are responsible for registering , , and into the system |
Attribute | Entities | Time (millisecond, ms) |
---|---|---|
Proposed method | ||
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hasan, A.S.M.T.; Sabah, S.; Haque, R.U.; Daria, A.; Rasool, A.; Jiang, Q. Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction. Symmetry 2022, 14, 64. https://doi.org/10.3390/sym14010064
Hasan ASMT, Sabah S, Haque RU, Daria A, Rasool A, Jiang Q. Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction. Symmetry. 2022; 14(1):64. https://doi.org/10.3390/sym14010064
Chicago/Turabian StyleHasan, A S M Touhidul, Shabnam Sabah, Rakib Ul Haque, Apubra Daria, Abdur Rasool, and Qingshan Jiang. 2022. "Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction" Symmetry 14, no. 1: 64. https://doi.org/10.3390/sym14010064
APA StyleHasan, A. S. M. T., Sabah, S., Haque, R. U., Daria, A., Rasool, A., & Jiang, Q. (2022). Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction. Symmetry, 14(1), 64. https://doi.org/10.3390/sym14010064