Conference PaperPDF Available

Realizing an Implementation Platform for Closed Loop Cyber-Physical Systems Using Blockchain

Authors:

Figures

Content may be subject to copyright.
Realizing an Implementation Platform for Closed
Loop Cyber-Physical Systems using Blockchain
Abdullah Bin Masood∗† , Hassaan Khaliq Qureshi, Syed Muhammad Danish, Marios Lestas
National University of Sciences and Technology (NUST), Islamabad, Pakistan
Email: (amasood.msee17seecs, hassaan.khaliq, sdanish.msee16seecs)@seecs.edu.pk
Frederick University, Nicosia, Cyprus. Email: eng.lm@frederick.ac.cy
Abstract—Cyber-physical Systems (CPS) comprise of a net-
work of physically distributed embedded sensors and actuators
equipped with computational and communication capability.
In CPS, Internet of Things (IoT) devices communicate in a
trustless environment as the data can be compromised due
to the centralized database, limited power and computational
constraints. At the same time, reliability and resiliency are key
concerns in CPS in the face of unforeseen circumstances, often
emanating from disaster based failures. In this paper, critical
issues of centralized database security in CPS are addressed via
a distributed blockchain based solution. The proposed system
encompasses a smart contract based framework in Ethereum
blockchain. It further explores the potential of blockchain in se-
curing and offering a distributed network for the CPS in a closed
loop manner. To demonstrate the realizability of the proposed
framework, a testbed implementation for the proposed idea is
provided. A desktop computer, a laptop, a simple temperature
sensor and a Light Emitting Diode (LED) are interfaced in a Peer-
to-Peer (P2P) network using Ethereum. The speedy transaction
of sensor data in the blockchain at various difficulty levels and
actuation through smart contracts enhance the usability of the
platform for CPS and various IoT applications.
Index Terms—Cyber-Physical Systems, Internet of Things,
Peer-to-Peer, Blockchain
I. INTRODUCTION
CPS is becoming a cornerstone technology in many im-
portant applications such as renewable energy, smart grids,
smart cities, intelligent transportation systems, large process
plants, distributed robotic systems etc. Modern technologies
and protocols are being developed to offer higher bandwidth
and reliable fast networks to communicate with each other us-
ing Internet of Things (IoT) devices. However, in many cases,
CPS is characterized by security deficiencies and lack of trust.
Multiple stakeholders countering communication noise and
updating system to current protocols pose major challenges in
CPS security and performance. Designing CPS for operation
in proximity to humans means that current safety regulations
need to be updated so that individuals are not harmed and
the desired benefits surpass the potential unintended conse-
quences.
A typical CPS system, which currently works largely in an
open loop fashion is Intelligent Transportation Systems. The
system gradually shifts from the open loop operation to closed
loop operation as the gathered data is processed and used to
issue command signals to the traffic actuation units which may
include traffic light signals, ramp metering signals, rerouting
instructions, variable speed limits etc. Closed loop CPS greatly
improve efficiency, however, they suffer from major security
challenges and lack of trust mostly on the data acquisition
side [1]. In addition, IoT devices are replacing modern sensors
in CPS as they offer interconnection and intelligence by
providing sensing and actuating with ubiquitous networking
and computing abilities. These devices are evaluated in terms
of their performance, load and number of users they can handle
efficiently. In many compelling application areas, the security
of communication channels is of primary importance [2].
Recently, blockchain has been considered to address open
problems in applications beyond cryptocurrencies including
IoTs [3]. This work explores the potential of blockchain to
offer an implementation platform for closed-loop CPS. The
blockchain platform has attractive security features which can
be offered to all elements of a cyber-physical system; sensing,
processing and actuation/control. Blockchain can store sensed
data in the form of verified hashed blocks and use smart con-
tracts to process the data, generate appropriate control signals
and actuate relevant devices in a distributed fashion. In this
work, a blockchain based management system is considered,
which combines the aforementioned functionalities to offer an
implementation platform for closed loop CPS. A testbed has
been implemented which serves as a proof of concept (POC)
for the proposed solution and is used to estimate the delay that
is crucial in closed loop systems as it may lead to instability.
The proposed management system implements a protocol via a
smart contract that turns a permissioned Ethereum blockchain
into an automated access-control manager. The automated
access-control manager helps to enhance user controllability
over data and does not require trust in a third party. Only users
have access rights over data and can define access policies for
IoT devices [4].
The ability to implement the envisioned system is demon-
strated by a simple testbed incorporating a temperature sensor
and an actuator. The readings from the temperature sensor
are stored on the blockchain and are utilized by a smart
contract to send activation signals to a LED which serves as
the actuator. The activation signals are generated by the smart
contract according to a simple control algorithm. Delay of the
sensor data transactions and output from the smart contract
is calculated at different difficulty hash levels and block sizes
with respect to time. The proposed system architecture for a
closed loop CPS incorporating blockchain is shown in Fig. 1.
Fig. 1: Proposed closed loop CPS architecture incorporating blockchain
The rest of this paper is organized as follows. Section
II presents relevant previous work and constraints in the
approaches therein. The proposed system architecture is then
described in section III. A working prototype of the proposed
solution is presented in section IV and concluding remarks are
offered in Section V.
II. BACKGROU ND A ND LITERATURE REVIEW
In various applications, IoT devices usually store actuated
data in centralized cloud storage. However centralized systems
are often inadequate and create a single point of failure. For
improving the security and control over CPS systems, users
wish to own their data and personalized services without
compromising security. Hence, a consensus-based secure com-
munication network is required for CPS in which nodes can
trust, interact and share information without worrying about
data tempering.
Blockchain has been recently considered for applications
beyond cryptocurrencies due to its ability to build trust among
various entities. The distributed nature of blockchain implies
that no single entity controls the ledger but rather the par-
ticipating peers together validate the authenticity of records.
Blockchain was designed to operate in a trustless environment
where Bitcoin and Ethereum are the most celebrated examples
of permissioned blockchain and hyperledger is an example
of a private blockchain. The most celebrated alternative to
the cryptocurrency application is the smart contract paradigm
where Bitcoin and Ethereum were originally deployed to serve
as cryptocurrencies [5]-[7]. The smart contract is defined as
”A computerized transaction protocol that executes the terms
of a contract” [8]. Ethereum is the first platform to provide
a blockchain with a built-in turing complete programming
language called Solidity. Physical systems in CPS typically
consist of IoT devices. As the interaction between these
devices and cyber systems increases, they become increasingly
more vulnerable due to constraints as indicated below:
1) Device Accessibility: Users are required to grant a set
of permissions to their devices upon sign-up. These
access rights are granted indefinitely and the only way
to alter them is by opting-out. Third-party applications
constantly collect high-resolution personal data without
the user’s knowledge or control [9].
2) Batteries: The size of IoT devices is decreasing day
by day to become more user-friendly and accessible.
Security is an issue in such devices due to their low
resource availability. A great challenge for the CPS is
to satisfy the ever-increasing energy demands of IoT
applications, while IoT nodes continue to grow in both
numbers and performance requirements.
3) Database: As we are installing more IoT devices
for gathering information to make our processes more
efficient and intelligent, securing the obtained data is
becoming a challenge. Providing large functionality and
high computations of data on a small battery driven IoT
means increased deployment and maintenance cost [2].
Blockchain has been used by researchers to solve diverse
problems. In [10], various options for blockchain directed
acyclic graph based distributed consensus systems have been
considered and compared to support Fog computing for IoT.
Similarly, distributed authorized control access over the mas-
sive IoT database is another problem which has been addressed
using blockchain in [11]. Access control and authorization
are co-designed and a decentralized scheme was proposed
focusing on streaming data. However, the data is assumed
to be off-chain. Another notable attempt is the work in
[12], which enables data exchange through smart contracts
and uses a signature-based approach to resolve the dilemma
between data indexing and information leakage. Finally, in the
recent work of [13], data management is again realized using
smart contracts, in an architecture where users connect to the
blockchain through management hubs. The main advantage
is that a POC implementation supports the proposal with
demonstrated effectiveness. A number of blockchain based
solutions also have been proposed for the issue of secure
device access control. A recent work [14], examines the use
of multiple smart contracts (access control contract, judge
contract, and register contract) to provide access control to IoT
devices. This is one of the few works which adopts the smart
contract approach for access control and supports the proposed
approach with POC hardware/software implementation.
III. SYS TE M ARCHITECTURE
The considered system architecture is illustrated in Fig.
2. A temperature sensor here is a representative of an IoT
device and data obtained from it is stored in Ethereum, while
actuation of the sensor is done via a smart contract. Node
one is interfaced with a LED and the temperature sensor, is
connected to Node two in a Peer-to-Peer (P2P) manner. The
Fig. 2: System architecture
architecture is divided into two parts whose functionalities are
explained below:
A. Hardware Components
Sensor: DHT11 is a digital temperature and humidity
sensor. In this architecture, it is used to measure temper-
ature.
Actuating Device: Arduino Uno board is used here to
interface DHT 11 sensor. It reads the value from a sensor
and serially sends it to Node one on the computer using
pySerial. Baud rate for this communication is set at 9600
bps. Two LEDs are also interfaced with the Uno board
to display the actuation process. Green LED blinks if the
temperature value transmitted to the computer is equal or
less than 30°C while the red LED blinks when the value
is above than 30°C. The specification of the devices used
in this architecture is shown in Table I.
B. Ethereum Platform
Proof of Authority: Clique Proof of Authority (PoA)
protocol has been opted in this architecture. PoA is
a modified form of Proof of Stake (PoS) where users
identity performs the role of stake instead of monetary
value. This protocol is an upgraded version of PoS and
has only one identity per person. It is lightweight and
can perform thousands of transactions per second. On the
other hand, Proof of Work (PoW) is costly, inefficient and
involves many computational resources. PoS has benefits
over PoW in terms of required computation, cost, and
hardware. No reward for mining, nothing at stake and
little prevention from a miner to mine numerous PoS
chains make it less fascinating. On the other hand, PoA
is efficient and can be deployed with IoT devices.
Ethereum Blockchain: Ethereum private testnet
blockchain has been opted for this system. Go Ethereum
TABLE I: Specification of devices.
Device CPU Operating
System Memory Hard
Disk
Dell Optiplex
990
Intel Core
i3, 3.10GHz Ubuntu 16.04 8 GB 500 GB
Lenovo
V310
Intel Core
i5, 2.30GHz Ubuntu 16.04 4 GB 1 TB
TABLE II: Genesis file parameters.
Parameter Value
eip150Block 2
eip155Block 3
Gas Limit 0x8000000
Hash Difficulty 0x1
(Geth) is the official golang implementation of Ethereum
network, used for creating Ethereum blockchain and its
nodes. Two nodes each having one account in them are
created using Geth. Ethereum private testnet blockchain
is initialized using the genesis file. Puppeth prevents the
operator from going through scratch to create genesis
file. Main parameters from this architecture’s genesis
file are shown in Table II. Network ID for the whole
blockchain network is 1515. Block size is set to 5
seconds for smooth sensing of temperature, storing and
transacting its value in the blockchain.
Ethereum blockchain is a P2P network and nodes can
have dynamic Internet Protocol (IP) address. Each ac-
count is allocated a bunch of Ethers through the genesis
file paying for transactions, as PoA does not have mining
rewards. However, bootnode usually works over static
IP addresses and its only purpose is to help nodes in
discovering each other. A uniquely defined value called
Enode is created by initializing bootnode and it is stored
in the boot.key file. Node one is running on a laptop,
having an IP address of 10.3.81.15 while Node two is
running on a desktop PC with IP address 10.3.81.16.
Sync mode is ON preventing the Nodes from having
an error of “discarded bad propagated block”. Node one
and Node two have Remote Procedure Call (RPC) port
numbers 8051 and 8052, respectively. The gas price,
while the Nodes are alive, is set at value 1. JavaScript
Object Notation-Remote Procedure Call (JSON-RPC),
web3py protocols and the request library are used for
communication between the python script and Node one.
Smart Contract: Solidity is used to write and develop
smart contracts for the Ethereum blockchain. A simple
smart contract having two functions is stored in this
blockchain. The first function named Sensor takes and
stores incoming sensor data values while the second
function, which is a Get function compares the stored
value in the Sensor function with defined conditions and
returns a specific value. For example, if the incoming
temperature sensor value is below or equal to 30°C, it
returns a value 0 and if it is above 30°C then it returns
a value 1. The temperature above 30°C in the system
architecture is pre-defined to turn on the red LED while
(a) Temperature sensor connected to Node one running on a Laptop. (b) Node two running on the desktop PC.
Fig. 3: Nodes of ethereum blockchain connected in P2P network
TABLE III: Address specification of accounts.
Node Account No Machine Public Address
1 1 Laptop 0x0337518b10d11Ff8c475ab2508eA120e3d7F41e7
2 2 Desktop PC 0xcEc646349D71e34c0c128eEa6B88dDFa0E60431b
Sensor 3 Laptop 0x29a86118C1Ff89d474E9497D8B3FA890D9F7e30C
1 4 (Smart Contract) Laptop 0x1F9eB9f5C0C94603f6fB1aCF19f99dDd76600AF7
values equal to or below 30°C turn on the green LED for
three seconds.
IV. TES TB ED IMPLEMENTATION
For the implementation of the system testbed, two machines
are connected in a P2P network. Node one, which is running
on a laptop interfaced to Arduino UNO is shown in Fig. 3a,
while the Desktop PC running Node two is shown in Fig.
3b. The system starts by running both Nodes on terminal
windows of their respective operating system. In the initial
time, a small period is required for building DApps, mining
some blocks and syncing on both nodes. A third account is
created using web3py and stored in the Genesis file for the
transaction of sensor data to the account stored on Node one. A
smart contract is deployed on Node one using the truffle suite.
Contract and accounts’ addresses of testbed implementation
are shown in Table III. Serial transmission of sensor data is
started by running a python script in the terminal window. This
python script holds the Node one URL, the path to the genesis
file, a public and private key of the third account, the chain ID
of the network, the gas limit and contract address. The python
script takes the incoming sensor data, directs it in the Sensor
function and then creates the method-ID of the function using
SHA3-hash. The whole hash is used as a parameter in creating
a valid transaction signature. This data then transact from the
third account to the contract address using the JSON-RPC
protocol. The output conditions are requested by reading the
Get function and their respective values are then transmitted
to the Arduino board.
The effectiveness of the proposed method has been demon-
strated by the ability of the system to switch ON and OFF
the LEDs based on the temperature measurements. The trans-
actions of sensor data at different temperatures below and
above 30°C with the resulting output from the smart contract
are shown in Fig. 4a and Fig. 4b respectively. The main
performance metric evaluated in this study is the delay of per-
forming the sensing and actuation actions i.e. upon receiving
a sensed reading, the time required for data processing via
the blockchain for the actuator to be activated. The delay is a
very important parameter which affects the stability properties
of any closed loop system. Evaluating the magnitude of the
delays as a result of the blockchain implementation reveals
fundamental limitations of the proposed approach and at the
same time helps to identify the class of systems for which such
an implementation will be applicable. Applications with fast
response and stringent delay requirements are not amenable for
implementing large delay structures. So, a major contribution
of this study is to characterize the delays as various system
parameters change.
Delay is defined as the time required for a sensor data
transmission to lead to an output from the smart contract
based on the sensor value. Different hash difficulty levels
are set while keeping the block size at 5 seconds. Ethereum
blockchain has a consensus algorithm for the relation between
the hash difficulty level and the block size. It will adjust
the difficulty level to keep the transaction time close to the
block size. The delay graph shown in Fig. 5a illustrates this
consensus algorithm phenomenon where mean and variance
are calculated from 50 consecutive transactions at different
difficulty level. Delay graph in Fig. 5b at difficulty level 10 and
block size 20 seconds further verifies the consensus algorithm
concept.
V. CONCLUSION
In this paper, a blockchain based framework to implement
a trustworthy and distributed management system for closed
loop CPS is proposed and a proof of concept implementa-
tion is developed. The framework includes a sensor, inter-
faced serially to a computer, transacting its data on nodes
of Ethereum blockchain and LEDs are blinked in return
through simple conditions programmed in a smart contract.
The developed testbed was used to characterize the overall
delay, including transactions, processing and actuation. Such
delay characterizations are crucial for closed loop CPS as
(a) Transactions in safe range. (b) Transactions in dangerous range.
Fig. 4: Sensor’s data transactions on blockchain at different temperatures.
4.4 4.6 4.8 5 5.2 5.4 5.6
Time (s)
0
1
2
3
4
5
6
7
f(x)
Normal Distribution Graph
Difficulty Level 1
Difficulty Level 10
Difficulty Level 50
Difficulty Level 200
(a) Delay graph at block size 5 seconds & different difficulty levels.
19.2 19.4 19.6 19.8 20 20.2 20.4
Time (s)
0
1
2
3
4
5
f(x)
Normal Distribution Graph for block size 20s & difficulty level 10
(b) Delay graph at block size 20 seconds & difficulty level 10.
Fig. 5: Delay graphs.
they are known to significantly affect stability. The proposed
system can potentially serve systems such as the smart grid,
Intelligent Transportation, industrial robots and medical moni-
toring/operations and such applications will be investigated in
the future.
ACKNOWLEDGMENT
This article is based upon work from COST Action
CA15127 (“Resilient communication services protecting end-
user applications from disaster-based failures RECODIS”)
supported by COST (European Cooperation in Science and
Technology).
REFERENCES
[1] Lu, G. Qu and Z. Liu, ”A Survey on Recent Advances in Vehicular Net-
work Security, Trust, and Privacy, in IEEE Transactions on Intelligent
Transportation Systems, vol. 20, no. 2, pp. 760-776, Feb. 2019
[2] S. Sen, J. Koo and S. Bagchi, ”TRIFECTA: Security, Energy Efficiency,
and Communication Capacity Comparison for Wireless IoT Devices,
in IEEE Internet Computing, vol. 22, no. 1, pp. 74-81, Jan./Feb. 2018.
[3] T. M. Fern´
andez-Caram´
es and P. Fraga-Lamas, ”A Review on the Use
of Blockchain for the Internet of Things,” in IEEE Access, vol. 6, pp.
32979-33001, 2018.
[4] G. Zyskind, O. Nathan and A. ’. Pentland, ”Decentralizing Privacy:
Using Blockchain to Protect Personal Data,” in IEEE Security and
Privacy Workshops, San Jose, CA, pp. 180-184, 2015.
[5] T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi and J. Wang, ”Un-
tangling Blockchain: A Data Processing View of Blockchain Systems,
in IEEE Transactions on Knowledge and Data Engineering, vol. 30, no.
7, pp. 1366-1385, 1 July 2018.
[6] Zhang, Kaiwen, Roman Vitenberg, and Hans-Arno Jacobsen. ”Decon-
structing Blockchains: Concepts, Systems, and Insights.” Proceedings of
the 12th ACM International Conference on Distributed and Event-based
Systems. ACM, pp. 187-190, 2018.
[7] Bacon, Jean and Michels, Johan David and Millard, Christopher and
Singh, Jatinder, Blockchain Demystified (December 20, 2017). Queen
Mary School of Law Legal Studies Research Paper No. 268/2017.
[8] Reyna, Ana, et al. ”On blockchain and its integration with IoT. Chal-
lenges and opportunities.” Future Generation Computer Systems, vol 88,
pp. 173-190, 2018.
[9] S. Singh and N. Singh, ”Blockchain: Future of financial and cyber
security, in 2nd International Conference on Contemporary Computing
and Informatics (IC3I), Noida, pp. 463-467, 2016.
[10] K. Yeow, A. Gani, R. W. Ahmad, J. J. P. C. Rodrigues and K.
Ko, ”Decentralized Consensus for Edge-Centric Internet of Things: A
Review, Taxonomy, and Research Issues,” in IEEE Access, vol. 6, pp.
1513-1524, 2018.
[11] Shafagh, Hossein, et al. ”Droplet: Decentralized Authorization for IoT
Data Streams.” arXiv preprint arXiv:1806.02057(2018).
[12] Zhou, Jiayu, et al. ”Distributed Data Vending on Blockchain.” arXiv
preprint arXiv:1803.05871 (2018).
[13] O. Novo, ”Blockchain Meets IoT: An Architecture for Scalable Access
Management in IoT, in IEEE Internet of Things Journal, vol. 5, no. 2,
pp. 1184-1195, April 2018.
[14] Zhang, Yuanyu, et al. ”Smart Contract-Based Access Control for the
Internet of Things.” arXiv preprint arXiv:1802.04410(2018).
... Koumidis blockchain technique for securing event logs in CPS, which bundles event data into blocks and delivers them to the system components that monitor and control the CPS in order to minimize the computational resources. Also, in [49], and [50], Masood et al. presented a framework for a blockchainbased distributed management system for closed-loop CPS in order to address issues caused by computational constraints, centralized control, and network dependency. ...
... A topic worth considering in future studies on CPS-based usage of blockchain is the inclusion of greater mining incentives [11]. [11], [19], [21], [33], [34], [35], [37], [38], [40], [41], [42], [43], [49], [50], [52], [53], [58], [60], [61], [62], [64], [67], [68], [70] Encryption Asymmetric [21], [36], [40], [43], [57], [61], Public key [41], [57] Advanced Encryption Standard (AES) [35], RSA Key & Encryption/Decryption [59], ElGamal [58], Symmetric [40] Edge Net [47], [50], [52], [53], [54], [57], [66], [70] Platform Ethereum [21], [33], [34], [35], [37], [38], [41], [42], [50], [52], [53], [57], [58], [67], [68], [70] Bitcoin [58], [59] EOS [32] VI. CONCLUSION The intrinsic combination of distributed data storage, consensus methods, and secure protocol implementations in blockchain efficiently solves diverse CPS performance and security issues. ...
... A topic worth considering in future studies on CPS-based usage of blockchain is the inclusion of greater mining incentives [11]. [11], [19], [21], [33], [34], [35], [37], [38], [40], [41], [42], [43], [49], [50], [52], [53], [58], [60], [61], [62], [64], [67], [68], [70] Encryption Asymmetric [21], [36], [40], [43], [57], [61], Public key [41], [57] Advanced Encryption Standard (AES) [35], RSA Key & Encryption/Decryption [59], ElGamal [58], Symmetric [40] Edge Net [47], [50], [52], [53], [54], [57], [66], [70] Platform Ethereum [21], [33], [34], [35], [37], [38], [41], [42], [50], [52], [53], [57], [58], [67], [68], [70] Bitcoin [58], [59] EOS [32] VI. CONCLUSION The intrinsic combination of distributed data storage, consensus methods, and secure protocol implementations in blockchain efficiently solves diverse CPS performance and security issues. ...
... These challenges are mainly related to the integration of the ICT technologies and the complex physical industrial environment giving rise to new forms of cyber-attacks. Several constituent elements such as centralized access control, third party storage, energy, and computationally constrained IoTs, and the integrity of their generated data logs [2] result in a lack of trust in communication nodes, reliability issues, unauthorized access, and improper modification or destruction of data logs [3]. Data-Driven Process Monitoring (DD-PM) methods enhance the resiliency of ICSs towards built-in faults or cyber-attacks in Industry 4.0 [4], [5]. ...
... The study of feedback delays is crucial for the effective integration of blockchain in ICSs as these are known to reduce the stability margins of the closed-loop system thus deteriorating performance. Sources of such delays, as a result of the blockchain implementation, include the process of creating, validating, and uploading transactions to store sensed readings, generating actuation outputs via the smart contract, and relaying them to the physical controllers [2]. The results presented in [2], [9] suggest average feedback delays of the order of 2.9 s. ...
... Sources of such delays, as a result of the blockchain implementation, include the process of creating, validating, and uploading transactions to store sensed readings, generating actuation outputs via the smart contract, and relaying them to the physical controllers [2]. The results presented in [2], [9] suggest average feedback delays of the order of 2.9 s. Compared to the sampling time of 3 min, fixed in DD-PM schemes found in the TE process [30], the suggested feedback delays are much smaller. ...
... Koumidis et al. [34] developed a blockchain technique for securing event logs in CPS, which bundles event data into blocks and delivers them to the system components that monitor and control the CPS in order to minimize the computational resources. Also, in [35], and [36], Masood et al. presented a framework for a blockchain-based distributed management system for closedloop CPS in order to address issues caused by computational constraints, centralized control, and network dependency. ...
... A topic worth considering in future studies on CPS-based usage of blockchain is the inclusion of greater mining incentives [11]. [11], [16], [18], [20], [21], [22], [24], [25], [27], [28], [29], [30], [35], [36], [38], [39], [43], [45], [46], [47], [49], [52], [53], [55] Encryption Asymmetric [18], [23], [27], [30], [42], [46], Public key [28], [42] Advanced Encryption Standard (AES) [22], RSA Key & Encryption/Decryption [44], ElGamal [43], Symmetric [27] Edge Net [33], [36], [38], [39], [40], [42], [51], [55] Platform Ethereum [18], [20], [21], [22], [24], [25], [28], [29], [36], [38], [39], [42], [43], [52], [53], [55] Bitcoin [43], [44] EOS [19] VI. CONCLUSION The intrinsic combination of distributed data storage, consensus methods, and secure protocol implementations in blockchain efficiently solves diverse CPS performance and security issues. ...
... A topic worth considering in future studies on CPS-based usage of blockchain is the inclusion of greater mining incentives [11]. [11], [16], [18], [20], [21], [22], [24], [25], [27], [28], [29], [30], [35], [36], [38], [39], [43], [45], [46], [47], [49], [52], [53], [55] Encryption Asymmetric [18], [23], [27], [30], [42], [46], Public key [28], [42] Advanced Encryption Standard (AES) [22], RSA Key & Encryption/Decryption [44], ElGamal [43], Symmetric [27] Edge Net [33], [36], [38], [39], [40], [42], [51], [55] Platform Ethereum [18], [20], [21], [22], [24], [25], [28], [29], [36], [38], [39], [42], [43], [52], [53], [55] Bitcoin [43], [44] EOS [19] VI. CONCLUSION The intrinsic combination of distributed data storage, consensus methods, and secure protocol implementations in blockchain efficiently solves diverse CPS performance and security issues. ...
Preprint
Full-text available
Blockchain has become a key technology in a plethora of application domains owing to its decentralized public nature. The cyber-physical systems (CPS) is one of the prominent application domains that leverage blockchain for myriad operations, where the Internet of Things (IoT) is utilized for data collection. Although some of the CPS problems can be solved by simply adopting blockchain for its secure and distributed nature, others require complex considerations for overcoming blockchain-imposed limitations while maintaining the core aspect of CPS. Even though a number of studies focus on either the utilization of blockchains for different CPS applications or the blockchain-enabled security of CPS, there is no comprehensive survey including both perspectives together. To fill this gap, we present a comprehensive overview of contemporary advancement in using blockchain for enhancing different CPS operations as well as improving CPS security. To the best of our knowledge, this is the first paper that presents an in-depth review of research on blockchain-enabled CPS operation and security.
... There are two obvious challenges in adopting blockchain for CPS closed-loop operations: 1) long-delay in reaching consensus in blockchain and 2) limited throughput in blockchain. Some research proposed to address both issues by using permissioned blockchain [44], [77] where the consensus decision is carried out by a small group of carefully chosen validators and a much lightweight consensus algorithm other than PoW is used, such as PBFT [27]. While indeed this approach could drastically shorten the consensus time and increase the throughput in most cases, it is not so in all cases due to the asynchrony of the Internet environment, which could lead to prolonged view changes before a consensus can be reached even with PBFT [31], [43], a fact rarely acknowledged in the blockchain literature. ...
Article
In this article, we provide a concise but systematic review on blockchain-enabled cyber-physical systems (CPS). We dissect various blockchain-enabled CPS as reported in the literature in terms of their operations and the features of blockchain that have been used. We identify key common CPS operations that can be enabled by blockchain, and classify them in terms of their time sensitivity and throughput requirements. We also elaborate and classify features of blockchain in terms of different levels of benefits to CPS, including security, privacy, immutability, fault tolerance, interoperability, data provenance, atomicity, automation, data/service sharing, and trust. Finally, we point out two primary open research issues for developing blockchain-enabled CPS, namely, excessive delay in reaching consensus and limited throughput, and outline future research directions.
Article
The widespread adoption of networked technology has led to a digital revolution in interconnected systems, resulting in a significant increase in the attack surface and a corresponding rise in the number and sophistication of cyber-attacks. The integration of cyber-physical systems (CPS) into critical infrastructure has made their security against intrusions of paramount importance. To address this issue, the analysis of network traffic through Intrusion Detection Systems (IDS) has emerged as a critical element in the arsenal of network security tools. In response to the growing rate and complexity of cyberattacks, researchers have turned to Machine Learning (ML) and Deep Learning (DL) methods to develop IDS capable of addressing network attacks. However, the effectiveness of these models is reliant on the availability of data. This study emphasizes an empirical analysis of a decentralized learning framework for detecting intrusions in CPS. The proposed approach adopts a comprehensive framework that utilizes federated learning to overcome the limitations imposed by centralized data. The study also incorporates privacy mechanisms, such as differential privacy, to strengthen intrusion detection systems. The analysis of centralized and decentralized learning scenarios reveals nuanced insights into detection performance, offering a novel perspective on securing CPS network environments. While the centralized approach demonstrates slightly better detection performance, its impact on data privacy jeopardizes its suitability for real-world implementation. The outcomes highlight the efficiency and efficacy of the devised framework, establishingamodelcapableofeffectivelyclassifyingdistinctbenignandintrusivetrafficpatternswithout inter-organizational exchange of data.
Article
In order to effectively deal with major crimes like murder, robbery, rape, and kidnapping, we need a secure system for case reporting. In general terms, victims or proxies complete and file e-initial reports (e-FIRs) online to report cybercrime offenses known as electronic crimes (e-crimes). This approach has some drawbacks which include susceptibility to cyberattacks and fraudulent entries. At the same time, scholars are examining various means of improving traditional ways based on technological advancements. One of the possible alternatives is the utilization of digital currencies like Bitcoin while dealing with criminals involved in electronic fraud. Ethereum has a blockchain which has raised curiosity due to its smart contract mechanism. Improvement in data integrity and prevention of fake registrations are the main goals that are meant to be achieved by incorporating Ethereum into the e-FIR system. Security plus reliability are provided for in high measures by the decentralized and immutable nature of the blockchain. This implies that after adding a record to it, it cannot be altered minus agreement from the network, giving it a high reputation based on how safe it is. The use of blockchain in smart cities, and more specifically the smart contracts in Ethereum, may revolutionize how major crimes are reported and recorded as it can offer much better transparency and information integrity in the eyes of both the public and the police
Article
Full-text available
Blockchain is an emerging technology based on the digital ledger in the distributed system. The decentralized trust is one of its prominent features that ensures better transparency. Blockchain-based systems also enhance data integrity, confidentiality, and anonymity by eliminating third-party involvement in completing the transactions. Many SLRs have been published related to blockchain recently, but no comprehensive and systematic study on blockchain platforms has been conducted. So, there is a need for an organized and systematic review of blockchain platforms. This paper has reported a systematic literature review on existing blockchain platforms. We have formulated two research questions to determine the major frameworks used to implement blockchain-based systems and how they differ in implementation and operation. We have identified eighty-five blockchain platforms. To provide‎‎ comprehensive insights on blockchain platforms, we ‎identified related technologies and provided a map for ‎further ‎research development on blockchain technology.
Article
Full-text available
Industry 4.0 (I4.0) creates more efficient production processes by providing an interconnected environment between man and machine. Cyber-physical systems (CPS) are one of the many technologies that enable I4.0 by building a bridge between the physical and the virtual objects in production systems. Nonetheless, CPSs are dealing with a complex system with various emergent behaviours. CPS must be defined by features and characteristics that can adapt to the changes in real-time and derive knowledge through the gathered abundant information it receives. In this respect, this study focuses on an analysis and a review of CPS and its characteristics to explore the essence of knowledge representation in CPS metamodels. This study aims to answer the following research questions: how are CPS metamodels described and characterized? How is Knowledge represented in CPS metamodels? To respond to the research questions and achieve the purpose of this study, first a literature review was conducted to identify relevant papers, then Formal Concept Analysis (FCA) as a clustering technique is used to make a more thorough investigation of the topic, to analyse CPS characteristics, and to discover any hidden relationship between them. The analysis conducted led to an understanding of CPS’s characteristics and the discovery of any hidden relationship among them. Among all characteristics (e.g., safety, fault-tolerant, redundancy), “resiliency” was the most frequent characteristic. Consequently, with the help of the hidden bonds found by FCA among the most frequent and the most observed characteristics, a hierarchy of highly ranked CPS characteristics as a road map to reach “resiliency” is proposed. The paper presented a review and an analysis of Cyber-physical systems and their representative characteristics. A new set of definitions for the highly ranked characteristics is also introduced. The proposed definitions can help the future CPS metamodel designs so that they take a path more aligned with the concept of Industry 4.0.
Article
Modern technologies and data-driven approaches have enabled fault-tolerant controllers in Industry 4.0 smart factories to detect, identify, and mitigate anomalies in real-time with a high level of accuracy. However, this has also presented new challenges and requirements for cybersecurity, data analytics, and computational complexity for Data-Driven Fault-Tolerant Controllers (DD-FTC) in smart factories. To address these issues, a Blockchain-Based Data-Driven Fault-Tolerant Control (BB-DD-FTC) framework for smart factories is proposed in this paper. Blockchain ensures the integrity of data logs via its immutable ledger and decentralized architecture. Moreover, the blockchain smart contract functionality, embedded with a Data-Driven Intrusion Detection System (DD-IDS), and reconfiguration conditions, realizes DD-FTC and undertakes the mitigation response in case of cyber-attacks. The DD-IDS mechanism utilizes the principal component analysis technique and observer models, trained via neural networks, to detect an attack and identify the compromised component. The Tennessee Eastman (TE) industrial benchmark process is considered a case study to investigate the performance of the proposed framework. Two kinds of integrity attacks are applied to the sensors of the TE process with simulation results demonstrating the effectiveness of the method in mitigating the adversarial effect of the applied attacks on the overall system performance. As feedback delays can negatively impact performance, a detailed delay analysis is performed using network calculus. The security advantages and limitations of the proposed method are finally highlighted in the performed security analysis. The results are encouraging for the wider adoption of the control-over-the-blockchain concept.
Article
Cyber-Physical Systems (CPSs) are increasingly more complex and integrated into our everyday lives forming the basis of smart infrastructures, products, and services. Consequently, there is a greater need for their ability to perform their required functions under expected and unexpected adverse events. Moreover, the multitude of threats and their rapid evolution pushes the development of approaches that go beyond pure technical reliability, rather encompassing multi-dimensional performance of a socio-technical system. These dimensions call for the notion of resilience, to be used as a staging area for modelling system performance. While a large number of documents deal with this kind of problem for systems including CPSs, a comprehensive review on the topic is still lacking. The scope of this paper is to survey available literature for understanding to which extent CPSs contribute to system resilience, and to synthetize the approaches developed in this domain. More than 500 documents were reviewed through a protocol based on the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) review technique. This survey identifies main models and methods categorizing them on the basis of the hazards of interest and their effects on security, privacy, safety and business continuity. It also summarizes main conceptual frameworks and metrics used to assess and compare the resilience capabilities of a system including also CPSs. This cross-domain survey highlights the dominant techno-centric unit of analysis for available literature, still highlighting emerging trends towards more systemic representations of system threats, even socio-technically oriented, and respective modern investigation approaches.
Conference Paper
Full-text available
Recent advances in blockchain technologies have provided exciting opportunities for decentralized applications. Specifically, blockchain-based smart contracts enable credible transactions without authorized third parties. The attractive properties of smart contracts facilitate distributed data vending, allowing for proprietary data to be securely exchanged on a blockchain. Distributed data vending can transform domains such as healthcare by encouraging data distribution from owners and enabling large-scale data aggregation. However, one key challenge in distributed data vending is the trade-off dilemma between the effectiveness of data retrieval and the leakage risk from indexing the data. In this paper, we propose a framework for distributed data vending through a combination of data embedding and similarity learning. We illustrate our framework through a practical scenario of distributing and aggregating electronic medical records on a blockchain. Extensive empirical results demonstrate the effectiveness of our framework.
Conference Paper
Full-text available
Popularly known for powering cryptocurrencies such as Bitcoin and Ethereum, blockchains is seen as a disruptive technology capable of impacting a wide variety of domains, ranging from finance to governance, by offering superior security, reliability, and transparency in a decentralized manner. In this tutorial presentation, we first study the original Bitcoin design, as well as Ethereum and Hyperledger, and reflect on their design from an academic perspective. We provide an overview of potential applications and associated research challenges, as well as a survey of ongoing research projects. We mention opportunities blockchain creates for event-based systems. Finally, we conclude with a walkthrough showing the process of developing a decentralized application (ĐSApp), using a popular Smart Contract language (Solidity) for the blockchain platform of Ethereum.
Article
Full-text available
The paradigm of Internet of Things (IoT) is paving the way for a world where many of our daily objects will be interconnected and will interact with their environment in order to collect information and automate certain tasks. Such a vision requires, among other things, seamless authentication, data privacy, security, robustness against attacks, easy deployment and self-maintenance. Such features can be brought by blockchain, a technology born with a cryptocurrency called Bitcoin. In this paper it is presented a thorough review on how to adapt blockchain to the specific needs of IoT in order to develop Blockchain-based IoT (BIoT) applications. After describing the basics of blockchain, the most relevant BIoT applications are described with the objective of emphasizing how blockchain can impact traditional cloud-centered IoT applications. Then, the current challenges and possible optimizations are detailed regarding many aspects that affect the design, development and deployment of a BIoT application. Finally, some recommendations are enumerated with the aim of guiding future BIoT researchers and developers on some of the issues that will have to be tackled before deploying the next generation of BIoT applications.
Article
Full-text available
In the Internet of Things (IoT) vision, conventional devices become smart and autonomous. This vision is turning into a reality thanks to advances in technology, but there are still challenges to address, particularly in the security domain e.g., data reliability. Taking into account the predicted evolution of the IoT in the coming years, it is necessary to provide confidence in this huge incoming information source. Blockchain has emerged as a key technology that will transform the way in which we share information. Building trust in distributed environments without the need for authorities is a technological advance that has the potential to change many industries, the IoT among them. Disruptive technologies such as big data and cloud computing have been leveraged by IoT to overcome its limitations since its conception, and we think blockchain will be one of the next ones. This paper focuses on this relationship, investigates challenges in blockchain IoT applications, and surveys the most relevant work in order to analyze how blockchain could potentially improve the IoT.
Article
Full-text available
The Internet of Things (IoT) is stepping out of its infancy into full maturity and establishing itself as part of the future Internet. One of the technical challenges of having billions of devices deployed worldwide is the ability to manage them. Although access management technologies exist in IoT, they are based on centralized models which introduce a new variety of technical limitations to manage them globally. In this paper, we propose a new architecture for arbitrating roles and permissions in IoT. The new architecture is a fully distributed access control system for IoT based on blockchain technology. The architecture is backed by a proof of concept implementation and evaluated in realistic IoT scenarios. The results show that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.
Article
Full-text available
With the exponential rise in the number of devices, the Internet of Things (IoT) is geared towards edge-centric computing to offer high bandwidth, low latency, and improved connectivity. In contrast, legacy cloud-centric platforms offer deteriorated bandwidth and connectivity that affect the Quality of Service (QoS). Edge-centric Internet of Things-based technologies such as fog and mist computing offer distributed and decentralized solutions to resolve the drawbacks of cloud-centric models. However, to foster distributed edge-centric models, a decentralized consensus system is necessary to incentivize all participants to share their edge resources. This paper is motivated by the shortage of comprehensive reviews on decentralized consensus systems for edge-centric Internet of Things that elucidates myriad of consensus facets, such as data structure, scalable consensus ledgers and transaction models. Decentralized consensus systems adopt either blockchain or blockchainless directed acyclic graph technologies, which serve as immutable public ledgers for transactions. This study scrutinizes the pros and cons of state-of-the-art decentralized consensus systems. With an extensive literature review and categorization based on existing decentralized consensus systems, we propose a thematic taxonomy. The pivotal features and characteristics associated with existing decentralized consensus systems are analyzed via a comprehensive qualitative investigation. The commonalities and variances among these systems are analyzed using key criteria derived from the presented literature. Finally, several open research issues on decentralized consensus for edge-centric IoT are presented, which should be highlighted regarding centralization risk and deficiencies in blockchain/blockchainless solutions.
Article
Full-text available
The widespread proliferation of sensor nodes in the era of Internet of Things (IoT) coupled with increasing sensor fidelity and data acquisition modality is expected to generate 3+ Exabytes of data per day by 2018. Since most of these IoT devices will be wirelessly connected at the last few feet, wireless communication is an integral part of the future IoT scenario. The ever-shrinking size of unit computation (Moore's Law) and continued improvements in efficient communication (Shannon's Law) is expected to harness the true potential of the IoT revolution and produce dramatic societal impact. However, reducing size of IoT nodes and lack of significant improvement in energy-storage density leads to reducing energy-availability. Moreover, smaller size and energy means less resources available for securing IoT nodes, making the energy-sparse low-cost leaf nodes of the network as prime targets for attackers. In this paper, we survey six prominent wireless technologies with respect to the three dimensions - security, energy efficiency, and communication capacity. We point out the state-of-the-art, open issues, and the road ahead for promising research directions.
Article
Vehicular ad hoc networks (VANETs) are becoming the most promising research topic in intelligent transportation systems, because they provide information to deliver comfort and safety to both drivers and passengers. However, unique characteristics of VANETs make security, privacy, and trust management challenging issues in VANETs' design. This survey article starts with the necessary background of VANETs, followed by a brief treatment of main security services, which have been well studied in other fields. We then focus on an in-depth review of anonymous authentication schemes implemented by five pseudonymity mechanisms. Because of the predictable dynamics of vehicles, anonymity is necessary but not sufficient to thwart tracking an attack that aims at the drivers' location profiles. Thus, several location privacy protection mechanisms based on pseudonymity are elaborated to further protect the vehicles' privacy and guarantee the quality of location-based services simultaneously. We also give a comprehensive analysis on various trust management models in VANETs. Finally, considering that current and near-future applications in VANETs are evaluated by simulation, we give a much-needed update on the latest mobility and network simulators as well as the integrated simulation platforms. In sum, this paper is carefully positioned to avoid overlap with existing surveys by filling the gaps and reporting the latest advances in VANETs while keeping it self-explained.
Article
This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-object pair, and implements both static access right validation based on predefined policies and dynamic access right validation by checking the behavior of the subject. The JC implements a misbehavior-judging method to facilitate the dynamic validation of the ACCs by receiving misbehavior reports from the ACCs, judging the misbehavior and returning the corresponding penalty. The RC registers the information of the access control and misbehavior-judging methods as well as their smart contracts, and also provides functions (e.g., register, update and delete) to manage these methods. To demonstrate the application of the framework, we provide a case study in an IoT system with one desktop computer, one laptop and two Raspberry Pi single-board computers, where the ACCs, JC and RC are implemented based on the Ethereum smart contract platform to achieve the access control.
Article
Blockchain technologies are gaining massive momentum in the last few years. Blockchains are distributed ledgers that enable parties who do not fully trust each other to maintain a set of global states. The parties agree on the existence, values and histories of the states. As the technology landscape is expanding rapidly, it is both important and challenging to have a firm grasp of what the core technologies have to offer, especially with respect to their data processing capabilities. In this paper, we first survey the state of the art, focusing on private blockchains (in which parties are authenticated). We analyze both in-production and research systems in four dimensions: distributed ledger, cryptography, consensus protocol and smart contract. We then present BLOCKBENCH, a benchmarking framework for understanding performance of private blockchains against data processing workloads. We conduct a comprehensive evaluation of three major blockchain systems based on BLOCKBENCH, namely Ethereum, Parity and Hyperledger Fabric. The results demonstrate several trade-offs in the design space, as well as big performance gaps between blockchain and database systems. Drawing from design principles of database systems, we discuss several research directions for bringing blockchain performance closer to the realm of databases.