Conference paper Restricted Access

Scalability analysis of a blockchain-based security strategy for complex IoT systems

Martí Miquel Martínez; Eva Marin Tordera; Xavi Masip Bruin


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://zenodo.org/record/5680030">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5680030</dct:identifier>
    <foaf:page rdf:resource="https://zenodo.org/record/5680030"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Martí Miquel Martínez</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>UPC</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Eva Marin Tordera</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>UPC</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Xavi Masip Bruin</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>UPC</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>Scalability analysis of a blockchain-based security strategy for complex IoT systems</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2021</dct:issued>
    <frapo:isFundedBy rdf:resource="info:eu-repo/grantAgreement/EC/Horizon 2020 Framework Programme - Research and Innovation action/952644/"/>
    <schema:funder>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </schema:funder>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2021-07-15</dct:issued>
    <owl:sameAs rdf:resource="https://zenodo.org/record/5680030"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5680030</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <owl:sameAs rdf:resource="https://doi.org/10.1109/HPSR52026.2021.9481865"/>
    <dct:isPartOf rdf:resource="https://zenodo.org/communities/fishy"/>
    <dct:description>&lt;p&gt;Supply chains constitute a type of IoT system that is becoming increasingly complex today. Providing supply chains with cybersecurity guarantees is becoming a highly topic in current research. This interest is mainly rooted on the fact that supply chains may include different vulnerable components, such as those residing in factories, distribution centres, logistics, or transportation, just to name a few. Moreover, most of these components are controlled by different IoT devices, such as sensors and actuators, also becoming well-known sources of vulnerabilities, easing attackers access to the whole system. In this scenario, cyberattacks that use this weak link in a supply chain are increasing in the last years, as it has been largely reported in the literature. In this heterogeneous scenario, the key trend to facilitate cybersecurity provisioning sits on guaranteeing cyber-security in the entire supply chain, handled as a whole, that is, not separately for each individual component of the chain. In this paper, we propose an authentication/access mechanism for the weaker elements in a supply chain, i.e., the IoT devices, leveraging blockchain as the baseline technology, based on considering the generation of temporal tickets to have a higher access control.&lt;/p&gt;</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/RESTRICTED"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/restrictedAccess">
        <rdfs:label>Restricted Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
  </rdf:Description>
  <foaf:Project rdf:about="info:eu-repo/grantAgreement/EC/Horizon 2020 Framework Programme - Research and Innovation action/952644/">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">952644</dct:identifier>
    <dct:title>A coordinated framework for cyber resilient supply chain systems over complex ICT infrastructures</dct:title>
    <frapo:isAwardedBy>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </frapo:isAwardedBy>
  </foaf:Project>
</rdf:RDF>
22
6
views
downloads
Views 22
Downloads 6
Data volume 18.7 MB
Unique views 14
Unique downloads 2

Share

Cite as