Conference paper Restricted Access

# Scalability analysis of a blockchain-based security strategy for complex IoT systems

Martí Miquel Martínez; Eva Marin Tordera; Xavi Masip Bruin

### DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<identifier identifierType="URL">https://zenodo.org/record/5680030</identifier>
<creators>
<creator>
<creatorName>Martí Miquel Martínez</creatorName>
<affiliation>UPC</affiliation>
</creator>
<creator>
<creatorName>Eva Marin Tordera</creatorName>
<affiliation>UPC</affiliation>
</creator>
<creator>
<creatorName>Xavi Masip Bruin</creatorName>
<affiliation>UPC</affiliation>
</creator>
</creators>
<titles>
<title>Scalability analysis of a blockchain-based security strategy for complex IoT systems</title>
</titles>
<publisher>Zenodo</publisher>
<publicationYear>2021</publicationYear>
<dates>
<date dateType="Issued">2021-07-15</date>
</dates>
<resourceType resourceTypeGeneral="ConferencePaper"/>
<alternateIdentifiers>
<alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5680030</alternateIdentifier>
</alternateIdentifiers>
<relatedIdentifiers>
<relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1109/HPSR52026.2021.9481865</relatedIdentifier>
<relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/fishy</relatedIdentifier>
</relatedIdentifiers>
<rightsList>
<rights rightsURI="info:eu-repo/semantics/restrictedAccess">Restricted Access</rights>
</rightsList>
<descriptions>
<description descriptionType="Abstract">&lt;p&gt;Supply chains constitute a type of IoT system that is becoming increasingly complex today. Providing supply chains with cybersecurity guarantees is becoming a highly topic in current research. This interest is mainly rooted on the fact that supply chains may include different vulnerable components, such as those residing in factories, distribution centres, logistics, or transportation, just to name a few. Moreover, most of these components are controlled by different IoT devices, such as sensors and actuators, also becoming well-known sources of vulnerabilities, easing attackers access to the whole system. In this scenario, cyberattacks that use this weak link in a supply chain are increasing in the last years, as it has been largely reported in the literature. In this heterogeneous scenario, the key trend to facilitate cybersecurity provisioning sits on guaranteeing cyber-security in the entire supply chain, handled as a whole, that is, not separately for each individual component of the chain. In this paper, we propose an authentication/access mechanism for the weaker elements in a supply chain, i.e., the IoT devices, leveraging blockchain as the baseline technology, based on considering the generation of temporal tickets to have a higher access control.&lt;/p&gt;</description>
</descriptions>
<fundingReferences>
<fundingReference>
<funderName>European Commission</funderName>
<funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
<awardNumber awardURI="info:eu-repo/grantAgreement/EC/Horizon 2020 Framework Programme - Research and Innovation action/952644/">952644</awardNumber>
<awardTitle>A coordinated framework for cyber resilient supply chain systems over complex ICT infrastructures</awardTitle>
</fundingReference>
</fundingReferences>
</resource>

22
6
views