Blockchain-Based Data Security and Sharing for Resource-Constrained Devices in Manufacturing IoT

Jinbiao Tan, Jianhua Shi, Jiafu Wan, Hong Ning Dai, Jiong Jin, Rui Zhang

Research output: Contribution to journalJournal articlepeer-review

Abstract

Presently, resource-constrained devices in manufacturing Internet of Things (MIoT), such as sensors and radio frequency identification (RFID) devices, collect a large amount of privacy-sensitive data. However, weak passwords and vulnerable encryption capabilities in MIoT have often become loopholes of security risks. To this end, this paper proposes a novel secure data-sharing scheme based on the integration of blockchain and fusion of both real and fake data to address the data security requirements of resource-constrained MIoT devices. First, a computing resource collaboration architecture is designed, thereby enabling these devices to interface with multiple devices with full resource to implement flexible resource scheduling. Then, a resource-assistance mechanism is devised through blockchain-based smart contracts by utilizing the idle resources of full nodes to complement the computational tasks launched by resource-constrained nodes. In addition, polygon semantic rules are proposed to improve the security of private data. Subsequently, real data artifacts are generated by data tampering to achieve privacy cover, avoiding the consumption of computing resources in traditional encryption algorithms. Finally, the feasibility of the proposed scheme is verified on a customized candy production line. The experimental results validate that data protection using polygon semantic rules can prevent actual data from being peeped. Moreover, the results also indicate that the proposed method can obtain resource assistance from other nodes through the resource compensation mechanism.
Original languageEnglish
Pages (from-to)1-10
Number of pages10
JournalIEEE Internet of Things Journal
DOIs
Publication statusE-pub ahead of print - 6 Feb 2024

Scopus Subject Areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

User-Defined Keywords

  • Blockchain
  • Blockchains
  • Computer architecture
  • Data protection
  • data security
  • data sharing
  • Encryption
  • intelligent manufacturing
  • Internet of Things
  • Manufacturing
  • Security
  • Semantics

Fingerprint

Dive into the research topics of 'Blockchain-Based Data Security and Sharing for Resource-Constrained Devices in Manufacturing IoT'. Together they form a unique fingerprint.

Cite this