Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions
Abstract
:1. Introduction
- These studies highlight the security issues, including infrastructure security, data security, and process trust, in IIoT, are selected. These studies highlight the concepts, technologies, architecture, and application of blockchain middleware technology in IIoT is selected.
- Reviews/frameworks on IIoT blockchain middleware and enabling technologies were evaluated to offer a comprehensive understanding of the trends, functions, technologies, and challenges involved in Industry 5.0.
- Studies containing concepts and issues related to digital transformation were taken into consideration, including those that did not specifically include blockchain middleware in the title, keywords, or abstract. This makes it possible to identify potential directions for future industrial innovations.
2. Security Issues in IIoT
2.1. The Characteristics of IIoT
2.1.1. Mass and Jumbled Data
2.1.2. Distributed Architecture
2.1.3. Heterogeneity
- Multiple devices and heterogeneous network communication
- 2.
- Interaction of heterogeneous systems and software
2.2. The Architecture of IIoT
2.2.1. Perception Layer
2.2.2. Network Layer
2.2.3. Middleware Layer
2.2.4. Application Layer
2.3. Security Issues in IIoT Architecture
3. Blockchain Middleware for Decentralized IIoT
3.1. Advantages of Blockchain Middleware in IIoT
3.1.1. Digital Identities
3.1.2. Distributed Security
3.1.3. Smart Contracts
3.1.4. Micro-Controls
3.2. Architecture of Secure Blockchain Middleware for Decentralized IIoT
3.3. The Review of Blockchain Middleware
3.3.1. Distributed Data Storage
3.3.2. Data Synchronism
3.3.3. Security and Privacy
3.3.4. Function Integration
3.3.5. Blockchain IIoT Cloud Platform
4. Enablers in Blockchain Middleware
4.1. Enablers for the Application Layer
4.1.1. Distributed Machine Learning
4.1.2. Secure Big Data Analytics
4.2. Enablers for the Middleware Layer
4.3. Enablers for the Blockchain Network
4.3.1. Consensus Mechanism
4.3.2. Smart Contracts
4.3.3. Cryptography and Distributed Ledger
4.4. Digital Transformation for the Perception Layer
5. Research Directions
5.1. Directions for the Application Layer
5.1.1. A robust and Unified Data Format and Real-Time Data Fusion
5.1.2. Efficient Deep Learning Models for Decentralized IIoT Middleware Frameworks
5.2. Directions for the Middleware Layer
5.2.1. Lightweight Ontology for IIoT
5.2.2. Embed Advanced Fault Detection Algorithms for Blockchain Middleware
5.2.3. Standardized Concise User Interface of Middleware
5.2.4. Adequate and Efficient Interfaces for Further Development
5.3. Directions for the Blockchain Network
5.3.1. Establish a Lightweight Blockchain Computing Network and Consensus Algorithm
5.3.2. Standardization of Blockchain-Enabled IIoT
5.4. Directions for the Perception Layer
5.4.1. Develop a Generic Paradigm for Building Digital Twin
5.4.2. Metaverse
6. Concluding Remarks
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Müller, J. Enabling Technologies for Industry 5.0. 2020. Available online: https://www.4bt.us/wp-content/uploads/2021/04/INDUSTRY-5.0.pdf (accessed on 19 July 2022).
- Breque, M.; De Nul, L.; Petridis, A. Industry 5.0: Towards a Sustainable, Human-Centric and Resilient European Industry. 2021. Available online: https://msu.euramet.org/current_calls/documents/EC_Industry5.0.pdf (accessed on 19 July 2022).
- Da Xu, L.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
- Li, S.; Zhao, S.; Yang, P.; Andriotis, P.; Xu, L.; Sun, Q. Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems. IEEE Internet Things J. 2019, 6, 2299–2308. [Google Scholar] [CrossRef]
- Latif, S.; Idrees, Z.; e Huma, Z.; Ahmad, J. Blockchain Technology for the Industrial Internet of Things: A Comprehensive Survey on Security Challenges, Architectures, Applications, and Future Research Directions. Trans. Emerg. Telecommun. Technol. 2021, 32, e4337. [Google Scholar] [CrossRef]
- Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on Blockchain for Internet of Things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
- Lian, J.; Wang, S.; Xie, Y. TDRB: An Efficient Tamper-Proof Detection Middleware for Relational Database Based on Blockchain Technology. IEEE Access 2021, 9, 66707–66722. [Google Scholar] [CrossRef]
- Leng, J.; Zhou, M.; Zhao, J.L.; Huang, Y.; Bian, Y. Blockchain Security: A Survey of Techniques and Research Directions. IEEE Trans. Serv. Comput. 2022, 15, 2490–2510. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain Challenges and Opportunities: A Survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Sun, Q.; Wang, N.; Li, S.; Zhou, H. Local Spatial Obesity Analysis and Estimation Using Online Social Network Sensors. J. Biomed. Inform. 2018, 83, 54–62. [Google Scholar] [CrossRef] [PubMed]
- Yli-Ojanperä, M.; Sierla, S.; Papakonstantinou, N.; Vyatkin, V. Adapting an Agile Manufacturing Concept to the Reference Architecture Model Industry 4.0: A Survey and Case Study. J. Ind. Inf. Integr. 2018, 15, 147–160. [Google Scholar] [CrossRef]
- Zhou, B.; Maines, C.; Tang, S.; Shi, Q.; Yang, P.; Yang, Q.; Qi, J. A 3-D Security Modeling Platform for Social IoT Environments. IEEE Trans. Comput. Soc. Syst. 2018, 5, 1174–1188. [Google Scholar] [CrossRef] [Green Version]
- Bukkapatnam, S.T.; Lakhtakia, A.; Kumara, S.R. Analysis of Sensor Signals Shows Turning on a Lathe Exhibits Low-Dimensional Chaos. Phys. Rev. E 1995, 52, 2375–2387. [Google Scholar] [CrossRef] [PubMed]
- Yang, H.; Kumara, S.; Bukkapatnam, S.T.; Tsung, F. The internet of Things for Smart Manufacturing: A Review. IISE Trans. 2019, 51, 1190–1216. [Google Scholar] [CrossRef]
- Leng, J.; Chen, Z.; Sha, W.; Ye, S.; Liu, Q.; Chen, X. Cloud-Edge Orchestration-Based Bi-Level Autonomous Process Control for Mass Individualization of Rapid Printed Circuit Boards Prototyping Services. J. Manuf. Syst. 2022, 63, 143–161. [Google Scholar] [CrossRef]
- Issarny, V.; Georgantas, N.; Hachem, S.; Zarras, A.; Vassiliadist, P.; Autili, M.; Gerosa, M.A.; Hamida, A.B. Service-Oriented Middleware for the Future Internet: State of the Art and Research Directions. J. Internet Serv. Appl. 2011, 2, 23–45. [Google Scholar] [CrossRef]
- Zeng, J.; Yang, L.T.; Lin, M.; Ning, H.; Ma, J. A Survey: Cyber-Physical-Social Systems and Their System-Level Design Methodology. Future Gener. Comput. Syst. 2020, 105, 1028–1042. [Google Scholar] [CrossRef]
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial Internet of Things: Challenges, Opportunities, and Directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
- Xu, H.; Yu, W.; Griffith, D.; Golmie, N. A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective. IEEE Access 2018, 6, 78238–78259. [Google Scholar] [CrossRef]
- Jayalaxmi, P.; Saha, R.; Kumar, G.; Kumar, N.; Kim, T.-H. A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access 2021, 9, 25344–25359. [Google Scholar] [CrossRef]
- Jose, A.C.; Malekian, R. Improving Smart Home Security: Integrating Logical Sensing into Smart Home. IEEE Sens. J. 2017, 17, 4269–4286. [Google Scholar] [CrossRef]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Perera, C.; Zaslavsky, A.; Christen, P.; Georgakopoulos, D. Context Aware Computing for The Internet of Things: A Survey. IEEE Commun. Surv. Tutor. 2013, 16, 414–454. [Google Scholar] [CrossRef]
- Silva, B.N.; Khan, M.; Han, K. Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges. IETE Technol. Rev. 2017, 35, 205–220. [Google Scholar] [CrossRef]
- Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
- Latif, S.; Zou, Z.; Idrees, Z.; Ahmad, J. A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network. IEEE Access 2020, 8, 89337–89350. [Google Scholar] [CrossRef]
- Muhammad, F.; Anjum, W.; Mazhar, K.S. A Critical Analysis on the Security Concerns of Internet of Things (IoT). Int. J. Comput. Appl. 2015, 111, 1–6. [Google Scholar]
- Mohamed, N.; Al-Jaroodi, J. A Survey on Service-Oriented Middleware for Wireless Sensor Networks. Serv. Oriented Comput. Appl. 2011, 5, 71–85. [Google Scholar] [CrossRef]
- Mohiuddin, I.; Almogren, A. Workload Aware VM Consolidation Method in Edge/Cloud Computing for Iot Applications. J. Parallel Distrib. Comput. 2019, 123, 204–214. [Google Scholar] [CrossRef]
- Alam, M.G.R.; Hassan, M.M.; Uddin, M.Z.; Almogren, A.; Fortino, G. Autonomic Computation Offloading in Mobile Edge for Iot Applications. Future Gener. Comput. Syst. 2019, 90, 149–157. [Google Scholar] [CrossRef]
- Sengupta, J.; Ruj, S.; Das Bit, S. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 2019, 149, 102481. [Google Scholar] [CrossRef]
- Attri, T.; Bhushan, B. Enabling Technologies, Attacks, and Machine Learning-Based Countermeasures for IoT and IIoT. In Integration of WSNs into Internet of Things; CRC Press: Boca Raton, FL, USA, 2021; pp. 249–272. [Google Scholar] [CrossRef]
- Pal, S.; Jadidi, Z. Analysis of Security Issues and Countermeasures for the Industrial Internet of Things. Appl. Sci. 2021, 11, 9393. [Google Scholar] [CrossRef]
- Ghadge, A.; Kara, M.E.; Moradlou, H.; Goswami, M. The Impact of Industry 4.0 Implementation on Supply Chains. J. Manuf. Technol. Manag. 2020, 31, 669–686. [Google Scholar] [CrossRef]
- Müller, J.M.; Veile, J.W.; Voigt, K.-I. Prerequisites and Incentives for Digital Information Sharing in Industry 4.0—An International Comparison Across Data Types. Comput. Ind. Eng. 2020, 148, 106733. [Google Scholar] [CrossRef]
- Mahmoud, R.; Yousuf, T.; Aloul, F.; Zualkernan, I. Internet of Things (Iot) Security: Current Status, Challenges and Prospective Measures. In Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 14–16 December 2015; pp. 336–341. [Google Scholar]
- Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of Things: Security vulnerabilities and challenges. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 180–187. [Google Scholar]
- Yang, J.C.; Fang, B.X. Security Model and Key Technologies for the Internet of Things. J. China Univ. Posts Telecommun. 2011, 18, 109–112. [Google Scholar] [CrossRef]
- Xiao, B.; Chen, W.; He, Y.; Sha, E.M. An Active Detecting Method Against SYN Flooding Attack. In Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS’05), Fukuoka, Japan, 20–22 July 2005; Volume 1, pp. 709–715. [Google Scholar]
- Ahemd, M.M.; Shah, M.A.; Wahid, A. IoT Security: A Layered Approach for Attacks & Defenses. In Proceedings of the 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan, 19–21 April 2017; pp. 104–110. [Google Scholar]
- Airehrour, D.; Gutierrez, J.; Ray, S.K. Secure Routing for Internet of Things: A Survey. J. Netw. Comput. Appl. 2016, 66, 198–213. [Google Scholar] [CrossRef]
- Pongle, P.; Chavan, G. A Survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015; pp. 1–6. [Google Scholar]
- Elkhodr, M.; Shahrestani, S.; Cheung, H. The Internet of Things: Vision & Challenges. In Proceedings of the IEEE 2013 Tencon-Spring, Sydney, NSW, Australia, 17–19 April 2013; pp. 218–222. [Google Scholar]
- Palattella, M.R.; Dohler, M.; Grieco, A.; Rizzo, G.; Torsner, J.; Engel, T.; Ladid, L. Internet of Things in the 5G Era: Enablers, Architecture, And Business Models. IEEE J. Sel. Areas Commun. 2016, 34, 510–527. [Google Scholar] [CrossRef]
- Guinard, D.; Trifa, V.; Karnouskos, S.; Spiess, P.; Savio, D. Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services. IEEE Trans. Serv. Comput. 2010, 3, 223–235. [Google Scholar] [CrossRef]
- O’Leary, D.E. ‘Big Data’, The ‘Internet of Things’ and the ‘Internet of Signs. Intell. Syst. Account. Financ. Manag. 2013, 20, 53–65. [Google Scholar] [CrossRef]
- Yan, Z.; Zhang, P.; Vasilakos, A.V. A Survey on Trust Management for Internet of Things. J. Netw. Comput. Appl. 2014, 42, 120–134. [Google Scholar] [CrossRef]
- Li, S.; Xu, L.D.; Zhao, S. The Internet of Things: A Survey. Inf. Syst. Front. 2015, 17, 243–259. [Google Scholar] [CrossRef]
- Gupta, B.B.; Tewari, A.; Jain, A.K.; Agrawal, D.P. Fighting Against Phishing Attacks: State of the Art and Future Challenges. Neural Comput. Appl. 2016, 28, 3629–3654. [Google Scholar] [CrossRef]
- Varga, P.; Plosz, S.; Soos, G.; Hegedus, C. Security Threats and Issues in Automation IoT. In Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway, 31 May–2 June 2017; pp. 1–6. [Google Scholar]
- Babar, S.; Mahalle, P.; Stango, A.; Prasad, N.; Prasad, R. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). In International Conference on Network Security and Applications; Springer: Berlin/Heidelberg, Germany, 2010; pp. 420–429. [Google Scholar]
- Pal, S.; Hitchens, M.; Varadharajan, V. Modeling Identity for the Internet of Things: Survey, Classification and Trends. In Proceedings of the 2018 12th International Conference on Sensing Technology (ICST), Limerick, Ireland, 4–6 December 2018; pp. 45–51. [Google Scholar]
- Sarma, A.C.; Girão, J. Identities in the Future Internet of Things. Wirel. Pers. Commun. 2009, 49, 353–363. [Google Scholar] [CrossRef]
- Lhaksmana, K.M.; Murakami, Y.; Ishida, T. Analysis of Large-Scale Service Network Tolerance to Cascading Failure. IEEE Internet Things J. 2016, 3, 1159–1170. [Google Scholar] [CrossRef]
- Lhaksmana, K.M.; Murakami, Y.; Ishida, T. Cascading Failure Tolerance in Large-Scale Service Networks. In Proceedings of the 2015 IEEE International Conference on Services Computing, New York, NY, USA, 27 June–2 July 2015; pp. 1–8. [Google Scholar]
- Mohamed, N.; Al-Jaroodi, J. Applying Blockchain in Industry 4.0 Applications. In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 0852–0858. [Google Scholar]
- Leng, J.; Ruan, G.; Jiang, P.; Xu, K.; Liu, Q.; Zhou, X.; Liu, C. Blockchain-Empowered Sustainable Manufacturing and Product Lifecycle Management in Industry 4.0: A Survey. Renew. Sustain. Energy Rev. 2020, 132, 110112. [Google Scholar] [CrossRef]
- Razzaque, M.A.; Milojevic-Jevric, M.; Palade, A.; Clarke, S. Middleware for Internet of Things: A Survey. IEEE Internet Things J. 2015, 3, 70–95. [Google Scholar] [CrossRef]
- Ngu, A.H.; Gutierrez, M.; Metsis, V.; Nepal, S.; Sheng, Q.Z. IoT Middleware: A Survey on Issues and Enabling Technologies. IEEE Internet Things J. 2017, 4, 1–20. [Google Scholar] [CrossRef]
- Fremantle, P.; Scott, P. A Survey of Secure Middleware for the Internet of Things. PeerJ Comput. Sci. 2017, 3, e114. [Google Scholar] [CrossRef]
- Hassan, A. Lightweight Cryptography for the Internet of Things. In Proceedings of the Future Technologies Conference (FTC) 2020, Vancouver, BC, Canada, 5–6 November 2020; Arai, K., Kapoor, S., Bhatia, R., Eds.; Advances in Intelligent Systems and Computing. Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
- Lyu, X.; Ni, W.; Tian, H.; Liu, R.P.; Wang, X.; Giannakis, G.B.; Paulraj, A. Optimal Schedule of Mobile Edge Computing for Internet of Things Using Partial Information. IEEE J. Sel. Areas Commun. 2017, 35, 2606–2615. [Google Scholar] [CrossRef]
- Atlam, H.F.; Alenezi, A.; Alharthi, A.; Walters, R.J.; Wills, G.B. Integration of cloud Computing with Internet of Things: Challenges and Open Issues. In Proceedings of the 2017 IEEE International Conference on Internet of Things (Ithings) and IEEE Green Computing and Communications (Greencom) and IEEE Cyber, Physical and Social Computing (Cpscom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017; pp. 670–675. [Google Scholar]
- Danish, S.M.; Assoc, C.M. A Blockchain-Based Adaptive Middleware for Large Scale Internet of Things Data Storage Selection. In Proceedings of the Middleware’19: 20th International Middleware Conference Doctoral Symposium, Davis, CA, USA, 9–13 December 2019; pp. 17–19. [Google Scholar]
- Lv, P.; Wang, L.; Zhu, H.; Deng, W.; Gu, L. An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains. IEEE Access 2019, 7, 41309–41314. [Google Scholar] [CrossRef]
- Ramachandran, G.S.; Wright, K.L.; Zheng, L.; Navaney, P.; Naveed, M.; Krishnamachari, B.; Dhaliwal, J. Trinity: A Byzantine Fault-Tolerant Distributed Publish-Subscribe System with Immutable Blockchain-Based Persistence. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Korea, 14–17 May 2019; pp. 227–235. [Google Scholar]
- Kshetri, N. Can Blockchain Strengthen the Internet of Things? IT Prof. 2017, 19, 68–72. [Google Scholar] [CrossRef] [Green Version]
- Al-Jaroodi, J.; Mohamed, N. Service-Oriented Middleware: A Survey. J. Netw. Comput. Appl. 2012, 35, 211–220. [Google Scholar] [CrossRef]
- Leng, J.; Yan, D.; Liu, Q.; Xu, K.; Zhao, J.L.; Shi, R.; Wei, L.; Zhang, D.; Chen, X. ManuChain: Combining Permissioned Blockchain with a Holistic Optimization Model as Bi-Level Intelligence for Smart Manufacturing. IEEE Trans. Syst. Man, Cybern. Syst. 2019, 50, 182–192. [Google Scholar] [CrossRef]
- Rizzardi, A.; Sicari, S.; Miorandi, D.; Coen-Porisini, A. Securing the Access Control Policies to the Internet of Things Resources Through Permissioned Blockchain. Concurr. Comput. Pract. Exp. 2022, 34, e6934. [Google Scholar] [CrossRef]
- Park, J.; Kim, H.; Kim, G.; Ryou, J. Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain. Computers 2020, 10, 7. [Google Scholar] [CrossRef]
- Duran, R.G.; Yarleque-Ruesta, D.; Belles-Munoz, M.; Jimenez-Viguer, A.; Munoz-Tapia, J.L. An Architecture for Easy Onboarding and Key Life-Cycle Management in Blockchain Applications. IEEE Access 2020, 8, 115005–115016. [Google Scholar] [CrossRef]
- Hasan, M.; Starly, B. Decentralized Cloud Manufacturing-As-A-Service (Cmaas) Platform Architecture with Configurable Digital Assets. J. Manuf. Syst. 2020, 56, 157–174. [Google Scholar] [CrossRef]
- Ochôa, I.S.; Silva, L.A.; de Mello, G.; da Silva, B.A.; de Paz, J.F.; González, G.V.; Garcia, N.M.; Leithardt, V.R.Q. PRICHAIN: A Partially Decentralized Implementation of UbiPri Middleware Using Blockchain. Sensors 2019, 19, 4483. [Google Scholar] [CrossRef]
- Underwood, S. Blockchain Beyond Bitcoin. Commun. ACM 2016, 59, 15–17. [Google Scholar] [CrossRef]
- Tapas, N.; Merlino, G.; Longo, F. Blockchain-based IoT-cloud authorization and delegation. In Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP), Taormina, Italy, 18–20 June 2018; pp. 411–416. [Google Scholar]
- Wang, N.; Wang, B.; Liu, T.; Li, W.; Yang, S. A Middleware Approach to Synchronize Transaction Data to Blockchain. In Proceedings of the 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 3–6 August 2020; pp. 1–8. [Google Scholar]
- Peng, Z.; Wu, H.; Xiao, B.; Guo, S. VQL: Providing Query Efficiency and Data Authenticity in Blockchain Systems. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), Macao, China, 8–12 April 2019; pp. 1–6. [Google Scholar]
- Zhou, E.; Sun, H.; Pi, B.; Sun, J.; Yamashita, K.; Nomura, Y. Ledgerdata Refiner: A Powerful Ledger Data Query Platform for Hyperledger Fabric. In Proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, 22–25 October 2019; pp. 433–440. [Google Scholar]
- Liu, X.; Wang, W.; Guo, H.; Barenji, A.V.; Li, Z.; Huang, G.Q. Industrial Blockchain Based Framework for Product Lifecycle Management in Industry 4.0. Robot. Comput. Manuf. 2019, 63, 101897. [Google Scholar] [CrossRef]
- Maxim, J. Onename Launches Blockchain Identity Product Passcard. Bitcoin Mag. 2015. Available online: https://bitcoinmagazine.com/business/onename-launches-blockchain-identity-product-passcard-1431548450 (accessed on 19 July 2022).
- Takahashi, R. How Can Creative Industries Benefit from Blockchain? McKinsey & Company: Hong Kong, China, 2017; Available online: http://bloomen.io/portfolio-item/mckinsey-can-creative-industries-benefit-blockchain/ (accessed on 19 July 2022).
- Lu, Y.; Fu, Q.; Xi, X.; Chen, Z. Cloud Data Acquisition and Processing Model Based on Blockchain. J. Intell. Fuzzy Syst. 2020, 39, 5027–5036. [Google Scholar] [CrossRef]
- Zupan, N.; Zhang, K.W.; Jacobsen, H.A. Demo: Hyperpubsub: A Decentralized, Permissioned, Publish/Subscribe Service Using Blockchains. In Proceedings of the Middleware ‘17: 18th International Middleware Conference, Las Vegas, NV, USA, 11–15 December 2017; pp. 15–16. [Google Scholar]
- Tang, Y.; Zou, Q.; Chen, J.; Li, K.; Kamhoua, C.A.; Kwiat, K.; Njilla, L. ChainFS: Blockchain-Secured Cloud Storage. In Proceedings of the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 2–7 July 2018; pp. 987–990. [Google Scholar]
- Samaniego, M.; Deters, R. Zero-Trust Hierarchical Management in IoT. In Proceedings of the 2018 IEEE International Congress on Internet of Things (ICIOT), Bhimtal, India, 23–24 February 2018; pp. 88–95. [Google Scholar]
- Hosen, A.S.M.S.; Singh, S.; Sharma, P.K.; Ghosh, U.; Wang, J.; Ra, I.-H.; Cho, G.H. Blockchain-Based Transaction Validation Protocol for a Secure Distributed IoT Network. IEEE Access 2020, 8, 117266–117277. [Google Scholar] [CrossRef]
- Walas, F.; Redchuk, A. IIoT/IoT and Artificial Intelligence/Machine Learning as a Process Optimization Driver under Industry 4.0 Model. J. Comput. Sci. Technol. 2021, 21, e15. [Google Scholar] [CrossRef]
- Tian, Y.; Li, T.; Xiong, J.; Bhuiyan, M.Z.A.; Ma, J.; Peng, C. A Blockchain-Based Machine Learning Framework for Edge Services in IIoT. IEEE Trans. Ind. Inform. 2021, 18, 1918–1929. [Google Scholar] [CrossRef]
- Khalil, R.A.; Saeed, N.; Masood, M.; Fard, Y.M.; Alouini, M.-S.; Al-Naffouri, T.Y. Deep Learning in the Industrial Internet of Things: Potentials, Challenges, and Emerging Applications. IEEE Internet Things J. 2021, 8, 11016–11040. [Google Scholar] [CrossRef]
- Hiessl, T.; Schall, D.; Kemnitz, J.; Schulte, S. Industrial Federated Learning—Requirements and System Design. In Proceedings of the PAAMS 2020: Highlights in Practical Applications of Agents, Multi-Agent Systems, and Trust-worthiness, the PAAMS Collection, L’Aquila, Italy, 7–9 October 2020; Communications in Computer and Information Science. Springer: Cham, Switzerland, 2020; Volume 1233. [Google Scholar] [CrossRef]
- Liu, Y.; Garg, S.; Nie, J.; Zhang, Y.; Xiong, Z.; Kang, J.; Hossain, M.S. Deep Anomaly Detection for Time-Series Data in Industrial Iot: A Communication-Efficient on-Device Federated Learning Approach. IEEE Internet Things J. 2020, 8, 6348–6358. [Google Scholar] [CrossRef]
- Lu, Y.; Huang, X.; Dai, Y.; Maharjan, S.; Zhang, Y. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT. IEEE Trans. Ind. Inform. 2019, 16, 4177–4186. [Google Scholar] [CrossRef]
- Wang, T.; Ke, H.; Zheng, X.; Wang, K.; Sangaiah, A.K.; Liu, A. Big Data Cleaning Based on Mobile Edge Computing in Industrial Sensor-Cloud. IEEE Trans. Ind. Inform. 2019, 16, 1321–1329. [Google Scholar] [CrossRef]
- Mathias, S.G.; Schmied, S.; Grossmann, D. Monitoring of Discrete Electrical Signals from Welding Processes Using Data Mining and Iiot Approaches. In Proceedings of the 2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI), Baltimore, MD, USA, 9–11 November 2020; pp. 911–916. [Google Scholar]
- Rahmstorf, S. Rising hazard of storm-surge flooding. Proc. Natl. Acad. Sci. USA 2017, 114, 11806–11808. [Google Scholar] [CrossRef]
- Yang, F.; Milosevic, D.; Cao, J. Optimising Column Family for OLAP Queries in HBase. Int. J. Big Data Intell. 2017, 4, 23–35. [Google Scholar] [CrossRef]
- Leng, J.; Jiang, P.; Xu, K.; Liu, Q.; Zhao, J.L.; Bian, Y.; Shi, R. Makerchain: A blockchain with chemical signature for self-organizing process in social manufacturing. J. Clean. Prod. 2019, 234, 767–778. [Google Scholar] [CrossRef]
- ERC-721; Non-Fungible Token Standard. Ethereum Foundation: Zuger, Switzerland, 2018.
- Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Leng, J.; Sha, W.; Lin, Z.; Jing, J.; Liu, Q.; Chen, X. Blockchained Smart Contract Pyramid-Driven Multi-Agent Autonomous Process Control for Resilient Individualised Manufacturing Towards Industry 5.0. Int. J. Prod. Res. 2022, 1–20. [Google Scholar] [CrossRef]
- Zhang, F.; Cecchetti, E.; Croman, K.; Juels, A.; Shi, E. Town Crier: An Authenticated Data Feed for Smart Contracts. In Proceedings of the CCS’16: 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 270–282. [Google Scholar]
- Liu, Q.; Zhang, H.; Leng, J.; Chen, X. Digital Twin-Driven Rapid Individualised Designing of Automated Flow-Shop Manufacturing System. Int. J. Prod. Res. 2018, 57, 3903–3919. [Google Scholar] [CrossRef]
- Leng, J.; Chen, Z.; Sha, W.; Lin, Z.; Lin, J.; Liu, Q. Digital Twins-Based Flexible Operating of Open Architecture Production Line for Individualized Manufacturing. Adv. Eng. Inform. 2022, 53, 101676. [Google Scholar] [CrossRef]
- Leng, J.; Zhou, M.; Xiao, Y.; Zhang, H.; Liu, Q.; Shen, W.; Su, Q.; Li, L. Digital Twins-Based Remote Semi-Physical Commissioning of Flow-Type Smart Manufacturing Systems. J. Clean. Prod. 2021, 306, 127278. [Google Scholar] [CrossRef]
- Leng, J.; Jiang, P.; Liu, C.; Wang, C. Contextual Self-Organizing of Mass Individualization Process Under Social Manufacturing Paradigm: A Cyber–Physical–Social System Approach. Enterp. Inf. Syst. 2018, 14, 1124–1149. [Google Scholar] [CrossRef]
- Zhao, R.; Yan, D.; Liu, Q.; Leng, J.; Wan, J.; Chen, X.; Zhang, X. Digital Twin-Driven Cyber-Physical System for Autonomously Controlling of Micro Punching System. IEEE Access 2019, 7, 9459–9469. [Google Scholar] [CrossRef]
- Zhang, Y.; Ren, S.; Liu, Y.; Sakao, T.; Huisingh, D. A Framework for Big Data Driven Product Lifecycle Management. J. Clean. Prod. 2017, 159, 229–240. [Google Scholar] [CrossRef]
- Leng, J.; Ye, S.; Zhou, M.; Zhao, J.L.; Liu, Q.; Guo, W.; Cao, W.; Fu, L. Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey. IEEE Trans. Syst. Man, Cybern. Syst. 2020, 51, 237–252. [Google Scholar] [CrossRef]
- Rehman, M.H.U.; Ahmed, E.; Yaqoob, I.; Hashem, I.A.T.; Imran, M.; Ahmad, S. Big Data Analytics in Industrial IoT Using a Concentric Computing Model. IEEE Commun. Mag. 2018, 56, 37–43. [Google Scholar] [CrossRef]
- Younan, M.; Houssein, E.H.; Elhoseny, M.; Ali, A.A. Challenges and Recommended Technologies for the Industrial Internet of Things: A Comprehensive Review. Measurement 2020, 151, 107198. [Google Scholar] [CrossRef]
- Angelopoulos, A.; Michailidis, E.T.; Nomikos, N.; Trakadas, P.; Hatziefremidis, A.; Voliotis, S.; Zahariadis, T. Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects. Sensors 2019, 20, 109. [Google Scholar] [CrossRef] [PubMed]
- Leng, J.; Ruan, G.; Song, Y.; Liu, Q.; Fu, Y.; Ding, K.; Chen, X. A Loosely Coupled Deep Reinforcement Learning Approach for Order Acceptance Decision of Mass-Individualized Printed Circuit Board Manufacturing in Industry 4.0. J. Clean. Prod. 2020, 280, 124405. [Google Scholar] [CrossRef]
- Gao, Y.; Chen, Y.; Hu, X.; Lin, H.; Liu, Y.; Nie, L. Blockchain Based IIoT Data Sharing Framework for SDN-Enabled Pervasive Edge Computing. IEEE Trans. Ind. Inform. 2020, 17, 5041–5049. [Google Scholar] [CrossRef]
- Derhamy, H.; Eliasson, J.; Delsing, J. IoT Interoperability—On-Demand and Low Latency Transparent Multiprotocol Translator. IEEE Internet Things J. 2017, 4, 1754–1763. [Google Scholar] [CrossRef]
- Shahzad, Y.; Javed, H.; Farman, H.; Ahmad, J.; Jan, B.; Zubair, M. Internet of Energy: Opportunities, applications, architectures and challenges in smart industries. Comput. Electr. Eng. 2020, 86, 106739. [Google Scholar] [CrossRef]
- Rahman, H.; Hussain, M.I. A Comprehensive Survey on Semantic Interoperability for Internet of Things: State-of-The-Art and Research Challenges. Trans. Emerg. Telecommun. Technol. 2020, 31, e3902. [Google Scholar] [CrossRef]
- Aazam, M.; Zeadally, S.; Harras, K.A. Deploying Fog Computing in Industrial Internet of Things and Industry 4.0. IEEE Trans. Ind. Inform. 2018, 14, 4674–4682. [Google Scholar] [CrossRef]
- Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. A Survey on the Adoption of Blockchain in Iot: Challenges and Solutions. Blockchain Res. Appl. 2021, 2, 100006. [Google Scholar] [CrossRef]
- Huo, R.; Zeng, S.; Wang, Z.; Shang, J.; Chen, W.; Huang, T.; Wang, S.; Yu, F.R.; Liu, Y. A Comprehensive Survey on Blockchain in Industrial Internet of Things: Motivations, Research Progresses, and Future Challenges. IEEE Commun. Surv. Tutor. 2022, 24, 88–122. [Google Scholar] [CrossRef]
- Guan, Z.; Lu, X.; Wang, N.; Wu, J.; Du, X.; Guizani, M. Towards Secure and Efficient Energy Trading in Iiot-Enabled Energy Internet: A Blockchain Approach. Future Gener. Comput. Syst. 2020, 110, 686–695. [Google Scholar] [CrossRef]
- Wang, E.K.; Liang, Z.; Chen, C.M.; Kumari, S.; Khan, M.K. PoRX: A Reputation Incentive Scheme for Blockchain Consensus of IIoT. Future Gener. Comput. Syst. 2020, 102, 140–151. [Google Scholar] [CrossRef]
- Khan, M.Z.; Alhazmi, O.H.; Javed, M.A.; Ghandorh, H.; Aloufi, K.S. Reliable Internet of Things: Challenges and Future Trends. Electronics 2021, 10, 2377. [Google Scholar] [CrossRef]
- Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.-H. Convergence of Blockchain and Artificial Intelligence in Iot Network for the Sustainable Smart City. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
- Fuller, A.; Fan, Z.; Day, C.; Barlow, C. Digital Twin: Enabling Technologies, Challenges and Open Research. IEEE Access 2020, 8, 108952–108971. [Google Scholar] [CrossRef]
- Lim, W.Y.B.; Xiong, Z.; Niyato, D.; Cao, X.; Miao, C.; Sun, S.; Yang, Q. Realizing the Metaverse with Edge Intelligence: A Match Made in Heaven. IEEE Wirel. Commun. 2022, 1–9. [Google Scholar] [CrossRef]
Security Type | Attack Name | Description | |
---|---|---|---|
Attacks on infrastructure | Physical attacks | Tampering [37] | The act of physically modifying a device (e.g., RFID) or communication link. Such a type of attack will lead to the consequence of access to sensitive information and gain access. |
Attack device performance [38,39] | The target of these attacks is mainly to affect or interrupt system operation by affecting device performance, for instance, a heatstroke attack, DoS/DDoS, and replay attacks. | ||
Side channel attack [37] | Attackers collect the encryption keys by adopting timing, power, and fault attack on devices to encrypt/decrypt confidential data. | ||
Permanent Denial of Service (PDoS, phlashing) [31] | Attacks are launched by destroying firmware or uploading a corrupted BIOS using malware. | ||
RF interference/jamming [40] | Attackers create and send noise signals over the Radio Frequency (RF)/WSN signals to initiate DoS attacks on the tags/sensor nodes thereby jamming communications. | ||
Network attacks | Injection attacks [40] | Include malicious code injection and fake node injection. | |
Traffic analysis attacks [37] | Confidential data flowing to and from the devices are sniffed by the attackers. | ||
DoS/DDoS [31] | Attackers make the network traffic unavailable to the users, or multiple compromised nodes attack a specific target by flooding messages to crash the server/resources. | ||
Control over communication attacks [41,42] | Attackers target routing protocols and redirect the routing path from the original receiver to an insecure one by misconfiguring routers, gateways, and DNS servers. Include blackhole, wormholes, Sybil, and pharming attacks. | ||
Data security | Integrity | Dynamic Infrastructure [43,44,45] | The interactions in IIoT are dynamic. It requires better security protections that could securely integrate a real-time IIoT state in cyberspace into the physical space. |
Data (resource) security [43,46,47] | Attackers manipulate sensitive information and perform unauthorized data access, breaching the trust relationships between users. | ||
Confidentiality | MITM attack [48] | Attackers join the network as legitimate users and gain control over the nodes via the active attack path to sniff information. | |
Data breach [31] | The disclosure of personal, sensitive, or confidential information in an unauthorized manner. | ||
Phishing site [49] | Attackers obtain a user’s private information by sending emails that contain a malicious link (e.g., malware or spyware). | ||
Sniffing attacks [48] | Attackers take control over a device through device tracking or tag tracking and then attack devices that are connected to them. | ||
Availability | Data Inconsistency [31] | Attack on data integrity results in the inconsistency of data in transit or data stored in a central database. | |
Malware [50] | An adversary infects the system via malicious software to achieve tamper with data or steal information, or launch DoS. | ||
Process trust concern | RFID Unauthorized Access [37] | An attacker can read, modify or delete data presented on RFID nodes because of the lack of proper authentication mechanisms. | |
Unauthorized Access [31] | Access control gives access to authorized users and denies access to unauthorized users. With unauthorized access, malicious users can gain data ownership or access sensitive data. | ||
Device impersonation [51,52,53] | Using identity fabrication to disrupt the integrity of a database by data forgery. | ||
Service interruption [54,55] | The failure of cascading services and misuse of the services by malicious actors lead to the failure of interconnected services. |
Type | Metrics | Instance |
---|---|---|
Digital identities | Access permissions management | Develop distributed access control policies for the Internet [70] |
Data Authentication and privacy protection [71] | ||
Identities verification | No need to buy cryptocurrency or protect private keys [72] | |
Digital asset management [73] | ||
Distributed security | Privacy preservation | Point-to-point encrypted transmission and digital signature [74] |
Authorization, communication, and subject matching encryption [65] | ||
Data security | Data tamper-resisting [7,75] | |
Smart contracts | Autonomous application | Without the requirement for significant paperwork or third-party registration [56] |
Delegation of access permissions [76] | ||
Trust support | No need to verify whether participating on both sides is trustworthy [71] | |
Micro-controls | Data transmission | Enhance the data synchronization [77] |
Data storage | Reorganize the data from the database [78] | |
Data tracking | Enrich the data query function based on the blockchain data provenance [79,80] |
Process | Related work | References |
---|---|---|
Process I | Create a verifiable query layer to make transactions in the underlying blockchain system efficient to extract and reorganize. | [78] |
Combining distributed storage services with IPFS data transfer technology for data storage security and IIoT performance. | [74] | |
Using the four-module model to facilitate the synchronization between database and blockchain system. | [77] | |
Using TDRB middleware to achieve the tamper-proof monitoring of data transmission between blockchain and relational database. | [7] | |
Process II | Combining middleware with the blockchain Hyperledger Fabric to achieve data traceability and queryable. | [79] |
Using blockchain cryptography to protect pub/sub-system from centralized single points of failure. | [65] | |
Leveraging blockchain transaction validation technology to achieve efficient and secure heterogeneous networks. | [84] | |
Using cloud storage combined with blockchain technology to ensure security and prevent forking attacks. | [85] | |
Process III | Information (e.g., product design, manufacturing progress, and data for tracking and monitoring) in the manufacturing system is packaged into transaction records via middleware between the perception layer and the blockchain system. | [73] |
The multi-source heterogeneous manufacturing data of the product life cycle is packed on-chain through the perception layer, and the manufacturing process autonomy is completed by leveraging smart contracts. | [80] | |
Process IV | Using machine learning algorithms to implement on-chain storage strategy selection. | [64] |
Leverage big data collection and storage technology to achieve high throughput and concurrency of the system. | [83] | |
Using a combination of service-oriented middleware Stack4Things for distributed resource access authorization and responsibilities delegation. | [76] | |
Using Byzantine consensus algorithm to achieve distributed fault tolerance of pub/sub system application. | [66] |
Type | Authors | Functional Features | Advantages |
---|---|---|---|
Distributed data storage | Danish et al. [64] | Make auditable, traceable, and immutable cloud storage decisions | Data traceability, auditability, accountability, integrity |
Ochoa et al. [74] | Decentralized implementation of UbiPri middleware using the Ethereum blockchain | Data integrity and privacy | |
Lu et al. [83] | Integrates with data processing technology and distributed message queue technology to implement data collection and storage of the HBase system based on IIoT big data architecture. | Data availability, integrity, and stability | |
Data Synchronism | Zhou et al. [79] | Allows users to mask the underlying principles of blockchain to query blocks and transactions | Queryable and traceability |
Peng et al. [78] | Extract transactions stored in the underlying blockchain system and efficiently reorganize them into a database | Provide efficient query services for blockchain data and make query data results authentical | |
Wang et al. [77] | As an intermediary to facilitate the synchronization of database data to the blockchain | Improves throughput and speed of transaction synchronization and ensures consistency between database and blockchain | |
Lian et al. [7] | Provide efficient tamper-proof detection for relational database | Tamper-proof and ensures the integrity, confidentiality, and consistency of data | |
Function integration | Zupan et al. [86] | Decentralized pub/sub messaging for a multi-federated, licensed environment | Security, validating, and privacy-preserving messaging |
Tapas et al. [76] | Distributed resource access authorization and delegating responsibilities through the Ethereum blockchain network, smart contracts, and Stack4Things | Make the data trusted and auditing | |
Ramachandran et al. [66] | A distributed fault-tolerant pub/sub broker with blockchain-based immutability | Avoiding a single point of failure | |
Lv et al. [65] | A distributed publish/subscribe model for privacy protection based on blockchain technology to avoid a centralized single point of failure | Confidentiality, privacy preservation, and resistance to DDOS attacks | |
Rizzardi et al. [70] | NOS integrated with blockchain to achieve secure and reliable distributed access control for IIoT resource | Integrity and Confidentiality Resist DOS/DDOS attacks Tamper-proof | |
Security and privacy | Zou et al. [85] | The lowest trust blockchain is used to ensure the security of cloud storage services | Prevent forking attacks and MITM attacks |
Samaniego et al. [87] | Mining is distributed to edge components and is divided into levels | Eliminates the limitation of low computing power | |
Sanwar et al. [84] | Provides a delay-sensitive, time-sensitive transaction authentication technology and security and privacy solutions | Minimizing the delay of the transaction, ensuring security and privacy | |
Genes et al. [72] | Users can access to easily create blockchain transactions, securing the management of their identity in IIoT | avoiding user impersonation | |
Park et al. [71] | Enable smart contracts to automatically validate off-chain operations while supporting data authentication and privacy protection | Provides authentication and privacy preservation | |
Blockchain IIoT cloud platform | Hasan et al. [73] | The resource of data generated based on blockchain architecture in manufacturing systems can be traced | Data privacy and security |
Liu et al. [80] | Process multi-source heterogeneous data at different stages of the product life cycle and broadcast the processed data to the blockchain network | Data integrity. Supports cross-enterprise access, processing, and analysis of production information |
Type | Techniques | Functional Features of Integration | |
---|---|---|---|
Middleware | Service-oriented | Stack4Things [76] | Focus on authentication, authorization, and delegation mechanisms |
Man4Ware [72] | Distributed ledgers created and maintained through the Man4Ware service can be used as a trusted, traceable record and source to verify the correctness of transactions | ||
UbiPri [74] | User privacy centralized management middleware | ||
Message-oriented | Kafka [83,86] | Efficiently process data streams in real-time and store them persistently in distributed replication clusters while maintaining high throughput | |
Security and encryption | SHA-256 [7] | Protect the private data in blockchain middleware and facilitate the retrieval of the data from the blockchain network | |
zk-SNARK [71] | A zero-knowledge proof that can perform computations after a validator with weak computations outsources the computation to an unreliable validator and feedback results with evidence that results are correct in off-chain computations. | ||
PKEwET (Public Key Encryption with Equality Test) primitive [65] | A ciphertext equivalence test to determine whether two ciphertexts encrypted by different public keys are equal without decrypting the ciphertext, effectively reducing user storage costs | ||
SUNDR protocol [85] | A remote file system to ensure fork consistency to the client and prevent forking attacks | ||
Data processing, storage, and management | Networked smart object (NOS) [70] | Enabled to manage the data provided by heterogeneous sources in a distributed manner and evaluate, utilizing proper algorithms | |
Strom [96] | An open-source distributed, scalable, and fault-tolerant real-time computing system to simplify parallel real-time data processing | ||
HBase [97] | A distributed database has good compatibility with distributed storage, aggregated computing, and random access to massive semi-structured or unstructured data in real-time. | ||
PostgreSQL [79] | A database can parse out information and reorganize it as a third-party database to provide multiple query functions | ||
Data transmit technology | IPFS [74] | A files system for distributed storage and P2P shared files to implement other middleware modules | |
TiDB [77] | Convert database data to key-value pairs for easy storage in the blockchain | ||
Others | SDN-Gateway [84] | Act as a linkage between LLN and blockchain, provide networking control operations, and execute different actions against vulnerabilities and cyberattacks. | |
Trinity APIs [66] | Through the APIs, data can be sent to the blockchain to initiate the consensus and block creation process to complete the interaction with the middleware and blockchain network |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Leng, J.; Chen, Z.; Huang, Z.; Zhu, X.; Su, H.; Lin, Z.; Zhang, D. Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions. Machines 2022, 10, 858. https://doi.org/10.3390/machines10100858
Leng J, Chen Z, Huang Z, Zhu X, Su H, Lin Z, Zhang D. Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions. Machines. 2022; 10(10):858. https://doi.org/10.3390/machines10100858
Chicago/Turabian StyleLeng, Jiewu, Ziying Chen, Zhiqiang Huang, Xiaofeng Zhu, Hongye Su, Zisheng Lin, and Ding Zhang. 2022. "Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions" Machines 10, no. 10: 858. https://doi.org/10.3390/machines10100858