Abstract
Today, information technology (IT) and operational technology (OT) accelerate the development of Intelligence of Things (IoT) systems, which consist of modular integrated circuits (ICs). However, the existing IoT cannot support this all-round certification based on System-Module-IC vertical integration of upstream and downstream product hardware version identification in its supply chain. In other words, this factor limits the ability of system equipment for IoT to include version certification of System, Module and IC chip. Furthermore, in the supply chain, a comprehensive trust relationship cannot be established in the cooperation process between suppliers and other manufacturers. This paper first implements the reconfigurable chain of trust authentication method according to the references [21] and [22] applied to the supply chain based on the System-Module(s)-IC(s) vertical integration via the designed the customized IoT system with the comprehensive identification of the hardware version of upstream and downstream products. This implementation is based on a private blockchain combined with a decentralized database system to improve the reliability, traceability and identification of all-round customized versions of customized systems, modules and ICs. The approach we proposed could implement of a blockchain and IPFS-Based anti-counterfeit traceable of the version customized System-Module-IC by using reconfigurable intelligence trust chain, where the DApp and the smart contracts for reconfigurable intelligence trust chain have been designed and performed in the real test-bed platform. Finally, the implemented results shown that this reconfigurable trust chain approach is a kind of the designed-in security as well as a kind of trusted platform integrated solution for creating a trusted platform module (TPM) solution based on Blockchain and IPFS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y.A.: An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250–10276 (2020). https://doi.org/10.1109/JIOT.2020.2997651
Chen, H.-C.: Collaboration IoT-based RBAC with trust evaluation algorithm model for massive IoT integrated application. Mob. Netw. Appl. 24(3), 839–852 (2018). https://doi.org/10.1007/s11036-018-1085-0
Chen, H.-C.: TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless Ad Hoc networks. IEEE Syst. J. 11(02), 449–459 (2017). https://doi.org/10.1109/JSYST.2015.2437285
Chen, H.-C., You, I., Weng, C.-E., Cheng, C.-H., Huang, Y.-F.: A security gateway application for End-to-End M2M communications. Comput. Stan. Interfaces 44, 85–93 (2016)
Chen, H.-C., Yang, W.-J., Chou, C.-L.: An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network. Concurrency Comput.-Pract. Experience 33(19) (2020). https://doi.org/10.1002/cpe.6128
Chen, H.-C.: A trust evaluation gateway for distributed blockchain IoT network. In: Chen, J.-L., Pang, A.-C., Deng, D.-J., Lin, C.-C. (eds.) WICON 2018. LNICSSITE, vol. 264, pp. 156–162. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-06158-6_16
Chen, H.-C., Putra, K.T., Tseng, S.-S., Chen, C.-L., Lin, J.C.-W.: A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system. Future Gener. Comput. Syst. 108, 488–500 (2020). https://doi.org/10.1016/j.future.2020.02.032
Chen, H.-C., Putra, K.T., Weng, C.-E.: A Novel predictor for exploring PM25 spatiotemporal propagation by using convolutional recursive neural networks. J. Internet Technol. 23(1), 165–176 (2022). https://doi.org/10.53106/160792642022012301017
Putra, K.T., et al.: Federated compressed learning edge computing framework with ensuring data privacy for PM2.5 prediction in smart city sensing applications. Sensors 21(13), 4586 (2021). https://doi.org/10.3390/s21134586
Karie, N.M., Sahri, N.M., Yang, W., Valli, C., Kebande, V.R.: A review of security standards and frameworks for IoT-based smart environments. IEEE Access 9, 121975–121995 (2021). https://doi.org/10.1109/ACCESS.2021.3109886
Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2018)
Wurm O. Arias, J., Hoang, K., Jin, Y.: Privacy and security in Internet of Things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)
Pinto, S., Gomes, T., Pereira, J., Cabral, J., Tavares, A.: IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput. 21(1), 40–47 (2017). https://doi.org/10.1109/MIC.2017.17
He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 16(4), 623–632 (2012)
Kounelis, I., et al.: Building trust in the human–Internet of Things relationship. IEEE Technol. Soc. Mag. 33(4), 73–80 (2014)
Nakamoto, S.: Bitcoin : A Peer-to-Peer Electronic Cash System. pp. 1–9 (2008)
Alharby, M., van Moorsel, A.: Blockchain based smart contracts : a systematic mapping study. In: Computer Science & Information Technology, pp. 125–140 (2017)
Chen, H.-C., Irawan, B., Shih, C.-Y., Damarjati, C., Shae, Z.-Y., Chang, F.: A smart contract to facilitate goods purchasing based on online haggle. Part of the advances in intelligent systems and computing book series (AISC, volume 994). In: The 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2019), First Online (2019)
Chen, H.-C., Damarjati, C., Prasetyo, E., Arofiati, F., Sugiyo, D.: Blockchain technology benefit in tackling online shopping transaction revocation issue. In: Proceedings of the 2020 The 6th International Conference on Frontiers of Educational Technologies (ICFET 2020), pp. 191–195. Tokyo, Japan (2020). https://doi.org/10.1145/3404709.3404757
Koe, A.S.V., et al.: Hieraledger: towards malicious gateways in appendable-block blockchain constructions for IoT. Inf. Sci. 632, 87–104 (2023)
Chen, H.-C., et al.: An implementation of trust chain framework with hierarchical content identifier mechanism by using blockchain technology. Sensors 22(13), 1–30 (2022). https://doi.org/10.3390/s22134831
Chen, H.-C.: A reconfigurable trust chain authentication method based on system-module-chip vertical integration of upstream and downstream product hardware version identification. Patent of the Republic of China, Application number: 112105536, pp.1–14, Applied date on 16 Feb 2023
Acknowledgments
This work was funded and supported by the National Science and Technology Council (NSTC), Taiwan, R.O.C., under contract NSTC 111-2218-E-468-001-MBK and the Ministry of Science and Technology, Taiwan, R.O.C., under contract MOST 110-2218-E-468-001-MBK. In addition, this work was supported in part by NSTC, Taiwan, R.O.C., under contract NSTC 111-2218-E-002-037 and MOST 110-2218-E-002-044.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, HC. et al. (2023). The Implement of a Reconfigurable Intelligence Trust Chain Platform with Anti-counterfeit Traceable Version Function for the Customized System-Module-IC. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 177. Springer, Cham. https://doi.org/10.1007/978-3-031-35836-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-031-35836-4_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35835-7
Online ISBN: 978-3-031-35836-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)