Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Oldenbourg June 28, 2018

Blockchain in Industrie 4.0: Beyond cryptocurrency

  • Martin Laabs

    Martin Laabs studied business informatics at the Technical University of Darmstadt. He is currently a researcher at Fraunhofer SIT, where he worked on various projects for the IT industry, e. g. on the topics of secure software development, secure software supply chain and public key infrastructures (PKI). Since 2014 he works in the department of Industrial Security Solutions (ISS) where is doing research on topics like threat and risk modeling, anomaly detection as well as blockchain technology, mainly in the context of Industrie 4.0. He is also an active member of Germany’s reference project for IT security in I4.0 named IUNO. https://www.iuno-projekt.de.

    and Siniša Đukanović

    Siniša Đukanović is a researcher at the Frauhofer SIT, where, being a member of the IT security testlab, he conducted IT security analysis on hard- and software from various domains, e. g. banking and telecommunications. Since 2014 he is deputy head of the department Industrial Security Solutions (ISS), where he researches IT security technologies for the manufacturing industry, especially in the context of Industrie 4.0. He is one of the technical leads for Germany’s reference project for IT-security in Industrie 4.0 named IUNO. https://www.iuno-projekt.de.

    EMAIL logo

Abstract

Industrie 4.0, the transition from static, centrally controlled production to dynamic, decentralized manufacturing, is aiming to increase product quality, customization and efficiency. Autonomous production systems and flexible inter-organizational cooperation are key challenges. Blockchain seems to be a natural fit to cope with these challenges. This article derives major challenges of I4.0 and compares them with benefits of blockchain technology. Use cases demonstrate where challenges and benefits match. Also, well known blockchain issues and possible solutions are addressed.

ACM CCS:

About the authors

Martin Laabs

Martin Laabs studied business informatics at the Technical University of Darmstadt. He is currently a researcher at Fraunhofer SIT, where he worked on various projects for the IT industry, e. g. on the topics of secure software development, secure software supply chain and public key infrastructures (PKI). Since 2014 he works in the department of Industrial Security Solutions (ISS) where is doing research on topics like threat and risk modeling, anomaly detection as well as blockchain technology, mainly in the context of Industrie 4.0. He is also an active member of Germany’s reference project for IT security in I4.0 named IUNO. https://www.iuno-projekt.de.

Siniša Đukanović

Siniša Đukanović is a researcher at the Frauhofer SIT, where, being a member of the IT security testlab, he conducted IT security analysis on hard- and software from various domains, e. g. banking and telecommunications. Since 2014 he is deputy head of the department Industrial Security Solutions (ISS), where he researches IT security technologies for the manufacturing industry, especially in the context of Industrie 4.0. He is one of the technical leads for Germany’s reference project for IT-security in Industrie 4.0 named IUNO. https://www.iuno-projekt.de.

Literature

1. Blocksquare whitepaper, 2018. Available at https://blocksquare.io/assets/pdf/Blocksquare-Whitepaper.pdf.Search in Google Scholar

2. Grid+ whitepaper, 2018. Available at http://goo.gl/49GM7A.Search in Google Scholar

3. Storj whitepaper, 2018. Available at https://storj.io/storj.pdf.Search in Google Scholar

4. Voxxo whitepaper, 2018. Available at https://voxxo.io/voxxowhitepaper.pdf.Search in Google Scholar

5. Zrcoin whitepaper, 2018. Available at https://zrcoin.io/files/Whitepaper_ENG.pdf.Search in Google Scholar

6. Reiner Anderl, Klaus Bauer, Thomas Bauernhansl, Bernhard Diegner, Johannes Diemer, Alexander Fay, Dietmar Goericke, Jürgen Grotepass, Claus Hilger, Jürgen Jasperneite, Johannes Kalhoff, Uwe Kubach, Ulrich Löwen, Georg Menges, Stefan Michels, Fabian Schmidt, Thomas Stiedl, Michael ten Hompel, Christian Zeidler. Fortschreibung der anwendungsszenarien der plattform industrie 4.0, okt 2016. Available at http://www.plattform-i40.de/I40/Redaktion/DE/Downloads/Publikation/fortschreibung-anwendungsszenarien.pdf.Search in Google Scholar

7. Thomas Bachlechner, Thorsten Behling, Esther Bollhöfer, Thomas Dexheimer, Georg Borges, Michael Gröne, Peter Handel, Thorsten Henkel, Jana Post, Michael Stiller, Gerhard Sutschet, Thomas Usländer, Michael Voeth, Heiko Weber, Andreas Wigger. It-sicherheit für die industrie 4.0, jan 2016. Available at https://www.bmwi.de/Redaktion/DE/Publikationen/Studien/it-sicherheit-fuer-industrie-4-0.pdf.Search in Google Scholar

8. J. Benet. Ipfs – content addressed, versioned, p2p file system, 2017. Available at https://ipfs.io/ipfs/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX/ipfs.draft3.pdf.Search in Google Scholar

9. Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld. Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract]y. SIGMETRICS Perform. Eval. Rev., 42(3):34–37, Grudzie/n 2014.10.1145/2695533.2695545Search in Google Scholar

10. A. Bessani, J. Sousa, E. E. P. Alchieri. State machine replication for the masses with bft-smart. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, strony 355–362, June 2014.10.1109/DSN.2014.43Search in Google Scholar

11. Diethelm Bienhaus. Patterns for the industrial internet / industrie 4.0. Proceedings of the 22Nd European Conference on Pattern Languages of Programs, EuroPLoP ’17, strony 17:1–17:11, New York, NY, USA, 2017. ACM.10.1145/3147704.3147723Search in Google Scholar

12. BMBF. The new high-tech strategy innovations for germany. Raport instytutowy, Federal Ministry of Education and Research (BMBF), Division Innovation Policy Issues, 2014.Search in Google Scholar

13. Kirill Borodulin, Gleb Radchenko, Aleksandr Shestakov, Leonid Sokolinsky, Andrey Tchernykh, Radu Prodan. Towards digital twins cloud platform: Microservices and computational workflows to rule a smart factory. Proceedings of the 10th International Conference on Utility and Cloud Computing, UCC ’17, strony 209–210, New York, NY, USA, 2017. ACM.10.1145/3147213.3149234Search in Google Scholar

14. F. Kirstein, V. Jacumeit, C. Welzel, K. P. Eckert. Mythos blockchain: Herausforderung für den öffentlichen sektor. Raport instytutowy, Kompetenzzentrum Öffentliche IT, Fraunhofer-Institut für Offene Kommunikationssysteme FOKUS, 2017.Search in Google Scholar

15. K. Christidis, M. Devetsikiotis. Blockchains and smart contracts for the internet of things. IEEE Access, 4:2292–2303, 2016.10.1109/ACCESS.2016.2566339Search in Google Scholar

16. Thomas Dickerson, Paul Gazzillo, Maurice Herlihy, Eric Koskinen. Adding concurrency to smart contracts. Proceedings of the ACM Symposium on Principles of Distributed Computing, PODC ’17, strony 303–312, New York, NY, USA, 2017. ACM.10.1145/3087801.3087835Search in Google Scholar

17. Ali Dorri, Salil S. Kanhere, Raja Jurdak. Blockchain in internet of things: Challenges and solutions. CoRR, abs/1608.05187, 2016.Search in Google Scholar

18. John R. Douceur. The sybil attack. Peter Druschel, Frans Kaashoek, Antony Rowstron, redaktorzy, Peer-to-Peer Systems, strony 251–260, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.10.1007/3-540-45748-8_24Search in Google Scholar

19. R. Drath, A. Horch. Industrie 4.0: Hit or hype? [industry forum]. IEEE Industrial Electronics Magazine, 8(2):56–58, June 2014.10.1109/MIE.2014.2312079Search in Google Scholar

20. P. Franco. Bitcoin: Cryptography Engineering and Economics. Wiley, New York NY USA, 2014.Search in Google Scholar

21. G. Greenspan. The blockchain immutability myth, 2017. Available at https://www.coindesk.com/blockchain-immutability-myth/.Search in Google Scholar

22. Ye Guo, Chen Liang. Blockchain application and outlook in the banking industry. Financial Innovation, 2(1):24, Dec 2016.10.1186/s40854-016-0034-9Search in Google Scholar

23. A. Hellinger W. Wahlster H. Kagermann, J. Helbig. Umsetzungsempfehlungen für das zukunftsprojekt industrie 4.0: Deutschlands zukunft als produktionsstandort sichern; abschlussbericht des arbeitskreises industrie 4.0. Raport instytutowy, Forschungsunion; Geschäftsstelle der Plattform Industrie 4.0, Berlin, Frankfurt/Main, 2013.Search in Google Scholar

24. M. Hermann, T. Pentek, B. Otto. Design principles for industrie 4.0 scenarios. 2016 49th Hawaii International Conference on System Sciences (HICSS), strony 3928–3937, Jan 2016.10.1109/HICSS.2016.488Search in Google Scholar

25. Mario Hermann, Tobias Pentek, Boris Otto. Design principles for industrie 4.0 scenarios. Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS), HICSS ’16, strony 3928–3937, Washington, DC, USA, 2016. IEEE Computer Society.10.1109/HICSS.2016.488Search in Google Scholar

26. Sabina Jeschke, Christian Brecher, Tobias Meisen, Denis Özdemir, Tim Eschert. Industrial Internet of Things and Cyber Manufacturing Systems, strony 3–19. Springer International Publishing, Cham, 2017.10.1007/978-3-319-42559-7_1Search in Google Scholar

27. Lutz Jänicke, Michael Jochem, Wolfgang Klasen, Bernd Kosch, Michael Krammel, Lukas Linke, Jens Mehrfeld, Michael Sandner, Andreas Teuscher, Thomas Walloschke, Stefan Zimmermann. It-security in der industrie 4.0, mar 2016. Available at https://www.plattform-i40.de/I40/Redaktion/DE/Downloads/Publikation/wegweiser-it-security.pdf.Search in Google Scholar

28. Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Čapkun. Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur., 18(1):2:1–2:32, Maj 2015.10.1145/2732196Search in Google Scholar

29. Henry M. Kim, Marek Laskowski. Towards an ontology-driven blockchain design for supply chain provenance. CoRR, abs/1610.02922, 2016.Search in Google Scholar

30. Steven L. Kinney. Trusted Platform Module Basics: Using TPM in Embedded Systems. Newnes, Newton, MA, USA, 2006.Search in Google Scholar

31. A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. 2016 IEEE Symposium on Security and Privacy (SP), strony 839–858, May 2016.10.1109/SP.2016.55Search in Google Scholar

32. J. Coleman, L. Horne. Generalized state channels on ethereum, 2017. Available at https://medium.com/l4-media/generalized-state-channels-on-ethereum.Search in Google Scholar

33. Leslie Lamport, Robert Shostak, Marshall Pease. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401, Lipiec 1982.10.1145/3335772.3335936Search in Google Scholar

34. E. A. Lee. Cyber physical systems: Design challenges. 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), strony 363–369, May 2008.10.1109/ISORC.2008.25Search in Google Scholar

35. Jay Lee, Behrad Bagheri, Hung-An Kao. A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing Letters, 3:18–23, 2015.10.1016/j.mfglet.2014.12.001Search in Google Scholar

36. Pascal Lessel, Marc Müller, Antonio Krüger. Towards a novel issue tracking system for “industry 4.0” environments. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA ’15, strony 1809–1814, New York, NY, USA, 2015. ACM.10.1145/2702613.2732720Search in Google Scholar

37. Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena. A secure sharding protocol for open blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, strony 17–30, New York, NY, USA, 2016. ACM.10.1145/2976749.2978389Search in Google Scholar

38. Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. A fistful of bitcoins: Characterizing payments among men with no names. Proceedings of the 2013 Conference on Internet Measurement Conference, IMC ’13, strony 127–140, New York, NY, USA, 2013. ACM.10.1145/2504730.2504747Search in Google Scholar

39. M. Mettler. Blockchain technology in healthcare: The revolution starts here. 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), strony 1–3, Sept 2016.10.1109/HealthCom.2016.7749510Search in Google Scholar

40. M. Mylrea, S. N. G. Gourisetti. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. 2017 Resilience Week (RWS), strony 18–23, Sept 2017.10.1109/RWEEK.2017.8088642Search in Google Scholar

41. E. Münsing, J. Mather, S. Moura. Blockchains for decentralized optimization of energy resources in microgrid networks. 2017 IEEE Conference on Control Technology and Applications (CCTA), strony 2164–2171, Aug 2017.10.1109/CCTA.2017.8062773Search in Google Scholar

42. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008. Available at https://bitcoin.org/bitcoin.pdf.Search in Google Scholar

43. Svein Ølnes. Beyond bitcoin enabling smart government using blockchain technology. Hans Jochen Scholl, Olivier Glassey, Marijn Janssen, Bram Klievink, Ida Lindgren, Peter Parycek, Efthimios Tambouris, Maria A. Wimmer, Tomasz Janowski, Delfina Sá Soares, redaktorzy, Electronic Government, strony 253–264, Cham, 2016. Springer International Publishing.10.1007/978-3-319-44421-5_20Search in Google Scholar

44. Serguei Popov. The tangle, oct 2017. Available at https://iota.org/IOTA_Whitepaper.pdf.Search in Google Scholar

45. Davy Preuveneers, Wouter Joosen, Elisabeth Ilie-Zudor. Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0. Proceedings of the Symposium on Applied Computing, SAC ’17, strony 1452–1455, New York, NY, USA, 2017. ACM.10.1145/3019612.3019861Search in Google Scholar

46. F. Reid, M. Harrigan. An analysis of anonymity in the bitcoin system. 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, strony 1318–1326, Oct 2011.10.1109/PASSAT/SocialCom.2011.79Search in Google Scholar

47. Press Release. European energy trading firms to execute trades over the blockchain on emart, 2017. Available at http://www.ponton.de/downloads/enerchain/Enerchain-PressRelease-29.09.2017_final.pdf.Search in Google Scholar

48. R. L. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120–126, Luty 1978.10.21236/ADA606588Search in Google Scholar

49. E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, M. Virza. Zerocash: Decentralized anonymous payments from bitcoin. 2014 IEEE Symposium on Security and Privacy, strony 459–474, May 2014.10.1109/SP.2014.36Search in Google Scholar

50. Charlie Shier, Muhammad Izhar Mehar, Alana Giambattista, Elgar Gong, Gabrielle Fletcher, Ryan Sanayhie, Marek Laskowski, Henry Kim. Understanding a revolutionary and flawed grand experiment in blockchain: The dao attack. 01 2017.10.2139/ssrn.3014782Search in Google Scholar

51. Janusz J. Sikorski, Joy Haughton, Markus Kraft. Blockchain technology in the chemical industry: Machine-to-machine electricity market. Applied Energy, 195(C):234–246, 2017.10.1016/j.apenergy.2017.03.039Search in Google Scholar

52. Yonatan Sompolinsky, Aviv Zohar. Secure high-rate transaction processing in bitcoin. Rainer Böhme, Tatsuaki Okamoto, redaktorzy, Financial Cryptography and Data Security, strony 507–527, Berlin, Heidelberg, 2015. Springer Berlin Heidelberg.10.1007/978-3-662-47854-7_32Search in Google Scholar

53. Nick Szabo. Smart contracts: Building blocks for digital markets, 1996.Search in Google Scholar

54. D. K. Tosh, S. Shetty, X. Liang, C. Kamhoua, L. Njilla. Consensus protocols for blockchain-based data provenance: Challenges and opportunities. 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), strony 469–474, Oct 2017.10.1109/UEMCON.2017.8249088Search in Google Scholar

55. F. Tschorsch, B. Scheuermann. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys Tutorials, 18(3):2084–2123, thirdquarter 2016.10.1109/COMST.2016.2535718Search in Google Scholar

56. J. Vermeulen. Bitcoin and ethereum vs visa and paypal – transactions per second, 2018. Available at https://mybroadband.co.za/news/banking/206742-bitcoin-and-ethereum-vs-visa-and-paypal-transactions-per-second.html.Search in Google Scholar

57. Marko Vukolić. The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. Jan Camenisch, Doğan Kesdoğan, redaktorzy, Open Problems in Network Security, strony 112–125, Cham, 2016. Springer International Publishing.10.1007/978-3-319-39028-4_9Search in Google Scholar

58. Michael Waidner, Michael Kasper. Security in industrie 4.0 – challenges and solutions for the fourth industrial revolution. DATE 2016 (Design, Automation and Test in Europe), Marzec 2016.10.3850/9783981537079_1005Search in Google Scholar

59. Andrew Whitmore, Anurag Agarwal, Li Da Xu. The internet of things – a survey of topics and trends. Information Systems Frontiers, 17(2):261–274, Apr 2015.10.1007/s10796-014-9489-2Search in Google Scholar

60. J. Zhang, N. Xue, X. Huang. A secure system for pervasive social network-based healthcare. IEEE Access, 4:9239–9250, 2016.10.1109/ACCESS.2016.2645904Search in Google Scholar

Received: 2018-02-21
Revised: 2018-05-18
Accepted: 2018-05-28
Published Online: 2018-06-28
Published in Print: 2018-07-01

© 2018 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 24.4.2024 from https://www.degruyter.com/document/doi/10.1515/itit-2018-0011/html
Scroll to top button