1. Introduction
Recent revolutions in the industrial sector have come from innovative technological concepts such as big data, cloud computing, artificial intelligence, and cyber-physical systems. Merging the smart industry with Internet of Things (IoT) technology has given rise to new and diverse requirements to ensure a secure industrial environment [
1]. With these technologies, the industrial process has evolved in new directions related to the provision of facilities, reducing production costs, and increasing production rates. The Fourth Industrial Revolution will be achieved by linking conventional industrial environments to internet networks [
2,
3].
Traditional IoT depends on the use of a centralized architecture, with information processing and analysis facilities provided by cloud-based servers. Each expansion in the use of IIoT networks is accompanied by renewed security and privacy challenges. The main drawback of a centralized architecture is that it represents a bottleneck, latency, and a single point of failure, meaning that hacking can lead to the whole network going down [
4]. The use of a centralized architecture therefore becomes unsuitable, especially for high-performance applications [
5]. In the new IIoT, the amounts of sensor data are huge, and this would lead to a significant increase in the load on centralized verification systems. However, in the IIoT, challenges related to security and scalability can be overcome through the integration of blockchain technology with IoT devices [
6].
The blockchain is an important technology that can provide a high level of secrecy, privacy and protection for control systems in real-time [
7,
8]. It is a distributed, decentralized, timestamp, and shared database ledger. That has ability to store the identity of registered nodes and all transactions between peers, cryptographic techniques and a hash algorithm are used to secure the transactions and authenticate the peers without the need for trusted third party services, blockchain uses hashing function (SHA-256) and elliptic curve cryptography (ECC) to provide robust cryptographic proof for data integrity and authenticity. Therefore, blockchain technology has unique advantages over other conventional technologies [
6]. In addition, the most common problems associated with a centralized architecture can be solved through the use of a decentralized system. Blockchain technology can also help to improve the performance of IIoT platforms in various areas of application [
9].
Blockchain features, such as distributed ledger, distributed database, distributed consensus mechanism, transparent log, timestamp, and traceability provide a trusted system that can efficiently resist many types of cybersecurity attacks [
10]. By merging the blockchain technology and exploiting its features in a new environment (founded on industrial IoTs), we ensure the system’s security and data integrity during the autonomous transfer of data between machines (M2M) in an industrial environment. This merging helps increase the possibility of a robotic control system with the remote observation of machine events, to make the right decisions in time. With our proposed architecture (depicted in
Figure 1), we integrated the technology of blockchain, smart contract and IoTs in a cement factory as an industrial environment. Our proposed architecture consists of three layers: Physical, Blockchain Service and Application. These layers work together to build a lightweight security scheme by utilizing STM32 boards and a low-power STM32F427 processor. Moreover, adopting a fast, highly scalable, low energy proof of authentication (PoAh) as a consensus mechanism helps to enhance the computational performance [
10,
11].
Motivation and Contributions
The process of integrating the blockchain with IIoT systems is challenging due to the particular requirements involved. These challenges include the resource-constrained and low-power nature of IoT devices, the sensitivity of the information, low storage capacities, and the high numbers of devices contained inside large IIoT networks. To overcome these challenges, we proposed a trusted, highly scalable, low-power, transparent, and lightweight security scheme based on a private blockchain mechanism for a cement factory. Our architecture consists of three layers: a physical layer, a blockchain service layer, and an application layer. In the first of these layers, we utilized an STM32 development board to transmit data from sensors and actuators to the blockchain service layer, which contains private blockchain (permission) and lightweight nodes that are designed to give a faster performance for an asymmetric cryptographic algorithm (ECC). Proof of authentication (PoAh) is used for new blocks authentication in our architecture, as this eliminates the need for the reverse hash function used in proof of work (PoW) and makes the process lighter in weight [
10,
12].
The main contributions of the proposed architecture are as follows:
It provides a security scheme that can guarantee the security of data transmission between peers in a Cement industry environment.
It is based on integration between a blockchain technology and IoTs to provide a lightweight, trusted, low-power, scalable, transparent, and decentralized IIoT network. It is also resistant to common IoT attacks such as Sybil, modification, impersonation, replay, repudiation, man in middle (MIM), denial of service (DoS), and distributed (DoS) attacks.
It offers low computational complexity and high performance due to the adoption of a blockchain service layer that contains lightweight nodes.
It successfully eliminates the need for a third party service (a trusted authority) through the use of PoAh and smart contracts that are executed autonomously.
2. Related Works
The IIoT was developed to improve industrial processes and can provide real-time information collection, processing, storage, and event management [
8,
13]. Traditional IIoT mechanisms still suffer from several security threats such as Sybil, modification, impersonation, replay, MIM, repudiation, DoS, and distributed DoS attacks [
14,
15]. All of these threats can be prevented through the use of blockchain technology, which can play a pivotal role in ensuring secure communication between each type of activity and building trust among communicating nodes [
16].
The IIoT is revolutionizing industry from many perspectives, such as manufacturing, supply, and retailing. In this section, we review several recent studies that are closely related to blockchain applications in the industrial sector. The first blockchain-based digital currency system is Bitcoin, which was introduced by Nakamoto in 2008 [
17]. There are many similarities between the IIoT and Bitcoin systems, such as huge numbers of nodes, rigorous security and privacy requirements, and the continuous exchange of data. Blockchain technology is therefore acknowledged as the most suitable choice for industrial applications. Shen et al. [
18] proposed a consortium blockchain to build trust between connected devices in various domains. For the authentication process, the author utilizes the identity-based signature (IBS), while Ephermeral Elliptic Curve Diffe-Hellman (EECDH) used for the key agreement process. Then, the authors design a new mechanism for identity management to preserve the privacy of participants devices, through it the authenticated devices remain anonymous. Rathee et al. [
14] explored the provision of security in the industrial sector for offices distributed over several countries and proposed a hybrid Blockchain mechanism. Cao et al. [
19] overcame the challenges associated with information traceability in a steel factory by presenting a blockchain-based quality traceability system. In this scheme, clients could gain access to process information and trace the quality of a product in a secure manner. Hu et al. [
20] developed a distributed P2P energy transaction model in which smart contracts were used to ensure the transparency and tamper-resistance of credit scores. He et al. [
21] presented a software status monitoring system based on the blockchain and IIoT, in which the blockchain was used for storage purposes. In their work, Gul et al. [
22] focused on both a business and its customers, and proposed a smart healthcare business model for the prediction of patient status by collecting suitable data from the Internet of Medical Things.
In any communication system, the overall security of the system poses a significant challenge, and this is especially true for the IIoT sector [
23]. However, blockchain technology can overcome a wide range of cybersecurity threats.
All of the research studies reviewed here are limited in that they use blockchain technology only for its efficiency in recording sensor data in industrial environments, and do not explore its applicability to other industrial operations; there is a lack of discussion in the literature of schemes for applications at the device level. Furthermore, most studies have relied on the use of open-source platforms and PoW as a consensus mechanism to provide blockchain services, which is exposed to 51% security attacks and required a high cost of energy and hardware [
10,
11,
24,
25,
26,
27].
To overcome the aforementioned challenges, we propose a trusted, scalable, low power, lightweight, and efficient security scheme based on a decentralized private blockchain architecture for a cement factory. By adopting a decentralized architecture, we address the problems of a single point of failure, latency, and bottlenecks, and eliminate the need for a relationship with a third party, which typically leads to an increase in the execution time needed for authentication and other services and poses a potential security threat to the whole system. In addition, we exploit the features of the blockchain to secure data at the device level. Using the proposed lightweight nodes (STM32F427), we achieve real-time encryption and data collection, processing, and storage in a blockchain network, and through the use of a private blockchain/smart contract, our architecture provides resistance to many common IoT attacks such as anonymity [
28], tampering, impersonation, replay, repudiation, MIM, Sybil, 51%, Double spending, and DoS attacks [
14,
15]. The elliptic curve digital signature algorithm (ECDSA) is adopted due to its low complexity and low storage requirements [
29].
In comparison to existing schemes, our experimental results show that we have created an efficient, secure architecture for the cement industry that satisfies the resource constraints by achieving the lowest execution time with the lowest energy consumption by utilizing ECDSA on an ARM Cortex-M4, as discussed in
Section 5. Instead of PoW, we use a PoAh consensus mechanism to generate a highly scalable, fast, and energy-efficient scheme [
30,
31].
In our scheme, we successfully realized the integration of blockchain technology with IoT devices in the industrial sector at the device level, which is considered to be a challenging point in many research papers. The IoT devices classified as resource constraints (sensors, actuators) that founded new requirements, such as lightweight security scheme, lightweight algorithms, and low power consumption [
20]. Our architecture satisfies these new requirements by building a lightweight security scheme, designed by utilizing a low-power ARM Cortex-M4 processor. Moreover, it adopts fast, highly scalable, low energy proof of authentication (PoAh) as a consensus mechanism that helps to enhance computational performance. In addition, our architecture brings many benefits and features to the internet of things network in an industrial sector, concerning increased overall system security, stability, offer information traceability, scalability, secure remote access to valuable data, transparency, and tamper-resistance (by using smart contract), and provides a real-time status monitoring system. The data collected from IoT sensors and actuators that could not be changed by any network participants (immutable) after recording them in a blockchain network, can also be used to predict future production capacity, maintenance, and many other factors, with excellent data management. In addition, this integration enables fast reactions to the newly received data, which helps enhance the quality and reduce the wastage of raw materials.
5. A Blockchain-Based Cement Factory
Our blockchain-based architecture for cement plant is illustrated in
Figure 4, from the start to the end of the process, a clinker product represented by a raw material passes through a specially designed rotary kiln, a cooler and iron conveyors. A VFD gear-motor controls the rotation of the kiln.
In cement processes, the temperature of the rotary kiln, the pressure of the inlet air actuator, the rotation speed of the kiln and the moisture of the mixture are highly important factors that are directly related to the quantity and quality of clinker production.
To control these critical factors effectively, four high-accuracy temperature sensors (kiln inlet, outlet, mixture, clinker) are used with an STM32 board. During the burning process of the raw material, the temperature sensors, rotation sensor, and pressure sensors are interfaced with the STM32 board to provide control over the state of the burner valve, the inlet air actuator, the raw material feed and the rotation speed. In the second stage, burning raw material at a high temperature (1450 °C) passed through the rotary kiln to produce the clinker. In this case, all of the sensors and actuators are used to ensure ideal burning conditions inside the rotary kiln, while the moisture sensor is used to check and control the moisture of the mixture before feeds to the kiln. Weight sensors are used with the STM32 board to record the weight of the product (clinker) in tons per hour. In the final stage (after cooling), iron chains are used to convey the product to the clinker store. Our architecture consists of several modules, all of which interact with the lightweight nodes (four STM32F427) of the blockchain service layer. Each of these modules has a copy of the recorded data, meaning that if a node crashes for any reason, then another node can provide a backup of the required data. Through this interaction, lightweight nodes can efficiently record the data and the states of actuators provided by the sensors. Real-time encryption is provided through the use of the ECC algorithm; this is applied by lightweight nodes to the acquired data, which are then sent to the private blockchain. The ECDSA was chosen for our architecture due to its low storage requirements and low complexity, which make it suitable for resource-constrained devices [
34]. It also used to create public and private keys and to provide an authentication mechanism for devices. Encrypted data are stored in a secure, private blockchain network, and only the administrator and authorized users can connect to and access services. Blockchain is a promising technology for use in a factory, as it can ensure the security required in a smart industrial environment.
7. Comparative Performance Analysis
Most the recent studies have focused on the features of the blockchain in the field of data storage, and have not dealt with the other features of blockchain technology regard to an industrial environment. They have also not provided a clear method for protecting the sensor data on the devices [
14,
19,
20,
21,
22]. In view of this, we propose a trusted, lightweight, low power, high-performance and secure communication network for a cement plant as an industrial environment. Our approach ensures the protection of the data transferred between peers, even outside the blockchain network, through the integration of the blockchain with IIoT. Since the blockchain operates based on asymmetric key cryptography, we can achieve security of information, protection of user identities, and guaranteed transactions.
Our architecture successfully achieves trust for all network operations and components, meaning that security and transparency can be ensured at all levels of the cement industry.
Table 3 shows a comparison of various methods in the literature in terms of the consensus mechanism used, the blockchain platform, the cryptographic scheme, hardware dependency, energy efficiency, and speed.
The first criterion in our comparison is the consensus mechanism through which new transactions are authenticated and added to the blockchain network. Due to the use of resource-constrained devices in IoTs and the associated scalability issues, the consensus mechanism must be lightweight. The authors of [
18] used identity-based signature (IBS), and the authors of [
14,
20] used PoW in their work, while the authors of [
19] used PoC. In [
21] PBFT used in their scheme, while in [
22] delegate PoS adopted as shown in
Table 3, most of these traditional consensus mechanisms are not compatible with resource-constrained devices. For example, the PoW algorithm has higher energy requirements than PoS, PoC and PoA, although none of these approaches is suitable for low-power computational devices. In our scheme, we used PoAh as a consensus algorithm, which has the lowest energy consumption for block authentication. PoAh is based on a cryptographic authentication scheme that makes it faster than other consensus algorithms, which designed to reduce the latency and energy consumption for each transaction. In addition, its specialized to resource-constraint IoTs nodes [
10,
11,
12,
26,
30].
The second criterion, the use of an open-source platform, is used in most schemes, which can provide an appropriate quality of service, however, an open-source platform fully depends on a third party (central authority). In general, external dependency can lead to many kinds of security and computational issues, such as single point of failure, bottleneck problems, and slow execution for the whole of the network activities due to an increase in the mutual authentication messages between the internal network and the trusted authority; this dramatically increases the network’s component power consumption. Our scheme is designed to work based on a private blockchain network; participants must be pre-registered in the network to be an authorized user or device. This makes it more feasible for use in industrial applications and eliminates the need for third-party services, with its related problems.
The third criterion is the cryptography used to ensure transactions and user identities, and to secure the data. There are several cryptographic schemes that have been adopted in blockchain applications, such as elliptic curve Diffie-Hellman key exchange (ECDHE) that adopted by the authors of [
18], and the authors of [
14,
19,
20] used SHA-256, while the authors of [
21,
22] adopted on the local public key, as shown in
Table 3. There are also other cryptography approaches such as the advanced encryption standard (AES), ECDSA, and identity-based signature (IBS), all of which have certain advantages and disadvantages. We used ECDSA in our scheme due to its low memory requirements and low computational complexity.
The hardware dependency is another important criterion that we considered when designing our scheme. Our results from the implementation of ECDSA on an ARM Cortex-M4 show that this was the faster and optimum selection. The fifth criterion is energy consumption, which depends on the type of consensus mechanism and encryption method used. We utilized PoAh, as it is energy efficient in comparison with other consensus algorithms, as discussed above. The sixth criterion represents the time it takes to complete a task, which relates to the performance of the proposed framework and depends on consensus algorithm type, utilizing resources, execution time, and energy efficiency. From experimental results, our framework requires less time than other frameworks.
The last criterion of our comparison is the security attacks, in which attackers can exploit the vulnerable points in the system to satisfy their goals. As in
Table 3, the authors of [
14,
20] used PoW as a consensus algorithm, which is susceptible to 51%, Sybil, balance, and double-spending attacks [
11,
35]. The authors of [
18] utilized the IBS as a consensus mechanism, which is susceptible to Sybil and DDoS attacks [
9]. The authors of [
19] adopted PoC, which is also susceptible to 51%, double spending and Sybil attacks [
35]. In addition, the authors of [
21] utilized the PBFT for the verifying process and this algorithm is exposed to Sybil attacks, while the authors of [
22] depend on Delegate PoS, and this algorithm is also vulnerable to 51%, double spending and Sybil attacks [
35]. With our architecture, we succeeded in being resistant to all of the aforementioned types of attacks by utilizing the private blockchain, smart contract, ECDSA, lightweight nodes and PoA algorithm.
In our experiments, we achieved faster performance with a lower power consumption than other similar frameworks. Our proposed architecture successfully implements a decentralized, secure, energy-efficient, fast and effective blockchain platform for an industrial environment (a cement factory) by combining the advantageous features of the ECDSA, a private blockchain network, and the PoAh consensus mechanism.
Recall, our scheme fast and secure than other schemes due to the utilization of PoAh as a consensus mechanism to authenticate new blocks in the blockchain network that featuring by lowest time to authenticate the new blocks, also it solved the security problem of 51% and Sybil attack founded with traditional consensus algorithms such as PoW, PoC, and DPoC. ECDSA used for data encryption that is secure and low computational complexity; in addition, the use of blockchain technology (private blockchain platform) helps in eliminate the dependence on third-party services, which address the problems related to a single point of failure, bottleneck, and slow execution. Moreover, using of smart contract gives the immutability of the ledger that help to resistance for many common security attacks such as tampering, 51%, replay, modification, Sybil, Man in Middle, DoS, and distributed DoS. While other schemes that adopted on other consensus algorithms and platforms that expose to most of the mentioned common security attacks.
8. Conclusions
In our work, we have proposed a decentralized, scalable, lightweight, low power, trusted security architecture for a cement factory as an industrial application area based on blockchain technology. We successfully integrated blockchain technology with IoT devices in an industrial environment.
Our proposed system carries out user and device registration using a private blockchain. Then, all transmitted data are stored as transactions in blocks while sending a copy of all transactions to the lightweight nodes to provide a backup of these transactions for use in case of a single node crash, which ensures the stability of operation for the machines through a P2P connection. Our proposed architecture is shown to be efficient, as it had reduced computational complexity and achieved the lowest execution time (1.1236 s) and lowest energy consumption (209.915 mW) compared to other schemes. It also offers enhanced security for an industrial environment through the use of an asymmetric cryptography algorithm. Furthermore, due to the use of a private blockchain, our architecture provides resistance to most kinds of common cybersecurity attacks on IoT networks of devices, such as Sybil, 51%, tampering, impersonation, replay, repudiation, DoS, and distributed DoS. All of this achieved through the decentralized architecture and the immutable features of blockchain ledgers, in which entries are made using smart contracts. In addition to the fast, highly scalable, and low energy proof of authentication (PoAh) adopted as a consensus mechanism that helps to enhance the computational performance by eliminating the reverse hash function process used in PoW, it also eliminated centralized dependencies, which makes blockchain lightweight and more suitable for resource-constrained devices.
In comparison with centralized architectures, our proposed scheme yields excellent performance, as demonstrated by our experimental results. Our system integrates blockchain technology with IIoT, and can therefore guarantee secure authentication and privacy preservation for the transmitted data. With this level of security, authorized clients (blockchain network participants) would be able to gain access to the private network and find out information on the cement production process, such as the quality, quantity, production capacity, production dates and power consumption. Security authentication and privacy preservation typically not considered in conventional IIoT systems, unlike in our work. We can successfully modernize conventional cement factories based on our new architecture in which the blockchain technology integrated with IIoT to create a secure industry environment.