Using RFID to identify smart products on a blockchain enabled production network
Keywords:RFID, Blockchain, smart factory, smart product, data security
Industry 4.0 requires the cooperation of several technologies. The intersections of these technologies present us with new challenges. One of these challenges is identification, since we have to identify all the items that are on the network that do work and those that are worked upon. If we fail to identify one of these items the network is presented with an unidentified potentially malicious device or a misidentified product which can cause production to halt. Blockchains or otherwise known as Distributed Ledger Technology, DLT for short is a technology that builds upon the current bookkeeping paradigm and expands it in a decentralized direction. This however can be used in more than just banking since it is essentially a distributed database that has memory of past events not just the current state. By using a blockchain based distributed database to hold processing details and using RFID-s as keys to certain entries in the database it is possible to build a tamper proof production system that can handle the challenges of industry 4.0. It may also be possible to use blockchain technology as a form of digital paper trail that can be used to validate messages sent to the nodes of the system.
A. Gilchrist, Industry 4.0. Berkeley, CA: Apress, 2016. https://doi.org/10.1007/978-1-4842-2047-4.
H. Watanabe and H. Fan, ‘A Novel Chip-Level Blockchain Security Solution for the Internet of Things Networks’, Technologies, vol. 7, no. 1, p. 28, Mar. 2019, https://doi.org/10.3390/technologies7010028.
M. A. Khan and K. Salah, ‘IoT Security: Review, Blockchain Solutions, and Open Challenges’, Future Generation Computer Systems, vol. 82, pp. 395–411, May 2018, https://doi.org/10.1016/j.future.2017.11.022.
M. Sidorov, M. T. Ong, R. V. Sridharan, J. Nakamura, R. Ohmura, and J. H. Khor, ‘Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains’, IEEE Access, vol. 7, pp. 7273–7285, 2019, https://doi.org/ 10.1109/ACCESS.2018.2890389.
U. Mujahid, M. Najam-ul-Islam, and M. Khalid, ‘Efficient Hardware Implementation of KMAP+: An Ultralightweight Mutual Authentication Protocol’, Journal of Circuits, Systems and Computers, vol. 27, no. 02, p. 1850033, Feb. 2018, https://doi.org/10.1142/S0218126618500330.
RFID in Manufacturing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. https://doi.org/10.1007/978-3-540-76454-0.
S. Figorilli et al., ‘A Blockchain Implementation Prototype for the Electronic Open Source Traceability of Wood along the Whole Supply Chain’, Sensors, vol. 18, no. 9, p. 3133, Sep. 2018, https://doi.org/10.3390/s18093133.
M. Iansiti and K. R. Lakhani, ‘The Truth About Blockchain’, p. 11.
S. Nakamoto, ‘Bitcoin: A Peer-to-Peer Electronic Cash System’, p. 9.
N. Szabo, ‘Formalizing and Securing Relationships on Public Networks’, First Monday, vol. 2, no. 9, Sep. 1997, https://doi.org/10.5210/fm.v2i9.548.
D. G. Wood, ‘ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER’, p. 32.
J. Gobel and A. E. Krzesinski, ‘Increased Block Size and Bitcoin Blockchain Dynamics’, in 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Nov. 2017, pp. 1–6. https://doi.org/10.1109/ATNAC.2017.8215367.
‘Don’t Count or Spend Payments until They Have 1 Confirmation, • Bitcoin/Bitcoin@a790fa4’, GitHub, Accessed: May 24, 2019. [Online]. Available: https://github.com/bitcoin/bitcoin/commit/a790fa46f40d751307f86c37a709eb119768ce5b
M. J. Krause and T. Tolaymat, ‘Quantification of Energy and Carbon Costs for Mining Cryptocurrencies’, Nature Sustainability, vol. 1, no. 11, pp. 711–718, Nov. 2018, https://doi.org/10.1038/s41893-018-0152-7.
‘Hashrate Distribution’, Blockchain.com, Accessed: May 24, 2019. [Online]. Available: https://www.blockchain.com/pools
A. Kiayias, A. Russell, B. David, and R. Oliynykov, ‘Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol’, in Advances in Cryptology – CRYPTO 2017, vol. 10401, J. Katz and H. Shacham, Eds. Cham: Springer International Publishing, 2017, pp. 357–388. https://doi.org/10.1007/978-3-319-63688-7_12.
N. Miloslavskaya, ‘Designing Blockchain-Based SIEM 3.0 System’, Information and Computer Security, vol. 26, no. 4, pp. 491–512, Oct. 2018, https://doi.org/10.1108/ICS-10-2017-0075.
B. Shahzad and J. Crowcroft, ‘Trustworthy Electronic Voting Using Adjusted Blockchain Technology’, IEEE Access, vol. 7, pp. 24477–24488, 2019, https://doi.org/10.1109/ACCESS.2019.2895670.
H. Treiblmaier and R. Beck, Eds., Business Transformation through Blockchain. Volume 2: ... Cham, Switzerland: Palgrave Macmillan, 2019.
How to Cite
Copyright (C) 2023 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.