Abstract

Undoubtedly, the supply chain management (SCM) system is an important part of many organizations worldwide; over time, the technologies used to manage a supply chain ecosystem have, therefore, a great impact on businesses’ effectiveness. Among others, numerous developments have been made that targeted to have robust supply chain systems to efficiently manage the growing demands of various supplies, considering the underlying requirements and main challenges such as scalability, specifically privacy and security, of various business networks. Internet of things (IoT) comes with a solution to manage a complex, scalable supply chain system, but to provide and attain enough security during information exchange, along with keeping the privacy of its users, is the great inherent challenge of IoT. To fulfill these limitations, this study designs and models a scaled IoT-based supply chain (IoT-SC) system, comprising several operations and participants, and deploys mechanisms to leverage the security, mainly confidentially, integrity, authentication (CIA), and a digital signature scheme to leverage potentially secured non-repudiation security service for the worst-case scenario, and to leverage privacy to keep users sensitive personal and location information protected against adversarial entities to the IoT-SC system. Indeed, a scaled IoT-SC system certainly opens new challenges to manage privacy and security while communicating. Therefore, in the IoT-SC system, each transaction writes from edge computing nodes to the IoT-SC controller is thoroughly examined to ensure the proposed solutions in bi-directional communication, and their robustness against adversarial behaviors. Future research works, employing blockchain and its integrations, are detailed as paces to accelerate the privacy and security of the IoT-SC system, for example, migrating IoT-centric computing to an immutable, decentralized platform.

Highlights

  • Internet of Things (IoT) is a centralized platform that provides reliable connectivity among objects, such as devices, sensors, machines, actuators, or things that can exchange information over the internet.IoT, together with its number of applications, offers several opportunities to manage and monitor the overall information exchange between hundreds of thousands of connected devices [1,2]

  • Dos Santos and Canedo [29] developed an IoT system that employs radio frequency identification (RFID) tags embedded to objects to read information, cloud computing (i.e., Microsoft Azure) technology and microservices, and independent IoT services, to manage the scalable system and a large dataset generated from ultra-high frequency (UHF) RFID tags

  • We examined that the IoT-based IoT supply chain (IoT-SC) system should require all essential security services such as authentication, integrity, confidentiality, and non-repudiation to combat the vulnerabilities and attacks, even these are important aspects that every internet-based system should adopt to attain its performance, for example, to ensure communication against unauthorized access and tampering

Read more

Summary

Introduction

Internet of Things (IoT) is a centralized platform that provides reliable connectivity among objects, such as devices, sensors, machines, actuators, or things that can exchange information over the internet. A number of research studies have been conducted to use IoT solutions to manage the supply chain operations, workflow, and processing; the conducted research works are good enough to support the industrial productions and deliveries, in short, the ultimate target is to generate profit; there are limited concentrations paid to the main challenges: privacy, security, and scalability, associated to the supply chain or IoT integrated supply chain either. The supply chain system is not a central computing system, its entities and operations are distributed across several locations, taxonomy of potential risks is unknown and high in the supply chain ecosystem; adopting new technologies and applications, even integration of IoT, the small and large organizations should do a risk analysis before to update the existing infrastructures; IoT integrations always require system updates, e.g., hardware/software updates, to keep managing its network effectiveness time-to-time.

Literature Survey
Internet of Things
Supply Chain System
Security and Privacy Analysis
System Design and Modeling
Privacy processing:numbers numbersof ofsteps steps are are used to process
2: Confidentiality and Statement 3
Statement 1
Statement 2
Statement 3
Statement 4
Statement 5
Identity
Location
Confidentiality
Authentication
Non-Repudiation
Results and Discussion
Conclusions
Future Works

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.