Skip to main content

The Implement of a Reconfigurable Intelligence Trust Chain Platform with Anti-counterfeit Traceable Version Function for the Customized System-Module-IC

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2023)

Abstract

Today, information technology (IT) and operational technology (OT) accelerate the development of Intelligence of Things (IoT) systems, which consist of modular integrated circuits (ICs). However, the existing IoT cannot support this all-round certification based on System-Module-IC vertical integration of upstream and downstream product hardware version identification in its supply chain. In other words, this factor limits the ability of system equipment for IoT to include version certification of System, Module and IC chip. Furthermore, in the supply chain, a comprehensive trust relationship cannot be established in the cooperation process between suppliers and other manufacturers. This paper first implements the reconfigurable chain of trust authentication method according to the references [21] and [22] applied to the supply chain based on the System-Module(s)-IC(s) vertical integration via the designed the customized IoT system with the comprehensive identification of the hardware version of upstream and downstream products. This implementation is based on a private blockchain combined with a decentralized database system to improve the reliability, traceability and identification of all-round customized versions of customized systems, modules and ICs. The approach we proposed could implement of a blockchain and IPFS-Based anti-counterfeit traceable of the version customized System-Module-IC by using reconfigurable intelligence trust chain, where the DApp and the smart contracts for reconfigurable intelligence trust chain have been designed and performed in the real test-bed platform. Finally, the implemented results shown that this reconfigurable trust chain approach is a kind of the designed-in security as well as a kind of trusted platform integrated solution for creating a trusted platform module (TPM) solution based on Blockchain and IPFS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y.A.: An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250–10276 (2020). https://doi.org/10.1109/JIOT.2020.2997651

    Article  Google Scholar 

  2. Chen, H.-C.: Collaboration IoT-based RBAC with trust evaluation algorithm model for massive IoT integrated application. Mob. Netw. Appl. 24(3), 839–852 (2018). https://doi.org/10.1007/s11036-018-1085-0

    Article  Google Scholar 

  3. Chen, H.-C.: TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless Ad Hoc networks. IEEE Syst. J. 11(02), 449–459 (2017). https://doi.org/10.1109/JSYST.2015.2437285

    Article  Google Scholar 

  4. Chen, H.-C., You, I., Weng, C.-E., Cheng, C.-H., Huang, Y.-F.: A security gateway application for End-to-End M2M communications. Comput. Stan. Interfaces 44, 85–93 (2016)

    Article  Google Scholar 

  5. Chen, H.-C., Yang, W.-J., Chou, C.-L.: An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network. Concurrency Comput.-Pract. Experience 33(19) (2020). https://doi.org/10.1002/cpe.6128

  6. Chen, H.-C.: A trust evaluation gateway for distributed blockchain IoT network. In: Chen, J.-L., Pang, A.-C., Deng, D.-J., Lin, C.-C. (eds.) WICON 2018. LNICSSITE, vol. 264, pp. 156–162. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-06158-6_16

    Chapter  Google Scholar 

  7. Chen, H.-C., Putra, K.T., Tseng, S.-S., Chen, C.-L., Lin, J.C.-W.: A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system. Future Gener. Comput. Syst. 108, 488–500 (2020). https://doi.org/10.1016/j.future.2020.02.032

    Article  Google Scholar 

  8. Chen, H.-C., Putra, K.T., Weng, C.-E.: A Novel predictor for exploring PM25 spatiotemporal propagation by using convolutional recursive neural networks. J. Internet Technol. 23(1), 165–176 (2022). https://doi.org/10.53106/160792642022012301017

    Article  Google Scholar 

  9. Putra, K.T., et al.: Federated compressed learning edge computing framework with ensuring data privacy for PM2.5 prediction in smart city sensing applications. Sensors 21(13), 4586 (2021). https://doi.org/10.3390/s21134586

    Article  Google Scholar 

  10. Karie, N.M., Sahri, N.M., Yang, W., Valli, C., Kebande, V.R.: A review of security standards and frameworks for IoT-based smart environments. IEEE Access 9, 121975–121995 (2021). https://doi.org/10.1109/ACCESS.2021.3109886

    Article  Google Scholar 

  11. Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2018)

    Article  Google Scholar 

  12. Wurm O. Arias, J., Hoang, K., Jin, Y.: Privacy and security in Internet of Things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)

    Article  Google Scholar 

  13. Pinto, S., Gomes, T., Pereira, J., Cabral, J., Tavares, A.: IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput. 21(1), 40–47 (2017). https://doi.org/10.1109/MIC.2017.17

    Article  Google Scholar 

  14. He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 16(4), 623–632 (2012)

    Article  Google Scholar 

  15. Kounelis, I., et al.: Building trust in the human–Internet of Things relationship. IEEE Technol. Soc. Mag. 33(4), 73–80 (2014)

    Article  Google Scholar 

  16. Nakamoto, S.: Bitcoin : A Peer-to-Peer Electronic Cash System. pp. 1–9 (2008)

    Google Scholar 

  17. Alharby, M., van Moorsel, A.: Blockchain based smart contracts : a systematic mapping study. In: Computer Science & Information Technology, pp. 125–140 (2017)

    Google Scholar 

  18. Chen, H.-C., Irawan, B., Shih, C.-Y., Damarjati, C., Shae, Z.-Y., Chang, F.: A smart contract to facilitate goods purchasing based on online haggle. Part of the advances in intelligent systems and computing book series (AISC, volume 994). In: The 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2019), First Online (2019)

    Google Scholar 

  19. Chen, H.-C., Damarjati, C., Prasetyo, E., Arofiati, F., Sugiyo, D.: Blockchain technology benefit in tackling online shopping transaction revocation issue. In: Proceedings of the 2020 The 6th International Conference on Frontiers of Educational Technologies (ICFET 2020), pp. 191–195. Tokyo, Japan (2020). https://doi.org/10.1145/3404709.3404757

  20. Koe, A.S.V., et al.: Hieraledger: towards malicious gateways in appendable-block blockchain constructions for IoT. Inf. Sci. 632, 87–104 (2023)

    Article  Google Scholar 

  21. Chen, H.-C., et al.: An implementation of trust chain framework with hierarchical content identifier mechanism by using blockchain technology. Sensors 22(13), 1–30 (2022). https://doi.org/10.3390/s22134831

    Article  Google Scholar 

  22. Chen, H.-C.: A reconfigurable trust chain authentication method based on system-module-chip vertical integration of upstream and downstream product hardware version identification. Patent of the Republic of China, Application number: 112105536, pp.1–14, Applied date on 16 Feb 2023

    Google Scholar 

Download references

Acknowledgments

This work was funded and supported by the National Science and Technology Council (NSTC), Taiwan, R.O.C., under contract NSTC 111-2218-E-468-001-MBK and the Ministry of Science and Technology, Taiwan, R.O.C., under contract MOST 110-2218-E-468-001-MBK. In addition, this work was supported in part by NSTC, Taiwan, R.O.C., under contract NSTC 111-2218-E-002-037 and MOST 110-2218-E-002-044.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hsing-Chung Chen , Kuen-Yu Tsai , Yu-Lin Song , Pei-Yu Hsu or Jia-Syun Cai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, HC. et al. (2023). The Implement of a Reconfigurable Intelligence Trust Chain Platform with Anti-counterfeit Traceable Version Function for the Customized System-Module-IC. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 177. Springer, Cham. https://doi.org/10.1007/978-3-031-35836-4_28

Download citation

Publish with us

Policies and ethics