2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2018
DOI: 10.1109/cybermatics_2018.2018.00229
|View full text |Cite
|
Sign up to set email alerts
|

BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…Subsequently, we conducted a random check using the previous classification to ensure less disagreement and to present more stable final decisions. Table 2 presents potential blockchain applications across different industries showing that early applications were mainly in the fields such as food provenance [51], physical distribution and logistics [52], manufacturing [53], [54], and drug/pharmaceuticals supplies [55]- [57]. Traceability [58] and transparency [59] issues are increasingly drawing more attention, and this phenomenon explains the penetration point where blockchain could be applied in SCM.…”
Section: B Classification Of Selected Papersmentioning
confidence: 99%
“…Subsequently, we conducted a random check using the previous classification to ensure less disagreement and to present more stable final decisions. Table 2 presents potential blockchain applications across different industries showing that early applications were mainly in the fields such as food provenance [51], physical distribution and logistics [52], manufacturing [53], [54], and drug/pharmaceuticals supplies [55]- [57]. Traceability [58] and transparency [59] issues are increasingly drawing more attention, and this phenomenon explains the penetration point where blockchain could be applied in SCM.…”
Section: B Classification Of Selected Papersmentioning
confidence: 99%
“…Stevens et al 2016 [16] Conti et al 2018 [32] Salman et al 2019 [35] Barron et al 2016 [53] Fu et al 2019 [21] Lu et al 2017 [54] Cyber Resilience Acharjamayum et al 2018 [30] Divey et al 2019 [99] Wang et al 2019 [47] Fraga-Lamas et 2019 [9] Shahaab et al 2019 [3] Ben?i? et al 2018 [10] Maple et al 2019 [29] Alotaibi 2019 [37] Hou et al 2019 [36] He et al 2018 [42] Onwubiko 2020 [41] Sharma et al 2019 [43] Saini et at 2019 [44] Security Frameworks & Solutions Hasan et al 2020 [100] Jaiswal et al 2019 [75] Lallas et al 2019 [79] Madhumida et al 2019 [55] Bose et al 2018 [85] Shwetha et al 2019 [102] Ramalingaiah et al 2018 [103] Omar et al 2019 [104] Li et al 2019 [86] Ding et al 2020 [90] Li et 2018 [105] Xie et al 2018 [91] Bodkhe et al 2019 [94] Epiphaniou et al 2020 [5] Ledwaba et al 2019 [106] Seitz et al 2018 [107] Abdellatif et 2018 [108] Stodt et al 2018 [109] Devi et al 2019 [110] Wang et al 2019 [98] Matzutt et al 2018 [111 ] Sidorov et al 2018 [96] Dinh et al 2018 [48] Demir et al 2018…”
Section: Security Compliancementioning
confidence: 99%
“…The complexity of SCM along with the security challenges are illustrated in [96]. Vulnerabilities in the SC is categorized into Piracy, Trojan Insertion, Overproduction, Recycled, Remarked, Cloned, Out of Spec / Defective, Forged Documentation and Side Channel Attack.…”
Section: Supply Chain Data Managementmentioning
confidence: 99%
See 2 more Smart Citations