2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) 2019
DOI: 10.1109/icgs3.2019.8688297
|View full text |Cite
|
Sign up to set email alerts
|

Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace

Abstract: The systematic integration of the Internet of Things (IoT) and Cyber-Physical Systems (CPS) into the supply chain to increase operational efficiency and quality has also introduced new complexities to the threat landscape. The myriad of sensors could increase data collection capabilities for businesses to facilitate process automation aided by Artificial Intelligence (AI) but without adopting an appropriate Securityby-Design framework, threat detection and response are destined to fail. The emerging concept of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 27 publications
(23 citation statements)
references
References 33 publications
0
23
0
Order By: Relevance
“…For example, image-based evidence can be gained through closed-circuit television (CCTV) surveillance or from social media. Behavioural anomaly detection can be used to detect unauthorised vehicle use through driver profiling [152], detect attacks on smart water systems [104] or unauthorised access within smart workplaces [24].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, image-based evidence can be gained through closed-circuit television (CCTV) surveillance or from social media. Behavioural anomaly detection can be used to detect unauthorised vehicle use through driver profiling [152], detect attacks on smart water systems [104] or unauthorised access within smart workplaces [24].…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, these complex and growing networks of connected objects incorporate human-users and form complex cyber-physical-natural (CPN) ecosystems interrelating systems, software, people and services. As such, a problem within this complex cyberspace, including cybersecurity challenges, can have a cascading effect on the entirety of the ecosystem [24,25].…”
Section: Introductionmentioning
confidence: 99%
“…These risks should be considered in the system to be developed and should be minimized. Besides, blockchain can also be used for cybersecurity such as visualization for security management [22], cyber insurance for cyber risk management [23], and cyber forensics analysis [24].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The four requirements for adding a block are (i) it must be a transaction, (ii) it must be verified, (iii) it must be stored, and (iv) it must receive a hash. For a more detailed classification, a blockchain requires a distributed ledger, a consensus mechanism, and associated cryptographic means [44].…”
Section: Integration Of Blockchain Types and Associated Consensus Mechanisms In Iomtmentioning
confidence: 99%