Industrial Networks Using Blockchain for Access Control
Glossary
Term DefinitionsNetwork NodeAny unit that participates in hosting a blockchain, which can be software or hardware, such as a control unit, embedded device, personal computer, server, or application-specific integrated circuit.TransactionA sequence of data with a specific meaning that depends on how the network node interprets it.Confirmed TransactionA transaction that has been stored by the blockchain.Unconfirmed TransactionA transaction that has not yet been stored by the blockchain.BlockchainA distributed, permissionless, trusted database that stores confirmed transactions.Consensus ProtocolA mechanism that a blockchain uses to ensure that multiple network nodes reach agreement on the addition of new transactions.Computing ResourceA resource required to perform a computing task, such as computing power, storage space, etc.Connection TransactionA transaction that indicates a connected device and describes its access rights to an industrial network.Connected DeviceAny device that attempts to join and access an industrial network, such as a maintenance operator's laptop.Trusted BackboneA network of multiple trusted network nodes that is responsible for deciding which connected devices are granted access rights.Trusted Network NodeA network node that is located in an area protected by physical access control or accessible only to trusted operators.Mining Network NodeA network node that is responsible for creating candidate blocks and adding confirmed transactions to the blockchain. Proof of Work Proof of Work A mechanism by which a mining network node consumes computing resources to create a candidate block. Provider Network Node A network node that provides network resources, such as control operations or data access. Network Resources are provided by a provider network node that allow connected devices to interact with the industrial network. Identification Information used to identify a connected device, such as a digital certificate. A digital certificate contains a connected device public key and an electronic document signed by a trusted certificate authority. A trusted certificate authority (CA) is a trusted entity responsible for signing and issuing digital certificates. Digital Signature An electronic signature created using a connected device private key that is used to verify identity. Trusted Node Identification Transaction A transaction that indicates a trusted network node and describes that it belongs to the trusted backbone network authority. Short Answer Questions
What is blockchain in industrial networks and how is it used for access control?
Explain the difference between “confirmed transactions” and “unconfirmed transactions.”
What role does the consensus protocol play in blockchain access control?
What is a connection transaction? How does it indicate a connected device and describe its authority?
What role does the trusted backbone play in a blockchain-based access control system?
Describe how a provider network node uses blockchain to grant access to network resources.
How is the identification information of the connected device stored in the connection transaction?
Explain how digital certificates are used to verify the identity of the connected device.
How does the trusted backbone authorize unconfirmed connection transactions?
What is a trusted node identification transaction and why is it important in determining the trusted backbone?
Short answer questions
Blockchain is a distributed, permissionless, trusted database that stores confirmed transactions. In industrial networks, blockchain stores connection transactions that indicate connected devices and describe their permissions to access network resources, thereby implementing access control.
Confirmed transactions are transactions that have been added to the blockchain and verified by multiple network nodes. Unconfirmed transactions are transactions that have been created but not yet added to the blockchain and need to be verified by the consensus protocol before they can be confirmed.
The consensus protocol ensures that multiple network nodes agree on which transactions are valid and should be added to the blockchain. This prevents malicious nodes from tampering with blockchain data and ensures that access control policies are properly enforced.
A connection transaction is a special type of transaction that stores the identification information of a connected device, such as a digital certificate, and information that describes its permissions to access industrial network resources, such as an access control list (ACL).
The trusted backbone consists of multiple trusted network nodes that are responsible for deciding which connected devices are granted access. The trusted backbone creates and authorizes connection transactions, which are then added to the blockchain.
When a connected device requests access to a network resource, the provider network node queries the blockchain to check if there is a valid connection transaction authorized by the trusted backbone that grants the connected device access to that specific network resource.
The identification information of the connected device is stored in the identification information field of the connection transaction. This is usually in the form of a digital certificate that contains the public key of the connected device and other identification information.
The digital certificate is signed by a trusted certificate authority (CA) and contains the public key of the connected device and the signature of the CA. The provider network node can use the CA's public key to verify the authenticity of the digital certificate, thereby confirming the identity of the connected device.
The trusted backbone authorizes unconfirmed connection transactions by digitally signing them. The network node uses the public key of the trusted backbone to verify the signature, ensuring that the connection transaction comes from an authorized source.
The trusted node identification transaction stores the identification information of the trusted network node, such as its digital certificate. This allows other network nodes to identify members of the trusted backbone and verify that the node participating in the access control decision does in fact have permission.
Paper Title
Discuss the advantages and disadvantages of using blockchain for access control in industrial networks.
Compare and contrast centralized access control systems with blockchain-based access control systems, focusing on security, scalability, and resiliency.
Analyze the effectiveness and security of different consensus protocols when using blockchain for access control in industrial networks.
Investigate the challenges and opportunities of integrating blockchain technology into existing industrial control systems, including technical barriers, security issues, and industry standards.
Design a blockchain-based access control system for a specific industrial application, such as smart grid, supply chain management, or healthcare. Describe the system architecture, key components, and security considerations.