{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:16:19Z","timestamp":1773011779405,"version":"3.50.1"},"reference-count":65,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T00:00:00Z","timestamp":1618012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["FEIH_KMU_1100336"],"award-info":[{"award-number":["FEIH_KMU_1100336"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indisputable logging. Ideally, the level of security for these IoT devices shall be very high, as they are specifically designed for this autonomous and networked environment. This paper discusses a use case of a company with legacy devices that wants to benefit from the features and functionality of blockchain technology. In particular, the implications of retrofit solutions are analyzed. The use of the BISS:4.0 platform is proposed as the underlying infrastructure. BISS:4.0 is intended to integrate the blockchain technologies into existing enterprise environments. Furthermore, a security analysis of IoT and blockchain present attacks and countermeasures are presented that are identified and applied to the mentioned use case.<\/jats:p>","DOI":"10.3390\/a14040121","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T03:04:06Z","timestamp":1618196646000},"page":"121","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Security Audit of a Blockchain-Based Industrial Application Platform"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9115-7668","authenticated-orcid":false,"given":"Jan","family":"Stodt","sequence":"first","affiliation":[{"name":"Institute for Data Science, Hochschule Furtwangen University, Cloud Computing and IT-Security (IDACUS), 78120 Furtwangen im Schwarzwald, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8094-0809","authenticated-orcid":false,"given":"Daniel","family":"Sch\u00f6nle","sequence":"additional","affiliation":[{"name":"Institute for Data Science, Hochschule Furtwangen University, Cloud Computing and IT-Security (IDACUS), 78120 Furtwangen im Schwarzwald, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9831-2181","authenticated-orcid":false,"given":"Christoph","family":"Reich","sequence":"additional","affiliation":[{"name":"Institute for Data Science, Hochschule Furtwangen University, Cloud Computing and IT-Security (IDACUS), 78120 Furtwangen im Schwarzwald, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0863-0907","authenticated-orcid":false,"given":"Fatemeh","family":"Ghovanlooy Ghajar","sequence":"additional","affiliation":[{"name":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK) , Offenburg University of Applied Sciences, 77652 Offenburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0641-6974","authenticated-orcid":false,"given":"Dominik","family":"Welte","sequence":"additional","affiliation":[{"name":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK) , Offenburg University of Applied Sciences, 77652 Offenburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0878-2919","authenticated-orcid":false,"given":"Axel","family":"Sikora","sequence":"additional","affiliation":[{"name":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK) , Offenburg University of Applied Sciences, 77652 Offenburg, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2021,4,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Herterich, M.M., Buehnen, T., Uebernickel, F., and Brenner, W. (2016, January 5\u20138). A Taxonomy of Industrial Service Systems Enabled by Digital Product Innovation. Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA.","DOI":"10.1109\/HICSS.2016.157"},{"key":"ref_2","unstructured":"Macaulay, T., and Singer, B.L. (2011). Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS, CRC Press."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Marhaug, A., and Schj\u00f8lberg, P. (2016, January 10\u201311). Smart Maintenance-Industry 4.0 and Smart Maintenance: From Manufacturing to Subsea Production Systems. Proceedings of the 6th International Workshop of Advanced Manufacturing and Automation, Manchester, UK.","DOI":"10.2991\/iwama-16.2016.9"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"4","DOI":"10.20965\/ijat.2017.p0004","article-title":"\u201cIndustrie 4.0\u201d and smart manufacturing-a review of research issues and application examples","volume":"11","author":"Thoben","year":"2017","journal-title":"Int. J. Autom. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Waidner, M., and Kasper, M. (2016, January 14\u201318). Security in industrie 4.0-challenges and solutions for the fourth industrial revolution. Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.3850\/9783981537079_1005"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ervural, B.C., and Ervural, B. (2018). Overview of cyber security in the industry 4.0 era. Industry 4.0: Managing the Digital Transformation, Springer.","DOI":"10.1007\/978-3-319-57870-5_16"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIE.2018.2874385","article-title":"Physical-layer security for industrial wireless control systems: Basics and future directions","volume":"12","author":"Pan","year":"2018","journal-title":"IEEE Ind. Electron. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jmsy.2018.04.007","article-title":"Security of smart manufacturing systems","volume":"47","author":"Tuptuk","year":"2018","journal-title":"J. Manuf. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Andrea, I., Chrysostomou, C., and Hadjichristofi, G. (2015, January 6\u20139). Internet of Things: Security vulnerabilities and challenges. Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus.","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Ahemd, M.M., Shah, M.A., and Wahid, A. (2017, January 19\u201321). IoT security: A layered approach for attacks & defenses. Proceedings of the 2017 international conference on Communication Technologies (ComTech), Rawalpindi, Pakistan.","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A Comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_12","first-page":"35","article-title":"Performance analysis of scalability in the sinkhole compromised topology of wireless sensor networks","volume":"117","author":"Baskar","year":"2017","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Varga, P., Plosz, S., Soos, G., and Hegedus, C. (June, January 31). Security threats and issues in automation IoT. Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway.","DOI":"10.1109\/WFCS.2017.7991968"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Janu\u00e1rio, F., Carvalho, C., Cardoso, A., and Gil, P. (2016, January 18\u201320). Security challenges in SCADA systems over Wireless Sensor and Actuator Networks. Proceedings of the 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Lisbon, Portugal.","DOI":"10.1109\/ICUMT.2016.7765386"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Machado, C., and Fr\u00f6hlich, A.A.M. (2018, January 29\u201331). IoT data integrity verification for cyber-physical systems using blockchain. Proceedings of the 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore.","DOI":"10.1109\/ISORC.2018.00019"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Maynard, P., McLaughlin, K., and Sezer, S. (2018, January 22\u201324). Using Application Layer Metrics to Detect Advanced SCADA Attacks. Proceedings of the ICISSP, Funchal, Portugal.","DOI":"10.5220\/0006656204180425"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJISP.2017070101","article-title":"A proposed scheme for remedy of man-in-the-middle attack on certificate authority","volume":"11","author":"Tanwar","year":"2017","journal-title":"Int. J. Inf. Secur. Priv. (IJISP)"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Mahmood, Z. (2021). Industry Use Cases on Blockchain Technology. Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector, IGI Global.","DOI":"10.4018\/978-1-7998-6650-3"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., Caro, A.D., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. arXiv.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_20","unstructured":"Maggi, F., and Pogliani, M. (2021, April 07). Attacks on Smart Manufacturing Systems. Available online: https:\/\/resources.mynewsdesk.com\/image\/upload\/t_attachment\/dc5ixveews0zqu6txtni.pdf."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Homoliak, I., Venugopalan, S., Reijsbergen, D., Hum, Q., Schumi, R., and Szalachowski, P. (2020). The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE Commun. Surv. Tutor.","DOI":"10.1109\/COMST.2020.3033665"},{"key":"ref_22","unstructured":"Wisseman (2019, February 15). Third-Party Libraries Are One of the Highest Security Risks. Available online: https:\/\/techbeacon.com\/security\/third-party-libraries-are-one-most-insecure-parts-application."},{"key":"ref_23","unstructured":"Bongiorni, L. (2012, December 15). A Remotely Controlled Malicious Usb Hid Injecting Cable. Available online: https:\/\/medium.com\/@LucaBongiorni\/usbsamurai-a-remotely-controlled-malicious-usb-hid-injecting-cable-for-less-than-10-ebf4b81e1d0b."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Tang, C., Chen, S., Fan, L., Xu, L., Liu, Y., Tang, Z., and Dou, L. (2019, January 25\u201331). A large-scale empirical study on industrial fake apps. Proceedings of the 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Montreal, QC, Canada.","DOI":"10.1109\/ICSE-SEIP.2019.00028"},{"key":"ref_25","unstructured":"Tedeschi, S., Emmanouilidis, C., Farnsworth, M., Mehnen, J., and Roy, R. (2019, January 1\u20135). New threats for old manufacturing problems: Secure IoT-Enabled monitoring of legacy production machinery. Proceedings of the IFIP International Conference on Advances in Production Management Systems, Austin, TX, USA."},{"key":"ref_26","unstructured":"Kovacs, E. (2020, March 15). Many Vulnerabilities Found in OPC UA Industrial Protocol. Available online: https:\/\/www.securityweek.com\/many-vulnerabilities-found-opc-ua-industrial-protocol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"7","DOI":"10.5937\/fmet2001007N","article-title":"The detection of sensor signal attacks in industrial control systems","volume":"48","year":"2020","journal-title":"FME Trans."},{"key":"ref_28","unstructured":"Trustwave (2018, April 15). 2018 Trustwave Global Security Report. Available online: https:\/\/www.trustwave.com\/en-us\/resources\/library\/documents\/2018-trustwave-global-security-report\/."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Specht, F., Otto, J., Niggemann, O., and Hammer, B. (2018, January 18\u201320). Generation of adversarial examples to prevent misclassification of deep neural network based condition monitoring systems for cyber-physical production systems. Proceedings of the 2018 IEEE 16th International Conference on Industrial Informatics (INDIN), Porto, Portugal.","DOI":"10.1109\/INDIN.2018.8472060"},{"key":"ref_30","unstructured":"Poston, H. (2020, September 15). Attacks on Blockchain. Available online: https:\/\/resources.infosecinstitute.com\/topic\/attacks-on-blockchain\/."},{"key":"ref_31","unstructured":"Kovacs, E. (2020, March 15). Vulnerabilities in Protocol Gateways Can Facilitate Attacks on Industrial Systems. Available online: https:\/\/www.securityweek.com\/vulnerabilities-protocol-gateways-can-facilitate-attacks-industrial-systems."},{"key":"ref_32","unstructured":"Messaad, M.A., Jerad, C., and Sikora, A. (2020, January 14\u201317). AI Approaches for IoT Security Analysis. Proceedings of the International Conference on Applied Soft Computing and Communication Networks (ACN\u201920), Chennai, India."},{"key":"ref_33","unstructured":"M\u00f6ller, B., Duong, T., and Kotowicz, K. (2021, April 07). This POODLE Bites: Exploiting the SSL 3.0 fallback. Available online: https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf."},{"key":"ref_34","unstructured":"ImperialViolet (2020, December 14). The POODLE Bites Again. Available online: https:\/\/www.imperialviolet.org\/2014\/12\/08\/poodleagain.html."},{"key":"ref_35","unstructured":"OpenSSL (2020, December 14). CVE-2014-0160\u2013Heartbleed. Available online: https:\/\/www.openssl.org\/news\/secadv\/20140407.txt."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MCE.2019.2953740","article-title":"Consumer IoT: Security vulnerability case studies and solutions","volume":"9","author":"Alladi","year":"2020","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Jardine, W., Frey, S., Green, B., and Rashid, A. (2016, January 28). Senami: Selective non-invasive active monitoring for ics intrusion detection. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, Vienna, Austria.","DOI":"10.1145\/2994487.2994496"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Yoo, H., and Ahmed, I. (2019, January 21\u201323). Control logic injection attacks on industrial control systems. Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection, Maribor, Slovenia.","DOI":"10.1007\/978-3-030-22312-0_3"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Gallais, A., Hedli, T.H., Loscri, V., and Mitton, N. (2019, January 23\u201326). Denial-of-Sleep Attacks against IoT Networks. Proceedings of the 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), Paris, France.","DOI":"10.1109\/CoDIT.2019.8820402"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Yamaguchi, S., and Gupta, B. (2020). Malware threat in Internet of Things and its mitigation analysis. Security, Privacy, and Forensics Issues in Big Data, IGI Global.","DOI":"10.4018\/978-1-5225-9742-1.ch016"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Khajanchee, T., and Kshirsagar, D. (2020). Attacks on Blockchain-Based Systems. Blockchain Technology and the Internet of Things: Challenges and Applications in Bitcoin and Security, Apple Academic Press.","DOI":"10.1201\/9781003022688-9"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Jamai, I., Azzouz, L.B., and Sa\u00efdane, L.A. (2020, January 15\u201319). Security issues in Industry 4.0. Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus.","DOI":"10.1109\/IWCMC48107.2020.9148447"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"3980","DOI":"10.1109\/JSYST.2019.2912308","article-title":"Covert channels-based stealth attacks in industry 4.0","volume":"13","author":"Alcaraz","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"147471","DOI":"10.1109\/ACCESS.2020.3015900","article-title":"Cyber-physical integrated intrusion detection scheme in SCADA system of process manufacturing industry","volume":"8","author":"Qian","year":"2020","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: Dissecting a Cyberwarfare Weapon","volume":"9","author":"Langner","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"030029","DOI":"10.1063\/5.0024821","article-title":"Detection of selective forwarding attack using BDRM in wireless sensor network","volume":"Volume 2271","author":"UmaRani","year":"2020","journal-title":"AIP Conference Proceedings"},{"key":"ref_47","unstructured":"Ghasemisharif, M., Ramesh, A., Checkoway, S., Kanich, C., and Polakis, J. (2018, January 15\u201317). O single sign-off, where art thou? an empirical analysis of single sign-on account hijacking and session management on the web. Proceedings of the 27th {USENIX} Security Symposium ({USENIX} Security 18), Baltimore, MD, USA."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Haber, M.J. (2020). Attack Vectors. Privileged Attack Vectors, Springer.","DOI":"10.1007\/978-1-4842-5914-6"},{"key":"ref_49","first-page":"4568368","article-title":"Investigating Brute Force Attack Patterns in IoT Network","volume":"2019","author":"Stiawan","year":"2019","journal-title":"J. Electr. Comput. Eng."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Alem, S., Espes, D., Martin, E., Nana, L., and De Lamotte, F. (2019, January 3\u20137). A hybrid intrusion detection system in industry 4.0 based on ISA95 standard. Proceedings of the 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/AICCSA47632.2019.9035260"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TIFS.2019.2928256","article-title":"SDTE: A secure blockchain-based data trading ecosystem","volume":"15","author":"Dai","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"113578","DOI":"10.1016\/j.eswa.2020.113578","article-title":"Toward security monitoring of industrial cyber-physical systems via hierarchically distributed intrusion detection","volume":"158","author":"Liu","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.compind.2018.09.004","article-title":"Cybersecurity for Industry 4.0 in the current literature: A reference framework","volume":"103","author":"Lezzi","year":"2018","journal-title":"Comput. Ind."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"27218","DOI":"10.1109\/ACCESS.2020.2971947","article-title":"Sabotage attack detection for additive manufacturing systems","volume":"8","author":"Yu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Shoukry, Y., Martin, P., Yona, Y., Diggavi, S., and Srivastava, M. (2015, January 12\u201316). Pycra: Physical challenge-response authentication for active sensors under spoofing attacks. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813679"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Wang, H. (2021, April 07). A Three-Tier Scheme for Sybil Attack Detection in Heterogeneous IWSN. Available online: https:\/\/www.researchgate.net\/publication\/339679791_A_three-tier_scheme_for_sybil_attack_detection_in_heterogeneous_IWSN.","DOI":"10.1051\/matecconf\/202030902005"},{"key":"ref_57","first-page":"439","article-title":"A survey of password attacks and comparative analysis on methods for secure authentication","volume":"19","author":"Raza","year":"2012","journal-title":"World Appl. Sci. J."},{"key":"ref_58","unstructured":"(2021, February 14). ISO\u2014ISO\/IEC 27001\u2014Information Security Management. Available online: https:\/\/www.iso.org\/isoiec-27001-information-security.html."},{"key":"ref_59","unstructured":"NIST (2021, February 14). Cybersecurity Framework, Available online: https:\/\/www.nist.gov\/cyberframework."},{"key":"ref_60","unstructured":"(2021, February 14). Cyber Aware, Available online: https:\/\/www.ncsc.gov.uk\/cyberaware\/home."},{"key":"ref_61","unstructured":"(2021, February 14). IT-Grundschutz. Available online: https:\/\/www.bsi.bund.de\/EN\/Topics\/ITGrundschutz\/itgrundschutz.html;jsessionid=72AEED468D2781D1CCE9FE259EF54D3F.internet472?nn=409850."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"150184","DOI":"10.1109\/ACCESS.2019.2946988","article-title":"Smart Contract Security: A Software Lifecycle Perspective","volume":"7","author":"Huang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Ghaleb, A., and Pattabiraman, K. (2020, January 18\u201322). How Effective Are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection. Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Los Angeles, CA, USA.","DOI":"10.1145\/3395363.3397385"},{"key":"ref_64","unstructured":"UpGuard Team (2021, April 07). Short Circuit: How a Robotics Vendor Exposed Confidential Data for Major Manufacturing Companies. Available online: https:\/\/www.upguard.com\/breaches\/short-circuit-how-a-robotics-vendor-exposed-confidential-data-for-major-manufacturing-companies."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Stodt, J., and Reich, C. (2020). Data Confidentiality In P2P Communication And Smart Contracts Of Blockchain In Industry 4.0. arXiv.","DOI":"10.5121\/csit.2020.101001"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/14\/4\/121\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:27:42Z","timestamp":1760365662000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/14\/4\/121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,10]]},"references-count":65,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["a14040121"],"URL":"https:\/\/doi.org\/10.3390\/a14040121","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,10]]}}}