{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:49:45Z","timestamp":1770914985088,"version":"3.50.1"},"reference-count":17,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the EU funded H2020 FISHY Project","award":["952644"],"award-info":[{"award-number":["952644"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While the benefits of the automatic exchange of information between these systems have been recognized and have led to their interconnection, protecting the whole supply chain from potential attacks is a challenging issue given the attack proliferation reported in the literature. In this paper, we present the FISHY platform, which anticipates protecting the whole supply chain from potential attacks by (a) adopting novel technologies and approaches including machine learning-based tools to detect security threats and recommend mitigation policies and (b) employing blockchain-based tools to provide evidence of the captured events and suggested policies. This platform is also easily expandable to protect against additional attacks in the future. We experiment with this platform in the farm-to-fork supply chain to prove its operation and capabilities. The results show that the FISHY platform can effectively be used to protect the supply chain and offers high flexibility to its users.<\/jats:p>","DOI":"10.3390\/electronics13010215","type":"journal-article","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T05:50:38Z","timestamp":1704261038000},"page":"215","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1489-1495","authenticated-orcid":false,"given":"Helen C.","family":"Leligou","sequence":"first","affiliation":[{"name":"Synelixis Solutions S.A., 34100 Chalkida, Greece"}]},{"given":"Alexandra","family":"Lakka","sequence":"additional","affiliation":[{"name":"Synelixis Solutions S.A., 34100 Chalkida, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4971-826X","authenticated-orcid":false,"given":"Panagiotis A.","family":"Karkazis","sequence":"additional","affiliation":[{"name":"Synelixis Solutions S.A., 34100 Chalkida, Greece"}]},{"given":"Joao Pita","family":"Costa","sequence":"additional","affiliation":[{"name":"XLAB, SI-1000 Ljubljana, Slovenia"}]},{"given":"Eva Marin","family":"Tordera","sequence":"additional","affiliation":[{"name":"X Lab, Universidad Politecnica de Catalunya, 08034 Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5389-3285","authenticated-orcid":false,"given":"Henrique Manuel Dinis","family":"Santos","sequence":"additional","affiliation":[{"name":"ALGORITMI R&D Centre, University of Minho, 4710-057 Braga, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9717-3690","authenticated-orcid":false,"given":"Antonio Alvarez","family":"Romero","sequence":"additional","affiliation":[{"name":"Eviden, 28037 Madrid, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Karamitsios, K., and Orphanoudakis, T. (2017, January 3\u20136). Efficient IoT data aggregation for connected health applications. Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece.","DOI":"10.1109\/ISCC.2017.8024685"},{"key":"ref_2","unstructured":"European Commission (2023, November 07). TERAFLOW [Online]. Available online: https:\/\/www.teraflow-h2020.eu\/."},{"key":"ref_3","unstructured":"European Commission (2023, November 07). ENSURESEC [Online]. Available online: https:\/\/www.ensuresec.eu\/."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"nwac228","DOI":"10.1093\/nsr\/nwac228","article-title":"Experimental quantum secure network with digital signatures and encryption","volume":"10","author":"Yin","year":"2023","journal-title":"Natl. Sci. Rev."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"250801","DOI":"10.1103\/PhysRevLett.130.250801","article-title":"Experimental Quantum Communication Overcomes the Rate-Loss Limit without Global Phase Tracking","volume":"130","author":"Zhou","year":"2023","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","first-page":"021001","article-title":"Nonlocal Temporal Interferometry for Highly Resilient Free-Space Quantum Communication","volume":"13","author":"Bulla","year":"2023","journal-title":"Phys. Rev. X"},{"key":"ref_7","unstructured":"Lella, \u0399., Theocharidou, M., Tsekmezoglou, E., Malatras, A., Garcia, S., and Valeros, V. (2021). Enisa Threat Landscape for Supply Chain Attacks, ENISA."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Trakadas, P., Karkazis, P., Leligou, H.C., Gonos, A., and Zahariadis, T. (2021, January 7\u201310). Farm to fork: Securing a supply chain with direct impact on food security. Proceedings of the IEEE International Conference on High Performance Switching and Routing, Paris, France.","DOI":"10.1109\/HPSR52026.2021.9481866"},{"key":"ref_9","unstructured":"(2023, October 03). Available online: https:\/\/attack.mitre.org\/."},{"key":"ref_10","unstructured":"Jukan, A., Dizdarevi\u0107, J., and Carpio, F. (2023, September 10). D2.4 Final Architectural Design and Technology Radar. Available online: https:\/\/fishy-project.eu\/sites\/fishy\/files\/public\/content-files\/deliverables\/D2.4%20Final%20Architectural%20design%20and%20technology%20radar_v1.0.pdf."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bensalem, M., Dizdarevi\u0107, J., Carpio, F., and Jukan, A. (2021, January 7\u201310). The role of intent-based networking in ict supply chains. Proceedings of the 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR), Paris, France.","DOI":"10.1109\/HPSR52026.2021.9481801"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Santos, H., Oliveira, A., Soares, L., Satis, A., and Santos, A. (2021, January 17\u201320). Information Security Assessment and Certification within Supply Chains. Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria.","DOI":"10.1145\/3465481.3470078"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bensalem, M., Dizdarevi\u0107, J., and Jukan, A. (2022, January 23\u201327). Benchmarking various ML solutions in complex intent-based network management systems. Proceedings of the 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO55190.2022.9803584"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Settanni, F., Regano, L., Basile, C., and Lioy, A. (2023, January 19\u201323). A Model for Automated Cybersecurity Threat Remediation and Sharing. Proceedings of the 2023 IEEE 9th International Conference on Network Softwarization (NetSoft), Madrid, Spain.","DOI":"10.1109\/NetSoft57336.2023.10175486"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MNET.001.2100363","article-title":"Link Layer Connectivity as a Service for Ad-Hoc Microservice Platforms","volume":"36","author":"Gonzalez","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_16","unstructured":"(2023, October 03). Available online: https:\/\/www.sofie-iot.eu\/."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Hussain, A., Aguil\u00f3-Ghost, F., Sim\u00f3-Mezquita, E., Mar\u00edn-Tordera, E., and Masip-Bruin, X. (2023, January 17\u201320). An NIDS for Known and Zero-Day Anomalies. Proceedings of the 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain.","DOI":"10.1109\/DRCN57075.2023.10108319"}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/13\/1\/215\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:38:57Z","timestamp":1760103537000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/13\/1\/215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["electronics13010215"],"URL":"https:\/\/doi.org\/10.3390\/electronics13010215","relation":{},"ISSN":["2079-9292"],"issn-type":[{"value":"2079-9292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,3]]}}}