Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While the benefits of the automatic exchange of information between these systems h...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2024-01-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/13/1/215 |
_version_ | 1797358964279607296 |
---|---|
author | Helen C. Leligou Alexandra Lakka Panagiotis A. Karkazis Joao Pita Costa Eva Marin Tordera Henrique Manuel Dinis Santos Antonio Alvarez Romero |
author_facet | Helen C. Leligou Alexandra Lakka Panagiotis A. Karkazis Joao Pita Costa Eva Marin Tordera Henrique Manuel Dinis Santos Antonio Alvarez Romero |
author_sort | Helen C. Leligou |
collection | DOAJ |
description | Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While the benefits of the automatic exchange of information between these systems have been recognized and have led to their interconnection, protecting the whole supply chain from potential attacks is a challenging issue given the attack proliferation reported in the literature. In this paper, we present the FISHY platform, which anticipates protecting the whole supply chain from potential attacks by (a) adopting novel technologies and approaches including machine learning-based tools to detect security threats and recommend mitigation policies and (b) employing blockchain-based tools to provide evidence of the captured events and suggested policies. This platform is also easily expandable to protect against additional attacks in the future. We experiment with this platform in the farm-to-fork supply chain to prove its operation and capabilities. The results show that the FISHY platform can effectively be used to protect the supply chain and offers high flexibility to its users. |
first_indexed | 2024-03-08T15:08:51Z |
format | Article |
id | doaj.art-cdc5d6abf9b3471bbe4e24d2e22b496e |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-08T15:08:51Z |
publishDate | 2024-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-cdc5d6abf9b3471bbe4e24d2e22b496e2024-01-10T14:55:15ZengMDPI AGElectronics2079-92922024-01-0113121510.3390/electronics13010215Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use CaseHelen C. Leligou0Alexandra Lakka1Panagiotis A. Karkazis2Joao Pita Costa3Eva Marin Tordera4Henrique Manuel Dinis Santos5Antonio Alvarez Romero6Synelixis Solutions S.A., 34100 Chalkida, GreeceSynelixis Solutions S.A., 34100 Chalkida, GreeceSynelixis Solutions S.A., 34100 Chalkida, GreeceXLAB, SI-1000 Ljubljana, SloveniaX Lab, Universidad Politecnica de Catalunya, 08034 Barcelona, SpainALGORITMI R&D Centre, University of Minho, 4710-057 Braga, PortugalEviden, 28037 Madrid, SpainModern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While the benefits of the automatic exchange of information between these systems have been recognized and have led to their interconnection, protecting the whole supply chain from potential attacks is a challenging issue given the attack proliferation reported in the literature. In this paper, we present the FISHY platform, which anticipates protecting the whole supply chain from potential attacks by (a) adopting novel technologies and approaches including machine learning-based tools to detect security threats and recommend mitigation policies and (b) employing blockchain-based tools to provide evidence of the captured events and suggested policies. This platform is also easily expandable to protect against additional attacks in the future. We experiment with this platform in the farm-to-fork supply chain to prove its operation and capabilities. The results show that the FISHY platform can effectively be used to protect the supply chain and offers high flexibility to its users.https://www.mdpi.com/2079-9292/13/1/215cybersecuritysupply chain systemsblockchainvalidationsecurity monitoringattack mitigation |
spellingShingle | Helen C. Leligou Alexandra Lakka Panagiotis A. Karkazis Joao Pita Costa Eva Marin Tordera Henrique Manuel Dinis Santos Antonio Alvarez Romero Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case Electronics cybersecurity supply chain systems blockchain validation security monitoring attack mitigation |
title | Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case |
title_full | Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case |
title_fullStr | Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case |
title_full_unstemmed | Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case |
title_short | Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case |
title_sort | cybersecurity in supply chain systems the farm to fork use case |
topic | cybersecurity supply chain systems blockchain validation security monitoring attack mitigation |
url | https://www.mdpi.com/2079-9292/13/1/215 |
work_keys_str_mv | AT helencleligou cybersecurityinsupplychainsystemsthefarmtoforkusecase AT alexandralakka cybersecurityinsupplychainsystemsthefarmtoforkusecase AT panagiotisakarkazis cybersecurityinsupplychainsystemsthefarmtoforkusecase AT joaopitacosta cybersecurityinsupplychainsystemsthefarmtoforkusecase AT evamarintordera cybersecurityinsupplychainsystemsthefarmtoforkusecase AT henriquemanueldinissantos cybersecurityinsupplychainsystemsthefarmtoforkusecase AT antonioalvarezromero cybersecurityinsupplychainsystemsthefarmtoforkusecase |