Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case

Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While the benefits of the automatic exchange of information between these systems h...

Full description

Bibliographic Details
Main Authors: Helen C. Leligou, Alexandra Lakka, Panagiotis A. Karkazis, Joao Pita Costa, Eva Marin Tordera, Henrique Manuel Dinis Santos, Antonio Alvarez Romero
Format: Article
Language:English
Published: MDPI AG 2024-01-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/13/1/215
_version_ 1797358964279607296
author Helen C. Leligou
Alexandra Lakka
Panagiotis A. Karkazis
Joao Pita Costa
Eva Marin Tordera
Henrique Manuel Dinis Santos
Antonio Alvarez Romero
author_facet Helen C. Leligou
Alexandra Lakka
Panagiotis A. Karkazis
Joao Pita Costa
Eva Marin Tordera
Henrique Manuel Dinis Santos
Antonio Alvarez Romero
author_sort Helen C. Leligou
collection DOAJ
description Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While the benefits of the automatic exchange of information between these systems have been recognized and have led to their interconnection, protecting the whole supply chain from potential attacks is a challenging issue given the attack proliferation reported in the literature. In this paper, we present the FISHY platform, which anticipates protecting the whole supply chain from potential attacks by (a) adopting novel technologies and approaches including machine learning-based tools to detect security threats and recommend mitigation policies and (b) employing blockchain-based tools to provide evidence of the captured events and suggested policies. This platform is also easily expandable to protect against additional attacks in the future. We experiment with this platform in the farm-to-fork supply chain to prove its operation and capabilities. The results show that the FISHY platform can effectively be used to protect the supply chain and offers high flexibility to its users.
first_indexed 2024-03-08T15:08:51Z
format Article
id doaj.art-cdc5d6abf9b3471bbe4e24d2e22b496e
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-08T15:08:51Z
publishDate 2024-01-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-cdc5d6abf9b3471bbe4e24d2e22b496e2024-01-10T14:55:15ZengMDPI AGElectronics2079-92922024-01-0113121510.3390/electronics13010215Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use CaseHelen C. Leligou0Alexandra Lakka1Panagiotis A. Karkazis2Joao Pita Costa3Eva Marin Tordera4Henrique Manuel Dinis Santos5Antonio Alvarez Romero6Synelixis Solutions S.A., 34100 Chalkida, GreeceSynelixis Solutions S.A., 34100 Chalkida, GreeceSynelixis Solutions S.A., 34100 Chalkida, GreeceXLAB, SI-1000 Ljubljana, SloveniaX Lab, Universidad Politecnica de Catalunya, 08034 Barcelona, SpainALGORITMI R&D Centre, University of Minho, 4710-057 Braga, PortugalEviden, 28037 Madrid, SpainModern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While the benefits of the automatic exchange of information between these systems have been recognized and have led to their interconnection, protecting the whole supply chain from potential attacks is a challenging issue given the attack proliferation reported in the literature. In this paper, we present the FISHY platform, which anticipates protecting the whole supply chain from potential attacks by (a) adopting novel technologies and approaches including machine learning-based tools to detect security threats and recommend mitigation policies and (b) employing blockchain-based tools to provide evidence of the captured events and suggested policies. This platform is also easily expandable to protect against additional attacks in the future. We experiment with this platform in the farm-to-fork supply chain to prove its operation and capabilities. The results show that the FISHY platform can effectively be used to protect the supply chain and offers high flexibility to its users.https://www.mdpi.com/2079-9292/13/1/215cybersecuritysupply chain systemsblockchainvalidationsecurity monitoringattack mitigation
spellingShingle Helen C. Leligou
Alexandra Lakka
Panagiotis A. Karkazis
Joao Pita Costa
Eva Marin Tordera
Henrique Manuel Dinis Santos
Antonio Alvarez Romero
Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
Electronics
cybersecurity
supply chain systems
blockchain
validation
security monitoring
attack mitigation
title Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
title_full Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
title_fullStr Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
title_full_unstemmed Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
title_short Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case
title_sort cybersecurity in supply chain systems the farm to fork use case
topic cybersecurity
supply chain systems
blockchain
validation
security monitoring
attack mitigation
url https://www.mdpi.com/2079-9292/13/1/215
work_keys_str_mv AT helencleligou cybersecurityinsupplychainsystemsthefarmtoforkusecase
AT alexandralakka cybersecurityinsupplychainsystemsthefarmtoforkusecase
AT panagiotisakarkazis cybersecurityinsupplychainsystemsthefarmtoforkusecase
AT joaopitacosta cybersecurityinsupplychainsystemsthefarmtoforkusecase
AT evamarintordera cybersecurityinsupplychainsystemsthefarmtoforkusecase
AT henriquemanueldinissantos cybersecurityinsupplychainsystemsthefarmtoforkusecase
AT antonioalvarezromero cybersecurityinsupplychainsystemsthefarmtoforkusecase