Next Article in Journal
Automatic Crop Canopy Temperature Measurement Using a Low-Cost Image-Based Thermal Sensor: Application in a Pomegranate Orchard under a Permanent Shade Net House
Previous Article in Journal
Proactive Fault Prediction of Fog Devices Using LSTM-CRP Conceptual Framework for IoT Applications
Previous Article in Special Issue
Adaptation of IoT with Blockchain in Food Supply Chain Management: An Analysis-Based Review in Development, Benefits and Potential Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System

Department of Computer Science, Kyonggi University, Suwon-si 16227, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(6), 2914; https://doi.org/10.3390/s23062914
Submission received: 27 January 2023 / Revised: 25 February 2023 / Accepted: 6 March 2023 / Published: 8 March 2023
(This article belongs to the Special Issue Blockchain Security and Its Application in Internet of Things)

Abstract

:
Current railroad customs clearance systems are problematic in that the movement of trains is occasionally restricted for extended periods during inspections to verify cargo integrity at customs clearance. Consequently, significant human and material resources are consumed to obtain customs clearance to the destination, considering different processes exist for cross-border trade. Therefore, we developed a cross-border blockchain-based non-stop customs clearance (NSCC) system to address these delays and reduce resource consumption for cross-border trains. The integrity, stability, and traceability of blockchain technology are used to construct a stable and reliable customs clearance system to address these problems. The proposed method connects diverse trade and customs clearance agreements in a single blockchain network, which ensures integrity and minimal resource consumption, and includes railroads, freight vehicles, and transit stations in addition to the current customs clearance system. The integrity and confidentiality of customs clearance data are protected using sequence diagrams and the blockchain to strengthen the resilience of the NSCC process against attacks; the blockchain-based NSCC system structurally verifies the attack resilience based on matching sequences. The results confirm that the blockchain-based NSCC system is time- and cost-efficient compared with the current customs clearance system and offers improved attack resilience.

1. Introduction

Cross-border freight transport by rail needs to undergo customs clearance at the border. The clearance process is time-consuming and requires considerable human and material resources. Furthermore, the rail freight agreements between different countries differ from each other [1], with several different consultative bodies responsible for handling the consultation, data integrity, and border delay problems associated with customs clearance processes. In this study, we developed a blockchain-based [2,3,4] border non-stop customs clearance (NSCC) system as a solution to these issues. Trains and freight cars need equipment to operate in a network because NSCC is required to ensure the integrity of goods. In this study, we refer to a setting in which the Internet of Things (IoT) is implemented on trains and freight vehicles [5,6]. Specifically, the cross-border NSCC system overlays a blockchain network on top of the current customs clearance system and uses the combined system as a blockchain platform [2,3,4] within the IoT context. Blockchain technology can address the issue of potential data breaches in cross-border customs clearance because it offers integrity, reliability, and traceability, while also providing the ability to track freight and trains for customs clearance purposes and ensure the reliability of data [7,8,9]. A suitable consensus algorithm for the border NSCC system developed in this study was selected based on previous research [10,11]. A basic attack scenario based on MITRE ATT&CK [12,13,14] was also built to create the NSCC system attack and defense functionality using blockchain technology. Consequently, measures for safeguarding the integrity and confidentiality of the NSCC process were developed, with cyberattacks to which the NSCC is vulnerable actively pre-empted. The structural benefits of NSCC are demonstrated by developing blockchain-based attack resilience [15] and a sequence diagram [16].
The existing customs clearance process transmits customs clearance data using the server–client method, and human resources directly validate cargo integrity. However, NSCC transmits data in a P2P system, with cargo integrity easily checked using the hash function. In addition, compared to the existing customs clearance system, which requires trains to stop at stations, NSCC improves efficiency because it inspects cargo integrity while the train is underway, making this operation the first example of NSCC procedure using blockchain for international rail freight transportation. In addition to resolving the problems associated with the current customs clearance system, the issue of data integrity while the data are being transferred from customs clearance can also be structurally resolved. Furthermore, a blockchain can be effectively applied to other domains because the developed blockchain-based NSCC system offers resilience to common attack scenarios and structural advantages. By utilizing blockchain-based NSCC, a plan was proposed to ensure cyber resilience against attacks targeting station and train nodes that participated in existing customs clearance procedures. In this study, we experimented with the cyber resilience environment that blockchain structurally provides and applied it to existing customs procedures, which enabled us to confirm the structural advantages of blockchain-based NSCC by constructing attack–response scenarios.
The remainder of this article is organized as follows: The structural resilience and consensus process of a blockchain is briefly described in Section 2. The consensus algorithm selected for utilization in this study is discussed, and MITRE ATT&CK is described to structurally prove the attack resilience of the NSCC system. Section 3 presents the designed blockchain-based border NSCC system, and Section 4 discusses the use of a sequence diagram to demonstrate the attack resilience of NSCC, which is the main topic of this study. Section 5 provides the experimental results of NSCC using Simulation of Urban Mobility (SUMO) [17], Docker, and Ethereum [18]. A summary table that explains the current customs clearance system and blockchain-based NSCC system is also presented. Finally, a discussion and the conclusion are presented in Section 6 and Section 7, respectively.

2. Related Work

In this study, we develop a blockchain-based NSCC system and demonstrate its structural attack resilience using a blockchain, its consensus algorithm, and an attack sequence diagram created with MITRE ATT&CK. In this section, we discuss relevant prior studies and present a method that applies to this study.

2.1. Structural Attack Resilience of Blockchain

In this section, we describe the structural resilience of a blockchain, including the structural benefits of using a blockchain with the NSCC system, as well as the background of this study. A blockchain is a distributed ledger technology in which every node connected to the blockchain network owns the same ledger and is structurally resilient to data forgery, denial of service (DoS) [19], and availability attacks. Consequently, if data forging occurs at one node, accessing another node allows the original ledger to be restored, and data remain preserved until no further nodes remain. Specifically, data robustness can be maintained even if only one node participates in the blockchain network [20].
One drawback of blockchain technology is that it cannot be utilized in various applications currently in operation in the industry. At present, efforts are ongoing in numerous domains to introduce blockchain technology into conventional industries; however, introducing a blockchain structurally is problematic. Incorporating a blockchain in conventional industries is time-consuming because of the high initial introduction cost. Moreover, an attack can target a blockchain network while it is transmitting, receiving, and distributing data when blockchain technology and older systems are combined. However, in this study, we assume that trains, freight cars, and customs clearance stations comprise one IoT node environment. Moreover, we utilize the structural advantages of a blockchain to demonstrate resilience to various attacks targeting industrial networks. In addition, we identify methods to utilize blockchain technology in various industrial domains.

2.2. Comparison of Consensus Algorithms and Their Application Domains

In this study, we develop a blockchain-based NSCC system. An integrated higher-level decision-making process is necessary because the NSCC system is a new consensus body created by the collaboration of numerous consensus bodies. To choose the best blockchain consensus algorithm for NSCC, we compare four primary consensus algorithms: proof of work (PoW), proof of activity (PoA), proof of stake (PoS), and delegated PoS (DPoS). Table 1 lists the existing consensus algorithms identified by referring to articles that compared and analyzed several consensus techniques. Table 1 presents PoS, chosen as the consensus technique to be implemented in the proposed blockchain-based NSCC. One drawback of PoW is that it is challenging to introduce in different nations owing to the significant reliance of NSCC on hardware. Additionally, PoA and DPoS are consensus algorithms investigated to compensate for the drawbacks of PoW and PoS, although they are less scalable than PoS. PoS with high scalability is more appropriate for NSCC because it requires the participation of numerous nations and councils. PoS must be required by some validation nodes on the blockchain network. Hence, each node that participates in NSCC must be a validation node, e.g., nations and councils.
To construct a blockchain-based NSCC system, this study chooses the PoS consensus algorithm and obtains consensus from each nation and consultative body. Railway cooperation organizations, such as the Organization for Cooperation of Railways (OSJD) [34] and the Organization for International Carriage by Rail (OTIF) [35], also have freight transport agreements, known as the Agreement on the International Goods Transport by Rail and the Uniform Rules Concerning the Contract of International Carriage of Goods by Rail [36]. The consensus algorithm of a blockchain is similar to a cargo transportation agreement because it is a mechanism that moves forward with customs clearance by evaluating the interests of each country. All consensus algorithms were introduced in various application domains except the railroad industry. Furthermore, because a blockchain uses a consensus algorithm to make decisions, an attack directed at the current network can occur while disseminating the consensus results, instead of the consensus algorithm. Therefore, in this study, we develop a strategy to introduce PoS into the railroad industry, structurally construct a blockchain-based NSCC system, and combine many railroad cooperation groups, such as the OSJD and OTIF, into one consensus system. The NSCC attack–response sequence for a network and cyber threats outlined in Section 2.3 are defined and detailed in Section 4.

2.3. Using MITRE ATT&CK

The MITRE organization created MITRE ATT&CK in response to the expansion of the influence of and harm inflicted by cross-border cyberattacks [12,13,14]. The adversarial tactics, techniques, and common knowledge (ATT&CK) framework is a phase of the cyber kill chain model [37] internally designed and arranged based on actual attack cases in MITRE. MITRE ATT&CK is a database consisting of standard data produced by analyzing the adversarial behaviors of attackers from the standpoint of attack tactics and techniques, achieved by observing actual cyberattacks and then classifying and cataloging the attack techniques of various attack groups. MITRE ATT&CK is the result of patterning threatening tactics and techniques to improve the detection of intelligent attacks, taking a slightly different perspective from the traditional cyber kill chain concept. At MITRE, development of the ATT&CK framework initially began by recording tactics, techniques, and procedures (TTPs) relating to hacking attacks employed in the Windows corporate network environment before evolving into a framework that can recognize the behavior of an attacker by mapping TTP information based on studying consistent attack behavior patterns generated by attackers.
In this study, we build a blockchain-based NSCC system attack and defense scenario and demonstrate its attack resilience by applying attack scenarios and sequences created using matrices of MITRE ATT&CK. In conventional security studies, the attack life cycle is depicted as a sequence diagram. We demonstrate the attack resilience of the NSCC developed in this study using this attack sequence diagram. Attack sequence diagrams are frequently used in academic research to support and demonstrate the reliability of networks and systems. By employing a DoS attack against the voice-over-internet protocol [38] environment, for instance, the robustness of the environment, in terms of availability to provide services, can be demonstrated [39].
In this study, an attack sequence diagram is established and used for process analysis to demonstrate the attack resilience of the developed blockchain-based NSCC system. A sequence is constructed in accordance with the basic NSCC process, while the attack life cycle is developed by selecting a random attack point in the sequence.

3. Non-Stop Customs Clearance Using Blockchain

The border NSCC system operates in areas in the vicinity of stations located on the borders between different countries. The system is implemented by configuring the blockchain network and enabling data transmission between trains and transit stations that belong to different networks. As shown in Figure 1, a train travels from country A to country B, with network interworking between base stations a and b assumed to be automatic in this process. Go-Ethereum (Geth) blockchain network interworking, required for the border NSCC system to progress, uses a Docker container [40] in the machine of every transit station and train node. Geth software is needed to function as the Ethereum node in the Ethereum network [41]. Considering the Simulation of Urban Mobility (SUMO) framework can simulate the actual traffic environment, it was used to simulate the role of the train in this study. SUMO runs inside the Docker container of the train, with the customs clearance process conducted using communication linking the IP address and port number between Docker containers.
The process developed in this study enables trains to proceed through customs clearance without stopping between transit stations; in addition, the attack resilience is structurally demonstrated. To proceed through Station 2 in country B, a train that already passed through Station 1 communicates the information required for NSCC. After receiving it, Station 2 checks the integrity of the data by comparing it to the hash value [42,43] of the data stored in the current blockchain network. The hash value for the cargo specs is broadcast to the blockchain network and other transit stations during the departure process once the cargo is loaded on the train at the original departure point. Cargo integrity is examined by contrasting the hash value transmitted with the hash value of the data propagated throughout the process of passing through each transit station. The hash value of the data is compared with the hash value recorded on the blockchain, and if no discrepancies are found, the NSCC process continues. If a problem arises, the train and its cargo are inspected using the existing customs clearance process.
The operation of the NSCC system is described in Section 3.1, with the network setup needed to use the blockchain defined and explained in Section 3.2.

3.1. Procedure of Blockchain-Based Non-Stop Customs Clearance System

The NSCC process is divided into five individual steps, as shown in Figure 2, where each step is described. NSCC uses distributed storage as its data storage process because it utilizes a blockchain network [44]. Data are logged using the distributed storage system known as the interplanetary file system [45,46,47], and data comparison and verification are conducted. Data are recorded and stored using distributed storage, a network of distributed nodes. Consequently, every train node and transit station node involved in the blockchain network participates in the distributed storage system. For the comparison–verification process, the customs clearance data are uploaded to the distributed storage and encrypted using the hash function. The respective steps of the process are shown in Figure 2.
  • (Step 1) Enter and transact: A train node approaches a station node by this process to conduct the NSCC process. The customs clearance data (raw data) are processed by the train node and sent to the station node for customs clearance. This process employs a security network (e.g., a virtual private network) that utilizes the base station of each country [48,49].
  • (Step 2) Receive and hash: Data from the train node are relayed to the station node, which hashes the data using a hash function. The calculated hash value is compared and validated in Step 3. The hash function to be used at this point is chosen from SHA-256 [50] or Keccak-256 [51] and applied throughout the customs clearance process.
  • (Step 3) Compare: The station node compares the hash value of the hashed data with that of the initial customs clearance data generated when the cargo was initially loaded. The hash value uploaded to the distributed storage is currently compared with that produced by the station node based on the transaction recorded in the blockchain. The results of the comparison are broadcast in Step 4.
  • (Step 4) Broadcast: The success of the NSCC process is determined by comparing the hash value produced by the station node to that in the distributed storage. Subsequently, the train node decides on whether to proceed. If the hash value of the distributed storage that already exists differs from that generated in the relevant station node, the train proceeds in accordance with the existing customs clearance procedures. If the two hash values correspond, indicating that no irregularities exist with the data or cargo, the train node passes through without stopping. The passing information is broadcast to other stations and train nodes.
  • (Step 5) Dashboard: A dashboard displays the NSCC-related data. The visualized data can be examined and subsequently analyzed. The corresponding dashboard of each node allows users to view information about the blockchain network and hardware resources.
Potential attack points for each node, component, interface, and layer that constitute NSCC are shown in Figure 2 and Figure 3. Points A, B, and C represent potential weak points vulnerable to attacks, which can be attacked by hostile attacker nodes intending to damage the NSCC network and systems. Attacks on NSCC-related data and communications are possible through these points. In this study, we use the properties of the blockchain to structurally demonstrate the attack resilience of points A, B, and C. In Figure 3, target, network, and storage are the three potential attack layers, with an attack scenario created by setting an attack sequence diagram of the respective points. The data shown in Figure 3 can be breached and stolen by the blockchain-based NSCC based on the configured scenario.
For instance, if the station in Figure 2 is attacked, data relevant to customs clearance can be compromised, making the customs data verification process vulnerable to attacks. In the event of an attack, significant issues, such as time delays and misjudgment can occur during the customs clearance process. Moreover, sensitive data can be compromised because the customs clearance process follows an international consensus procedure. However, the attack resilience of the customs clearance node is structurally proven by the developed NSCC sequence diagram, with the method for securing resilience explained using security elements as an example.

3.2. Network Configuration of Blockchain-Based Non-Stop Customs Clearance System

This section describes the organizational structure of the blockchain network, and the manner data are sent to and received from the network via an existing railway network. The structure of the blockchain-based NSCC network is depicted in Figure 4, with the NSCC sequence technique from the perspective of each node summarized in Table 2. The detailed explanation is as follows:
The network for NSCC based on a blockchain, shown schematically in Figure 4, indicates that each IP address uses the same subnet mask because when setting up the experimental environment, the network is configured utilizing many Docker containers inside a single machine. The IP information of each node is expressed differently during the actual NSCC application process. For example, Stations A and B have static IP addresses of 242.42.25.65 and 103.132.54.12, respectively. Furthermore, the port number increases sequentially, as shown in Figure 4; however, when NSCC is applied, appropriate port numbers, such as 9090 and 7897, can be assigned to each node.
The number of connected nodes is also changed if NSCC is applied to customs clearance. The network includes the customs clearance nodes from 29 OSJD and 51 OTIF member countries, assuming that the present customs clearance offices in border areas are participating (as of December 2022) [52]. As more member nodes join the blockchain network, it becomes more stable. Therefore, the NSCC network has high robustness, and the maturity of each node increases with the number of consultative bodies and countries participating in NSCC.
A summary of each process depicted in Figure 4 is provided in Table 2, as identified by the process number. This process is more difficult than the current railroad customs clearance system because data broadcast from a train to a transit station uses network connection protocols and interfaces. An attacker can target the network, trains, and transit stations in this process. Sequence diagrams are used in this study to describe the basic flow of this process. In addition, each attack–defense phase is defined and the structural resilience of the blockchain-based NSCC system is demonstrated.

4. Attack Resilience in Blockchain-Based Railway

A sequence diagram for basic customs clearance is defined and systematically discussed in Section 4.1. In addition, the potential attack time and method, which are the focal elements of this study, are presented in Section 4.2, where the attack–response sequence diagram is defined. The procedures for attack, response, and analysis are described. The attack–response sequence diagram constructed based on potential attack points A, B, and C is depicted in Figure 2 and Figure 3.

4.1. Basic Sequence of Blockchain-Based Non-Stop Customs Clearance

The basic flow of the developed blockchain-based NSCC is shown in Figure 5. When the initial cargo information is transmitted to the blockchain network at a shipping point, the transaction status and block in the blockchain are returned. Once the cargo is recorded in the blockchain network, the train departs for the transit station. When the train passes through this transit station, data pertaining to customs clearance are broadcast to the station and verified. The verification process corroborates the integrity of the cargo based on the data already recorded in the blockchain network. A hash function is used to readily and rapidly substantiate the customs data, as shown in Figure 2.
The sequence diagram shown in Figure 5 only depicts the basic customs clearance process of NSCC, with additional details of each step omitted for clarity. Furthermore, all ‘Station’ mentioned below are categorized as customs clearance station nodes according to Figure 5. As the diagram is intended to indicate the steps involved in the automatic generation of data recorded throughout the transaction and block creation process of each blockchain and the verification process at each transit station, the processes related to distributed storage are not shown here.
Given that a blockchain is a platform that offers integrity and reliability, the NSCC process can be conducted by relying on these features of a blockchain for customs clearance in trains and transit stations. As presented in Section 4.2, an attack–response sequence is added to the basic NSCC sequence to reinforce the structural robustness of the NSCC and ensure the cyber resilience of the blockchain-based NSCC.

4.2. Attack Sequence of Blockchain-Based Non-Stop Customs Clearance with Attack Resilience

The attack–response sequence diagram for the potential attack points of the blockchain-based NSCC system, which is the main concept of this research, is presented in this section. The entire sequence demonstrates that the blockchain structurally has attack resilience, with an attacker performing an attack sequence against a victim and the victim responding in correspondence with the sequence. As defined in Figure 5, a customs clearance station node is referred to as a Station.

4.2.1. Attack Sequence A: Attacking Clearance Station Node Using DoS

Blockchain-based NSCC technology is robust and has attack resilience in terms of the availability of customs clearance. In this sequence, an attacker targets Station A with a DoS [19] attack. We utilize the structural benefits of the blockchain to defend the system against this attack.
  • Attack sequence: One of the potential attack points indicated in Figure 2 and Figure 3 is transit Station A, through which the train is expected to pass. An attacker prepares a DoS attack against this target. In addition to overloading the network communication of transit Station A by packet fragmentation, the attacker sends a request to establish socket communication to transit Station A [53]. Accordingly, the train waits at the station without transmitting a request to pass through after receiving data relating to customs clearance and completing the verification process. Thus, the attacker keeps transit Station A overloaded to perform DoS attacks and delay customs clearance.
  • Corresponding sequence: As the train node cannot receive permission to pass through transit Station A, it sends a request to other nearby transit station nodes for customs clearance. When transit Station B receives a request for customs clearance, the train is granted permission to pass through Station B, and the train is processed for passage through transit Station A in accordance with the existing customs clearance sequence.
  • Analysis and discussion: A flowchart based on the attack–response scenarios for DoS attacks is shown in Figure 6. As all trains and transit station nodes are connected to the blockchain network, no problems occur when clearance is requested from and processed by transit Station B. If the integrity of the data transmitted from the train can be verified, the train can pass through the customs clearance station without stopping. Thus, the system is designed to enable other trusted customs clearance nodes to handle the data verification process. The attacker targets the availability of the NSCC; however, it offers resilience against these attacks because only one blockchain network is used. As the blockchain network is structurally designed to ensure the reliability and integrity of recorded transactions, even if additional nodes participate in the verification process, the reliability of the verification is ensured.

4.2.2. Attack Sequence B: Attacking Distributed Storage Using Spoofing Attack

In terms of the data integrity and reliability of customs clearance, the developed blockchain-based NSCC is attack-resilient and robust. In this sequence, an attacker conducts a spoofing attack [54] targeting the distributed storage. The structural benefits of the blockchain are utilized to defend against this attack.
  • Attack Sequence: Figure 7 shows the approach followed to target and attack the distributed storage system of the blockchain-based NSCC. An attacker confounds the sender by spoofing the domain address and routing details to connect to the distributed storage at B, a potential attack point, as depicted in Figure 2 and Figure 3. Customs documents are sent to transit Station A by train. Transit Station A utilizes the distributed storage and transaction data on the blockchain network to verify them. During this process, the attacker transfers arbitrary data while changing the routing table of transit Station A to enable the attacker to appear as the distributed storage. Data inconsistency occurs because transit Station A undertakes the verification process based on the data sent by the attacker; consequently, the NSCC process cannot be implemented.
  • Corresponding sequence: Transit Station A analyzes the distributed storage data for inconsistencies and compares them to transactions [55] on its own local blockchain ledger. After the first verification, a secondary verification is conducted with the transaction data of the actual blockchain network because the hash value of the customs clearance data is present in the transaction data. Transit Station A updates the routing table and broadcasts permission for the train to pass through after verifying that the data from the blockchain network correspond with the customs clearance data. The sequence is completed after the customs clearance is recorded on the blockchain network.
  • Analysis and discussion: An attack that targets the routing database occurs when a transit station is proceeding with verification. The distributed storage and blockchain network transactions contain the data needed for verification, and any data inconsistencies can be determined in the event of an attack directed against the distributed storage. In this case, the blockchain network is accessed to verify data because every participating node has the same ledger. The blockchain platform structurally ensures integrity, reliability, and traceability because all participating nodes share the same ledger. These features of the blockchain can be used to safely conduct the data verification process.

4.2.3. Attack Sequence C: Attacking Clearance Station Nodes Using Advanced Persistent Threat and Backdoor Attacks

In terms of data integrity and customs clearance resilience, NSCC based on blockchain technology is attack-resilient and robust. In this sequence, an attacker targets Station A using advanced persistent threat (APT) [56] and backdoor [57] attacks. These attacks are warded off by utilizing the structural benefits of the blockchain.
  • Attack sequence: The attacker is based at potential attack point C, as shown in Figure 2 and Figure 3. The process before the attack is the same as the basic NSCC process. However, when a train departs, the attacker designates the transit station along the route as a target, launches an APT attack, and simultaneously inserts a backdoor. If the attack is successful, the attacker can control the root authority of transit Station A [58] and modify the transaction data of the blockchain. Subsequently, a discrepancy arises between the data transmitted and received by the train during the verification of customs clearance data with transit Station A.
  • Corresponding sequence: The train that is refused customs clearance sends its request for permission to pass through to nearby transit Station B. The customs clearance data are checked at transit Station B, which responds with the necessary permission for customs clearance. Furthermore, data sync to transit Station B is requested to restore the blockchain transaction data of transit Station A, which is falsified. To recover the transaction data of transit Station A and conduct its ledger sync process, transit Station B and other transit stations transfer the entire blockchain data to transit Station A, which can re-participate in the customs clearance process.
  • Analysis and discussion: Root access can be hijacked using numerous methods. Figure 8 shows a straightforward example of backdoor injection via an APT attack. A transit station with social engineering issues is vulnerable to root authority hijacking attacks. This attack falsifies the blockchain data of a transit station node and interferes with customs clearance. Owing to the structural features of the blockchain, data can be restored even if the blockchain data inside one node are altered. All nodes included in the blockchain can participate in the consensus process, as shown in Figure 6. Consequently, transit Station B is required to continue with customs clearance.

5. Experimental Results

In this section, we describe the simulation of the environment in Figure 1 using SUMO, Docker, and Ethereum for experiments, explain the blockchain-based NSCC, and demonstrate the advantages of the approach followed in this study. In addition, the conventional concept of a blockchain is explained, and the quantitative and qualitative metrics used when a blockchain is integrated into the customs clearance system are presented. Table 3 provides information about the software versions and status information of the experimental environment.

5.1. Experiments and Materials

In this study, the NSCC environment was constructed using SUMO, Docker, and Ethereum, with the final experimental results of the NSCC derived based on the experimental results of each component. SUMO makes it possible to simulate the navigation of a given road network by single vehicles in response to a given traffic demand. The simulation is purely microscopic: each vehicle is modeled explicitly, has its own route, and navigates the network individually. Therefore, we used SUMO to derive the travel route and the timing of the train on the railroad. In addition, NSCC was implemented using Docker to configure the train and station as one node, while Geth was used to implement the blockchain network. Figure 9 shows the structure of our experimental environment.
Station and Train nodes are implemented as a single Docker container; considering they are implemented on a single local machine for experimentation, they all have the same IP address and different port numbers. However, in a real environment, all nodes have different IP addresses and port numbers. Each node was composed of Geth nodes to connect to the Ethereum network; in the case of the Train node, the SUMO client was run inside the Docker container to serve as a train in this experiment. Each Docker container communicates using the IP address and port number. During the communication process, the Docker container transmits and receives data, interlocks with the Ethereum network, and propagates transactions and blocks. In this study, using SUMO, the NSCC was tested for a simulation involving trains moving between Kazakhstan and Mongolia. Table 4 shows the values and parameters required for the experiment. The train departed from Station 1, a customs clearance station in Mongolia, and traveled to Station 2, a customs clearance station in Kazakhstan, at approximately 150 km/h.
Figure 10 shows the SUMO-based simulation environment, with Kazakhstan to the left of the red line and Mongolia to the right. We simulated a train traveling from Station 1 in Mongolia to Station 2 in Kazakhstan. Specific information is listed in Table 4, with the train movement and NSCC procedures tested in this environment. The steps indicated below the figure correspond to Steps 1–4 described in Figure 2. Step 0 involves the train moving from Station 1 to Station 2. While the train is underway, in Step 1, data related to customs clearance are transmitted to the station. In Step 2, the station proceeds with hashing based on the received data. In Step 3, the station compares and verifies the data integrity based on the hash value of the data. In Step 4, the station propagates the final verification result to other station and train nodes. The novelty of this study is that after reducing the speed to a minimum from Step 1 to Step 4, the train passes through the station. In the case of the existing customs clearance procedure, it is necessary to stop at the station to allow the cargo to be inspected. In contrast, the proposed basic methodology for our blockchain-based NSCC enables the train to pass through the station without stopping after cargo integrity is verified.

5.2. Results of Blockchain-Based NSCC

This study developed a solution to the problem of time delays caused by the need to obtain customs clearance, consumption of human and material resources, and reliability and integrity of customs clearance of the existing customs clearance system. The system utilizes a Bitcoin-derived blockchain [22]. A blockchain is a peer-to-peer-based system in which distributed nodes share a single ledger [59], and is characterized by integrity, reliability, and traceability. Data integrity can be realized by alerting other nodes when data are forged because nodes are distributed and share the same ledger. Additionally, data are recorded in a setting that ensures integrity. The reliability of previously created data and blocks increases if data are transmitted because transactions and blocks are continuously created by a verification process. Owing to their integrity and reliability, data continually entered into the ledger on a blockchain cannot be falsified. Therefore, the traceability of all data can also be guaranteed.
The average processing times for Step 1 to Step 4 are listed in Table 5. The amount of data allowed per transmission in the process is limited to a maximum of 1000 MB. In Step 1, data are propagated using a VPN environment, which takes a maximum of 10 min based on the minimum data propagation speed over the network. Step 2 takes a maximum of 1 min based on the minimum execution time of SHA-256, which is 20 Mbps in size, to derive a hash value using the SHA-256 hash function after receiving the data. Step 3 takes a maximum of 10 min based on the minimum download speed of 1 Mbps from IPFS to perform the comparison verification based on the data stored in IPFS. Finally, when the verification process is completed based on the customs clearance data, it takes a maximum of 10 min to verify transactions and propagate blocks using the PoW consensus algorithm in the Ethereum-based PoW environment, calculated at 11 TPS. Therefore, the overall process takes a maximum of 31 min to complete if no problems arise. However, considering that connection to the blockchain may involve delays or disconnections depending on the network environment, a maximum of 1 h is considered necessary to enable these issues to be resolved [60].
Using these features of a blockchain network and software, we created a “blockchain-based border NSCC” system in this study and tested its resilience against attacks. The main contributions of this study and the differences between the developed NSCC and current customs clearance systems are discussed below.
Table 6 compares the traditional customs clearance system with the blockchain-based NSCC system. The six criteria used for comparison are time, resource, integrity, reliability, transparency, and traceability. The respective criteria are described as follows:
  • Time: The current customs clearance process is time-consuming because individuals have to directly inspect customs clearance items and cargo. However, with NSCC, customs clearance can be completed in as little as 1 h if the validity of the customs documents is not questionable.
  • Resource: In the current customs clearance system, people directly participate in customs clearance and personally inspect the goods and cargo. However, resource consumption is minimal because the accuracy of the customs data is verified by machine. Customs clearance is conducted by verifying the integrity using the hash value of the data, which is broadcast to the blockchain network.
  • Integrity: Data integrity is safeguarded by the distributed ledger technology used in the blockchain. However, data forgery and tampering can occur because documents are stored in a database and written by hand in the current customs clearance system.
  • Reliability: The current customs clearance system assumes that the people participating in customs clearance are reliable. However, the blockchain-based NSCC system can structurally ensure reliability.
  • Transparency: The blockchain-based NSCC guarantees that the customs clearance process remains transparent. The participation of each of the member countries in verification and customs clearance enables transparent data management. However, the transparency of the current customs clearance process cannot be ensured because of possible threats by malicious attackers.
  • Traceability: The current customs system tracks data to documents and databases. However, the blockchain-based NSCC uses a distributed storage and blockchain network to track every step of the continuous customs clearance process from shipment to unloading.
The comparison in Table 6 shows that blockchain-based NSCC guarantees integrity, reliability, and traceability, reduces the need for human resources, and shortens the time required for customs clearance. In addition, our solution based on the consensus algorithm of the blockchain integrates the interests of existing railway cooperation agreements and organizations, such as OSJD and OTIF. However, the blockchain-based NSCC system is still vulnerable to APT and network attacks aimed at legacy systems, which prompted us to consider the attack resilience of NSCC, as demonstrated in Section 4, using sequence diagrams to provide a structural explanation. Section 6 and Section 7 outline the limitations and future research directions.

6. Discussions

In this study, we developed a blockchain-based NSCC system intended as a new customs clearance mechanism with structural robustness and attack resilience. As demonstrated in Section 4, existing customs clearance systems are vulnerable to DoS, APT, and spoofing attacks. The proposed blockchain-based NSCC system includes a method to solve the above-mentioned problems based on the integrity and reliability provided by the blockchain. In addition, the efficiency of the customs clearance process was maximized by reducing the time required for the customs clearance procedure to 1 h. However, real measurements are challenging and significant system resources are required to implement the sequences, as described in Section 4. In the future, each of these sequences can be investigated and additional vulnerabilities to cyberattacks could be considered, with attack sequences tested by modeling and simulation (M&S) [65,66,67]. In this study, the current railroad customs clearance system was set up as an overlay network for the developed blockchain-based NSCC system. The integrity and reliability offered by a blockchain can be ensured when configured as an overlay. However, because each train and transit station node participates as nodes in the blockchain network, machine resources unnecessary in the conventional customs clearance system are required. Our choice of a PoS-based consensus algorithm minimizes the use of computational resources. We plan to perform M&S for each potential consensus method in our next study.
This study was conducted based on an IoT-based network environment. Further research on IoT and artificial intelligence (AI)-based block seals and smart container capabilities [68] for inspecting cargo integrity is required, which we plan to incorporate in future studies. Concepts of IoT-based block seals and AI can be used to actively inspect cargo integrity in terms of damage and movement. This study is the first step toward proposing a blockchain-based customs clearance procedure. The most important aspect of this study is that we introduced blockchain into the existing railway customs clearance process to maximize the efficiency of the international railway customs clearance process.

7. Conclusions

This study involved developing a blockchain-based NSCC system and structurally demonstrating its resilience to cyberattacks. Cyberattacks aimed at legacy systems can occur because the NSCC system combines a blockchain with the legacy customs clearance system. However, an attack–response sequence diagram was used to demonstrate that cyberattack resilience can be secured by employing the integrity, reliability, and traceability features of the blockchain.
Compared to the current customs clearance methods, the blockchain-based NSCC system excels in terms of integrity, security, and reliability. Reducing the time required for customs clearance can improve the performance of the freight transportation sector using railroads for cross-border trade. Consequently, the developed customs clearance method uses fewer materials and people overall. This study demonstrated the versatility of blockchain technology and its implications for maritime and aviation trade and the customs clearance system for cross-border railroad transport.
This work demonstrated the compatibility of blockchain with traditional systems. Future research could employ trade domains, such as land, sea, and air. The blockchain-based NSCC system proposed in this study can also be improved using IoT and AI-based object recognition systems to verify cargo integrity. Furthermore, M&S of the NSCC system can be conducted based on the created attack–response sequence diagram presented in Section 4 to appropriately apply the environment, such as the consensus algorithm and network protocol. The defense system utilizing MITRE D3FEND can also be extended [69]. Moreover, simulating the connection between the actual train model and IoT equipment based on the experiment conducted in Section 5 could be explored further.

Author Contributions

Conceptualization, S.K. and D.K.; software, S.K.; sequence diagram, S.K. and D.K.; validation, S.K. and D.K.; investigation, S.K.; resources, S.K.; writing—original draft preparation, S.K. and D.K.; writing—review and editing, S.K. and D.K.; attack scenario, S.K. and D.K.; supervision, D.K.; project administration, S.K. and D.K.; funding acquisition, D.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This study was supported by a Kyonggi University Research Grant (2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Abramović, B.; Zitricky, V.; Biškup, V. Organisation of railway freight transport: Case study CIM/smgs between Slovakia and Ukraine. Eur. Transp. Res. Rev. 2016, 8, 27. [Google Scholar] [CrossRef] [Green Version]
  2. Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain technology overview. arXiv 2019, arXiv:1906.11078. [Google Scholar]
  3. Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352. [Google Scholar] [CrossRef]
  4. Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [Google Scholar] [CrossRef]
  5. Li, S.; Xu, L.D.; Zhao, S. The internet of things: A survey. Inf. Syst. Front. 2015, 17, 243–259. [Google Scholar] [CrossRef]
  6. Rose, K.; Eldridge, S.; Chapin, L. The internet of things: An overview. Internet Soc. 2015, 80, 1–50. [Google Scholar]
  7. Zikratov, I.; Kuzmin, A.; Akimenko, V.; Niculichev, V.; Yalansky, L. Ensuring data integrity using blockchain technology. In Proceedings of the 20th Conference of Open Innovations Association (FRUCT), St. Petersburg, Russia, 3–7 April 2017; Volume 2017. [Google Scholar] [CrossRef]
  8. Galvez, J.F.; Mejuto, J.C.; Simal-Gandara, J. Future challenges on the use of blockchain for food traceability analysis. TrAC Trends Anal. Chem. 2018, 107, 222–232. [Google Scholar] [CrossRef]
  9. Lo, S.K.; Xu, X.; Staples, M.; Yao, L. Reliability Analysis for blockchain oracles. Comput. Electr. Eng. 2020, 83, 106582. [Google Scholar] [CrossRef]
  10. Bach, L.M.; Mihaljevic, B.; Zagar, M. Comparative Analysis of Blockchain Consensus algorithms. In Proceedings of the 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 21–25 May 2018; Volume 2018, pp. 1545–1550. [Google Scholar] [CrossRef]
  11. Bamakan, S.M.H.; Motavali, A.; Babaei Bondarti, A.B. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 2020, 154, 113385. [Google Scholar] [CrossRef]
  12. Strom, B.E.; Applebaum, A.; Miller, D.P.; Nickels, K.C.; Pennington, A.G.; Thomas, C.B. Mitre ATT&CK: Design and Philosophy. In Technical Report; The MITRE Corporation: Bedford, MA, USA, 2018. [Google Scholar]
  13. Xiong, W.; Legrand, E.; Åberg, O.; Lagerström, R. Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix. Softw. Syst. Model. 2022, 21, 157–177. [Google Scholar] [CrossRef]
  14. Alexander, O.; Belisle, M.; Steele, J. MITRE ATT&CK for Industrial Control Systems: Design and Philosophy; The MITRE Corporation: Bedford, MA, USA, 2020; p. 29. [Google Scholar]
  15. Gupta, R.; Tanwar, S.; Kumar, N.; Tyagi, S. Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review. Comput. Electr. Eng. 2020, 86, 106717. [Google Scholar] [CrossRef]
  16. Fernandez, E.; Pelaez, J.; Larrondo-Petrie, M. Attack patterns: A new forensic and design tool. In Advances in Digital Forensics III, Proceedings of the IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, January 28–January 31, 2007; Springer: New York, NY, USA, 2007; pp. 345–357. [Google Scholar]
  17. SUMO Official Site. Available online: https://sumo.dlr.de/docs/ (accessed on 19 February 2023).
  18. Ethereum Official Site. Available online: https://ethereum.org/en/ (accessed on 20 February 2023).
  19. Mahjabin, T.; Xiao, Y.; Sun, G.; Jiang, W. A survey of distributed denial-of-service attack, prevention, and mitigation techniques. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717741463. [Google Scholar] [CrossRef] [Green Version]
  20. Castro, M.; Liskov, B. Practical byzantine fault tolerance. OsDI 1999, 99, 173–186. [Google Scholar]
  21. Kaur, M.; Khan, M.Z.; Gupta, S.; Noorwali, A.; Chakraborty, C.; Pani, S.K. MBCP: Performance analysis of large-scale mainstream blockchain consensus protocols. IEEE Access 2021, 9, 80931–80944. [Google Scholar] [CrossRef]
  22. Nakamoto, S. Bitcoin: A Peer-To-Peer Electronic Cash System Bitcoin. 2009. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 4 January 2023).
  23. Kim, H.; Kim, D. Adjusting the block interval in PoW consensus by block interval process improvement. Electronics 2021, 10, 2135. [Google Scholar] [CrossRef]
  24. Gervais, A.; Karame, G.O.; Wüst, K.; Glykantzis, V.; Ritzdorf, H.; Capkun, S. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 3–16. [Google Scholar] [CrossRef]
  25. De Angelis, S.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; Sassone, V. PBFT vs. proof-of-authority: Applying the CAP theorem to permissioned blockchain. In Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, 6–9 February 2018. [Google Scholar]
  26. Ekparinya, P.; Gramoli, V.; Jourjon, G. The attack of the clones against proof-of-authority. arXiv 2019, arXiv:1902.10244. [Google Scholar] [CrossRef]
  27. Toyoda, K.; Machi, K.; Ohtake, Y.; Zhang, A.N. Function-level bottleneck analysis of private proof-of-authority ethereum blockchain. IEEE Access 2020, 8, 141611–141621. [Google Scholar] [CrossRef]
  28. Saleh, F. Blockchain without waste: Proof-of-stake. Rev. Financ. Stud. 2021, 34, 1156–1190. [Google Scholar] [CrossRef]
  29. Lee, D.R.; Jang, Y.; Kim, H. Poster: A proof-of-stake (PoS) blockchain protocol using fair and dynamic Sharding management. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 2553–2555. [Google Scholar] [CrossRef]
  30. Li, W.; Andreina, S.; Bohli, J.; Karame, G. Securing proof-of-stake blockchain protocols. In Data Privacy Management, Cryptocurrencies and Blockchain Technology; Springer: Cham, Switzerland, 2017; pp. 297–315. [Google Scholar] [CrossRef]
  31. Nguyen, C.T.; Hoang, D.T.; Nguyen, D.N.; Niyato, D.; Nguyen, H.T.; Dutkiewicz, E. Proof-of-stake consensus mechanisms for future blockchain networks: Fundamentals, applications and opportunities. IEEE Access 2019, 7, 85727–85745. [Google Scholar] [CrossRef]
  32. Yang, F.; Zhou, W.; Wu, Q.; Long, R.; Xiong, N.N.; Zhou, M. Delegated proof of stake with downgrade: A secure and efficient blockchain consensus algorithm with downgrade mechanism. IEEE Access 2019, 7, 118541–118555. [Google Scholar] [CrossRef]
  33. Wang, Y.; Cai, S.; Lin, C.; Chen, Z.; Wang, T.; Gao, Z.; Zhou, C. Study of blockchains’s consensus mechanism based on credit. IEEE Access 2019, 7, 10224–10231. [Google Scholar] [CrossRef]
  34. OSJD Official Site. Available online: https://en.osjd.org/ (accessed on 4 January 2023).
  35. OTIF Official Site. Available online: http://otif.org/en/ (accessed on 4 January 2023).
  36. CIM; SMGS. CIT Official Site. Available online: https://www.cit-rail.org/en/freight-traffic/cim-smgs/ (accessed on 4 January 2023).
  37. Yadav, T.; Rao, A.M. Technical aspects of cyber kill chain. In International Symposium on Security in Computing and Communication; Springer: Cham, Switzerland, 2015; pp. 438–452. [Google Scholar]
  38. Karapantazis, S.; Pavlidou, F.-N. VoIP: A comprehensive survey on a promising technology. Comput. Netw. 2009, 53, 2050–2090. [Google Scholar] [CrossRef]
  39. Rafique, M.Z.; Akbar, M.A.; Farooq, M. Evaluating dos attacks against SIP-based VoIP systems. In Proceedings of the GLOBECOM IEEE Global Telecommunication Conference, Honolulu, HI, USA, 30 November–4 December 2009; Volume 2009, pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  40. Docker Documents Official Site. Available online: https://docs.docker.com/ (accessed on 4 January 2023).
  41. Go-Ethereum Documents Official Site. Available online: https://geth.ethereum.org/docs (accessed on 4 January 2023).
  42. Merkle, R.C. A fast software one-way hash function. J. Cryptol. 1990, 3, 43–58. [Google Scholar] [CrossRef]
  43. Swaminathan, A.; Mao, Y.; Wu, M. Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 2006, 1, 215–230. [Google Scholar] [CrossRef] [Green Version]
  44. Chang, F.; Dean, J.; Ghemawat, S.; Hsieh, W.C.; Wallach, D.A.; Burrows, M.; Chandra, T.; Fikes, A.; Gruber, R.E. Bigtable: A distributed storage system for structured data. ACM Trans. Comput. Syst. 2008, 26, 1–26. [Google Scholar] [CrossRef]
  45. Benet, J. Ipfs-content addressed, versioned, p2p file system. arXiv 2014, arXiv:1407.3561. [Google Scholar]
  46. Chen, Y.; Li, H.; Li, K.; Zhang, J. An Improved P2P File System Scheme Based on IPFS and Blockchain. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; pp. 2652–2657. [Google Scholar] [CrossRef]
  47. IPFS Documents Official Site. Available online: https://docs.ipfs.tech/ (accessed on 4 January 2023).
  48. Ferguson, P.; Huston, G. What Is a VPN? Technical Report; Cisco Systems: San Jose, CA, USA, 1998. [Google Scholar]
  49. Schurgot, M.R.; Shinberg, D.A.; Greenwald, L.G. Experiments with security and privacy in IoT networks. In Proceedings of the 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Boston, MA, USA, 14–17 June 2015; pp. 1–6. [Google Scholar] [CrossRef]
  50. Rachmawati, D.; Tarigan, J.T.; Ginting, A.B.C. A comparative Study of Message Digest 5 (MD5) and SHA256 algorithm. J. Phys. Conf. Ser. 2018, 978, 012116. [Google Scholar] [CrossRef]
  51. Bertoni, G.; Daemen, J.; Peeters, M.; Van Assche, G. Keccak. In Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26–30, 2013. Proceedings 32; Springer: Berlin/Heidelberg, Germany, 2013; pp. 313–314. [Google Scholar]
  52. Antonowicz, M. 65 years of OSJD activities in Eurasia. Probl. Kolejnictwa 2021, 65, 111–120. [Google Scholar] [CrossRef]
  53. Xu, J.; Lee, W. Sustaining availability of web services under distributed denial of service attacks. IEEE Trans. Comput. 2003, 52, 195–208. [Google Scholar] [CrossRef]
  54. Van der Merwe, J.R.; Zubizarreta, X.; Lukčin, I.; Rügamer, A.; Felber, W. Classification of spoofing attack types. In Proceedings of the 2018 European Navigation Conference (ENC), Gothenburg, Sweden, 14–17 May 2018; pp. 91–99. [Google Scholar]
  55. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
  56. Li, M.; Huang, W.; Wang, Y.; Fan, W.; Li, J. The study of APT attack stage model. In Proceedings of the 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, Japan, 26–29 June 2016; pp. 1–5. [Google Scholar] [CrossRef]
  57. Li, Y.; Jiang, Y.; Li, Z.; Xia, S.T. Backdoor learning: A survey. IEEE Trans. Neural Netw. Learn. Syst. 2022, 1–18. [Google Scholar] [CrossRef]
  58. Alladi, T.; Chamola, V.; Sikdar, B.; Choo, K.R. Consumer IoT: Security vulnerability case studies and solutions. IEEE Consum. Electron. Mag. 2020, 9, 17–25. [Google Scholar] [CrossRef]
  59. Rodrigues, R.; Druschel, P. Peer-to-peer systems. Commun. ACM 2010, 53, 72–82. [Google Scholar] [CrossRef] [Green Version]
  60. Su, Y.; Nguyen, K.; Sekiya, H. A comparison of blockchain recovery time in static and Mobile IoT-blockchain networks. Future Internet 2022, 14, 330. [Google Scholar] [CrossRef]
  61. Oudah, M.A.; Oudah, M.A. An insight into internet sector in Iraq. Turk. J. Comput. Math. Educ. TURCOMAT 2023, 14, 22–32. [Google Scholar]
  62. Algredo-Badillo, I.; Morales-Sandoval, M.; Medina-Santiago, A.; Hernández-Gracidas, C.A.; Lobato-Baez, M.; Morales-Rosales, L.A. A SHA-256 hybrid-redundancy hardware architecture for detecting and correcting errors. Sensors 2022, 22, 5028. [Google Scholar] [CrossRef] [PubMed]
  63. Zhang, P.; Zhang, X.; Yu, J. A parallel hash function with variable initial values. Wirel. Pers. Commun. 2017, 96, 2289–2303. [Google Scholar] [CrossRef]
  64. Lepore, C.; Ceria, M.; Visconti, A.; Rao, U.P.; Shah, K.A.; Zanolini, L. A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS. Mathematics 2020, 8, 1782. [Google Scholar] [CrossRef]
  65. Guizani, M.; Rayes, A.; Khan, B.; Al-Fuqaha, A. Network Modeling and Simulation: A Practical Perspective; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
  66. Alharby, M.; Van Moorsel, A. Blocksim: A simulation framework for blockchain systems. SIGMETRICS Perform. Eval. Rev. 2019, 46, 135–138. [Google Scholar] [CrossRef]
  67. Gupta, Y.; Shorey, R.; Kulkarni, D.; Tew, J. The applicability of blockchain in the Internet of things. In Proceedings of the 2018 10th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, 3–7 January 2018; pp. 561–564. [Google Scholar] [CrossRef]
  68. Kupriyanovsky, Y.; Kupriyanovsky, V.; Klimov, A.; Namiot, D.; Dolbnev, A.; Sinyagov, S.; Lipuntsov, Y.; Arsenyan, A.; Evtushenko, S.; Larin, O. Smart container, smart port, BIM, Internet Things and blockchain in the digital system of world trade. Int. J. Open Inf. Technol. 2018, 6, 49–94. [Google Scholar]
  69. Turtiainen, H.; Costin, A.; Hämäläinen, T. Defensive machine learning methods and the cyber defence chain. In Artificial Intelligence and Cybersecurity; Springer: Cham, Switzerland, 2023; pp. 147–163. [Google Scholar]
Figure 1. Railway border non-stop custom clearance in real-world simulation.
Figure 1. Railway border non-stop custom clearance in real-world simulation.
Sensors 23 02914 g001
Figure 2. Process overview of non-stop customs clearance system and attack points.
Figure 2. Process overview of non-stop customs clearance system and attack points.
Sensors 23 02914 g002
Figure 3. Data derived for each component layer.
Figure 3. Data derived for each component layer.
Sensors 23 02914 g003
Figure 4. Non-stop customs clearance network implemented with Ethereum.
Figure 4. Non-stop customs clearance network implemented with Ethereum.
Sensors 23 02914 g004
Figure 5. Basic sequence diagram of NSCC.
Figure 5. Basic sequence diagram of NSCC.
Sensors 23 02914 g005
Figure 6. Attack sequence diagram using DoS.
Figure 6. Attack sequence diagram using DoS.
Sensors 23 02914 g006
Figure 7. Attack sequence diagram using spoofing.
Figure 7. Attack sequence diagram using spoofing.
Sensors 23 02914 g007
Figure 8. Attack sequence using root access privileges.
Figure 8. Attack sequence using root access privileges.
Sensors 23 02914 g008
Figure 9. Blockchain network in NSCC using Docker, SUMO, and Ethereum.
Figure 9. Blockchain network in NSCC using Docker, SUMO, and Ethereum.
Sensors 23 02914 g009
Figure 10. Simulation of NSCC from Mongolia to Kazakhstan using SUMO.
Figure 10. Simulation of NSCC from Mongolia to Kazakhstan using SUMO.
Sensors 23 02914 g010
Table 1. Quantitative indicator analysis of consensus algorithms [11,21].
Table 1. Quantitative indicator analysis of consensus algorithms [11,21].
CategoryPoWPoAPoSDPoS
Latency (response time)10 min5 min1 min3 s
transaction per second (TPS) 7 TPS 14 TPS 300 TPS 500 TPS
Computing overheadHighLowMediumMedium
ScalabilityLowMediumHighMedium
Decentralized levelHighLowMediumMedium
Hardware dependencyYesNoNoNo
Security (in application)LowMediumMediumMedium
Consensus methodHash ratesActivity-basedStakeStake votes
Reference[22,23,24][25,26,27][28,29,30,31][32,33]
AdequacyXO
Table 2. Process of non-stop customs clearance on blockchain network.
Table 2. Process of non-stop customs clearance on blockchain network.
Process No.Description of Each Process
Communication data cleaning and communication protocols are accessed to
transmit data from trains to transit stations.
Data transmitted to transit station using communication protocol of machine.
Transit station that received data through communication protocol accesses
Ethereum node to verify data.
After verification process, communication protocol to deliver data to
another transit station is accessed.
Verified results broadcast to other transit stations (blockchain network) using
communication protocol.
Verification data received from other transit stations through blockchain network are checked.
Data forwarded to other transit station nodes that do not directly participate
in this customs clearance process, and data are verified.
Verification-related data are transmitted to transit stations on future train routes.
Transit stations other than those that received data check whether transaction information
of blockchain network matches the verification result.
Table 3. Simulation and experimental environment.
Table 3. Simulation and experimental environment.
CategoryDescription
OSWindows 11
GPURTX 3070 Ti
RAM16 GB
Docker OSUbuntu 20.04
Blockchain environmentGeth v1.10.25
SUMO versionSUMO v1.14.1
Table 4. Numerical values and parameters required for experiments.
Table 4. Numerical values and parameters required for experiments.
CategoryDescriptions of Values and Parameters
Stations and countryMongolia Station 1 to Kazakhstan Station 2
Train velocityApproximately 150 km/h
Coordinates of departure stationlat: 44.162919, lon: 80.326560
Coordinates of destination stationlat: 43.632262, lon: 77.647001
Maximum duration of consensus algorithmUp to 10 min with PoW
Table 5. Processing speed and available data size for each NSCC step.
Table 5. Processing speed and available data size for each NSCC step.
CategoryTime for Each ProcedureSpeedDataRef.
Step 1: Enter and transactUp to 10 min with VPN5~10 Mbps1000 MB[61]
Step 2: Receive and hashUp to 1 min with SHA-25620 Mbps1000 MB[62,63]
Step 3: CompareUp to 10 min with IPFS1 Mbps1000 MB[46]
Step 4: BroadcastUp to 10 min with PoW11 TPS.[64]
Total Up to 31 min . . .
Table 6. Quantitative comparison of the existing customs clearance system and NSCC.
Table 6. Quantitative comparison of the existing customs clearance system and NSCC.
CategoryExisting Customs ClearanceNon-Stop Customs Clearance (Ours)
Time to customs clearanceAbout 1–2 daysUp to 1 h (from Table 5)
ResourceHuman and machineMachine
IntegrityXO
ReliabilityO
TransparencyO
TraceabilityXO
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kim, S.; Kim, D. Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System. Sensors 2023, 23, 2914. https://doi.org/10.3390/s23062914

AMA Style

Kim S, Kim D. Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System. Sensors. 2023; 23(6):2914. https://doi.org/10.3390/s23062914

Chicago/Turabian Style

Kim, Sungbeen, and Dohoon Kim. 2023. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System" Sensors 23, no. 6: 2914. https://doi.org/10.3390/s23062914

APA Style

Kim, S., & Kim, D. (2023). Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System. Sensors, 23(6), 2914. https://doi.org/10.3390/s23062914

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop