Submitted:
08 May 2024
Posted:
10 May 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
- Analysis of supply chains to understand the integration points and requirements for DPP management using BC.
- The development and mapping of generic processes into smart contracts, ensuring their privacy across the supply chain.
- Proposals for secure data exchange and manage DPP functions within the supply chain, fostering trust and collaboration among stakeholders.
2. Fundamentals
2.1. Digital Product Passports (DPPs)
2.2. Blockchain Technology
- Decentralisation: Unlike traditional data systems which rely on a central authority, BC operates on a decentralised model. This means that control and decision-making are distributed across all participants in the network, enhancing security, resilience, and inclusivity [21].
- Immutability: A BC consists of blocks of calculations that contain mathematical references to the preceding blocks. Therefore, once data is recorded in a block, it cannot be altered without changing all subsequent blocks and achieving consensus among network participants [22]. This is secured through cryptographic hashing, ensuring that once a transaction is recorded, it becomes tamper-evident, safeguarding data integrity.
- Transparency and Security: Through mechanisms like public and private keys, transactions are visible to all network participants, yet sensitive information is encrypted and protected from unauthorised access [23].
- Cryptography: The integrity of the BC is maintained through cryptographic hashes, such as SHA-256 in Bitcoin [19]. These hashes create a unique and unalterable fingerprint for each block, linking them in a secure chain that guards against tampering.
- Consensus Mechanisms: The crucial element of BC’s decentralised nature is the process of reaching consensus among network participants [24]. Mechanisms like PoW and PoS ensure all participants agree on the ledger’s state without needing a central authority. PoW requires computational work to validate transactions and mint new blocks, while PoS selects validators in proportion to their holdings, offering a more energy-efficient alternative. Validators are financially remunerated for carrying out calculations to achieve the consensus. As a result, transactions always come with transaction costs.
- Public BC: Networks like Bitcoin and Ethereum are open to anyone, ensuring security and transparency at the cost of scalability and energy efficiency.
- Private BC: Networks such as Hyperledger Fabric utilize permissioned access control, focusing on scalability and privacy. These often use consensus algorithms like Practical Byzantine Fault Tolerance (PBFT) to achieve faster transaction times and data confidentiality.
- Consortium BC: A hybrid model where control is shared among a consortium of organisations, like R3 Corda, which uses a notary node for consensus, striking a balance between decentralisation and efficiency.
- Hybrid BC: Dragonchain provides flexibility in keeping some data private while broadcasting other data to a public BC, using a combination of consensus mechanisms to serve varied business needs.
2.2.1. Smart Contract
2.2.2. Overview of Blockchain Platforms
- Ethereum: Ethereum enables the development of Decentralized Application (dApp)s and smart contracts [29] by using its built-in Solidit scripting language. The network’s transition from PoW to PoS aims to address scalability and energy efficiency. The platform includes a widely used built-in smart contract functionality.
- Hyperledger Fabric: Known for its modular and configurable architecture, Fabric allows for the creation of permissioned BC networks with a high degree of control over transactions and privacy [30]. Its support for chaincode in various programming languages and the ability to create private channels make it ideal for DPPs in environments where data privacy and permissioned access are paramount.
- R3 Corda: Tailored for the financial industry, Corda’s design focuses on privacy and security, offering features like transaction finality and privacy through its notary architecture [31]. Its ability to interoperate with existing legal frameworks and focus on regulated industries makes it suitable for DPPs in sectors where compliance and legal conformity are critical.
- Secret Network: Secret Network is a BC designed to prioritize privacy, offering unique features that enable smart contracts to execute in a way that the data remains encrypted [32]. This capacity allows for the creation and management of private transactions and private dApps compared to those on traditional BCs where all transactions and smart contract interactions are public by default. However, it’s important to note that Secret Network isn’t a "private BC" in the sense that it’s restricted to a select group of users or entities, like a corporate BC would be. Instead, it’s a public BC with privacy-enhancing features. This means anyone can participate in the network, send transactions, or deploy smart contracts, but the content of those transactions and contracts can be kept hidden from other users, depending on how they’re designed. So called Viewing Keys can be issued to authorise access to data stored in the BC by the respective owner.
- Quorum: As an enterprise-focused fork of Ethereum, Quorum’s attempt to tailor Ethereum for enterprise use by enhancing privacy raises significant concerns [33]. Its modifications, aimed at balancing privacy with Ethereum’s interoperability, may actually compromise the principles of decentralisation and transparency central to BC technology. This approach, while intended to attract dApps requiring both privacy and Ethereum’s features, could fall short of addressing stringent privacy demands, potentially undermining the platform’s utility and security.
2.3. Blockchain-Based DPP
2.3.1. Key Features Required for Implementing DPPs in Blockchain
- Privacy and Confidentiality: The cornerstone of any DPP system is the assurance of privacy and confidentiality. This is particularly critical for protecting sensitive data such as proprietary manufacturing processes and product compositions, which could be of high value to competitors [36].
- Scalability and Efficiency: As DPP systems are expected to handle high volumes of transactions and data, scalability and efficiency become paramount [10]. The ability of the DPP system to scale efficiently ensures the smooth operation and growth of the system as the product and user bases expand, without compromising on performance or cost-effectiveness.
- Interoperability: The diverse nature of supply chains means that DPP systems must seamlessly integrate with various existing systems and protocols used by different participants [37].
- Smart Contract Capability: Smart contracts allow for the automation of processes, enforcement of rules, and reduction of manual interventions and errors. In the realm of DPPs, this translates to enhanced efficiency, accuracy, and reliability of operations [39].
- Data Integrity and Security: Ensuring the integrity and security of DPP data is non-negotiable [40]. The data must be accurate, consistent, and safeguarded against unauthorised access and tampering [41]. Maintaining the credibility and reliability of DPP information is essential for all stakeholders involved, as it forms the basis of trust and decision-making within the supply chain.
- Sector-independency: DPP systems should be independent of sectors, regulations, and individual customer needs. With clear semantics and standardised data schemas, the interoperability may be enabled, while the overall accessibility must be considered in policies and onboarding proceedings.
- DPP-based supply chain management efficiency: There are requirements with respect to an efficient DPP-based supply chain management [42], where the identification of all required resources for a specific scenario, as well as impacting factors are gathered.
- Supply chain traceability: Supply chain traceability requirements are based on events. Object-events describe what happens to an object, as well as aggregation and transformation events where objects are represented or combined, or transaction events in which the object is involved in the process of describing ownership [43]. Data elements should include the what, who, when, where and why of a traceability event. The BC technology used must enable these requirements.
2.3.2. Overview of Candidate BC Platforms
3. Related Work and State-of-the-Art
3.1. The AAS: A Digital Twin for Manufacturing
- 1.
- URIOfTheProduct: The product needs to be unambiguously identifiable using a globally URI.
- 2.
- ManufacturerName: The legally valid designation of the natural or judicial person directly responsible for the design, production, packaging and labeling of a product with respect to bringing it into circulation.
- 3.
- ManufacturerProductDesignation: Brief product description (e.g., "industrial robot").
- 4.
- ContactInformation: Contact to the manufacturer or an authorised service provider.
- 5.
- ManufacturerProductType: Characteristic of different products in a product family or special variants, e.g., an International Registration Data Identifier (IRDI) reference to a product class using [50].
- 6.
- YearOfConstruction: The year in which the asset was completed.
- 7.
- Markings: Collection of product markings and all label-specific information, e.g., the "CE" mark including the date of issue and the label file.
- 1.
- ProductCarbonFootprintCalculationMethod: This describes a standard or a method for determining the greenhouse gas emissions of a product (from a list of various standards for calculation).
- 2.
- ProductCarbonFootprintCO2equivalent: This summarizes all greenhouse gas emissions of a product according to the quantification requirements of standard (e.g., 17.2 kg).
- 3.
- ProductCarbonFootprintReferenceValueForCalculation: This describes the quantity unit of the product to which the PCF information on the CO2 footprint refers to (e.g., per piece).
- 4.
- ProductCarbonFootprintQuantityOfMeasureForCalculation: This describes the quantity of the product to which the PCF information on the CO2 footprint refers to (e.g., 5 pieces).
- 5.
- ProductCarbonFootprintGoodsAddressHandover: This indicates the place of hand-over of the goods.
- 6.
- ProductCarbonFootprintLifeCyclePhase: Here the life cycle stages of the product according to the quantification requirements of the standard to which the PCF carbon footprint statement refers to is categorised (e.g., raw material supply).
- 1.
- TransportCarbonFootprintProcess: Processes in a transport service to determine the sum of all direct or indirect greenhouse gas emissions from fuel supply and vehicle operation (e.g., Tank-to-Wheel).
- 2.
- TransportCarbonFootprintGoodsTransportAddressTakeover: This indicates the place of receipt of the goods.
3.2. Gaia-X as a Tool for Collaboratively Working on Product Data
3.3. Enhancing Security for DPP Systems through Blockchain Technology
3.4. State of the Art: Digital Product Passports
3.4.1. Deficits in DPP Content and Collaboration Methods
3.4.2. Blockchain Integration without Comprehensive Privacy Support
3.4.3. Addressing the Gaps: The Need for Privacy-Enhanced DPPs
4. Blockchain-Enabled DPPs in Manufacturing
4.1. Systemic Requirements for Generic DPPs in Manufacturing Supply Chains
4.1.1. Abstraction of Supply Chain Business Processes
- Source: This process describes all activities realted to the ordering and receipt of goods and services.
- Return (Customer point of view): The customer may identify the need to return a delivered product. The identifying, the scheduling and the execution of returning goods are summarised in this process.
- Make: This process describes all activities that add value to a product, such as the conversion of materials or the creation of a service.
- Deliver: Every activity associated with the creation and fulfliment of customer orders are described by this process, such as scheduling, shipment or invoicing the customer.
- Return (Supplier point of view): This process describes all activities associated with the return of formerly delivered goods.
- Enable: This process describes management processes (e.g., regularity compliance, performance measurements).
- Plan: “Plan” processes include all activities that contribute to planning the supply chain (e.g., balancing requirements, planning capabilities).
4.1.2. Integration of Supply Chain Functionalities into Smart Contract-Based DPPs
4.1.3. DPP Interactions in Manufacturing: Source Asset
4.1.4. DPP Interactions in Manufacturing: Make Asset
4.1.5. DPP Interactions in Manufacturing: Deliver Asset
4.1.6. DPP Interactions in Manufacturing: Return Asset
4.2. Proposed System Architecture for BC-Based DPPs
- Closing a smart contract for further modifications at the end of an asset’s lifetime.
4.2.1. Design Considerations
4.2.2. DPP Management Functions: Creating the DPP
| Algorithm 1 Create DPP |
![]() |
4.2.3. DPP Management Functions: Updating the DPP
| Algorithm 2 Update DPP |
![]() |
4.2.4. DPP Management Functions: Transferring the Ownership of the DPP
| Algorithm 3 Transferring the Ownership of the DPP |
![]() |
4.2.5. DPP Management Functions: Enabling View Access to the DPP
| Algorithm 4 Access Control for DPP |
![]() |
4.2.6. DPP Management Functions: Closing the DPP
| Algorithm 5 Closing the DPP |
![]() |
4.3. Exemplary Application of the Concept to an Industrial Use Case
5. Evaluation
5.1. Integration of Security in DPP Architecture:
- Decentralisation and Trust: Leveraging the decentralised architecture of BC markedly diminishes the likelihood of single points of failure, thereby bolstering the network’s resilience against adversarial actions. The employment of smart contracts enhances trust through the transparent and efficient application of rules. By integrating Secret Network technology within the Gaia-X framework, a nuanced fusion of decentralisation, transparency, and the immutable nature of BC is achieved. This architecture capitalizes on the intrinsic decentralisation of BC to cultivate trust among all parties involved in the supply chain.
- Data Integrity and Security: DPP architecture seamlessly integrates on-chain and off-chain data storage solutions, significantly advancing data integrity and security while efficiently managing resource consumption. By selectively utilizing on-chain storage for crucial transactional data, it leverages BC’s inherent immutability, thereby safeguarding against tampering and ensuring the utmost data integrity and bolstered security. For more extensive data sets, it employs off-chain storage, which is secured through advanced cryptographic measures to maintain integrity and operational efficiency. This strategic approach not only alleviates the issues of BC bloat and its related costs but also establishes a comprehensive framework for the protection of sensitive information.
5.2. Structured Security Framework:
5.2.1. Security Evaluation Metrics and Approaches:
- Compliance Adherence: This metric assesses the DPP system’s compliance with relevant standards and regulations, ensuring data privacy and sovereignty as per Gaia-X framework requirements.
- Threat Model Coverage: Evaluates the comprehensiveness of the threat model and the efficacy of corresponding mitigation strategies in addressing identified security risks.
- Smart Contract Audit Findings: Focuses on identifying and rectifying vulnerabilities within the smart contracts that govern the DPP system’s BC operations.
- System Resilience: Assessed through rigorous penetration testing and simulated attack scenarios to ascertain the system’s ability to withstand and recover from potential security breaches.
5.2.2. Threat Modeling and Risk Assessment:
5.2.3. Security Measures and Controls
- Encryption and Data Protection: Advanced encryption standards are employed to protect data at rest and in transit, a critical measure for maintaining the confidentiality and integrity of DPP data as it traverses networks and is stored within the BC.
- Access Control Mechanisms: Utilizing Role-Based Access Control (RBAC) and fine-grained permission policies, the system ensures that only authorised users can access or modify the DPP data. Secure session management and viewing keys are dynamically managed and thoroughly audited to prevent unauthorised data exposure.
- Smart Contract Security: Smart contracts, which enforce the business logic of the DPP on the BC, are rigorously tested for vulnerabilities. Smart contract audits, along with input validation and sanitisation, are performed to identify and remediate security flaws.
- Gaia-X Compliance: The Gaia-X framework incorporates a regulatory compliance layer rooted in security-by-design principles. This framework ensures adherence to European regulations by implementing stringent data protection and privacy standards, such as secure bootstrapping and regular audits to safeguard data integrity.
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- European Commission. The European Green Deal: Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions, 11.12.2019.
- European Commission. A new Circular Economy Action Plan: For a cleaner and more competitive Europe: Communication from the Commission to the European Parliament, the European Council, the Council, the European Economic and Social Committee and the Committee of the Regions, 2020.
- European Parlament and EU Council. REGULATION (EU) 2023/1542 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 July 2023 concerning batteries and waste batteries, amending Directive 2008/98/EC and Regulation (EU) 2019/1020 and repealing Directive 2006/66/EC, 12.07.2023.
- Jansen, M.; Meisen, T.; Plociennik, C.; Berg, H.; Pomp, A.; Windholz, W. Stop Guessing in the Dark: Identified Requirements for Digital Product Passport Systems. Systems 2023, 11, 123. [Google Scholar] [CrossRef]
- Aschermayr, D.; Kadner, S.; Risch, L.; Simböck, J.; Braunfels, A.S.; Dixon, B.; Herrmann, S.; Kleine Jäger, J.; Kühl, C.; Schenk, S.; Teuber, A.; Vahle, T. Battery Passport Content Guidance: Achieving compliance with the EU Battery Regulation and increasing sustainability and circularity.
- Buterin, V. Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform, 2014.
- Introduction to smart contracts. Available online: https://ethereum.org/en/smart-contracts/ (accessed on 31 July 2023).
- Stratmann, L.; Hoeborn, G.; Pahl, C.; Schuh, G. Classification of product data for a Digital Product Passport in the manufacturing industry 2023. [CrossRef]
- Zier, M.; Stenzel, P.; Kotzur, L.; Stolten, D. A review of decarbonization options for the glass industry. Energy Convers. Manag. X 2021, 10, 100083. [Google Scholar] [CrossRef]
- Adisorn, T.; Tholen, L.; Götz, T. Towards a digital product passport fit for contributing to a circular economy. Energies 2021, 14, 2289. [Google Scholar] [CrossRef]
- ESCAP, U. Beginners’ manual on digital marketing and e-commerce 2022.
- Union, E. EPREL - European Product Registry for Energy Labelling. 2024, https://eprel.ec.europa.eu/screen/home, 2024.
- Agency, E.C. Understanding REACH, 2024.
- Michael, J.; Grote, E.M.; Pfeifer, S.A.; Rasor, R.; Henke, C.; Trächtler, A.; Kaiser, L. Towards the Concept of a Digital Green Twin for a Sustainable Product Lifecycle. International Conference on Water Energy Food and Sustainability. Springer, 2021, pp. 548–557. [CrossRef]
- Donetskaya, J.V.; Gatchin, Y.A. Development of requirements for the content of a digital passport and design solutions. Journal of Physics: Conference Series 2021, 1828, 012102. [Google Scholar] [CrossRef]
- Walden, J.; Steinbrecher, A.; Marinkovic, M. Digital product passports as enabler of the circular economy. Chem. Ing. Tech. 2021, 93, 1717–1727. [Google Scholar] [CrossRef]
- Swan, M. Blockchain: Blueprint for a new economy; " O’Reilly Media, Inc.", 2015.
- Zhang, C.; Wu, C.; Wang, X. Overview of blockchain consensus mechanism. Proceedings of the 2020 2nd International Conference on Big Data Engineering, 2020, pp. 7–12. [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.
- Nguyen, G.T.; Kim, K. A survey about consensus algorithms used in blockchain. J. Inf. Process. Syst. 2018, 14. [Google Scholar]
- Mishra, D.K.; Ghadi, M.J.; Azizivahed, A.; Li, L.; Zhang, J. A review on resilience studies in active distribution systems. Renew. Sustain. Energy Rev. 2021, 135, 110201. [Google Scholar] [CrossRef]
- Stančić, H.; Bralić, V. Digital archives relying on blockchain: Overcoming the limitations of data immutability. Computers 2021, 10, 91. [Google Scholar] [CrossRef]
- Xu, P.; Lee, J.; Barth, J.R.; Richey, R.G. Blockchain as supply chain technology: Considering transparency and security. Int. J. Phys. Distrib. Logist. Manag. 2021, 51, 305–324. [Google Scholar] [CrossRef]
- Lashkari, B.; Musilek, P. A comprehensive review of blockchain consensus mechanisms. IEEE Access 2021, 9, 43620–43652. [Google Scholar] [CrossRef]
- Zeba, S.; Suman, P.; Tyagi, K. Types of blockchain. In Distributed Computing to Blockchain; Elsevier, 2023; pp. 55–68.
- Li, R.; Song, T.; Mei, B.; Li, H.; Cheng, X.; Sun, L. Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput. 2018, 12, 762–771. [Google Scholar] [CrossRef]
- Wang, S.; Yuan, Y.; Wang, X.; Li, J.; Qin, R.; Wang, F.Y. An overview of smart contract: Architecture, applications, and future trends. 2018 IEEE Intelligent Vehicles Symposium (IV). IEEE, 2018, pp. 108–113. [CrossRef]
- Hewa, T.; Ylianttila, M.; Liyanage, M. Survey on blockchain based smart contracts: Applications, opportunities and challenges. J. Netw. Comput. Appl. 2021, 177, 102857. [Google Scholar] [CrossRef]
- Buterin, V. Ethereum: Platform review. Oppor. Challenges Priv. Consort. Blockchains 2016, 45. [Google Scholar]
- Nasir, Q.; Qasse, I.A.; Abu Talib, M.; Nassif, A.B.; et al. Performance analysis of hyperledger fabric platforms. Secur. Commun. Networks 2018, 2018. [Google Scholar] [CrossRef]
- Valenta, M.; Sandner, P. Comparison of ethereum, hyperledger fabric and corda. Frankf. Sch. Blockchain Cent. 2017, 8, 1–8. [Google Scholar]
- Woetzel, C. Secret network: A privacy-preserving secret contract & decentralized application platform 2016.
- Baliga, A.; Subhod, I.; Kamat, P.; Chatterjee, S. Performance evaluation of the quorum blockchain platform. arXiv 2018, arXiv:1809.03421. [Google Scholar]
- Stodt, F.; Kamel, M.B.; Reich, C.; Theoleyre, F.; Ligeti, P. Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture. IEEE Access 2024, 12, 26747–26758. [Google Scholar] [CrossRef]
- Zhang, R.; Xue, R.; Liu, L. Security and privacy on blockchain. ACM Comput. Surv. (CSUR) 2019, 52, 1–34. [Google Scholar] [CrossRef]
- Berger, K.; Rusch, M.; Pohlmann, A.; Popowicz, M.; Geiger, B.C.; Gursch, H.; Schöggl, J.P.; Baumgartner, R.J. Confidentiality-preserving data exchange to enable sustainable product management via digital product passports-a conceptualization. Procedia CIRP 2023, 116, 354–359. [Google Scholar] [CrossRef]
- Ajdinović, S.; Strljic, M.; Lechler, A.; Riedel, O. Interoperable Digital Product Passports: An Event-Based Approach to Aggregate Production Data to Improve Sustainability and Transparency in the Manufacturing Industry. 2024 IEEE/SICE International Symposium on System Integration (SII). IEEE, 2024, pp. 729–734. [CrossRef]
- Stodt, F.; Reich, C.; Sikora, A.; Welte, D. Trust management system for hybrid industrial blockchains. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN). IEEE, 2023, pp. 1–6. [CrossRef]
- Voulgaridis, K.; Lagkas, T.; Angelopoulos, C.M.; Boulogeorgos, A.A.A.; Argyriou, V.; Sarigiannidis, P. Digital product passports as enablers of digital circular economy: A framework based on technological perspective. Telecommunication Systems 2024, 1–17. [Google Scholar] [CrossRef]
- Jensen, S.F.; Kristensen, J.H.; Adamsen, S.; Christensen, A.; Waehrens, B.V. Digital product passports for a circular economy: Data needs for product life cycle decision-making. Sustain. Prod. Consum. 2023, 37, 242–255. [Google Scholar] [CrossRef]
- Stodt, J.; Schönle, D.; Reich, C.; Ghovanlooy Ghajar, F.; Welte, D.; Sikora, A. Security audit of a blockchain-based industrial application platform. Algorithms 2021, 14, 121. [Google Scholar] [CrossRef]
- Psarommatis, F.; May, G. Digital Product Passport: A Pathway to Circularity and Sustainability in Modern Manufacturing. Sustainability 2024, 16, 396. [Google Scholar] [CrossRef]
- Künster, N.; Dietrich, F.; Palm, D. Opportunities And Challenges Of The Asset Administration Shell For Holistic Traceability In Supply Chain Management. 2023. [Google Scholar] [CrossRef]
- Ye, X.; Xu, W.; Liu, J.; Zhong, Y.; Liu, Q.; Zhou, Z.; Song, W.S.; Hong, S.H. Implementing Digital Twin and Asset Administration Shell Models for a Simulated Sorting Production System. IFAC-PapersOnLine 2023, 56, 11880–11887. [Google Scholar] [CrossRef]
- Federal Ministry for Economic Affairs and Climate Action. Details of the Asset Administration Shell: Part 1 - The exchange of information between partners in the value chain of Industrie 4.0: Specification, 2022.
- ZVEI Recommendation: "The Digital Nameplate" - CONSISTENT, SUSTAINABLE, FUTURE-PROOF, NETWORKED, 2020. Available online: https://www.zvei.org/en/press-media/publications/zvei-recommendation-the-digital-nameplate (accessed on 1 January 2024).
- European Parlament and EU Council. DIRECTIVE 2006/42/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 May 2006 on machinery, and amending Directive 95/16/EC (recast), 17.05.2006.
- Garrels, K.; Grüner, S.; Schönfeld, M.; Jänicke, L.; Lamboley, P.; Martinez, B.; Gayko, J.; Holst, J.C.; Käbisch, S.; Klasen, W.; Löffler, M.; Löwen, U.; Rossi, G.; Stephan, G.; Wegener, D.; Vojanec, B.; Schork, S. ZVEI-Show-Case PCF@Control Cabinet: Product Carbon Footprint Calculation of a Control Cabinet using the Asset Administration Shell: White Paper, Mai 2022.
- Digital Nameplate for Industrial Equipment: Submodel Template of the Asset Administration Shell: Specification IDTA 02006-2-0.
- ECLASS, e.V. An introduction to the standard. https://eclass.eu/en/eclass-standard/introduction, 2024.
- Industrial Digital Twin Association, e.V. IDTA Carbon Footprint: Working Draft. https://github.com/admin-shell-io/submodel-templates/blob/main/development/Carbon%20Footprint/1/0/2023-01-24%20-%20DraftIDTASubmodelPCF.pdf.
- Braud, A.; Fromentoux, G.; Radier, B.; Le Grand, O. The road to European digital sovereignty with Gaia-X and IDSA. IEEE Netw. 2021, 35, 4–5. [Google Scholar] [CrossRef]
- Mazumdar, S. How to Reduce Information Silos While Blockchain-ifying Recycling Focused Supply Chain Solutions? The 56th Hawaii international conference on system sciences. HICSS 2023. Hawaii International Conference on System Sciences (HICSS), 2023, pp. 459–468.
- Hummel, P.; Braun, M.; Tretter, M.; Dabrock, P. Data sovereignty: A review. Big Data Soc. 2021, 8, 2053951720982012. [Google Scholar] [CrossRef]
- eco Association of the Internet Industry. Software Requirements Specification for Gaia-X Federation Services: Authentication/Authorization: IDM.AA, 2021.
- Ruf, P.; Stodt, J.; Reich, C. Security Threats of a Blockchain-Based Platform for Industry Ecosystems in the Cloud. 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), 2021, pp. 192–199. [CrossRef]
- Makrakis, G.M.; Kolias, C.; Kambourakis, G.; Rieger, C.; Benjamin, J. Industrial and critical infrastructure security: Technical analysis of real-life security incidents. Ieee Access 2021, 9, 165295–165325. [Google Scholar] [CrossRef]
- Stodt, F.; Reich, C. A Review on Digital Wallets and Federated Service for Future of Cloud Services Identity Management. Service Computation 2023: The Fifteenth International Conference on Advanced Service Computing, June 26, 2023 to June 30, 2023, Nice, France, 2023, pp. 16–20.
- Nowacki, S.; Sisik, G.M.; Angelopoulos, C.M. Digital Product Passports: Use Cases Framework and Technical Architecture Using DLT and Smart Contracts. 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2023, pp. 373–380. [CrossRef]
- Falco, F. Distributed ledger technology in the circular economy: Enable traceability and transparency of recyclable products with a digital product passport platform. Ph.D. thesis, FH Vorarlberg (Fachhochschule Vorarlberg).
- Saleheen, A.; Afrid, S. Potential of decentralised blockchains for the digital product passport: Need for traceability and transparency in textile industries, 2023.
- Nguyen, H.; Do, L. The adoption of blockchain in food retail supply chain: Case: IBM food trust blockchain and the food retail supply chain in Malta 2018.
- DIN Deutsches Institut für Normung, e.V. . DIN EN ISO 9000 - Quality management systems - Fundamentals and vocabulary, Nov 2015.
- Council, A.S.C. APICS Supply Chain Operations Reference Model: SCOR Version 12.0, 2017.
- Federal Ministry for Economic Affairs and Climate Action. Relationships between I4.0 Components – Composite Components and Smart Production: Continuation of the Development of the Reference Model for the I4.0 SG Models and Standards: Working Paper, 2017.
- Shi, Z.; Graffi, K.; Starobinski, D.; Matyunin, N. Threat modeling tools: A taxonomy. IEEE Secur. Priv. 2021, 20, 29–39. [Google Scholar] [CrossRef]
- Khan, R.; McLaughlin, K.; Laverty, D.; Sezer, S. STRIDE-based threat modeling for cyber-physical systems. 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2017, pp. 1–6. [CrossRef]
- Heinrich, M.; Lang, W. Materials Passports - Best Practice: Innovative Solutions for a Transition to a circular Economy in the Built Environment, 2019. https://www.bamb2020.eu/wp-content/uploads/2019/02/BAMB_MaterialsPassports_BestPractice.pdf.
- Kämper, B.; Both, M.; Maisch, N.; Müller, J. Mapping of an abstract PLC information model into different fields of application: CLIMA 2022 conference, 2022: CLIMA 2022 The 14th REHVA HVAC World Congress 2022. [CrossRef]
- Ajdinović, S.; Maisch, N.; Dzubba, M.; Lechler, A.; Riedel, O. Defining Scalable Data Models for Operational Data Integration in Manufacturing Processes within the Digital Product Passport Framework through OPC UA and Asset Administration Shell [Manuscript submitted for publication]. Proceedings for FAIM 2024 2024.












| Feature/Blockchain | ETH | Fabric | R3 Corda | Secret Net. | Quorum |
|---|---|---|---|---|---|
| Privacy & Confidentiality | × | - | |||
| Scalability & Efficiency | × | × | |||
| Interoperability | |||||
| Decentralisation & Trust | × | × | |||
| Smart Contract Capability | |||||
| Data Integrity & Security | |||||
| Consensus Mechanism | PoS | PBFT | Notary-Based | BFT | IBFT |
| Study | Method Used | Blockchain | Area of Applying DPP | Privacy Preserving | Secure | Scalable | Decentralised |
| [59] | Framework Development | Yes | Various Sectors | Not Specified | Yes | Yes | Yes |
| [10] | Mixed Methods (Desk Research and Stakeholder Workshops) | Not Specified | Sustainable Development, Circular Economy | Not Specified | Not Specified | Not Specified | Not Specified |
| [61] | Qualitative Exploratory Design (Interviews) | Yes | Textile Industry | Not Specified | Yes | Not Specified | Yes |
| [60] | Technical Solution Development | Yes | Recycling, Circular Economy | Not Specified | Yes | Yes | Yes |
| [39] | Systematic Literature Review | Not Specified | Digital Circular Economy | Not Specified | Not Specified | Not Specified | Not Specified |
| Ours | Technical Solution Development | Yes | Digital Circular Economy in industry | Yes | Yes | Yes | Yes |
| Asset Name | Threat Type | Impact | Mitigation Strategies |
|---|---|---|---|
| Users | Phishing, Credential theft | Critical | Secure session management, security by design with viewing key |
| Security Policies | Policy Bypass, Misconfiguration | High | Least privilege, Regular access reviews, Automated policy enforcement |
| DPP Management Process | Unauthorised Access, Data Manipulation | Critical | security by design with Secret Network |
| Gaia-X Service Initialisation | unauthorised access during setup | High | Secure bootstrapping, Encryption at rest and in transit |
| Blockchain Operations | Smart Contract Vulnerabilities | Critical | Smart contract audits, Input validation and sanitisation |
| Security Monitoring | Inadequate Detection | Critical | Continuous threat intelligence |
| Data Transfers | MITM Attacks, Data Interception | High | Transport Layer Security (TLS), Certificate pinning, Regular certificate rotation |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).




