Skip to main navigation Skip to search Skip to main content

Enhancing Digital Supply Chain Security Through Critical Infrastructure Protection Blueprints: A Review on Challenges, Reference Architectures and Software Bills of Material

  • Djibrilla Amadou Kountche*
  • , Meisam Gordan*
  • , Mona Soroudi
  • , Daniel McCrum
  • , Efstathios Zavvos
  • , Lorcan Connolly
  • , Sandra König
  • , Stefan Schauer
  • , Jose Carlos Carrasco
  • , Jocelyn Aubert
  • , Nicola Gregorio Durante
  • , Manh Dung Nguyen
  • , Marisa Escalante Martinez
  • , Zisis Palaskas
  • , Páraic Caroll
  • *Corresponding author for this work
  • AKKODIS Research
  • University College Dublin
  • VLTN BV
  • Research Driven Solutions Limited
  • Austrian Institute of Technology
  • Barcelona Supercomputing Center (BSC)
  • Luxembourg Institute of Science and Technology
  • Engineering Ingegneria Informatica S.p.A.
  • Montimage
  • Inlecom Innovation
  • University of Melbourne

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Critical Infrastructure Protection (CIP)Critical Infrastructure Protection (CIP) against cascading effects of cyber and physical threats involves several solutions (i.e., software) from CIP domains such as Risk Assessment and Management, Infrastructure InterdependenciesInterdependencies, Resilience Engineering, Data Analytics and Predictive Modelling, and Technological Innovations, e.g., Digital Twin. However, these solutions are often bespoke, limiting reuse, and are scattered across repositories and deliverables. Commercial solutions can be costly and come with licensing constraints and data restrictions. Furthermore, CIP software assets are subjected to supply chainSupply chain attacks. This chapter reviews the blueprint concept for reusing CIP assets and introduces zero trust architectures. This chapter also proposes a community-based approach to facilitate the description, adoption, and reuse of integrated CIP software by researchers and Critical Infrastructure (CI) operators. This approach is based on (i) the definition of reference architecturesReference architecture for CIP software; (ii) the provision of re-usable concrete implementations of these architectures; and (iii) the description of these implementations using TOSCATopology and Orchestration Specification for Cloud Applications (TOSCA) for their deployment and orchestration, considering security and quality of service policies. Overall, this chapter lays the groundwork for a blueprint repository including software, datasets, documentation, and TOSCA service templates, to support broader adoption and reuse of CIP tools.

Original languageEnglish
Title of host publicationSignals and Communication Technology
PublisherSpringer Science and Business Media Deutschland GmbH
Pages29-58
Number of pages30
DOIs
Publication statusPublished - 2026

Publication series

NameSignals and Communication Technology
VolumePart F1412
ISSN (Print)1860-4862
ISSN (Electronic)1860-4870

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure

Keywords

  • Blueprints
  • Critical infrastructure protection
  • Cyber-physical
  • Interdependencies
  • Reference architecture
  • SBOM

Fingerprint

Dive into the research topics of 'Enhancing Digital Supply Chain Security Through Critical Infrastructure Protection Blueprints: A Review on Challenges, Reference Architectures and Software Bills of Material'. Together they form a unique fingerprint.

Cite this