A blockchain-based cyber-security for connected networks

被引:0
|
作者
Choudhary, Deepak [1 ]
Pahuja, Roop [1 ]
机构
[1] Dr BR Ambekar Natl Inst Technol, Jalandhar, India
关键词
Internet of things; Blockchain; Data privacy; Security system; Distributed management; IIoT; INTERNET; THINGS;
D O I
10.1007/s12083-023-01506-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Both technical and commercial businesses have become increasingly interested in blockchain technology. The Internet of Things (IoT) was established out of the interconnectedness of numerous new technologies, such as wireless technology, the Internet, embedded automation systems, and micro-electromechanical devices. Manufacturing settings and activities have been successfully altered into the fourth industrial revolution, known as Industry 4.0, by applying cutting-edge technologies such as cloud computing (CC), cloud service provider (CSP), Information communication technologies (ICT), and Enterprise Model, as well as other technological advancements. Data management is characterized as acquiring data to make better business decisions; data about a corporation is processed, secured, and stored. In the early notion, there were connected contrivances and Machine-to-Machine (M2M) interactions, and transaction data is recorded on the Blockchain. Security is a challenging subject that must be carefully considered throughout a CSP's design and development phases. By focusing on such issues while taking into account the traditional characteristics of IoT/ IIoT-predicated environments, we proposed a Secure and Distributed Framework for Resource Management (SDFRM) in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system, the dynamic and trust-based Distributed Management Framework (DMF) of shared resource access, in this research article. Furthermore, to offer strong privacy assurances for Access Control (AC)-equivalent actions, a privacy-preserving approach is devised and implemented into the Distributed Management Framework (DMF). Based on blockchain technology and peer-to-peer networks, the recommended DMF provides for dynamic access control and system governance without relying on third-party vulnerabilities. A privacy-preserving technique is presented and implemented into the DMF to give adequate privacy safeguards for AC-related processes. With an average throughput of 98.15 percent, our proposal exceeds the Multichannel Blockchain regarding successful storage transactions.
引用
收藏
页码:1852 / 1867
页数:16
相关论文
共 50 条
  • [31] Blockchain-Based Shared Security Architecture
    Raj, Shaji N.
    Sherly, Elizabeth
    COGNITIVE INFORMATICS AND SOFT COMPUTING, 2020, 1040 : 29 - 35
  • [32] A CYBER-SECURITY STORM MAP
    Ferebee, Denise
    Dasgupta, Dipankar
    Wu, Qishi
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 93 - 102
  • [33] Survey on Blockchain-based Security Services
    Wang L.-P.
    Guan Z.
    Li Q.-S.
    Chen Z.
    Hu M.-S.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 1 - 32
  • [34] Permissioned Blockchain-based Security for IIoT
    Yeasmin, Samira
    Baig, Adeel
    2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, : 504 - 510
  • [35] A Framework of Blockchain-Based Security for WBANs
    Deng, Han
    Meng, Xiangwei
    Guo, Jun
    Xi, Erhui
    Zhao, Hui
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 75 - 80
  • [36] Defining and computing a value based cyber-security measure
    Ben Aissa, Anis
    Abercrombie, Robert K.
    Sheldon, Frederick T.
    Mili, Ali
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 433 - 453
  • [37] Defining and computing a value based cyber-security measure
    Anis Ben Aissa
    Robert K. Abercrombie
    Frederick T. Sheldon
    Ali Mili
    Information Systems and e-Business Management, 2012, 10 : 433 - 453
  • [38] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [39] Blockchain-based Mobility Verification of Connected Cars
    Chiasserini, Carla Fabiana
    Giaccone, Paolo
    Malnati, Giovanni
    Macagno, Michele
    Sviridov, German
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [40] Blockchain-Based Cyber-Physical Security for Electrical Vehicle Aided Smart Grid Ecosystem
    Kaur, Kuljeet
    Kaddoum, Georges
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (08) : 5178 - 5189