A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0
A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4....
Gespeichert in:
Veröffentlicht in: | Sustainability 2020-11, Vol.12 (21), p.9179 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 21 |
container_start_page | 9179 |
container_title | Sustainability |
container_volume | 12 |
creator | ElMamy, Sidi Boubacar Mrabet, Hichem Gharbi, Hassen Jemai, Abderrazak Trentesaux, Damien |
description | A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented. |
doi_str_mv | 10.3390/su12219179 |
format | Article |
fullrecord | <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_03691396v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2548741347</sourcerecordid><originalsourceid>FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</originalsourceid><addsrcrecordid>eNpNkF9LwzAUxYsoOHQvfoKATwqd-dM0zeMs6gYDH9yeQ5Ima2dtZtIO--1tqaj35V4uv3M4nCi6QXBBCIcPoUMYI44YP4tmGDIUI0jh-b_7MpqHcIDDEDKA6SwSS_DW-ZPpgWtAWxqwC3JvgLPgsXb6XZeyasDW6LJxtdv3wDoP8l4ZH29Lb2QbQDXpcte05qsdleum6ELre5As4HV0YWUdzPxnX0W756dtvoo3ry_rfLmJNcG8jWnBkaWYp6m2hWIZpylKFaK4yIqEaoW5Koi1TBGqOaYpVhhmFlLNFFOSMXIV3U2-pazF0Vcf0vfCyUqslhsx_iBJOSI8PaGBvZ3Yo3efnQmtOLjON0M8gWmSsQSRZHS8nyjtXQje2F9bBMXYt_jrm3wD3Ydvtg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2548741347</pqid></control><display><type>article</type><title>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB Electronic Journals Library</source><creator>ElMamy, Sidi Boubacar ; Mrabet, Hichem ; Gharbi, Hassen ; Jemai, Abderrazak ; Trentesaux, Damien</creator><creatorcontrib>ElMamy, Sidi Boubacar ; Mrabet, Hichem ; Gharbi, Hassen ; Jemai, Abderrazak ; Trentesaux, Damien</creatorcontrib><description>A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.</description><identifier>ISSN: 2071-1050</identifier><identifier>EISSN: 2071-1050</identifier><identifier>DOI: 10.3390/su12219179</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Authentication ; Automatic ; Availability ; Big Data ; Blockchain ; Cloud computing ; Communication ; Comparative studies ; Denial of service attacks ; Engineering Sciences ; Enterprise resource planning ; Factories ; Industry 4.0 ; Internet of Things ; Learning algorithms ; Literature reviews ; Manufacturing ; Preventive maintenance ; Privacy ; Product development ; Quality of life ; Radio frequency identification ; Real time ; Security ; Security services ; Sensors ; Sustainability ; Technology ; Wireless networks</subject><ispartof>Sustainability, 2020-11, Vol.12 (21), p.9179</ispartof><rights>2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>Attribution</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</citedby><cites>FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</cites><orcidid>0000-0002-9327-4523 ; 0000-0003-2489-6203 ; 0000-0001-9537-2832 ; 0000-0003-4033-2969</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,776,780,881,27903,27904</link.rule.ids><backlink>$$Uhttps://uphf.hal.science/hal-03691396$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>ElMamy, Sidi Boubacar</creatorcontrib><creatorcontrib>Mrabet, Hichem</creatorcontrib><creatorcontrib>Gharbi, Hassen</creatorcontrib><creatorcontrib>Jemai, Abderrazak</creatorcontrib><creatorcontrib>Trentesaux, Damien</creatorcontrib><title>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</title><title>Sustainability</title><description>A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.</description><subject>Access control</subject><subject>Authentication</subject><subject>Automatic</subject><subject>Availability</subject><subject>Big Data</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Comparative studies</subject><subject>Denial of service attacks</subject><subject>Engineering Sciences</subject><subject>Enterprise resource planning</subject><subject>Factories</subject><subject>Industry 4.0</subject><subject>Internet of Things</subject><subject>Learning algorithms</subject><subject>Literature reviews</subject><subject>Manufacturing</subject><subject>Preventive maintenance</subject><subject>Privacy</subject><subject>Product development</subject><subject>Quality of life</subject><subject>Radio frequency identification</subject><subject>Real time</subject><subject>Security</subject><subject>Security services</subject><subject>Sensors</subject><subject>Sustainability</subject><subject>Technology</subject><subject>Wireless networks</subject><issn>2071-1050</issn><issn>2071-1050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpNkF9LwzAUxYsoOHQvfoKATwqd-dM0zeMs6gYDH9yeQ5Ima2dtZtIO--1tqaj35V4uv3M4nCi6QXBBCIcPoUMYI44YP4tmGDIUI0jh-b_7MpqHcIDDEDKA6SwSS_DW-ZPpgWtAWxqwC3JvgLPgsXb6XZeyasDW6LJxtdv3wDoP8l4ZH29Lb2QbQDXpcte05qsdleum6ELre5As4HV0YWUdzPxnX0W756dtvoo3ry_rfLmJNcG8jWnBkaWYp6m2hWIZpylKFaK4yIqEaoW5Koi1TBGqOaYpVhhmFlLNFFOSMXIV3U2-pazF0Vcf0vfCyUqslhsx_iBJOSI8PaGBvZ3Yo3efnQmtOLjON0M8gWmSsQSRZHS8nyjtXQje2F9bBMXYt_jrm3wD3Ydvtg</recordid><startdate>20201104</startdate><enddate>20201104</enddate><creator>ElMamy, Sidi Boubacar</creator><creator>Mrabet, Hichem</creator><creator>Gharbi, Hassen</creator><creator>Jemai, Abderrazak</creator><creator>Trentesaux, Damien</creator><general>MDPI AG</general><general>MDPI</general><scope>AAYXX</scope><scope>CITATION</scope><scope>4U-</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-9327-4523</orcidid><orcidid>https://orcid.org/0000-0003-2489-6203</orcidid><orcidid>https://orcid.org/0000-0001-9537-2832</orcidid><orcidid>https://orcid.org/0000-0003-4033-2969</orcidid></search><sort><creationdate>20201104</creationdate><title>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</title><author>ElMamy, Sidi Boubacar ; Mrabet, Hichem ; Gharbi, Hassen ; Jemai, Abderrazak ; Trentesaux, Damien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Automatic</topic><topic>Availability</topic><topic>Big Data</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Comparative studies</topic><topic>Denial of service attacks</topic><topic>Engineering Sciences</topic><topic>Enterprise resource planning</topic><topic>Factories</topic><topic>Industry 4.0</topic><topic>Internet of Things</topic><topic>Learning algorithms</topic><topic>Literature reviews</topic><topic>Manufacturing</topic><topic>Preventive maintenance</topic><topic>Privacy</topic><topic>Product development</topic><topic>Quality of life</topic><topic>Radio frequency identification</topic><topic>Real time</topic><topic>Security</topic><topic>Security services</topic><topic>Sensors</topic><topic>Sustainability</topic><topic>Technology</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>ElMamy, Sidi Boubacar</creatorcontrib><creatorcontrib>Mrabet, Hichem</creatorcontrib><creatorcontrib>Gharbi, Hassen</creatorcontrib><creatorcontrib>Jemai, Abderrazak</creatorcontrib><creatorcontrib>Trentesaux, Damien</creatorcontrib><collection>CrossRef</collection><collection>University Readers</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Sustainability</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>ElMamy, Sidi Boubacar</au><au>Mrabet, Hichem</au><au>Gharbi, Hassen</au><au>Jemai, Abderrazak</au><au>Trentesaux, Damien</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</atitle><jtitle>Sustainability</jtitle><date>2020-11-04</date><risdate>2020</risdate><volume>12</volume><issue>21</issue><spage>9179</spage><pages>9179-</pages><issn>2071-1050</issn><eissn>2071-1050</eissn><abstract>A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/su12219179</doi><orcidid>https://orcid.org/0000-0002-9327-4523</orcidid><orcidid>https://orcid.org/0000-0003-2489-6203</orcidid><orcidid>https://orcid.org/0000-0001-9537-2832</orcidid><orcidid>https://orcid.org/0000-0003-4033-2969</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2071-1050 |
ispartof | Sustainability, 2020-11, Vol.12 (21), p.9179 |
issn | 2071-1050 2071-1050 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_03691396v1 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB Electronic Journals Library |
subjects | Access control Authentication Automatic Availability Big Data Blockchain Cloud computing Communication Comparative studies Denial of service attacks Engineering Sciences Enterprise resource planning Factories Industry 4.0 Internet of Things Learning algorithms Literature reviews Manufacturing Preventive maintenance Privacy Product development Quality of life Radio frequency identification Real time Security Security services Sensors Sustainability Technology Wireless networks |
title | A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0 |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T18%3A30%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20on%20the%20Usage%20of%20Blockchain%20Technology%20for%20Cyber-Threats%20in%20the%20Context%20of%20Industry%204.0&rft.jtitle=Sustainability&rft.au=ElMamy,%20Sidi%20Boubacar&rft.date=2020-11-04&rft.volume=12&rft.issue=21&rft.spage=9179&rft.pages=9179-&rft.issn=2071-1050&rft.eissn=2071-1050&rft_id=info:doi/10.3390/su12219179&rft_dat=%3Cproquest_hal_p%3E2548741347%3C/proquest_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2548741347&rft_id=info:pmid/&rfr_iscdi=true |