A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0

A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Sustainability 2020-11, Vol.12 (21), p.9179
Hauptverfasser: ElMamy, Sidi Boubacar, Mrabet, Hichem, Gharbi, Hassen, Jemai, Abderrazak, Trentesaux, Damien
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 21
container_start_page 9179
container_title Sustainability
container_volume 12
creator ElMamy, Sidi Boubacar
Mrabet, Hichem
Gharbi, Hassen
Jemai, Abderrazak
Trentesaux, Damien
description A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.
doi_str_mv 10.3390/su12219179
format Article
fullrecord <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_03691396v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2548741347</sourcerecordid><originalsourceid>FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</originalsourceid><addsrcrecordid>eNpNkF9LwzAUxYsoOHQvfoKATwqd-dM0zeMs6gYDH9yeQ5Ima2dtZtIO--1tqaj35V4uv3M4nCi6QXBBCIcPoUMYI44YP4tmGDIUI0jh-b_7MpqHcIDDEDKA6SwSS_DW-ZPpgWtAWxqwC3JvgLPgsXb6XZeyasDW6LJxtdv3wDoP8l4ZH29Lb2QbQDXpcte05qsdleum6ELre5As4HV0YWUdzPxnX0W756dtvoo3ry_rfLmJNcG8jWnBkaWYp6m2hWIZpylKFaK4yIqEaoW5Koi1TBGqOaYpVhhmFlLNFFOSMXIV3U2-pazF0Vcf0vfCyUqslhsx_iBJOSI8PaGBvZ3Yo3efnQmtOLjON0M8gWmSsQSRZHS8nyjtXQje2F9bBMXYt_jrm3wD3Ydvtg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2548741347</pqid></control><display><type>article</type><title>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB Electronic Journals Library</source><creator>ElMamy, Sidi Boubacar ; Mrabet, Hichem ; Gharbi, Hassen ; Jemai, Abderrazak ; Trentesaux, Damien</creator><creatorcontrib>ElMamy, Sidi Boubacar ; Mrabet, Hichem ; Gharbi, Hassen ; Jemai, Abderrazak ; Trentesaux, Damien</creatorcontrib><description>A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.</description><identifier>ISSN: 2071-1050</identifier><identifier>EISSN: 2071-1050</identifier><identifier>DOI: 10.3390/su12219179</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Authentication ; Automatic ; Availability ; Big Data ; Blockchain ; Cloud computing ; Communication ; Comparative studies ; Denial of service attacks ; Engineering Sciences ; Enterprise resource planning ; Factories ; Industry 4.0 ; Internet of Things ; Learning algorithms ; Literature reviews ; Manufacturing ; Preventive maintenance ; Privacy ; Product development ; Quality of life ; Radio frequency identification ; Real time ; Security ; Security services ; Sensors ; Sustainability ; Technology ; Wireless networks</subject><ispartof>Sustainability, 2020-11, Vol.12 (21), p.9179</ispartof><rights>2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>Attribution</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</citedby><cites>FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</cites><orcidid>0000-0002-9327-4523 ; 0000-0003-2489-6203 ; 0000-0001-9537-2832 ; 0000-0003-4033-2969</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,776,780,881,27903,27904</link.rule.ids><backlink>$$Uhttps://uphf.hal.science/hal-03691396$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>ElMamy, Sidi Boubacar</creatorcontrib><creatorcontrib>Mrabet, Hichem</creatorcontrib><creatorcontrib>Gharbi, Hassen</creatorcontrib><creatorcontrib>Jemai, Abderrazak</creatorcontrib><creatorcontrib>Trentesaux, Damien</creatorcontrib><title>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</title><title>Sustainability</title><description>A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.</description><subject>Access control</subject><subject>Authentication</subject><subject>Automatic</subject><subject>Availability</subject><subject>Big Data</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Comparative studies</subject><subject>Denial of service attacks</subject><subject>Engineering Sciences</subject><subject>Enterprise resource planning</subject><subject>Factories</subject><subject>Industry 4.0</subject><subject>Internet of Things</subject><subject>Learning algorithms</subject><subject>Literature reviews</subject><subject>Manufacturing</subject><subject>Preventive maintenance</subject><subject>Privacy</subject><subject>Product development</subject><subject>Quality of life</subject><subject>Radio frequency identification</subject><subject>Real time</subject><subject>Security</subject><subject>Security services</subject><subject>Sensors</subject><subject>Sustainability</subject><subject>Technology</subject><subject>Wireless networks</subject><issn>2071-1050</issn><issn>2071-1050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpNkF9LwzAUxYsoOHQvfoKATwqd-dM0zeMs6gYDH9yeQ5Ima2dtZtIO--1tqaj35V4uv3M4nCi6QXBBCIcPoUMYI44YP4tmGDIUI0jh-b_7MpqHcIDDEDKA6SwSS_DW-ZPpgWtAWxqwC3JvgLPgsXb6XZeyasDW6LJxtdv3wDoP8l4ZH29Lb2QbQDXpcte05qsdleum6ELre5As4HV0YWUdzPxnX0W756dtvoo3ry_rfLmJNcG8jWnBkaWYp6m2hWIZpylKFaK4yIqEaoW5Koi1TBGqOaYpVhhmFlLNFFOSMXIV3U2-pazF0Vcf0vfCyUqslhsx_iBJOSI8PaGBvZ3Yo3efnQmtOLjON0M8gWmSsQSRZHS8nyjtXQje2F9bBMXYt_jrm3wD3Ydvtg</recordid><startdate>20201104</startdate><enddate>20201104</enddate><creator>ElMamy, Sidi Boubacar</creator><creator>Mrabet, Hichem</creator><creator>Gharbi, Hassen</creator><creator>Jemai, Abderrazak</creator><creator>Trentesaux, Damien</creator><general>MDPI AG</general><general>MDPI</general><scope>AAYXX</scope><scope>CITATION</scope><scope>4U-</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-9327-4523</orcidid><orcidid>https://orcid.org/0000-0003-2489-6203</orcidid><orcidid>https://orcid.org/0000-0001-9537-2832</orcidid><orcidid>https://orcid.org/0000-0003-4033-2969</orcidid></search><sort><creationdate>20201104</creationdate><title>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</title><author>ElMamy, Sidi Boubacar ; Mrabet, Hichem ; Gharbi, Hassen ; Jemai, Abderrazak ; Trentesaux, Damien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c329t-5d91f52966cfdb7895616b152d8d45cb29bd3ff7b35c92562b208f05c7b7ba773</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Automatic</topic><topic>Availability</topic><topic>Big Data</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Comparative studies</topic><topic>Denial of service attacks</topic><topic>Engineering Sciences</topic><topic>Enterprise resource planning</topic><topic>Factories</topic><topic>Industry 4.0</topic><topic>Internet of Things</topic><topic>Learning algorithms</topic><topic>Literature reviews</topic><topic>Manufacturing</topic><topic>Preventive maintenance</topic><topic>Privacy</topic><topic>Product development</topic><topic>Quality of life</topic><topic>Radio frequency identification</topic><topic>Real time</topic><topic>Security</topic><topic>Security services</topic><topic>Sensors</topic><topic>Sustainability</topic><topic>Technology</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>ElMamy, Sidi Boubacar</creatorcontrib><creatorcontrib>Mrabet, Hichem</creatorcontrib><creatorcontrib>Gharbi, Hassen</creatorcontrib><creatorcontrib>Jemai, Abderrazak</creatorcontrib><creatorcontrib>Trentesaux, Damien</creatorcontrib><collection>CrossRef</collection><collection>University Readers</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Sustainability</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>ElMamy, Sidi Boubacar</au><au>Mrabet, Hichem</au><au>Gharbi, Hassen</au><au>Jemai, Abderrazak</au><au>Trentesaux, Damien</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0</atitle><jtitle>Sustainability</jtitle><date>2020-11-04</date><risdate>2020</risdate><volume>12</volume><issue>21</issue><spage>9179</spage><pages>9179-</pages><issn>2071-1050</issn><eissn>2071-1050</eissn><abstract>A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/su12219179</doi><orcidid>https://orcid.org/0000-0002-9327-4523</orcidid><orcidid>https://orcid.org/0000-0003-2489-6203</orcidid><orcidid>https://orcid.org/0000-0001-9537-2832</orcidid><orcidid>https://orcid.org/0000-0003-4033-2969</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2071-1050
ispartof Sustainability, 2020-11, Vol.12 (21), p.9179
issn 2071-1050
2071-1050
language eng
recordid cdi_hal_primary_oai_HAL_hal_03691396v1
source MDPI - Multidisciplinary Digital Publishing Institute; EZB Electronic Journals Library
subjects Access control
Authentication
Automatic
Availability
Big Data
Blockchain
Cloud computing
Communication
Comparative studies
Denial of service attacks
Engineering Sciences
Enterprise resource planning
Factories
Industry 4.0
Internet of Things
Learning algorithms
Literature reviews
Manufacturing
Preventive maintenance
Privacy
Product development
Quality of life
Radio frequency identification
Real time
Security
Security services
Sensors
Sustainability
Technology
Wireless networks
title A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T18%3A30%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20on%20the%20Usage%20of%20Blockchain%20Technology%20for%20Cyber-Threats%20in%20the%20Context%20of%20Industry%204.0&rft.jtitle=Sustainability&rft.au=ElMamy,%20Sidi%20Boubacar&rft.date=2020-11-04&rft.volume=12&rft.issue=21&rft.spage=9179&rft.pages=9179-&rft.issn=2071-1050&rft.eissn=2071-1050&rft_id=info:doi/10.3390/su12219179&rft_dat=%3Cproquest_hal_p%3E2548741347%3C/proquest_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2548741347&rft_id=info:pmid/&rfr_iscdi=true