scholarly journals A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0

2020 ◽  
Vol 12 (21) ◽  
pp. 9179
Author(s):  
Sidi Boubacar ElMamy ◽  
Hichem Mrabet ◽  
Hassen Gharbi ◽  
Abderrazak Jemai ◽  
Damien Trentesaux

A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.

The Distributed Denial of Service attack become one of the most adverse effects among all Cyber-attack due to the high availability of the internet and unprotected internetconnected communication devices. There are many mitigation solutions available to reduce the risk of DDoS attacks, and the researcher represents many techniques to get rid of the DDoS attacks. The main challenge to identify and mitigate the attack is that attack traffic mixes with the legitimate system user traffic so it becomes very important to block the attack traffic because it costs in terms of money and system reputation. Blockchain technology presents the ideology of decentralized distributed database and transaction without the need of any central authority. But utilization of blockchain is not only limited to the financial sector but supply chain, IoT, hospitality sector used blockchain most. The most attractive features of the blockchain like immutability, distributed makes the use of blockchain for mitigation of various Cyber-attacks, and one of them is DDoS Attacks. The solution of DDoS attacks that utilize the blockchain is still in the infancy phase. In this paper, we propose the review or survey of DDoS attacks solutions based on blockchain. And also present the comparative study of Blockchain-based DDoS mitigation solutions for non-IOT domain or system. This paper also gives brief about the features of this interconnection of two emerging domain named DDoS Attacks and Blockchain Technology.


2020 ◽  
Vol 2 (1) ◽  
pp. 349-356
Author(s):  
Wojciech Gliń ◽  
Renata Stasiak-Betlejewska

AbstractCurrently, the industry is called as Industry 4.0, Internet of Things, Industrial Internet of Things, where devices, machines, information, organizations and people are connected to the network. Every day meet new solutions for Industry 4.o can be met, but in parallel with these solutions there are also threats in the field of security of industrial networks. Such threats have been called cyber-attacks or cyber threats. Cybersecurity is the global name of a field aimed at counteracting all types of threats on the web. Cybersecurity is to raise awareness, inform, control and introduce solutions to counteract cyber threats. Enterprises, organizations dealing with the promotion of Industry 4.0, IoT, IIoT, form the appropriate groups, departments, companies whose goal is to counteract all types of cyber-attacks. At present, the thesis can be formulated that cybersecurity of the broadly understood network is more important than the implementation of Industry 4.0. The publication will attempt to present the threats that cybersecurity enterprises must face and the ways and methods to counter them.


2019 ◽  
Vol 37 (5) ◽  
pp. 796-810 ◽  
Author(s):  
Jeong Hoon Jo ◽  
Shailendra Rathore ◽  
Vincenzo Loia ◽  
Jong Hyuk Park

Purpose The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data. Design/methodology/approach The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data. Findings Analysis of the proposed architecture with a use case scenario demonstrates that it provides a robust security measure against unauthorized network intrusions. Originality/value Unlike the existing security zone, this paper adopts a method of storing data by using blockchain. It meets the need to study integrated authentication management methods of future research.


Energies ◽  
2020 ◽  
Vol 13 (21) ◽  
pp. 5583
Author(s):  
Kaikai Pan ◽  
Jingwei Dong ◽  
Elyas Rakhshani ◽  
Peter Palensky

The high penetration of renewable energy resources and power electronic-based components has led to a low-inertia power grid which would bring challenges to system operations. The new model of load frequency control (LFC) must be able to handle the modern scenario where controlled areas are interconnected by parallel AC/HVDC links and storage devices are added to provide virtual inertia. Notably, vulnerabilities within the communication channels for wide-area data exchange in LFC loops may make them exposed to various cyber attacks, while it still remains largely unexplored how the new LFC in the AC/HVDC interconnected system with emulated inertia would be affected under malicious intrusions. Thus, in this article, we are motivated to explore possible effects of the major types of data availability and integrity attacks—Denial of Service (DoS) and false data injection (FDI) attacks—on such a new LFC system. By using a system-theoretic approach, we explore the optimal strategies that attackers can exploit to launch DoS or FDI attacks to corrupt the system stability. Besides, a comparison study is performed to learn the impact of these two types of attacks on LFC models of power systems with or without HVDC link and emulated inertia. The simulation results on the the exemplary two-area system illustrate that both DoS and FDI attacks can cause large frequency deviations or even make the system unstable; moreover, the LFC system with AC/HVDC interconnections and emulated inertia could be more vulnerable to these two types of attacks in many adversarial scenarios.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5473
Author(s):  
Marek Sikora ◽  
Radek Fujdiak ◽  
Karel Kuchar ◽  
Eva Holasova ◽  
Jiri Misurec

In today’s world, the volume of cyber attacks grows every year. These attacks can cause many people or companies high financial losses or loss of private data. One of the most common types of attack on the Internet is a DoS (denial-of-service) attack, which, despite its simplicity, can cause catastrophic consequences. A slow DoS attack attempts to make the Internet service unavailable to users. Due to the small data flows, these attacks are very similar to legitimate users with a slow Internet connection. Accurate detection of these attacks is one of the biggest challenges in cybersecurity. In this paper, we implemented our proposal of eleven major and most dangerous slow DoS attacks and introduced an advanced attack generator for testing vulnerabilities of protocols, servers, and services. The main motivation for this research was the absence of a similarly comprehensive generator for testing slow DoS vulnerabilities in network systems. We built an experimental environment for testing our generator, and then we performed a security analysis of the five most used web servers. Based on the discovered vulnerabilities, we also discuss preventive and detection techniques to mitigate the attacks. In future research, our generator can be used for testing slow DoS security vulnerabilities and increasing the level of cyber security of various network systems.


2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


2018 ◽  
Vol 32 (2) ◽  
pp. 103-119
Author(s):  
Colleen M. Boland ◽  
Chris E. Hogan ◽  
Marilyn F. Johnson

SYNOPSIS Mandatory existence disclosure rules require an organization to disclose a policy's existence, but not its content. We examine policy adoption frequencies in the year immediately after the IRS required mandatory existence disclosure by nonprofits of various governance policies. We also examine adoption frequencies in the year of the subsequent change from mandatory existence disclosure to a disclose-and-explain regime that required supplemental disclosures about the content and implementation of conflict of interest policies. Our results suggest that in areas where there is unclear regulatory authority, mandatory existence disclosure is an effective and low cost regulatory device for encouraging the adoption of policies desired by regulators, provided those policies are cost-effective for regulated firms to implement. In addition, we find that disclose-and-explain regulatory regimes provide stronger incentives for policy adoption than do mandatory existence disclosure regimes and also discourage “check the box” behavior. Future research should examine the impact of mandatory existence disclosure rules in the year that the regulation is implemented. Data Availability: Data are available from sources cited in the text.


2021 ◽  
Vol 54 (7) ◽  
pp. 1-39
Author(s):  
Ankur Lohachab ◽  
Saurabh Garg ◽  
Byeong Kang ◽  
Muhammad Bilal Amin ◽  
Junmin Lee ◽  
...  

Unprecedented attention towards blockchain technology is serving as a game-changer in fostering the development of blockchain-enabled distinctive frameworks. However, fragmentation unleashed by its underlying concepts hinders different stakeholders from effectively utilizing blockchain-supported services, resulting in the obstruction of its wide-scale adoption. To explore synergies among the isolated frameworks requires comprehensively studying inter-blockchain communication approaches. These approaches broadly come under the umbrella of Blockchain Interoperability (BI) notion, as it can facilitate a novel paradigm of an integrated blockchain ecosystem that connects state-of-the-art disparate blockchains. Currently, there is a lack of studies that comprehensively review BI, which works as a stumbling block in its development. Therefore, this article aims to articulate potential of BI by reviewing it from diverse perspectives. Beginning with a glance of blockchain architecture fundamentals, this article discusses its associated platforms, taxonomy, and consensus mechanisms. Subsequently, it argues about BI’s requirement by exemplifying its potential opportunities and application areas. Concerning BI, an architecture seems to be a missing link. Hence, this article introduces a layered architecture for the effective development of protocols and methods for interoperable blockchains. Furthermore, this article proposes an in-depth BI research taxonomy and provides an insight into the state-of-the-art projects. Finally, it determines possible open challenges and future research in the domain.


Sign in / Sign up

Export Citation Format

Share Document