ACCENTS Transactions on Image Processing and Computer Vision (TIPCV) ISSN (O): 2455-4707 Vol - 9, Issue - 24, February 2023

  1. Google Scholar

  2. Citation

  3. Impact Factor
A review of blockchain cyber security

Animesh Kumar Dubey

Abstract

The aim of this review paper is to provide a comprehensive understanding of blockchain security. As cyber-attacks continue to increase, there is a growing need for secure technologies, and blockchain technology has emerged as a promising solution. However, this technology also faces its own set of challenges related to attacks and code encryption. The paper delves into these challenges, along with potential solutions for enhancing blockchain security. The review paper discusses various methods and techniques that have been proposed to ensure the security of blockchain technology. It covers topics such as consensus algorithms, encryption methods, and access control mechanisms. It provides detailed results about several methods used in blockchain security. The paper also discusses the potential implications of using blockchain technology for security purposes in different domains, such as finance, healthcare, and supply chain management. By providing a comprehensive understanding of the challenges and potential solutions in blockchain security, this review paper can serve as a useful resource for researchers and practitioners working in the field.

Keyword

Blockchain security, Cyber-attacks, Consensus algorithms, Encryption methods, Access control mechanisms.

Cite this article

Refference

[1][1]Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KK. A systematic literature review of blockchain cyber security. Digital Communications and Networks. 2020; 6(2):147-56.

[2][2]Zhang R, Xue R, Liu L. Security and privacy on blockchain. ACM Computing Surveys. 2019; 52(3):1-34.

[3][3]Tanwar S, Bhatia Q, Patel P, Kumari A, Singh PK, Hong WC. Machine learning adoption in blockchain-based smart applications: the challenges, and a way forward. IEEE Access. 2019; 8:474-88.

[4][4]Dwivedi AD, Srivastava G, Dhar S, Singh R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors. 2019; 19(2):1-17.

[5][5]Islam MN, Kundu S. Enabling ic traceability via blockchain pegged to embedded puf. ACM Transactions on Design Automation of Electronic Systems. 2019; 24(3):1-23.

[6][6]https://economictimes.indiatimes.com/markets/cryptocurrency/what-are-51-attacks-in-cryptocurrencies/articleshow/85802504.cms. Accessed 12 November 2022.

[7][7]https://www.cnbc.com/2022/08/10/hackers-have-stolen-1point4-billion-this-year-using-crypto-bridges.html. Accessed 12 November 2022.

[8][8]Demirkan S, Demirkan I, McKee A. Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics. 2020; 7(2):189-208.

[9][9]Le Nguyen B, Lydia EL, Elhoseny M, Pustokhina I, Pustokhin DA, Selim MM, et al. Privacy preserving blockchain technique to achieve secure and reliable sharing of IoT data. Computers, Materials & Continua. 2020; 65(1):87-107.

[10][10]Aldasoro I, Gambacorta L, Giudici P, Leach T. The drivers of cyber risk. Journal of Financial Stability. 2022.

[11][11]Serrano W. The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities. Journal of Network and Computer Applications. 2021.

[12][12]Maulani G, Gunawan G, Leli L, Nabila EA, Sari WY. Digital certificate authority with blockchain cybersecurity in education. International Journal of Cyber and IT Service Management. 2021; 1(1):136-50.

[13][13]White J, Daniels C. Continuous cybersecurity management through blockchain technology. In technology & engineering management conference 2019 (pp. 1-5). IEEE.

[14][14]Zhuang P, Zamir T, Liang H. Blockchain for cybersecurity in smart grid: a comprehensive survey. IEEE Transactions on Industrial Informatics. 2020; 17(1):3-19.

[15][15]Gimenez-Aguilar M, De Fuentes JM, Gonzalez-Manzano L, Arroyo D. Achieving cybersecurity in blockchain-based systems: a survey. Future Generation Computer Systems. 2021; 124:91-118.

[16][16]Daim T, Lai KK, Yalcin H, Alsoubie F, Kumar V. Forecasting technological positioning through technology knowledge redundancy: patent citation analysis of IoT, cybersecurity, and blockchain. Technological Forecasting and Social Change. 2020.

[17][17]Ghiasi M, Dehghani M, Niknam T, Kavousi-Fard A, Siano P, Alhelou HH. Cyber-attack detection and cyber-security enhancement in smart DC-microgrid based on blockchain technology and Hilbert Huang transform. IEEE Access. 2021; 9:29429-40.

[18][18]Smith KJ, Dhillon G. Assessing blockchain potential for improving the cybersecurity of financial transactions. Managerial Finance. 2020; 46(6):833-48.

[19][19]Abdulkader O, Bamhdi AM, Thayananthan V, Elbouraey F, Al-Ghamdi B. A lightweight blockchain based cybersecurity for IoT environments. In international conference on cyber security and cloud computing (CSCloud)/ 5th international conference on edge computing and scalable cloud 2019 (pp. 139-44). IEEE.

[20][20]Mora OB, Rivera R, Larios VM, Beltrán-Ramírez JR, Maciel R, Ochoa A. A use case in cybersecurity based in blockchain to deal with the security and privacy of citizens and smart cities cyberinfrastructures. In international smart cities conference 2018 (pp. 1-4). IEEE.

[21][21]Giannoutakis KM, Spathoulas G, Filelis-Papadopoulos CK, Collen A, Anagnostopoulos M, Votis K, et al. A blockchain solution for enhancing cybersecurity defence of IoT. In international conference on blockchain 2020 (pp. 490-5). IEEE.

[22][22]Wang X, Xu C, Zhou Z, Yang S, Sun L. A survey of blockchain-based cybersecurity for vehicular networks. International Wireless Communications and Mobile Computing. 2020:740-5.

[23][23]Gourisetti NG, Mylrea M, Patangia H. Application of rank-weight methods to blockchain cybersecurity vulnerability assessment framework. In 9th annual computing and communication workshop and conference 2019 (pp. 206-13). IEEE.

[24][24]Moradi J, Shahinzadeh H, Nafisi H, Gharehpetian GB, Shaneh M. Blockchain, a sustainable solution for cybersecurity using cryptocurrency for financial transactions in Smart Grids. In 24th electrical power distribution conference 2019 (pp. 47-53). IEEE.

[25][25]Sun T, Yu W. A formal verification framework for security issues of blockchain smart contracts. Electronics. 2020; 9(2):1-23.

[26][26]Khan MA, Abbas S, Rehman A, Saeed Y, Zeb A, Uddin MI, et al. A machine learning approach for blockchain-based smart home networks security. IEEE Network. 2020; 35(3):223-9.

[27][27]Farooq MS, Khan S, Rehman A, Abbas S, Khan MA, Hwang SO. Blockchain-based smart home networks security empowered with fused machine learning. Sensors. 2022; 22(12):1-13.

[28][28]Liu Y, Yu FR, Li X, Ji H, Leung VC. Blockchain and machine learning for communications and networking systems. IEEE Communications Surveys & Tutorials. 2020; 22(2):1392-431.

[29][29]Li Y, Shan B, Li B, Liu X, Pu Y. Literature review on the applications of machine learning and blockchain technology in smart healthcare industry: a bibliometric analysis. Journal of Healthcare Engineering. 2021; 2021:1-11.

[30][30]Shahbazi Z, Byun YC. Integration of blockchain, IoT and machine learning for multistage quality control and enhancing security in smart manufacturing. Sensors. 2021; 21(4):1-21.

[31][31]Jamil F, Kahng HK, Kim S, Kim DH. Towards secure fitness framework based on IoT-enabled blockchain network integrated with machine learning algorithms. Sensors. 2021; 21(5):1-31.

[32][32]Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F. A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Computer Networks. 2021.