Blockchain for Cybersecurity in Cyber-Physical Systems

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease.

Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, online fraud, etc.

This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.

Author(s): Yassine Maleh, Mamoun Alazab, Imed Romdhani
Series: Advances in Information Security, 102
Publisher: Springer
Year: 2023

Language: English
Pages: 282
City: Cham

Preface
Contents
Editors and Contributors
About the Editors
Contributors
Cryptocurrency Wallets: Assessment and Security
1 Introduction
1.1 Crypto Wallets' Categories
1.2 Available Digital Wallets
2 Overview of Digital Wallets' Security
2.1 Cryptocurrency Wallet's Backup
2.2 Cryptocurrency Wallet's Encryption
2.3 Cold Wallets as Another Solution
2.4 Cryptocurrency Wallets and QR Code
3 Cryptocurrency Wallets' Security Objectives
4 Cryptocurrency Wallets' Adversary Model
5 Vulnerabilities in Cryptocurrency Wallets
5.1 Cryptocurrency Wallets' Attack Surface
5.2 Digital Wallet's Common Threats
6 Conclusion
References
Cyber-Physical Systems Security: Analysis, Opportunities, Challenges, and Future Prospects
1 Introduction
2 Overview of the Cyber-Physical System (CPS)
2.1 Principle of CPS Operations
2.2 Cyber-Physical System and Internet of Things
2.3 Cyber-Physical System Layers
2.4 Cyber-Physical System Model Types and Components
2.5 Challenges of Cyber-Physical System
3 CPS Security, Threat, and Attacks
3.1 Cyber-Physical System Security Issues
3.2 Cybersecurity
3.3 Cyber-Physical System Vulnerabilities
3.4 Cyber Attacks
4 Risk Assessment
4.1 Asset Identification
4.2 Threat Identification
4.3 Vulnerability Identification
5 Conclusion and Future Directions
References
Cybersecurity-Based Blockchain for Cyber-Physical Systems: Challenges and Applications
1 Introduction
2 Research Methodology
3 Blockchain (BC) Applications for Cyber-Physical Systems (CPS)
3.1 Health Care
3.2 Industrial Control Systems
3.3 Transportation
3.4 Smart Grid Systems
3.5 Cybersecurity
4 Blockchain-Enabled Cybersecurity in CPS
4.1 Cyber-Physical Systems Security
4.2 Data Authentication in Cyber-Physical Systems
5 Limitations and Open Research Issues
6 Conclusion
References
Trust Management in Cyber-Physical Systems: Issues and Challenges
1 Introduction
2 Backgrounds
2.1 Cyber Physical Systems
2.2 Different Features of CPSs
3 CPS: How Does It Operate?
3.1 Principle of CPS Operation
3.2 Integrated Technologies in CPS
4 Security Issues in CPS
4.1 Security Vulnerabilities in CPS
4.2 Security Attacks in CPS
5 Trust Management in CPS
5.1 Trust: Definitions and Classifications
5.2 Trust Management: How Does It Work?
5.3 Trust Criteria
5.4 Trust Management in CPS
6 Blockchain-Based Trust Management in CPS
6.1 Blockchain: Definition, Architecture, and Characteristics
6.2 Principle of Operation of Blockchain
6.3 Blockchain-Based Trust Management in CPS
7 Conclusion and Future Works
References
Blockchain-Based Authentication in IoT Environments: A Survey
1 Introduction
1.1 Problem Definition
1.2 Research Contribution
1.3 Chapter Layout
2 Preliminaries
2.1 Blockchain
2.2 Authentication
2.3 Authentication Attacks
3 Methodology
4 Blockchain and IoT Authentication
5 Discussions
5.1 Advantages of Using Blockchain in IoT Authentication
5.2 Challenges in Using Blockchain in IoT Authentication
6 Conclusions
References
Blockchain Technology-Based Smart Cities: A Privacy-Preservation Review
1 Introduction
2 Theoretical Background
3 Methodology
4 Proposed Solutions
4.1 User Identity Privacy
4.2 Generated Data Protection
4.3 Protection to the Data and to the Privacy of the Users
5 Discussion
6 Conclusion
References
Security in Electronic Health Records System: Blockchain-Based Framework to Protect Data Integrity
1 Introduction
2 Blockchain Technology
3 Related Work
4 Proposed Framework
4.1 Preliminary Studies
4.2 Develop a blockchain-Based EHR Data-Sharing Prototype
4.3 Implement a Web Application for Blockchain-Enabled EHR Data Sharing with Authentication
4.4 A Case Study: Blockchain-Based Medical Image Sharing and Critical-Result Notification
5 Discussion and Challenges
6 Conclusion
References
A Secure Data-Sharing Framework Based on Blockchain: Teleconsultation Use-Case
1 Introduction
2 Preliminaries
2.1 Blockchain
2.2 Distributed File Systems
2.3 Homomorphic Encryption
2.4 Broadcast Encryption
3 Related Works
4 Security Concerns
5 A Secure Data-Sharing Framework Based on Blockchain
5.1 Architecture
5.2 Perception Layer
5.3 Platform Layer
5.4 Decentralized Applications Layer
5.4.1 Distributed Storage Component
5.4.2 Smart Contract Component
5.5 Gateway Component
5.5.1 Encryption Process
5.5.2 Identification Process
5.5.3 Query Process
5.5.4 Decryption Process
5.6 Query Engine Component
5.7 Facade Layer
5.8 Cryptology Algorithms
5.9 Workflow
5.9.1 Storage
5.9.2 Data Owner Registration
5.9.3 Request Access
5.9.4 Data Sharing
6 Security Evaluation
6.1 Formal Description
6.1.1 Proposed Framework
6.1.2 Requirements
6.1.3 Assumptions
6.2 Formal Verification
6.2.1 Integrity
6.2.2 Confidentiality of Identification Information and Query
6.2.3 Confidentiality of Metadata
6.2.4 Confidentiality of Data (Access Control)
7 A Teleconsultation Use Case of the Proposed Secure Data-Sharing Framework
7.1 Discussion
8 Conclusion
References
Reputation-Based Consensus on a Secure Blockchain Network
1 Introduction
2 Problem Formulation
2.1 Weight-Based Consensus Algorithm
3 Proposed Reputation-Based Consensus Algorithm (RBCA)
4 Blockchain Implementation
5 Simulations
5.1 Test 1: Agent 1 Shares Non-compliant Time-Varying States
5.2 Test 2: Agent 1 Shares Non-compliant Constant States
6 Conclusions
References
AI and Blockchain for Cybersecurity in Cyber-Physical Systems: Challenges and Future Research Agenda
1 Introduction
2 Research Methodology
3 Background Details
3.1 AI-Framework for Cyber-Physical Security
3.2 Network, Threat, and Design Goal of CPS
4 Reported Work
4.1 Graph-Based Approach
4.2 Intrusion Detection Tree Approach
4.3 Federated Learning for Cyberattack
4.4 Deep Learning-Based Attack Detection
4.5 Signature-Based Malicious Behavior Detection
5 Comparative Analysis
6 Future Prospective
7 Conclusion
References
Assessing the Predictability of Bitcoin Using AI and Statistical Models
1 Introduction
1.1 A Blockchain-Enabled Cyber-Physical System
2 Literature Review
3 Methodology and Experiment
3.1 Models Used in the Study: LSTM and ARIMA
3.1.1 Data and Variables
3.1.2 Dependent Variable
3.1.3 Independent Variables
3.1.4 Feature Selection
3.1.5 Unit Root Testing
4 Results, Findings, Analysis, and Discussions
4.1 Time Series Analysis
4.2 Feature Engineering
4.3 Feature Visualization
4.4 Unit Root Result (Fig. 6)
4.5 Time Series Prediction
4.6 LSTM Results
4.7 ARIMA Results
4.8 Feature Significance
5 Results Discussion
6 Conclusion and Future Work
Appendices
Appendix A: Data Retrieval Sources
Appendix B: Model Data Pre-processing
Appendix C: ADF Test Scores
Appendix D: Findings
References
Blockchain-Based Novel Solution for Online Fraud Prevention and Detection
1 Introduction
1.1 Why Blockchain?
1.2 Advantages of Using Blockchain
1.3 Applications of Blockchain Banking Application
1.3.1 Cyber Security
1.3.2 Supply Chain Management
1.3.3 Health Sector
1.3.4 Governance
2 Types of Online Fraud
2.1 Types of Transactional Frauds
3 Literature Review
3.1 Types of Traditional Authentication Systems
4 Proposed Solution
5 Implementation
6 Results and Analysis
7 Limitations
8 Conclusions
References
Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain
1 Introduction
2 Related Work
2.1 Blockchain Architecture
2.2 Consensus Algorithm
2.3 Identification of Problem
3 Method
3.1 Leader Selection
3.2 Parameters/Inputs
3.3 Neural Network Architecture
3.4 Case Studies on Output and Dominant Feature Extraction
3.5 Pattern Validation and Back to Stability
4 Learning Methodology for Bias Pattern Validation
5 Results
6 Conclusion and Future Scope
References