A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues.

作者: Saurabh Kumar Garg , Byeong Ho Kang , Muhammad Bilal Amin , Mutaz Barika , Khizar Hameed

DOI:

关键词:

摘要: Blockchain technology has taken on a leading role in today's industrial applications by providing salient features and showing significant performance since its beginning. began journey from the concept of cryptocurrency is now part range core to achieve resilience automation between various tasks. With integration into different applications, many application designs, security privacy challenges present themselves, posing serious threats users their data. Although several approaches have been proposed address specific needs targeted with functional parameters, there still need for research study application, challenges, requirements Blockchain-based along possible countermeasures. This presents state-of-the-art survey Industry 4.0 focusing crucial requirements, as well corresponding attacks systems potential We also analyse provide classification techniques used these enhance advancement features. Furthermore, we highlight some open issues that help design secure future directions.

参考文章(295)
Leslie Lamport, Constructing Digital Signatures from a One Way Function SRI International. ,(2016)
Z. Banković, J. C. Vallejo, D. Fraga, J. M. Moya, Detecting bad-mouthing attacks on reputation systems using self-organizing maps computational intelligence and security. pp. 9- 16 ,(2011) , 10.1007/978-3-642-21323-6_2
Sergio Martins, Yang Yang, Introduction to bitcoins: a pseudo-anonymous electronic currency system conference of the centre for advanced studies on collaborative research. pp. 349- 350 ,(2011)
Dorit Ron, Adi Shamir, Quantitative Analysis of the Full Bitcoin Transaction Graph financial cryptography. pp. 6- 24 ,(2013) , 10.1007/978-3-642-39884-1_2
Alex Biryukov, Chosen Plaintext and Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.). pp. 205- ,(2005)
Shiyong Wang, Jiafu Wan, Di Li, Chunhua Zhang, Implementing smart factory of Industrie 4.0: an outlook International Journal of Distributed Sensor Networks. ,vol. 2016, pp. 3159805- ,(2016) , 10.1155/2016/3159805
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5