Skip to main content

Advertisement

Log in

A blockchain-based cyber-security for connected networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Both technical and commercial businesses have become increasingly interested in blockchain technology. The Internet of Things (IoT) was established out of the interconnectedness of numerous new technologies, such as wireless technology, the Internet, embedded automation systems, and micro-electromechanical devices. Manufacturing settings and activities have been successfully altered into the fourth industrial revolution, known as Industry 4.0, by applying cutting-edge technologies such as cloud computing (CC), cloud service provider (CSP), Information communication technologies (ICT), and Enterprise Model, as well as other technological advancements. Data management is characterized as acquiring data to make better business decisions; data about a corporation is processed, secured, and stored. In the early notion, there were connected contrivances and Machine-to-Machine (M2M) interactions, and transaction data is recorded on the Blockchain. Security is a challenging subject that must be carefully considered throughout a CSP's design and development phases. By focusing on such issues while taking into account the traditional characteristics of IoT/ IIoT-predicated environments, we proposed a Secure and Distributed Framework for Resource Management (SDFRM) in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system, the dynamic and trust-based Distributed Management Framework (DMF) of shared resource access, in this research article. Furthermore, to offer strong privacy assurances for Access Control (AC)-equivalent actions, a privacy-preserving approach is devised and implemented into the Distributed Management Framework (DMF). Based on blockchain technology and peer-to-peer networks, the recommended DMF provides for dynamic access control and system governance without relying on third-party vulnerabilities. A privacy-preserving technique is presented and implemented into the DMF to give adequate privacy safeguards for AC-related processes. With an average throughput of 98.15 percent, our proposal exceeds the Multichannel Blockchain regarding successful storage transactions.

Graphical Abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Hamid UZ, Zamzuri H, Limbu DK (2019) Internet of vehicle (iov) applications in expediting the implementation of the smart highway of autonomous vehicle: A survey, in Performability in the Internet of Things, 1260 Springer, pp. 137–157

  2. Müller JM, Kiel D, Voigt KI (2018) What drives the implementation of industry 4. 0? The role of opportunities and challenges in the context of sustainability. Sustain 10(no. 1):247

  3. Mohamed Said Frikhaa (2021) Sonia Mettali Gammara, Abdelkader Lahmadib, Laurent Andrey, “Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey.” Computer comm Journal 24(8):214–225

    Google Scholar 

  4. Zhao L, Wang J, Liu J, Kato N (2019) Routing for crowd management in smart cities: A deep reinforcement learning perspective. IEEE Commun Mag 57:88–93

    Article  Google Scholar 

  5. Guo R, Shi H, Zhao Q, Zheng D (2018) Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6:11

  6. Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDOs) flooding attacks. IEEE Communications Surveys & Tutorials 15(4):2046–2069

    Article  Google Scholar 

  7. Vakili M, Ghamsari M, Rezaei M (2020) Performance analysis and comparison of machine and deep learning algorithms for IoT data classification. arXiv preprint arXiv:2001.09636

  8. Grecuccio J, Giusto E, Fiori F, Rebaudengo M (2020) Combining blockchain and IoT: food-chain traceability and beyond. Energies 13(15):3820

    Article  Google Scholar 

  9. Husain SZ, Abououf M, Alblooshi M, Salah K (2018) Monetization of IoT data using smart contracts. IET Networks 8(1):32–37

    Google Scholar 

  10. Zhou S, Huang H, Chen W, Zhou P, Zheng Z, Guo S (2020) PIRATE: a blockchain-based secure framework of distributed machine learning in 5G networks. IEEE Network 34(6):84–91

    Article  Google Scholar 

  11. Chen Y, Su L, Xu J (2017) Distributed statistical machine learning in adversarial settings: byzantine gradient descent. Proceedings of the ACM on Measurement and Analysis of Computing Systems 1(2):1–25

    Google Scholar 

  12. da Costa KA, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: A survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157

    Article  Google Scholar 

  13. Al-Rawi HA, Ng MA, Yau K-LA (2015) Application of reinforcement learning to routing in distributed wireless networks: a review. Artif Intell Rev 43:381–416

    Article  Google Scholar 

  14. Wang H, Wang L, Zhou Z, Tao X, Pau G et al (2019) ‘Blockchain-based resource allocation model in fog computing. Appl Sci 9(24):5538

    Article  Google Scholar 

  15. Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID-based remote user authentication scheme for multi-server environment. Math Comput Model 58(12):85–95

    Article  Google Scholar 

  16. Haghi M, Thurow K, Stoll R (2017) Wearable devices in medical internet of things: Scientific research and commercially available devices. Healthcare Informatics Research 23(1):4–15

    Article  Google Scholar 

  17. Liang W, Huang W, Long J, Li KC, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J 7(7):6392–6401

    Article  Google Scholar 

  18. Elisa N, Yang L, Chao F, Cao Y (2018) A framework of blockchain-based secure and privacy-preserving E-government system. Wireless Netw 2018:1–11

    Google Scholar 

  19. Zhang P, Wang H, Hu C, Lin C (2016) On denial of service attacks in software-defined networks. IEEE Network 30(6):28–33

    Article  Google Scholar 

  20. Wang Y, Ye Z, Wan P, Zhao J (2019) A survey of dynamic spectrum al location based on reinforcement learning algorithms in cognitive radio networks. Artif Intell Rev 51:493–506

    Article  Google Scholar 

  21. Li L, Liu J, Cheng L, Qiu S, Wang W et al (2018) ‘CreditCoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles.’ IEEE Trans Intell Transp Syst 19(7):2204–2220

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Both Authors done different contributions testing and validtions and checking.

Corresponding author

Correspondence to Deepak choudhary.

Ethics declarations

Ethical approval and consent to participate

Not Applicable.

Human and animal ethics

Not Applicable.

Consent for publication

Yes.

Competing interests

No.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: 1- Track on Networking and Applications

Guest Editor: Vojislav B. Misic

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

choudhary, D., Pahuja, R. A blockchain-based cyber-security for connected networks. Peer-to-Peer Netw. Appl. 16, 1852–1867 (2023). https://doi.org/10.1007/s12083-023-01506-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01506-9

Keywords

Navigation