Abstract
Both technical and commercial businesses have become increasingly interested in blockchain technology. The Internet of Things (IoT) was established out of the interconnectedness of numerous new technologies, such as wireless technology, the Internet, embedded automation systems, and micro-electromechanical devices. Manufacturing settings and activities have been successfully altered into the fourth industrial revolution, known as Industry 4.0, by applying cutting-edge technologies such as cloud computing (CC), cloud service provider (CSP), Information communication technologies (ICT), and Enterprise Model, as well as other technological advancements. Data management is characterized as acquiring data to make better business decisions; data about a corporation is processed, secured, and stored. In the early notion, there were connected contrivances and Machine-to-Machine (M2M) interactions, and transaction data is recorded on the Blockchain. Security is a challenging subject that must be carefully considered throughout a CSP's design and development phases. By focusing on such issues while taking into account the traditional characteristics of IoT/ IIoT-predicated environments, we proposed a Secure and Distributed Framework for Resource Management (SDFRM) in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system, the dynamic and trust-based Distributed Management Framework (DMF) of shared resource access, in this research article. Furthermore, to offer strong privacy assurances for Access Control (AC)-equivalent actions, a privacy-preserving approach is devised and implemented into the Distributed Management Framework (DMF). Based on blockchain technology and peer-to-peer networks, the recommended DMF provides for dynamic access control and system governance without relying on third-party vulnerabilities. A privacy-preserving technique is presented and implemented into the DMF to give adequate privacy safeguards for AC-related processes. With an average throughput of 98.15 percent, our proposal exceeds the Multichannel Blockchain regarding successful storage transactions.
Graphical Abstract
















Similar content being viewed by others
References
Hamid UZ, Zamzuri H, Limbu DK (2019) Internet of vehicle (iov) applications in expediting the implementation of the smart highway of autonomous vehicle: A survey, in Performability in the Internet of Things, 1260 Springer, pp. 137–157
Müller JM, Kiel D, Voigt KI (2018) What drives the implementation of industry 4. 0? The role of opportunities and challenges in the context of sustainability. Sustain 10(no. 1):247
Mohamed Said Frikhaa (2021) Sonia Mettali Gammara, Abdelkader Lahmadib, Laurent Andrey, “Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey.” Computer comm Journal 24(8):214–225
Zhao L, Wang J, Liu J, Kato N (2019) Routing for crowd management in smart cities: A deep reinforcement learning perspective. IEEE Commun Mag 57:88–93
Guo R, Shi H, Zhao Q, Zheng D (2018) Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6:11
Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDOs) flooding attacks. IEEE Communications Surveys & Tutorials 15(4):2046–2069
Vakili M, Ghamsari M, Rezaei M (2020) Performance analysis and comparison of machine and deep learning algorithms for IoT data classification. arXiv preprint arXiv:2001.09636
Grecuccio J, Giusto E, Fiori F, Rebaudengo M (2020) Combining blockchain and IoT: food-chain traceability and beyond. Energies 13(15):3820
Husain SZ, Abououf M, Alblooshi M, Salah K (2018) Monetization of IoT data using smart contracts. IET Networks 8(1):32–37
Zhou S, Huang H, Chen W, Zhou P, Zheng Z, Guo S (2020) PIRATE: a blockchain-based secure framework of distributed machine learning in 5G networks. IEEE Network 34(6):84–91
Chen Y, Su L, Xu J (2017) Distributed statistical machine learning in adversarial settings: byzantine gradient descent. Proceedings of the ACM on Measurement and Analysis of Computing Systems 1(2):1–25
da Costa KA, Papa JP, Lisboa CO, Munoz R, de Albuquerque VHC (2019) Internet of things: A survey on machine learning-based intrusion detection approaches. Comput Netw 151:147–157
Al-Rawi HA, Ng MA, Yau K-LA (2015) Application of reinforcement learning to routing in distributed wireless networks: a review. Artif Intell Rev 43:381–416
Wang H, Wang L, Zhou Z, Tao X, Pau G et al (2019) ‘Blockchain-based resource allocation model in fog computing. Appl Sci 9(24):5538
Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID-based remote user authentication scheme for multi-server environment. Math Comput Model 58(12):85–95
Haghi M, Thurow K, Stoll R (2017) Wearable devices in medical internet of things: Scientific research and commercially available devices. Healthcare Informatics Research 23(1):4–15
Liang W, Huang W, Long J, Li KC, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J 7(7):6392–6401
Elisa N, Yang L, Chao F, Cao Y (2018) A framework of blockchain-based secure and privacy-preserving E-government system. Wireless Netw 2018:1–11
Zhang P, Wang H, Hu C, Lin C (2016) On denial of service attacks in software-defined networks. IEEE Network 30(6):28–33
Wang Y, Ye Z, Wan P, Zhao J (2019) A survey of dynamic spectrum al location based on reinforcement learning algorithms in cognitive radio networks. Artif Intell Rev 51:493–506
Li L, Liu J, Cheng L, Qiu S, Wang W et al (2018) ‘CreditCoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles.’ IEEE Trans Intell Transp Syst 19(7):2204–2220
Author information
Authors and Affiliations
Contributions
Both Authors done different contributions testing and validtions and checking.
Corresponding author
Ethics declarations
Ethical approval and consent to participate
Not Applicable.
Human and animal ethics
Not Applicable.
Consent for publication
Yes.
Competing interests
No.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: 1- Track on Networking and Applications
Guest Editor: Vojislav B. Misic
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
choudhary, D., Pahuja, R. A blockchain-based cyber-security for connected networks. Peer-to-Peer Netw. Appl. 16, 1852–1867 (2023). https://doi.org/10.1007/s12083-023-01506-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01506-9