(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Image Processing and Computer Vision (TIPCV)

ISSN (Print):    ISSN (Online):2455-4707
Volume-9 Issue-24 February-2023
Full-Text PDF
Paper Title : A review of blockchain cyber security
Author Name : Animesh Kumar Dubey
Abstract :

The aim of this review paper is to provide a comprehensive understanding of blockchain security. As cyber-attacks continue to increase, there is a growing need for secure technologies, and blockchain technology has emerged as a promising solution. However, this technology also faces its own set of challenges related to attacks and code encryption. The paper delves into these challenges, along with potential solutions for enhancing blockchain security. The review paper discusses various methods and techniques that have been proposed to ensure the security of blockchain technology. It covers topics such as consensus algorithms, encryption methods, and access control mechanisms. It provides detailed results about several methods used in blockchain security. The paper also discusses the potential implications of using blockchain technology for security purposes in different domains, such as finance, healthcare, and supply chain management. By providing a comprehensive understanding of the challenges and potential solutions in blockchain security, this review paper can serve as a useful resource for researchers and practitioners working in the field.

Keywords : Blockchain security, Cyber-attacks, Consensus algorithms, Encryption methods, Access control mechanisms.
Cite this article : Dubey AK. A review of blockchain cyber security. ACCENTS Transactions on Image Processing and Computer Vision. 2023; 9(24):1-8. DOI:10.19101/TIPCV.2023.924001.
References :
[1]Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KK. A systematic literature review of blockchain cyber security. Digital Communications and Networks. 2020; 6(2):147-56.
[Crossref] [Google Scholar]
[2]Zhang R, Xue R, Liu L. Security and privacy on blockchain. ACM Computing Surveys. 2019; 52(3):1-34.
[Crossref] [Google Scholar]
[3]Tanwar S, Bhatia Q, Patel P, Kumari A, Singh PK, Hong WC. Machine learning adoption in blockchain-based smart applications: the challenges, and a way forward. IEEE Access. 2019; 8:474-88.
[Crossref] [Google Scholar]
[4]Dwivedi AD, Srivastava G, Dhar S, Singh R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors. 2019; 19(2):1-17.
[Crossref] [Google Scholar]
[5]Islam MN, Kundu S. Enabling ic traceability via blockchain pegged to embedded puf. ACM Transactions on Design Automation of Electronic Systems. 2019; 24(3):1-23.
[Crossref] [Google Scholar]
[6]https://economictimes.indiatimes.com/markets/cryptocurrency/what-are-51-attacks-in-cryptocurrencies/articleshow/85802504.cms. Accessed 12 November 2022.
[7]https://www.cnbc.com/2022/08/10/hackers-have-stolen-1point4-billion-this-year-using-crypto-bridges.html. Accessed 12 November 2022.
[8]Demirkan S, Demirkan I, McKee A. Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics. 2020; 7(2):189-208.
[Crossref] [Google Scholar]
[9]Le Nguyen B, Lydia EL, Elhoseny M, Pustokhina I, Pustokhin DA, Selim MM, et al. Privacy preserving blockchain technique to achieve secure and reliable sharing of IoT data. Computers, Materials & Continua. 2020; 65(1):87-107.
[Google Scholar]
[10]Aldasoro I, Gambacorta L, Giudici P, Leach T. The drivers of cyber risk. Journal of Financial Stability. 2022.
[Crossref] [Google Scholar]
[11]Serrano W. The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities. Journal of Network and Computer Applications. 2021.
[Crossref] [Google Scholar]
[12]Maulani G, Gunawan G, Leli L, Nabila EA, Sari WY. Digital certificate authority with blockchain cybersecurity in education. International Journal of Cyber and IT Service Management. 2021; 1(1):136-50.
[Google Scholar]
[13]White J, Daniels C. Continuous cybersecurity management through blockchain technology. In technology & engineering management conference 2019 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[14]Zhuang P, Zamir T, Liang H. Blockchain for cybersecurity in smart grid: a comprehensive survey. IEEE Transactions on Industrial Informatics. 2020; 17(1):3-19.
[Crossref] [Google Scholar]
[15]Gimenez-Aguilar M, De Fuentes JM, Gonzalez-Manzano L, Arroyo D. Achieving cybersecurity in blockchain-based systems: a survey. Future Generation Computer Systems. 2021; 124:91-118.
[Crossref] [Google Scholar]
[16]Daim T, Lai KK, Yalcin H, Alsoubie F, Kumar V. Forecasting technological positioning through technology knowledge redundancy: patent citation analysis of IoT, cybersecurity, and blockchain. Technological Forecasting and Social Change. 2020.
[Crossref] [Google Scholar]
[17]Ghiasi M, Dehghani M, Niknam T, Kavousi-Fard A, Siano P, Alhelou HH. Cyber-attack detection and cyber-security enhancement in smart DC-microgrid based on blockchain technology and Hilbert Huang transform. IEEE Access. 2021; 9:29429-40.
[Crossref] [Google Scholar]
[18]Smith KJ, Dhillon G. Assessing blockchain potential for improving the cybersecurity of financial transactions. Managerial Finance. 2020; 46(6):833-48.
[Crossref] [Google Scholar]
[19]Abdulkader O, Bamhdi AM, Thayananthan V, Elbouraey F, Al-Ghamdi B. A lightweight blockchain based cybersecurity for IoT environments. In international conference on cyber security and cloud computing (CSCloud)/ 5th international conference on edge computing and scalable cloud 2019 (pp. 139-44). IEEE.
[Crossref] [Google Scholar]
[20]Mora OB, Rivera R, Larios VM, Beltrán-Ramírez JR, Maciel R, Ochoa A. A use case in cybersecurity based in blockchain to deal with the security and privacy of citizens and smart cities cyberinfrastructures. In international smart cities conference 2018 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[21]Giannoutakis KM, Spathoulas G, Filelis-Papadopoulos CK, Collen A, Anagnostopoulos M, Votis K, et al. A blockchain solution for enhancing cybersecurity defence of IoT. In international conference on blockchain 2020 (pp. 490-5). IEEE.
[Crossref] [Google Scholar]
[22]Wang X, Xu C, Zhou Z, Yang S, Sun L. A survey of blockchain-based cybersecurity for vehicular networks. International Wireless Communications and Mobile Computing. 2020:740-5.
[Crossref] [Google Scholar]
[23]Gourisetti NG, Mylrea M, Patangia H. Application of rank-weight methods to blockchain cybersecurity vulnerability assessment framework. In 9th annual computing and communication workshop and conference 2019 (pp. 206-13). IEEE.
[Crossref] [Google Scholar]
[24]Moradi J, Shahinzadeh H, Nafisi H, Gharehpetian GB, Shaneh M. Blockchain, a sustainable solution for cybersecurity using cryptocurrency for financial transactions in Smart Grids. In 24th electrical power distribution conference 2019 (pp. 47-53). IEEE.
[Crossref] [Google Scholar]
[25]Sun T, Yu W. A formal verification framework for security issues of blockchain smart contracts. Electronics. 2020; 9(2):1-23.
[Crossref] [Google Scholar]
[26]Khan MA, Abbas S, Rehman A, Saeed Y, Zeb A, Uddin MI, et al. A machine learning approach for blockchain-based smart home networks security. IEEE Network. 2020; 35(3):223-9.
[Crossref] [Google Scholar]
[27]Farooq MS, Khan S, Rehman A, Abbas S, Khan MA, Hwang SO. Blockchain-based smart home networks security empowered with fused machine learning. Sensors. 2022; 22(12):1-13.
[Crossref] [Google Scholar]
[28]Liu Y, Yu FR, Li X, Ji H, Leung VC. Blockchain and machine learning for communications and networking systems. IEEE Communications Surveys & Tutorials. 2020; 22(2):1392-431.
[Crossref] [Google Scholar]
[29]Li Y, Shan B, Li B, Liu X, Pu Y. Literature review on the applications of machine learning and blockchain technology in smart healthcare industry: a bibliometric analysis. Journal of Healthcare Engineering. 2021; 2021:1-11.
[Crossref] [Google Scholar]
[30]Shahbazi Z, Byun YC. Integration of blockchain, IoT and machine learning for multistage quality control and enhancing security in smart manufacturing. Sensors. 2021; 21(4):1-21.
[Crossref] [Google Scholar]
[31]Jamil F, Kahng HK, Kim S, Kim DH. Towards secure fitness framework based on IoT-enabled blockchain network integrated with machine learning algorithms. Sensors. 2021; 21(5):1-31.
[Crossref] [Google Scholar]
[32]Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F. A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Computer Networks. 2021.
[Crossref] [Google Scholar]