A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0
Sidi Boubacar ElMamy,
Hichem Mrabet,
Hassen Gharbi,
Abderrazak Jemai and
Damien Trentesaux
Additional contact information
Sidi Boubacar ElMamy: Department of Computer Science, Faculty of Sciences of Tunis, University of Tunis El Manar, Tunis 2092, Tunisia
Hichem Mrabet: SERCOM-Laboratory, Tunisia Polytechnic School, Carthage University, Tunis 1054, Tunisia
Hassen Gharbi: National School of Computer Science (ENSI), Manouba University, Manouba 2010, Tunisia
Abderrazak Jemai: INSAT, SERCOM-Laboratory, Tunisia Polytechnic School, Carthage University, Tunis 1080, Tunisia
Damien Trentesaux: LAMIH-UMR CNRS, Université Polytechnique Hauts-de-France, 59313 Valenciennes, France
Sustainability, 2020, vol. 12, issue 21, 1-19
Abstract:
A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.
Keywords: Industry 4.0; blockchain; industrial internet of things (IIoT); cyber-security; cyber physical system (CPS); cloud computing; edge computing; smart manufacturing; sustainability (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2020
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (3)
Downloads: (external link)
https://www.mdpi.com/2071-1050/12/21/9179/pdf (application/pdf)
https://www.mdpi.com/2071-1050/12/21/9179/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:12:y:2020:i:21:p:9179-:d:440033
Access Statistics for this article
Sustainability is currently edited by Ms. Alexandra Wu
More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().