Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey

被引:0
作者
Sujith Samuel Mathew
Kadhim Hayawi
Nahom Aron Dawit
Ikbal Taleb
Zouheir Trabelsi
机构
[1] Zayed University,College of Technological Innovation
[2] UAE University,College of Information Technology
来源
Cluster Computing | 2022年 / 25卷
关键词
Anomaly-based IDS; Blockchain; Collaborative intrusion detection systems; Industry 4.0; Industrial internet of things; Signature-based IDS; Specification-based IDS; Trust management;
D O I
暂无
中图分类号
学科分类号
摘要
The advent of the Industrial Internet of Things (IIoT) integrates all manners of computing technologies, from tiny actuators to process-intensive servers. The distributed network of IoT devices relies on centralized architecture to compensate for their lack of resources. Within this complex network, it is crucial to ensure the security and privacy of data in the IIoT systems as they involve real-time functions that manage people’s movement and industrial materials like chemicals, radio-active goods, and large equipment. Intrusion Detection Systems (IDS) have been widely used to detect and thwart cyber-attacks on such systems. However, these are inefficient for the multi-layered IIoT networks which include heterogeneous protocol standards and topologies. With the need for a novel security method, the integration of collaborative IDS (CIDS) and blockchain has become a disruptive technology to ensure secure and trustable network transactions. Which detection methodology is suitable for this integration, and IIoT? Will blockchain render IIoT completely immune to cyber-attacks? In this paper, we provide a comprehensive review of the state of the art, analyze, and classify the integration approaches of CIDS and blockchain, and discuss suitable approaches for securing IIoT systems. We also categorize the major blockchain vulnerabilities with their potential losses to expose significant gaps for future research directions.
引用
收藏
页码:4129 / 4149
页数:20
相关论文
共 190 条
[1]  
Weiser M(1999)The computer for the 21st century ACM Sigmobile Mob. Comput. Commun. Rev. 3 3-11
[2]  
Lu Y(2019)The blockchain: State-of-the-art and research challenges J. Indust. Inform. Integr. 15 80-90
[3]  
Da Xu L(2014)Internet of things in industries: a survey IEEE Trans. Industr. Inf. 10 2233-2243
[4]  
He W(2012)Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things Inf. Technol. Manag. 13 205-216
[5]  
Li S(2020)A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT” J. Netw. Comput. Appl. 10 419-442
[6]  
Li Y(2016)Internet of things in industries: a survey for sustainable development Int. J. Innovat. Sustain. Dev. 107 944-961
[7]  
Hou M(2019)Industrial communication systems and their future challenges: next-generation ethernet, IIoT, and 5G Proc. IEEE 4 1-1
[8]  
Liu H(2020)FDA3: federated defense against adversarial attacks for cloud-based IIoT applications IEEE Trans. Ind. Inform. 10 15-602
[9]  
Liu Y(2014)Resource management in mobile sink based wireless sensor networks through cloud computing Model. Optim. Sci. Technol. 5 586-137280
[10]  
Sengupta J(2017)A comprehensive study of security of internet-of-things IEEE Trans. Emerg. Top. Comput. 9 137260-19