Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA)

Aurel Vlaicu University of Arad, Romania. Dec 17-19, 2021

A Review on Cyber-Physical Systems based on


Blockchain: Possibilities and Challenges
Bhawana Sushil Kumar
School of Computer and Systems Sciences (SC&SS) School of Computer and Systems Sciences (SC&SS)
Jawaharlal Nehru University Jawaharlal Nehru University
New Delhi, India-110067 New Delhi, India-110067
bhawan63_scs@jnu.ac.in skdohare@mail.jnu.ac.in
2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA) | 978-1-6654-1473-9/21/$31.00 ©2021 IEEE | DOI: 10.1109/ICCCA52192.2021.9666299

Abstract—Cyber-Physical Systems (CPS) and the Internet updation in the physical systems with seamless network
of Things (IoT) are booming technologies for researchers and connectivity and refinement to control actuation operations
industries that are closely correlated to each other to perform by the end-users. Kelvin Ashton first coined the term IoT in
task-oriented operations. The IoT is a collection of smart 1999 [5] to explain a system where the physical world is
sensor devices connected with the internet whereas, the CPS connected with the internet via smart sensor devices or smart
incorporates the computation, networking, control, and IoT devices [6]. The things in the IoT indicate the physical or
monitoring of these smart sensor devices remotely. As a result, virtual entity that exists and moves in the physical space and
privacy and security are deeply affected due to eavesdroppers can be distinguished [7]. The IoT generates a massive
or attackers. Further, the range of CPS applications
amount of data using smart sensor devices and forwards this
comprising IoT suffers from various challenges, including
robustness, trust, data breach, availability, single point of
data to the centralized system for processing to perform real-
failure, and interoperability because of the existing centralized time actuation operations. However, these smart sensor
architecture. Therefore, incorporating decentralized devices pose several challenges, such as security and
technology such as blockchain is required to overcome the CPS privacy, due to their resource constraint nature. The current
challenges and ensure immutability, fault tolerance, and centralized system used for the CPS is suitable for small-
consistency using the consensus mechanism and smart contract scale applications but shortly unable to fulfill the need of
implementation. In this context, this paper provides a continuously growing large-scale Next-gen CPS. Also, a
systematic review of blockchain and CPS incorporating IoT. single point of failure, data breaches, operation delay,
The provided survey is divided into three categories such as scalability, lack of trust, and transparency are common issues
security, privacy, and trust. These three categories explain the associated with the centralized system of CPS. Therefore,
use of blockchain to overcome security attacks and threats, moving the CPS to the decentralized system will resolve
privacy preservation, and trust management issues by many problems [8].
combining different latest techniques such as cloud computing,
edge computing, machine learning, artificial intelligence, side- Today’s most popular decentralized system is blockchain
chain, etc. which has gained much attention in recent years due to its
distributed architecture and removal of centralized regulatory
Keywords—Cyber-physical Systems, Internet of Things, authority. The blockchain is a peer-to-peer (P2P) network
Blockchain, Security, Privacy, Trust. that records all the timestamp transactions generated by CPS
smart devices and users. Every transaction is stored in an
I. INTRODUCTION immutable ledger maintained by network participants
The fast development in Cyber-Physical Systems (CPS) belonging to the ecosystem of the CPS to avoid
evolved many new applications such as smart industrial disagreement. The distributed architecture of the blockchain
control systems, smart grid systems, smart transportation solves many challenges associated with CPS, such as
systems, smart healthcare systems, etc. These applications scalability, security, data integrity, trust, and transparency, as
connect the cyber and physical world to perform efficient well as reduces the installation and maintenance cost
operations. The term CPS was initially mentioned by Helen associated with the centralized system. A generalized view of
Gill around 2006 at the US National Science Foundation [1]. blockchain for reconstructing CPS to overcome various
CPS means connecting the cyber and physical world by challenges, consisting of WSN and IoT, as shown in Fig. 1.
combining sensing, computing, networking, and actuation
processes with the potential to transform the way we interact Blockchain
Enable decentralized

with the surrounding [2]-[3]. The CPS consists of various


security and privacy
Enable decentralized

components, i.e., sensors and actuators connected and


integrated under a centralized smart decision-making system
trust

to fulfill a specific task. In recent years, the CPS strongly Integrates


connects with multi-disciplinary realms such as Wireless
Sensor Networks (WSN), Internet of Things (IoT), Next-
generation CPS (Next-gen CPS), and focusing on
redesigning the existing centralized system architectures [4]. WSN

Among all the realms, the IoT gives rise to Next-gen IoT
CPS, which indicates the industry 4.0 to empower interactive CPS
Next-gen CPS
functionality between the physical and cyber worlds. The
bringing of IoT in Next-gen CPS enables the manipulation or Fig. 1: Diagrammatic View of Blockchain for CPS

978-1-6654-1473-9/21/$31.00 ©2021 IEEE 691


Authorized licensed use limited to: National Institute of Technology Patna. Downloaded on July 12,2023 at 10:09:17 UTC from IEEE Xplore. Restrictions apply.
The motivation behind this paper is to provide a detailed require permission from the centralized authority to join the
description of blockchain and integration of blockchain in blockchain network or become valid blockchain nodes.
the CPS with other emerging technologies as machine Further, they can leave the blockchain network at any point
learning (ML), artificial intelligence (AI), hybrid computing, in time without affecting blockchain functioning. The most
edger computing, etc., by the mean of published research common public blockchains are Ethereum, Bitcoin,
papers. The rest of the paper is structured as follows. Section Litecoin, IOTA, etc.
II explains the background related to blockchain. The related
review is presented in Section III. Section IV presents a b) Private/Permissioned Blockchain: The private
proposed systematic review on blockchain and CPS based on blockchain permits only known participants to become
three properties, i.e., privacy, security, and trust. Section V authorized blockchain nodes. It requires permission from a
describes the blockchain challenges and possible solutions. centralized authority to join the blockchain network for
Finally, the paper concluded in Section VI. accessing block transactions and participation in the
consensus process. The very well-known private blockchain
II. BACKGROUND are Hyperledger, Multichain, etc.
A. Blockchain Evolution Overview and Definition c) Consortium/Federated Blockchain: The consortium
blockchain is an extension of private blockchain managed
The evolution of blockchain starts to promote a new
by a group of pre-selected participants instead of a single
digital cryptocurrency called Bitcoin for commercial
transactions independent of banks and countries proposed by authority. This type of blockchain is semi-decentralized or
an unknown person named Satoshi Nakamoto [9]. Bitcoin is semi-private, which is not open for everyone having each
a cryptocurrency that uses blockchain technology to circulate participant with equal power. The very famous consortium
Bitcoin globally without including any trusted intermediary, blockchains are Quorum, R3 Corda, etc.
e.g., banks. However, to achieve confidentiality among E. Characteristics of Blockchain
people while using Bitcoin, numerous cryptographic
functions and security are used to protect against the double- Blockchain combines many vital features [17] to make
spend problem [10]. After analyzing the Bitcoin blockchain, itself unique from other emerging technology to fit into the
the other developer and researcher communities explore the CPS domain to solve many issues discussed below.
possibilities of developing new blockchain platforms and Decentralization: The decentralized architecture provides
applications in the financial sector [11] and vertical many advantages over a centralized system, such as
industries [12] other than cryptocurrencies. The blockchain is scalability, fault tolerance, immutability, trust, tractability,
a distributed ledger technology that stores the provenance of transparency, and robustness.
records using transaction blocks to remove control of trusted Tamper-proofing: Each block in blockchain links to the
centralized authorities. previous block through a cryptographic hash to form a chain
of trust. For instance, if any malicious node tries to modify
B. Block Structure the block’s content, it requires to changes the hash of all
The block is the fundamental unit of blockchain, divided subsequent blocks. That is easy to trace, which makes
into two parts, i.e., block header and block body [13]. The blockchain more secure and tamper-proof.
block header consists of block version, present block hash, Anonymity: To interact with the blockchain network, each
merkle tree hash, timestamp, nBits, and nonce. In contrast, user requires blockchain-generated public/private key pairs.
the block body comprises a set of transactions that holds These key pairs hide the user’s real-world identity efficiently
related information. The merkle tree hash indicates a hash with no centralized control by a trusted third party.
value corresponding to the collection of transactions Transparency: Blockchain provides a high level of
transparency by sharing transaction information on the
proposed in the same block generated using hashing
blockchain network, visible to all authorized blockchain
techniques, e.g., SHA256, digital signature, MD5, etc.
nodes.
C. Smart Contract Better security: Blockchain provides better protection using
cryptographic techniques such as ECDSA, SHA-256, digital
The idea behind the smart contract is not new and was
signature, etc., to protect against malicious actions which
initially invented by Nick Szabo in 1994 [14] before the
lead to change in information.
evolution of blockchain. The smart contract is an opinion to
translate the conceptual clauses into the script to eliminate III. RELATED REVIEW
the intermediary role. According to the blockchain, the
This section presents the existing literature surveys
smart contract is a self-executable code that executes an published by many authors based on the blockchain and
agreement’s terms once the predetermined conditions are CPS. Some authors considered the IoT applications while
satisfied. Thus, the smart contract promises a low mentioning the advantage of using blockchain technology in
transaction fee w.r.t. centralized system that requires a different CPS domains. In [18], the authors systematically
trusted intermediary to execute an agreement’s terms and reviewed various CPS applications where blockchain has
conditions [15]. been utilized. A mathematical model is proposed based on a
D. Types of Blockchain decision support system to identify the benefit of bringing
the blockchain to CPS applications. In [19], the authors
The blockchain is primarily classified into three presented an in-depth review of blockchain-enabled CPS.
categories, i.e., public, private, and consortium blockchain The advantage of using blockchain for CPS is indicated via
[16], which are described below. subjective logic. Further, nine blockchain-based operations
a) Public/Permissionless Blockchain: The public are considered w.r.t. CPS applications. These operations are
blockchain is open to everyone. The participants do not classified according to sensitivity and throughput, which are

692
Authorized licensed use limited to: National Institute of Technology Patna. Downloaded on July 12,2023 at 10:09:17 UTC from IEEE Xplore. Restrictions apply.
correlated with the blockchain. In [20], the authors suggested variational autoencoder algorithms are applied in the
a blockchain-based CPS according to security and privacy-preserving module to protect data integrity and
operational viewpoints. In addition, a graphical inference attack. Further, a recurrent neural network
representation is indicated to show the research work, which algorithm is used in the anomaly detection module for
summarizes the existing study in an organized manner. In anomaly detection. In the future, apply the proposed
[21], the authors suggest using blockchain for cyber threats framework on various datasets from smart power networks to
w.r.t. industry 4.0. It is evident from the results that only evaluate scalability and utility. In [25], the authors presented
60% of the work ensures confidentiality and integrity, and a decentralized pseudonym management scheme for the
the rest of the 20% confirm availability and privacy. In [22], internet of connected vehicles, which uses public key
the authors detailed existing state-of-art consensus infrastructure and shuffle operation for privacy-preserving
algorithms and highlighted their strengths and weakness in for different vehicles. In [26], the authors developed a
decentralized CPS applications. The importance of privacy-preserving publish/subscribe model based on
blockchain-enabled consensus mechanisms is presented in blockchain for the IoT system. A lightweight public key
various verticals of CPS applications encryption with equality test protocol is employed to encrypt
the topic for subscriber privacy. In [27], the authors proposed
To date, various surveys are conducted by authors that a privacy-preserving support vector machine (SVM) training
fulfill their objective by explaining the bringing of scheme based on blockchain called secureSVM. Further, a
blockchain in CPS with IoT. Most of the authors are focused secure building block is designed using holomorphic
on CPS applications, while others on security and privacy. cryptosystem and Paillier properties to ensure the privacy of
In this context, we presented a systematic survey on numerous IoT data providers. In the future, various privacy-
blockchain and CPS by highlighting privacy preservation, preserving ML algorithms will develop on multipart
cybersecurity attacks and threats, and trust mechanisms. To encrypted datasets. In [28], the authors presented a
provide better visibility by explaining the use of blockchain trustworthy privacy-preserving secured framework (TP2SF)
to cure various CPS issues. for the smart city using blockchain and ML techniques.
Further, a CloudBlock-FogBlock architecture is utilized to
IV. ROLE OF BLOCKCHAIN FOR CPS deploy TP2SF, which integrated blockchain-IPFS strategy to
The blockchain-based solution has been adopted to support traceability, immutability, verifiability, etc. In [29],
address the CPS challenges, eliminating the trusted third the authors proposed a secure and privacy-preserving meter
parties to safeguard the information in a decentralized way. data aggregation framework based on a two-tier hierarchal
This section provides a systematic survey of using blockchain for the smart grid. An adaptive homomorphism
blockchain in the CPS domain with IoT, including future encryption technique is used to protect from attackers, and
direction. The study review is categorized into three areas, PBFT consensus is adopted to improve framework
i.e., privacy, security, and trust, as shown in Fig. 2. In the efficiency. In the future, refinement of consensus algorithm
privacy section, we focus on privacy preservation using is suggested.
blockchain. On the other side, the security section is further B. Blockchain for Cybersecurity Attacks in CPS
subdivided into two sub-sections, describing the use of
blockchain to preserve various cybersecurity attacks and In [30], the authors proposed a blockchain-enabled
threats, Furthermore, the trust section contains the trust framework for IoT devices to detect and prevent denial of
system, trust management, and trust protocol driven by service (DoS) attacks in a group of compromised IoT devices
distributed technology for CPS, is explained below. using a smart contract and static resource allocation
mechanism. In [31], the authors presented a blockchain-
Blockchain for CPS enabled framework to detect distributed denial of service
(DDoS) attacks in the IoT network through lightweight
Privacy Security Trust
agents. These agents shared outbound traffic information and
utilized the consensus algorithm to collaboratively identify
x Privacy Preservation
Cybersecurity
Attacks
Cybersecurity
Threats
x Trust system the possible victims, i.e., infected IoT devices. Further, to
x Trust management
x Trust protocol
make the proposed system more robust and resilient against
x DoS or DDoS attack x Malware detection faulty nodes (e.g., agents). A validity checking mechanism is
x Eavesdropping x Anomaly detection
attack x Intruction detection employed to protect from hiding any sensitive information
x Man-in-middle-
attack
related to the DDoS attack and the integrity of provided
x Replay attack information. In [32], the authors designed an IoT smart home
x Spoofing attack
architecture using blockchain and cloud computing called
Fig. 2: Classification of Survey Research Method SH-BlockCC. A security analysis algorithm, namely
A. Blockchain for Privacy Preservation in CPS multivariate correlation based on extraction technique, is
proposed to analyse the network traffic and identify
In [23], the authors designed a blockchain-facilitated DoS/DDOS attacks in an IoT smart home network. Further, a
smart grid system that incorporates three layers. The Diffie-Hellman encryption algorithm and lightweight
integration of blockchain achieves decentralization and hashing are utilized to achieve integrity and confidentially. In
reliable data provenance whereas, an attribute-enabled token [33], the authors proposed a blockchain-based ad-hoc
verification scheme based on identity mixer technology is vehicular network architecture to bring trust, security, and
used for privacy preservation of end-users interface. In the reliability among connected vehicles while sharing
future, deploy an architecture in an emulated smart grid information and network resources. In the proposed scheme,
environment to evaluate performance. In [24], the authors various analyses are performed to protect against malicious
proposed a blockchain-enabled framework for smart power activity in which an encryption mechanism is utilized based
networks, including two-level privacy-preserving and on the secondary key. In [34], the authors presented an IoT-
anomaly detection modules. An enhanced proof of work and

693
Authorized licensed use limited to: National Institute of Technology Patna. Downloaded on July 12,2023 at 10:09:17 UTC from IEEE Xplore. Restrictions apply.
based decentralized network production environment using information based on clustering and multi-feature Naïve
private blockchain to solve trusty and secure data Bayes classifier algorithm, which further stores the malware
management issues. Every entity receives a digital identity information into the blockchain for future analysis. In [44],
using cryptographic key pair based on secp256k1 ECDSA to the authors suggested a blockchain and multi-level deep
authenticate each other in a decentralized manner to mitigate learning-enabled framework for android IoT devices to
several attacks. In the future, privacy-enhancing techniques detect malware activities. Additionally, the smart contracts
will apply on top of the private blockchain. In [35], the are used to verify the malicious application and approve or
authors proposed a secure and lightweight device deny for downloading and uploading the harmful android
authentication protocol for the medical cyber-physical applications, which helps to provide better security for the
system (MCPS) using blockchain. Meanwhile, the BAN (i.e., IoT devices. In [45], the author proposed a collaborative
Burrow, Abadi, and Needham) logic is utilized to check the instruction detection approach using blockchain for
feasibility of the proposed protocol, security of session key, mutilmicrogrid (MMG). For enhancing the accuracy of
and mutual authentication process. The author suggested instruction detection in the MMG, a multi-pattern-based
extending the protocol logic to the other application domains proposal generation is presented. Further, an improved
and integrating private blockchain in the future. In [36], the delegated proof-of-stake consensus algorithm is designed to
authors presented a blockchain-enabled framework to achieve agreement and removal of trusted centralized
uniquely identify the edge devices using physical unclonable authority/server. In [46], the author designed a lightweight
functions in IoT systems. Additionally, a secure blockchain-enabled collaborative anomaly detection
communication protocol is proposed for edge devices using a framework (CIoTA) for IoT devices. A self-attestation and
cryptographic secure random number generator and one-time consensus mechanism is utilized to update the anomaly
password to protect numerous attacks. N gateways utilize to information in a trusted manner via blockchain. In the future,
access a given device in the future, which justifies the use of upgrade CIoTA to support various frameworks and
local blockchain infrastructure data set. In [37], the authors improvisation in its anomaly detection capabilities.
designed an efficient lightweight blockchain-based
radiofrequency identification-enabled authentication protocol D. Blockchain for Trust in CPS
for the supply chain in the 5G mobile computing In [47], the authors designed a blockchain-enabled
environment called LBRAPS. This secure authentication signature storage model to store the signature information of
protocol manages the initialization and mutual authentication the devices exchanging data to ensure trust among the
phase, utilizing one-way cryptographic hash, XOR, and participants. In the future, focus on lowering the transaction
bitwise rotation operations to secure against various attacks. cost of the proposed solution. In [48], the authors presented a
In the future, plan to implement the LBRAPS in a real-time three-level blockchain architecture for data integrity
environment. In [38], the authors presented a blockchain- verification produced by IoT devices in the IoT-CPS
enabled IoT device-to-device authentication protocol for environment. A proof-of-trust mechanism based on
smart city applications using 5G technology called lightweight trustful space-time protocol is proposed to
BIDASCA5G. Designing proposed protocol SHA-1 and achieve time-deterministic, energy-efficient, and secure
ECC primitives are used for authentication between IoT communication. In the future, investigate the utilization of
devices without involving gateway nodes. In the future, hash functions to verify the integrity of specific data. In [49],
consider a blockchain environment for IoT device the authors presented a trust enabling system based on
authentication. In [39], the authors presented a delay- blockchain for the cyber-physical trust system (CPTS). A
sensitive blockchain-enabled access control and public-key cryptographic approach is suggested for data
authentication mechanism for lightweight IoT devices in an exchange between IoT devices and blockchain to bring trust.
IoT system. The proposed mechanism is based on proof-of- In the future, perform in-depth formal and informal security
concept consensus, fog computing, and ECDSA algorithm to analysis. In [50], the authors designed a distributed trust
protect from cyber-attacks. In the future, focus on the management model for an IoT network using holochain to
development of a new lightweight consensus algorithm. In overcome scalability issues. The model is divided into two
[40], the authors designed a two-tier system model to explain layers to securely update and distribute trust information
the secure storage and sharing of medical records in MCPS. between IoT devices without including a centralized
Further, a certificateless aggregate signature scheme is administrator. Also, address the integrity and security
proposed based on multiple trapdoor hash functions to problems by using a unique private digital signature scheme.
enhance the blockchain-enabled MCPS. In the future, to In the future, a demonstration w.r.t. achieving scalability and
improve security, the lattice-based digital signature will be security against misleading trust assessment and code
utilized. injection is performed. In [51], the authors proposed a
federated trust management architecture for sensor devices of
C. Blockchain for Cybersecurity Threats in CPS the IoT network. The fog/edge nodes are used to evaluate a
In [41], the authors presented a cloud-based deep trust value corresponding to each resource-constraint sensor
blockchain model for intrusion detection, which utilized node. Further, a request-reply protocol with an encryption
bidirectional long short-term memory deep learning technique is employed to avoid eavesdropping. A digital
algorithm to discover cyber-attacks. In [42], the authors signature is considered to protect against malicious code
presented blockchain-based tracking and liability attribute injection activity. In [52], the authors presented a
framework to facilitate tracking for CPS object behaviors blockchain-enabled trustworthy edge caching mechanism for
within the smart controlled business environment to support mobile users in the mobile cyber-physical system. A trust
resilience by enabling proactive insider threat detection. In management mechanism is proposed for mobile users to
[43], the authors proposed a model using permissioned access edge node’s trust information. Further, a min-max
blockchain and ML to enhance malware detection for logic-based resource allocation algorithm is designed for
android IoT devices. The ML approach extracts the malware allocating caching resources according to the mobile user’s

694
Authorized licensed use limited to: National Institute of Technology Patna. Downloaded on July 12,2023 at 10:09:17 UTC from IEEE Xplore. Restrictions apply.
optimal demands. In the future, focus on increasing edge covers things in the physical space and utilizes its
nodes profits and quality of experience for mobile users by capabilities to fetch data and fulfill time-oriented operations
considering the content caching monitor approach. In [53], more efficiently. Moreover, various security, privacy, and
the authors proposed a trust enabling system component for trust challenges are currently associated with existing CPS
CPTS using distributed ledger technology. A proof-of- models. In this context, an alternative decentralized approach
concept is implemented to conduct an in-depth performance is required to overcome all these issues. Blockchain and its
analysis based on Dev-system, surface-Go, and Raspberry- inherent property, such as decentralization data storage,
pi. Also, the security analysis was performed for formal and secure protocol, consensus algorithm, and smart contracts,
informal approaches based on the Dolev-Yao adversary are suitable for building a secure, robust and reliable system
attack model. In [54], the authors presented a distrusted trust by integrating other latest technologies that fit well with
model for the IoT to bring trust between the IoT devices CPS. This paper provides a systematic survey of CPS based
without depending on any common root of trust. on blockchain incorporating IoT. The paper is categorized
Furthermore, a protocol is used for bridging trust based on a into three sections, i.e., privacy, security, and trust. In the
three-way handshaking protocol composed of setup, spend, privacy section, various privacy-preserving techniques are
and fulfilling phases to protect from security attacks. described proposed by numerous authors. The security
section focuses on the security attacks and threats present in
V. BLOCKCHAIN CHALLENGES FOR CPS the CPS and their solution using blockchain. Apart from this,
As shown in Fig. 3, there are numerous challenges to trust is an important factor in the CPS. In this context, a
applying blockchain directly in the CPS domain or detailed review of trust management and trust system is
applications [55]. The smart sensor devices embedded in the presented in the trust system using a distributed system.
CPS are responsible for generating huge data volume.
However, storing this continuously growing information of REFERENCES
CPS onto the blockchain may raise the high storage cost for [1] K. J. Park, R. Zheng, and X. Liu, “Cyber-physical systems:
the mining nodes (i.e., manage complete details of Milestones and research challenges,” Comput. Commun., vol. 36,
no. 1, pp. 1–7, 2012, doi: 10.1016/j.comcom.2012.09.006.
blockchain). Further, the mining process in the blockchain [2] V. Dedeoglu et al., “A Journey in Applying Blockchain for
requires high computational resources and dedicated Cyberphysical Systems,” 2020 Int. Conf. Commun. Syst. NETworkS,
hardware to validate the newly created block, which COMSNETS 2020, no. January, pp. 383–390, 2020, doi:
introduces high energy consumption. Thus, these dedicated 10.1109/COMSNETS48256.2020.9027487.
hardware poses scalability issues. In the P2P or distributed [3] I. Graja, S. Kallel, N. Guermouche, S. Cheikhrouhou, and A. Hadj
Kacem, “A comprehensive survey on modeling of cyber-physical
network, the increasing number of CPS smart devices systems,” Concurr. Comput. , vol. 32, no. 15, pp. 1–18, 2020, doi:
indirectly influences the consensus process, which adds 10.1002/cpe.4850.
delays in the transaction confirmation time. Furthermore, in [4] A. Bagula, O. Ajayi, and H. Maluleke, “Cyber physical systems
the blockchain-based CPS applications, an adversary can dependability using cps-iot monitoring,” Sensors, vol. 21, no. 8, pp.
backtrack a participant’s (i.e., user) real identity for misuse 1–23, 2021, doi: 10.3390/s21082761.
by observing the transaction details, which leads to privacy [5] “Kevin Ashton - Wikipedia.”
https://en.wikipedia.org/wiki/Kevin_Ashton (accessed Aug. 06,
issues. On the other side, there is a huge problem of fake 2021).
block generation in the blockchain, also refers as forking. [6] D. Li, “IFIP Advances in Information and Communication
Technology: Preface,” IFIP Adv. Inf. Commun. Technol., vol. 393
Blockchain AICT, no. PART 2, 2013, doi: 10.1007/978-3-642-36137-1.
challenges [7] R. Basir et al., “Fog computing enabling industrial internet of
things: State-of-the-art and research challenges,” Sensors
High High Storage High Energy Lack of
(Switzerland), vol. 19, no. 21, 2019, doi: 10.3390/s19214807.
Delay
Forking
Cost Consumption Privacy
Scalability [8] H. F. Atlam and G. B. Wills, Technical aspects of blockchain and
IoT, 1st ed., vol. 115, no. December. Elsevier Inc., 2019.
Fig. 3: Different Blockchain Challenges [9] C. S. Wright, “Bitcoin: A Peer-to-Peer Electronic Cash System,”
SSRN Electron. J., pp. 1–9, 2019, doi: 10.2139/ssrn.3440802.
The latest technologies such as ML and AI can be [10] C. Pinzón and C. Rocha, “Double-spend Attack Models with Time
incorporated with the blockchain to resolve the above-raised Advantange for Bitcoin,” Electron. Notes Theor. Comput. Sci., vol.
challenges. These technologies help CPS to protect from 329, pp. 79–103, 2016, doi: 10.1016/j.entcs.2016.12.006.
multiple attacks by analyzing the different attacks patterns. [11] D. B. Rawat, V. Chaudhary, and R. Doku, “Blockchain: Emerging
Applications and Use Cases,” 2019, [Online]. Available:
Also, cloud computing, edge computing, hybrid clouds, or http://arxiv.org/abs/1904.12247.
side-chains concept could be used with blockchain as an [12] K. Zīle and R. Strazdiņa, “Blockchain Use Cases and Their
alternative solution for the storage and scalability issues. Feasibility,” Appl. Comput. Syst., vol. 23, no. 1, pp. 12–20, 2018,
Finally, zero-knowledge proofs, ring signatures, and group doi: 10.2478/acss-2018-0002.
signatures can be utilized for the privacy problem while [13] H. Wang, Z. Zheng, S. Xie, H. N. Dai, and X. Chen, “Blockchain
challenges and opportunities: a survey,” Int. J. Web Grid Serv., vol.
designing a solution for the CPS to bring anonymity to the 14, no. 4, p. 352, 2018, doi: 10.1504/ijwgs.2018.10016848.
distributed network. [14] “First Monday: Formalizing and Securing Relationships on Public
Networks.”
VI. CONCLUSION https://firstmonday.org/ojs/index.php/fm/article/download/548/469
(accessed Jul. 24, 2021).
The CPS brings the capabilities to reorganize, coordinate [15] M. Alharby and A. van Moorsel, “Blockchain Based Smart
and communicate with the physical and cyber world through Contracts : A Systematic Mapping Study,” pp. 125–140, 2017, doi:
smart sensors, actuators, and control devices. The 10.5121/csit.2017.71011.
interconnection between cyber and physical environment is [16] “Types of Blockchains - Decide which one is better for your
achieved through centralized architecture leading to a single Investment Needs - DataFlair.” https://data-
point of failure which interrupts various operations and flair.training/blogs/types-of-blockchain/ (accessed Jul. 23, 2021).
[17] J. Dattani and H. Sheth, “Overview of Blockchain Technology,” vol.
services. On the other side, integration of IoT with CPS V, no. I, pp. 1–3.

695
Authorized licensed use limited to: National Institute of Technology Patna. Downloaded on July 12,2023 at 10:09:17 UTC from IEEE Xplore. Restrictions apply.
[18] H. Rathore, A. Mohamed, and M. Guizani, “A survey of blockchain 2018, doi: 10.1109/Cybermatics_2018.2018.00193.
enabled cyber-physical systems,” Sensors (Switzerland), vol. 20, no. [37] S. Jangirala, A. K. Das, and S. Member, “Authentication Protocol
1, pp. 1–28, 2020, doi: 10.3390/s20010282. for Supply Chains in 5G Mobile Edge Computing Environment,”
[19] W. Zhao, S. Member, C. Jiang, H. Gao, and S. Member, IEEE Trans. Ind. Informatics, vol. 16, no. 11, pp. 7081–7093, 2020,
“Blockchain-Enabled Cyber – Physical Systems : A Review,” vol. 8, doi: 10.1109/TII.2019.2942389.
no. 6, pp. 4023–4034, 2021. [38] M. Vivekanandan and S. V. N. S. R. U, “BIDAPSCA5G :
[20] A. A. Khalil, J. Franco, I. Parvez, S. Uluagac, and M. A. Rahman, Blockchain based Internet of Things ( IoT ) device to device
“A Literature Review on Blockchain-enabled Security and authentication protocol for smart city applications using 5G
Operation of Cyber-Physical Systems.” technology,” pp. 403–419, 2021.
[21] Singh P. et.al. (2021) Combating Challenges in the Construction [39] Malsa N., et.al. (2021) Framework and Smart Contract for
Industry with Blockchain Technology. In: Mekhilef S., Favorskaya Blockchain Enabled Certificate Verification System Using Robotics.
M., Pandey R.K., Shaw R.N. (eds) Innovations in Electrical and In: Bianchini M., Simic M., Ghosh A., Shaw R.N. (eds) Machine
Electronic Engineering. Lecture Notes in Electrical Engineering, vol Learning for Robotics Applications. Studies in Computational
756. Springer, Singapore. https://doi.org/10.1007/978-981-16-0749- Intelligence, vol 960. Springer, Singapore.
3_56 https://doi.org/10.1007/978-981-16-0598-7_10
[22] U. Bodkhe, D. Mehta, S. Tanwar, P. Bhattacharya, P. K. Singh, and [40] B. M. Cyber, “sensors An E ffi cient Certificateless Aggregate
W. C. Hong, “A survey on decentralized consensus mechanisms for Signature,” pp. 1–24.
cyber physical systems,” IEEE Access, vol. 8, pp. 54371–54401, [41] O. Alkadi, N. Moustafa, S. Member, B. Turnbull, K. R. Choo, and
2020, doi: 10.1109/ACCESS.2020.2981415. S. Member, “A Deep Blockchain Framework-enabled Collaborative
[23] X. Liang, S. Shetty, D. K. Tosh, J. Zhao, D. Li, and J. Liu, “A Intrusion Detection for Protecting IoT and Cloud Networks,” vol.
reliable data provenance and privacy preservation architecture for 4662, no. c, pp. 1–12, 2020, doi: 10.1109/JIOT.2020.2996590.
business-driven cyber-physical systems using blockchain,” Int. J. [42] G. Ahmadi-assalemi, J. Cosson, H. Jahankhani, and G. Epiphaniou,
Inf. Secur. Priv., vol. 12, no. 4, pp. 68–81, 2018, doi: “Federated Blockchain-based Tracking and Liability Attribution
10.4018/IJISP.2018100105. Framework for Employees and Cyber- Physical Objects in a Smart
[24] M. Keshk, B. Turnbull, N. Moustafa, D. Vatsalan, and K. K. R. Workplace.”
Choo, “A Privacy-Preserving-Framework-Based Blockchain and [43] Rajawat A.S., et.al. (2021) Blockchain-Based Model for Expanding
Deep Learning for Protecting Smart Power Networks,” IEEE Trans. IoT Device Data Security. In: Bansal J.C., Fung L.C.C., Simic M.,
Ind. Informatics, vol. 16, no. 8, pp. 5110–5118, 2020, doi: Ghosh A. (eds) Advances in Applications of Data-Driven
10.1109/TII.2019.2957140. Computing. Advances in Intelligent Systems and Computing, vol
[25] S. Bao, Y. U. E. Cao, A. O. Lei, P. Asuquo, Z. Sun, and M. Huth, 1319. Springer, Singapore. https://doi.org/10.1007/978-981-33-
“Pseudonym Management Through Blockchain : Cost-Efficient 6919-1_5.
Privacy Preservation on Intelligent Transportation Systems,” IEEE [44] N. Masla, et.al. "Reduction in Gas Cost for Blockchain Enabled
Access, vol. 7, pp. 80390–80403, 2019, doi: Smart Contract," 2021 IEEE 4th International Conference on
10.1109/ACCESS.2019.2921605. Computing, Power and Communication Technologies (GUCON),
[26] Milan Kumar, et. al, “Predictive Data Analysis for Energy 2021, pp. 1-6, doi: 10.1109/GUCON50781.2021.9573701.
Management of a Smart Factory Leading to Sustainability” Book [45] B. Hu, C. Zhou, Y. Tian, Y. Qin, and X. Junping, “Using
Chapter, Springer, “Innovations in Electrical and Electronic Blockchain for Multimicrogrid Systems,” IEEE Trans. Syst. Man,
Engineering” [ISBN 978-981-15-4691-4], Editors: Favorskaya, Cybern. Syst., vol. 49, no. 8, pp. 1720–1730, 2019, doi:
M.N., Mekhilef, S., Pandey, R.K., Singh, N. (Eds.) pp. 765- 10.1109/TSMC.2019.2911548.
773.2020 [46] T. Golomb, Y. Mirsky, and Y. Elovici, “CIoTA : C ollaborative IoT
[27] M. Shen, X. Tang, and L. Zhu, “Privacy-Preserving Support Vector A nomaly Detection via Blockchain,” no. February, 2018.
Machine Training Over Blockchain-Based Encrypted IoT Data in [47] B. K. Mohanta, U. Satapathy, M. R. Dey, S. S. Panda, and D. Jena,
Smart Cities,” vol. 6, no. 5, pp. 7702–7712, 2019. “Trust Management in Cyber Physical System using Blockchain,”
[28] P. Kumar, G. P. Gupta, and R. Tripathi, “rna lP,” J. Syst. Archit., p. 2020 11th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT
101954, 2020, doi: 10.1016/j.sysarc.2020.101954. 2020, 2020, doi: 10.1109/ICCCNT49239.2020.9225272.
[29] Y. Wang, F. Luo, Z. Dong, Z. Tong, and Y. Qiao, “Distributed [48] C. Machado and A. A. Frohlich, “IoT data integrity verification for
meter data aggregation framework based on Blockchain and cyber-physical systems using blockchain,” Proc. - 2018 IEEE 21st
homomorphic encryption,” vol. 4, pp. 30–37, 2019, doi: 10.1049/iet- Int. Symp. Real-Time Comput. ISORC 2018, pp. 83–90, 2018, doi:
cps.2018.5054. 10.1109/ISORC.2018.00019.
[30] U. Javaid and M. N. Aman, “Mitigating IoT Device based DDoS [49] A. Beckmann, A. Milne, J. Razafindrakoto, P. Kumar, M. Breach,
Attacks using Blockchain,” pp. 71–76, 2018. and N. Preining, “BlockchainǦ Based Cyber Physical Trust
[31] G. Spathoulas, N. Giachoudis, and G. Damiris, “Collaborative Systems,” IoT Secur., no. July 2020, pp. 265–277, 2020, doi:
Blockchain-Based Detection of Distributed Denial of Service 10.1002/9781119527978.ch14.
Attacks Based on Internet of Things Botnets,” 2019, doi: [50] R. T. Frahat, M. M. Monowar, and S. M. Buhari, “Model for IoT
10.3390/fi11110226. P2P Network,” 2019 2nd Int. Conf. Comput. Appl. Inf. Secur., pp. 1–
[32] S. Singh, I. H. Ra, W. Meng, M. Kaur, and G. H. Cho, “SH- 6, 2019.
BlockCC: A secure and efficient Internet of things smart home [51] A. S. Rajawat, et.al., "Scheme Invisible Internet Protocol (I2P) using
architecture based on cloud computing and blockchain technology,” Blockchain techniques for tracking Darkweb User Activities," 2021
Int. J. Distrib. Sens. Networks, vol. 15, no. 4, 2019, doi: IEEE 4th International Conference on Computing, Power and
10.1177/1550147719844159. Communication Technologies (GUCON), 2021, pp. 1-5, doi:
[33] S. Sharma, K. K. Ghanshala, and S. Mohan, “Blockchain-based 10.1109/GUCON50781.2021.9573880.
internet of vehicles (IoV): An efficient secure ad hoc vehicular [52] Q. Xu, Z. Su, and Q. Yang, “Blockchain-Based Trustworthy Edge
networking architecture,” IEEE 5G World Forum, 5GWF 2019 - Caching Scheme for Mobile Cyber-Physical System,” IEEE Internet
Conf. Proc., pp. 452–457, 2019, doi: 10.1109/5GWF.2019.8911664. Things J., vol. 7, no. 2, pp. 1098–1110, 2020, doi:
[34] D. Preuveneers, W. Joosen, and E. Ilie-Zudor, “Trustworthy data- 10.1109/JIOT.2019.2951007.
driven networked production for customer-centric plants,” Ind. [53] A. J. M. Milne, A. Beckmann, and P. Kumar, “Cyber-Physical Trust
Manag. Data Syst., vol. 117, no. 10, pp. 2305–2324, 2017, doi: Systems Driven by Blockchain,” IEEE Access, vol. 8, pp. 66423–
10.1108/IMDS-10-2016-0419. 66437, 2020, doi: 10.1109/ACCESS.2020.2984675.
[35] F. Chen, Y. Tang, X. Cheng, D. Xie, T. Wang, and C. Zhao, [54] R. Di Pietro, X. Salleras, M. Signorini, and E. Waisbard, “A
“Blockchain-Based Efficient Device Authentication Protocol for blockchain-based trust system for the internet of things,” Proc. ACM
Medical Cyber-Physical Systems,” Secur. Commun. Networks, vol. Symp. Access Control Model. Technol. SACMAT, pp. 77–83, 2018,
2021, no. 2, 2021, doi: 10.1155/2021/5580939. doi: 10.1145/3205977.3205993.
[36] U. Guin, P. Cui, and A. Skjellum, “Ensuring Proof-of-Authenticity [55] S. P. Mohanty, V. P. Yanambaka, E. Kougianos, and D. Puthal,
of IoT Edge Devices Using Blockchain Technology,” Proc. - IEEE “PUFchain: A Hardware-Assisted Blockchain for Sustainable
2018 Int. Congr. Cybermatics 2018 IEEE Conf. Internet Things, Simultaneous Device and Data Security in the Internet of Everything
Green Comput. Commun. Cyber, Phys. Soc. Comput. Smart Data, (IoE),” IEEE Consum. Electron. Mag., vol. 9, no. 2, pp. 8–16, 2020,
Blockchain, Comput. Inf. Technol. iThings/Gree, pp. 1042–1049, doi: 10.1109/MCE.2019.2953758.

696
Authorized licensed use limited to: National Institute of Technology Patna. Downloaded on July 12,2023 at 10:09:17 UTC from IEEE Xplore. Restrictions apply.

You might also like