TY - JOUR
T1 - Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT
T2 - a survey
AU - Mathew, Sujith Samuel
AU - Hayawi, Kadhim
AU - Dawit, Nahom Aron
AU - Taleb, Ikbal
AU - Trabelsi, Zouheir
N1 - Funding Information:
The funding of this project was provided by Zayed University, UAE; Cluster Grant: R20140.
Publisher Copyright:
© 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2022/12
Y1 - 2022/12
N2 - The advent of the Industrial Internet of Things (IIoT) integrates all manners of computing technologies, from tiny actuators to process-intensive servers. The distributed network of IoT devices relies on centralized architecture to compensate for their lack of resources. Within this complex network, it is crucial to ensure the security and privacy of data in the IIoT systems as they involve real-time functions that manage people’s movement and industrial materials like chemicals, radio-active goods, and large equipment. Intrusion Detection Systems (IDS) have been widely used to detect and thwart cyber-attacks on such systems. However, these are inefficient for the multi-layered IIoT networks which include heterogeneous protocol standards and topologies. With the need for a novel security method, the integration of collaborative IDS (CIDS) and blockchain has become a disruptive technology to ensure secure and trustable network transactions. Which detection methodology is suitable for this integration, and IIoT? Will blockchain render IIoT completely immune to cyber-attacks? In this paper, we provide a comprehensive review of the state of the art, analyze, and classify the integration approaches of CIDS and blockchain, and discuss suitable approaches for securing IIoT systems. We also categorize the major blockchain vulnerabilities with their potential losses to expose significant gaps for future research directions.
AB - The advent of the Industrial Internet of Things (IIoT) integrates all manners of computing technologies, from tiny actuators to process-intensive servers. The distributed network of IoT devices relies on centralized architecture to compensate for their lack of resources. Within this complex network, it is crucial to ensure the security and privacy of data in the IIoT systems as they involve real-time functions that manage people’s movement and industrial materials like chemicals, radio-active goods, and large equipment. Intrusion Detection Systems (IDS) have been widely used to detect and thwart cyber-attacks on such systems. However, these are inefficient for the multi-layered IIoT networks which include heterogeneous protocol standards and topologies. With the need for a novel security method, the integration of collaborative IDS (CIDS) and blockchain has become a disruptive technology to ensure secure and trustable network transactions. Which detection methodology is suitable for this integration, and IIoT? Will blockchain render IIoT completely immune to cyber-attacks? In this paper, we provide a comprehensive review of the state of the art, analyze, and classify the integration approaches of CIDS and blockchain, and discuss suitable approaches for securing IIoT systems. We also categorize the major blockchain vulnerabilities with their potential losses to expose significant gaps for future research directions.
KW - Anomaly-based IDS
KW - Blockchain
KW - Collaborative intrusion detection systems
KW - Industrial internet of things
KW - Industry 4.0
KW - Signature-based IDS
KW - Specification-based IDS
KW - Trust management
UR - http://www.scopus.com/inward/record.url?scp=85133016488&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85133016488&partnerID=8YFLogxK
U2 - 10.1007/s10586-022-03645-9
DO - 10.1007/s10586-022-03645-9
M3 - Article
AN - SCOPUS:85133016488
SN - 1386-7857
VL - 25
SP - 4129
EP - 4149
JO - Cluster Computing
JF - Cluster Computing
IS - 6
ER -