Open access peer-reviewed chapter

Blockchain for Cyber-Physical Systems

Written By

Doddi Srilatha and Thillaiarasu Nadesan

Submitted: 23 August 2022 Reviewed: 06 February 2023 Published: 26 July 2023

DOI: 10.5772/intechopen.110394

From the Edited Volume

Blockchain Applications - Transforming Industries, Enhancing Security, and Addressing Ethical Considerations

Edited by Vsevolod Chernyshenko and Vardan Mkrttchian

Chapter metrics overview

85 Chapter Downloads

View Full Metrics

Abstract

Cyber-physical systems (CPSs) are the intelligent systems that offer an interaction among computational, software, and networking resources in a continuous and dynamic fashion. Future systems are likely to be created and developed using CPSs, which have been recognized as a significant area of research. The electric power grid, energy systems, body area networks, modern vehicles, smart homes, cooperative robotics, and smart transportation are the examples for CPS. The security aspects of CPSs can be enhanced with blockchain (BC) technology. For instance, with the combination of CPSs and blockchain, a peer-to-peer energy market is made possible where machines may automatically buy and sell energy based on parameters specified by the user. In this chapter, we summarize recent developments in the creation and applications of CPS, the state-of-the-art and pertinent concepts, numerous CPS applications that have employed blockchain, relevant solutions, and open challenging issues.

Keywords

  • cyber-physical systems
  • blockchain
  • power grid
  • internet of things
  • transportation systems
  • vehicular systems

1. Introduction

Cyber-physical systems (CPSs) is a sort of architecture that combines sensing and communication technology to give the society a number of advantages. To put it another way, a computerized process system (CYPS) is an engineering structure whose physical system or procedure is made up of cybernetic elements such as computing hardware and a communication network [1]. All the mechanisms of CPS are same tightly combined with respectively other, by which we can understand that the functionality of single module depends on the additional factor. The CPSs have a sequential development in current years in the fields of energy, smart homes, smart vehicles, health, transportation, and industrial Internet of Things (IIoT). The main expanses of investigate to be considered for scheming such schemes to be keen, effective and flexible, remain constancy, dependability, robustness, safety and confidentiality.

Rapid development of technologies also made such schemes for thoughtful and profound risks. If such dangers remain not attained, then we would misplace all the assistances that the CPS provides. Blockchain establishes trust among the nodes to generate new basics for most dispersed arrangements. The important technology to allow decentralization that plays a significant part in CPS field is blockchain.

Blockchain (BC) is a protected numerical ledger of dealings that not only maintains records of the economic world but similarly in additional areas that maintain historical sign of the dealings that has charge. This is the core skill of Bitcoin. Financial establishments, for a long time, consume negotiated around the need aimed at the circulated decision-making procedure, but never took it on to the next step, till the beginning of crypto-currencies fueled through the BC skill [2].

Firstly, the blockchain skill was mainly used for defending the economic transactions, smart contracts, storage space systems, and notary. However, the assistances were not sticked to particular needs but there were also other requests such as supply chain, health care, and transportation. The manufacturing comprehended that blockchain can expand the effectiveness. This made an active part of effort, where researchers and professors are now observing at other submissions where blockchain can be exploited.

Advertisement

2. Blockchain model

The hack of done a billion of Yahoo files [3], the Equifax, the increase in information breaches [4], and then ransomware occurrences are some of the cyber-attacks conveyed in recent years. Every day, more than a million cyber-threats are published, and through 2020, approximately 200 million IoT strategy [5] determination requires protection. Nearly business analysts predicted that in a few years, this figure will reach 29 billion.

BC is a distributed system that organizes payments and is to be taken into consideration as a possible option to defend cyber-attacks since it employs network participant consensus to generate trust. When opposed to centralized systems, which become inefficient as the number of linked devices rises, distributed systems provide a number of advantages. Currently [6], blockchain is surrounded by a strong and quickly expanding ecosystem, and there are more applications for safeguarding transactions than ever before. Blockchain was initially designed for purely digital applications, but as time has gone on, it has also proven useful for applications that integrate digital and physical elements.

2.1 Blockchain clarification

BC is essentially, unchallengeable file to which novel transactions with time stamps are continuously added and organized into hash chains called blocks [7]. This protocol’s most important feature determines how a system of users, recognized as miners, may come to an understanding about the blockchain’s present status. The BC designs come in a variety of forms, including private (i.e., permissioned) and public (i.e., permission-less).

  • A community blockchain is single that anybody may connect; typically, they are permission-less, giving all users an identical level of privileges.

  • A closed blockchain where confidentiality is valued and each joining node is pre-nominated is known as a private blockchain. All network users do not have equal access to them since they are permitted.

Example of popular permission-less blockchain procedure is Bitcoin [8]. It randomly chooses a new miner who has the capability to obligate or insert a fresh block to the blockchain on average once per minute. Who adds the next transaction and how it is done are the two main issues to be resolved. For the same, there are two techniques: proof-of-work (PoW) and proof-of-stake (PoS).

Deliberate the circumstance where person 1 wishes to pay person 2 in basic words. Person 1 declares its purpose first and then authenticates the operation by signing it with a cryptographic key. The legitimacy of the digital signatures and the accessibility of possessions remain subsequently verified by network administrators or miners. The additional transactions are included in the blockchain after the process is finished.

Individually block comprises a single code-named hash, which comprises the hash of earlier block and is used to attach the blocks composed in an exact order. To establish the credibility as a leader any miner should perform a set of computations. These calculations solve the problem of mapping data of any size to an immovable size. In any system, a spearhead can remain selected in one of the following traditions:

Once everybody has confirmed this, they will choose that specific mine job as their leader. The PoW method is computationally intensive since numerous miners try to answer the puzzles at the same time until one of them prospers.

The distinctive level assessment of BC is exposed in the Figure 1. Here, once a deal is demanded, an information construction is allocated to support a set of transactions for all nodes on the network. Earlier calculation everything to the BC construction all the nodes perform the block confirmation process. Once nodes perform block verification, they will receive the PoW rewards.

Figure 1.

The blockchain process.

Similarly, each new node linking the disseminated arrangement of BC becomes a fully copy of the BC. It is directed to each point confidentially the blockchain outline when another block is made. At this time, each node will confirm the block also check whether the statistics expressed there is correct. If the whole thing is normal, the block will be additional to each node’s local blockchain.

In PoS, a leader with the maximum quantity of stake in the system is designated. The number of coins that the miner owns determines the amount of the stack in the network. Honestly, this is based on the theory that it is most likely a miner who is very interested in the network, and the break of the system implicitly receives the leader through appending his slab to the leader block. Figure 2 demonstrates the illustration of deal records of BC.

Figure 2.

POW of blockchain mechanism process.

Using a cryptographic hash algorithm, the block’s principal job is to keep track of a sequence of confirmed transactions. The essential characteristics make the hash function effective:

  • It produces a fixed-length output regardless of the distance of the contribution.

  • It is available, which implies that given an input, it always produces the similar result.

  • It is irreversible; therefore, it is unbearable to get the identical input from the output.

  • Any little changes to the initial input result in new output.

  • The hash calculations are quick and incur little overhead.

Once a miner finds a random number that causes the hash value of its block to fall beneath the trouble threshold, the block will eventually be measured effective and then ready for transmission to the network, and the miner will be rewarded for his efforts.

An attacker can change the database’s contents and produce additional sets of transactional data to establish alternative chain of records, which is a possible attack scenario. However, the achievement of varying anything in the chain will lead to domino consequence; thereby, it invalidates all the modules that trail. After the whole block has been invalidated, the network miners must once again search for a time being that produces a hash key underneath the desired struggle.

This demonstrates that of all current technologies, blockchain is the most innovative technology that is also the most effective and secure.

The open-source, permission-less public designs, like those used by Bitcoin and Ethereum, let anybody download the code, provide evidence of work, as well as earn the ability to approve network transactions. Open and transparent architecture describes this style. On the other side, private blockchain organizations, like R3 [9] and EWF [10], function as a team. It has a permissioned read and write architecture and a semi-distributed design. This kind of architecture is quicker and uses people with confirmed credentials who have been pre-approved.

Advertisement

3. CPS related to blockchain

Through the increasing popularity of processers in the earlier few eras, accounts consume changed after primarily paper credentials to digital versions shaped and then maintained on computers.

This is single of the numerous cyber requests, the ones permitted through processors. Even though these documents are made and kept electronically, information must still be entered manually. It can be claimed that people are still the major source of information gathering in these applications since money transfers, health records, and coverage records are only a few of the numerous instances in this category.

The sensors increasingly taking the place of people as the main data collecting source in many organizations, thanks to the rise of IoT and the growth of sensing technologies over the last several years. These systems, also known as CPS, bring together physical processes, software, and information to create a cohesive system with design, analysis, and abstraction capabilities. A number of disciplines are involved in the study, which has as its fundamental elements used for dynamic analysis.

BC financial transactions have been extensively studied and recorded. All of these technological advancements have made it possible to transfer money directly to approve individuals without using centralized authority. The use of smart contracts on the BC reduces the likelihood of delays, suppression, or other outside influences. This is unbreakable, ensures total financial stability, and maintains track of the conditions of the contract. It is also easier to track and manage online identity when utilizing blockchain. Blockchain is employed as a low-cost notary system, as detailed in Ref. [11], preventing various frauds by producing distinctive certificates that would be simple to validate. Table 1 represents BC technology applications.

3.1 Health and medical level BC applications

BC is currently existence cast-off in community strength and health investigates grounded on patient data and application management. Assessment criteria depending on viability, planned capabilities, and acquiescence may be rummage-sale to evaluate BC-based decentralized systems in the healthcare sector [12]. This is the fundamental advantage of blockchain, which is crucial for health data since it makes it difficult to modify or erase a record while leaving a data trace of the effort. Blockchain is being used by several nations to safeguard clinical trial and health archives by associating access to the information with authorization locations. BC also provides safety overslide, allowing the use of barcodes to scan medicines and helping them enter secure digital blocks when ownership changes, thereby reducing the risk of counterfeiting. There is supply chain access to real-time records. Blockchain can be used for a variety of applications, specifically information sharing, admittance regulator, medical analysis, management, and supply restraint management [13].

3.1.1 Healthcare information organization

Research on the subject of interoperability between blockchain applications in healthcare can be originated here [14]. The MedRec model [15] provides a proof-of-work that allows blockchain designs and other decentralization standards to anchor and communicate with other medical record technologies. The architecture is organized using Ethereum smart contracts, which also provides a log that keeps track of medical data and allows users to see entire data, review care records, and exchange information. An innovative approach for structuring open APIs and system structure transparency, as well as conditioning with the supplier’s existing framework, has also been described in this study [16]. An adaptive method for processing large-scale personal health data using a tree-like method is proposed [17]. A blockchain-based program has been adopted to secure documents stored in the cloud. A further platform built on the blockchain for healthcare data is BlockHIE [18], which includes off-chain archiving with on-chain validation to guarantee privacy as well as authenticity for records. With the use of blockchain technology, healthcare data may be transferred in a secure and auditable way [19]. Additionally, it employs blockchain to manage access-based health data [20, 21]. Figure 3 represents the scope of CSP. Lastly, a blockchain-based technology for maintaining patient and physician databases in the field of healthcare analytics is shown. The benefits of a parallel healthcare system are brought in by a methodology that is given in Ref. [22] and is built on artificial systems, computational trials, and then a simultaneous implementation utilizing blockchain technology. To handle health data at the individual and institutional levels, several experts have suggested using private blockchain solutions [23].

Figure 3.

The scope of CPS.

3.1.2 Implantable health care device safety

Advanced health care systems are essential for enduring nursing, giving them a major health care knowledge [24, 25, 26] and transforming health care data into an important source of health care knowledge [26, 27]. We spoke about the study on managing health information in the preceding segment. In this unit, we will be learning the latest developments in health information sharing. According to statistics, the US’s GDP and per capita health care expenditures are higher (a record 2.5 trillion U.S. dollars (17.3%), per capita expenditure in 2009 was approximately 8050 U.S. dollars) [28], with a growth rate of 1 to the normal growth rate in 2019. 6.3% per year. By 2019, it will reach 19.6% of GDP [28].

Medical equipment’s are anticipated to have a market share of $186 billion by the end of 2019 [28], manufacture medical equipment is one of the largest marketplaces in this industry. The U.S. Department of Commerce (DOC) recognizes that medical device exports in 2015 exceeded $44 billion [29], which was mainly driven by key innovations from more than 6500 medicinal expedient businesses in the US country. Table 2 presents BC forth coming challenges in medical applications.

SchemesSubmissionsShared inspiration
Medical levelHealth equipment, networks for medical analysisMedical and healthcare facilities of the highest calibers.
TransportationTransportation networks, railroad technology, aviation, and airspace managementZero vehicular deaths, less cramming, and less delays.
AutomotiveOrganization nursing & management.Extreme performance & produce.
Power gridsBuilding construction, supply of electricity, & environmental conservationAdvantages to the environment include delivery of power without blackouts.

Table 1.

Applications of blockchain technology.

Performance measureObjectiveForthcoming guidelines
Medical-level applications with patient interaction [14, 30]Information sharing, interpreting, and applicationSophisticated information analytics and strong care organization.
Medical health care records management [15]Controls patient admission to medical records though enabling thorough document review, care traceability, and data exchange.Assemble the needs for customized integration to create an available functioning.
BC modeling [18]Medical data sharing for automated medicinal annals and individual clinical records.For privacy and authenticity, on-chain validation and off-chain storing are both used.
Healthcare analytics [31]Health data collection, storage, and exchangeAnalytics for healthcare using BC and AI.
BC and (IoT) level applications [32]Incorporating cloud-level Bigdata.Need an agreement model, lower block processing, and transaction validation computing costs.
MedShare [33]Model for data exchange across cloud service providers.Reduced latency facilitates data giving out and advancement
Information authentication with privacy [16]A batching approach for dispensation personal health information using Hyper ledger fabric and trees.Information about one’s own health as well as medical information.
Confidentiality desecration [34]Statement, backup and retrieval, and anonymization of data.Advancement of raw data, protect it.

Table 2.

Offerings the numerous BC use cases, plan contests, and upcoming instructions in medical.

3.2 Blockchain claims in manufacturing control schemes

Manufacturing Regulate Schemes are used to monitor &switch physical objects that may be found in a variety of different sectors, since organization-critical nuclear facilities to everyday irrigation schemes (ICS).

As demonstrated in Figure 4, ICS uses sensors to perceive and gather data, and then transmit that data to the controller, which then uses the actuator to deliver feedback.

Figure 4.

Industrial control systems.

The following are the essential elements of an ICS environment:

  • A plant with operational technologies for data collecting, communication, and local processing. This is referred to as a sensor. It is a tool for measuring actual physical amount. Cameras, accelerators, gyroscopes, radar, lidar, and other devices are examples of sensors.

  • A computer device that can be programmed to carry out activities using programming logic analysis to be done.

  • A control loop gives the controller the ability to carry out different operations by deciphering signals from the sensors. The actuator, which is a component of this system, modifies the physical quantity that the system is observing. Actuators often include devices such as motor drivers, LEDs, lasers, speakers, switches, valves.

The future transformation of industrial systems will heavily rely on the IIoT. Similar to ICS, the intelligence and connectivity are delivered through sensors and actuators with networking and computation capabilities. It is predicted that billions of data-generating gadgets will already be online and linked to the Internet. Numerous applications, including infrastructure, transportation, and agriculture, will profit from this. In this type of system, transactions involve reading data from various sensors, with time and space tags that indicate where and when the measurement occurred; then, these data are distributed to various network participants. It is important to keep a historical record of these transactions because they are used to influence key decisions. This assumes that the record has not been manipulated and will be tracked when such attempts occur.

A powerful and effective new group of mechanisms for dealings created by corporeal resources is introduced by blockchain. The grouping of BC and the IoT provides us with a multifunctional, truly distributed point-to-point system, and it is possible to interact clearly and reliably with distributed sensors [35]. To implement access control regulations, a BC-based system for safe shared verification is required. To provide both privacy and security, this scheme employs a triangulation with combined quality sign, multi-receiver encoding, and communication verification code [36]. In order to offer a reliable mechanism for the identification and verification of devices, blockchain is utilized to construct virtual zones. The Trust Bubble, a decentralized system made up of several virtual spaces, ensures robust device identification and authentication while safeguarding the accessibility and integrity of data [37, 38, 39]. Table 3 presents ICS design challenges with analysis.

Parameter fieldObjectivesForth coming instructions
IoT maintenance [35]Load information from your iPhone or mobile and meter.Necessitates a lot of memory and is not quick.
Smart Home [40]Smart phones use symmetric cryptography and lightweight protection.Investigate implications in further IoT fields.
Industrial IIoT [36]Exploit the financial gains from credit banks.Plans created for risky circumstances with good or bad recognition ratings.
EVs with fog computing [37]To produce the evidence of work, data submission periodicity, and energy contribution are utilized.For center-less trust, cooperative intelligence, as well as spatiotemporal sensibility, hybrid cloud, and edge calculating.
Distributive switch scheme for advantage calculation [38]Higher-level executing strategic decision-makingAccountable for process control at the executive level.
BSeIn [39]Access control and safe authentication process for Industry 4.0Incorporating value systems inside organizations
Foams of trust [41]Safe virtual spaces where objects may recognize and trust one another.Collaboration among virtual zones.
BCencounters IoT [42]Scalable IoT permissionsIoT scenarios need for technology that is flexible.
Device organization arrangement on blockchain [43], confidentiality conserving [44].Distribution of device data while compromising privacyData anonymization is a possibility, and there are other difficulties and possibilities as well, such as regulation, fault tolerance, non-reputation, and trust [45]

Table 3.

ICS design challenges.

One may automate labor-intensive job processes when all the gadgets in an IoT network are interconnected and equipped with decision-making capacities. Nevertheless, this necessitates that a historical log of these activities and the information that inspired them be kept. According to ongoing scientific study, like the one cited above, the use of BCs in the IoT space will satisfy the demand for cryptographic verifiability, leading to significant improvements across many sectors.

3.3 Applications in transportation

Prospective transportation would depend heavily on autonomous cars, which will also be important for societal advancement. These automobiles have a significant impact on traffic management, and comfort while driving and messaging and road safety. An autonomous, reliable, and decentralized intelligent transportation system, which makes better use of the structure and advantages of traditional intelligent transportation systems (ITS), is especially suitable for crowd sourcing innovation. Figure 5 presents the ITS national architecture proposed by department of transportation [46]. Physical, data, network, consensus, incentive, and application layers are the seven layers of the conceptual paradigm for ITS. In a heterogeneous intelligent transport system, dispersed key management is also used [47]. In order to cut down on key transfer time, it incorporates dynamic key management and key transfer across heterogeneous networks.

Figure 5.

ITS-based US DOT architecture.

The connected automobiles have in-built sensor capabilities that allow them to monitor their surroundings and provide a thorough 360-degree perspective of what is around. They include things such as cameras, proximity sensors, light and radio-frequency detection sensors, navigation systems, and webcams, to mention a few. In the event of a collision, they have the capacity to synchronize data from several sensors—a process known as sensor fusion—with real-time data to keep the cars and infrastructure components informed. Advanced driver aid technologies including adaptive cruise control, lane departure warning, and collision avoidance systems have increased as result of these features. In order to achieve all these functions, these vehicles are also equipped with communication equipment and protocols for exchanging information between all objects in the vehicle network. Dedicated Short-Range Communication (DSRC) is currently approved ITS 5.9 GHz band protocol for vehicle safety (V2V) applications [48]. Similarly, based on software, the key question to be answered is software updates when new features are added. Table 4 presents the BC design challenges and future directions in transportation sector.

Application domainObjectives/use casesFuture directions
Intelligent Transport Systems [46]Conceptual framework for intelligent transportation networks with seven layersExamine the justification, innovative business methods, and real-world application situations.
Distributed key management [47]Reduces the time it takes to transmit keys during the handover of automobiles by making use of the dynamic transactional collecting period.Blockchain-based maintenance of pseudonyms.
Charge it up [49]For postponement, latency, safety, and cost in smart mobility networks, use the state channel.State channels can be used by intelligent mobility devices for connection & control records.
Reward-based systems [50]Reliability of vehicle behavior, as well as legal and unlawful conduct of vehicles.Activity with many vehicles in a dubious situation.
TangleCV [51]Security using a decentralized trust systemVehicles entering and exiting the network.
Trustbit [52]Intelligent vehicle communication using a reward-based scheme.More use cases on communication level.
Intelligent vehicle trust point [53]Crypto ID to assure vehicle reliability.Using Bitcoin to make payments at petrol stations.
Identification of vehicles [54]Blockchain-based connectivity that is secure.For the blockchain validations, do somewhat expensive hash operations.
Software update system [55]System for secure wireless (SW) updates.Verify the findings with a larger dataset.
CUBE [56]Framework for information security.Utilize artificial intelligence (AI) to thwart nefarious assaults.

Table 4.

BC use cases, design challenges, and future directions in transportation sector.

3.4 Applications in smart grid systems

The smart grid networks that deliver power among supply and consumption in an optimal manner. This is achieved by integrating data technology, telecommunications, and energy into existing electrical systems. Smart grid systems integrate sensors and software into existing networks and provide information to public utilities and private users, who can use this information to react quickly to changes. The smart grids not only improve the effectiveness and dependability of the electricity supply, but they also act as a catalyst for the integration of renewable energy sources into current networks, lowering carbon emissions.

There are multiple options for network modernization through BC. The existing power grid cannot withstand cyber-attacks on distributed energy sources and network peripherals. The business model reduces costs through cutting out third parties [57, 58]. Many methods to increasing arbitrage chances to harvest and sell energy at separate level are studied and used. Information about energy use is distributed gathered through smart metering equipment. Utilizing self-enforcing smart agreements, the predicted energy adaptability at the customer level may be managed programmatically. We can learn how energy demand and manufacture can remain matched at a smart grid level and how to integrate the reward and penalty mechanism to balance energy demand by monitoring the flexibility among energy consumption and then the demand answer signal. Smart contracts built on blockchain technology give security and flexibility, an unchangeable record of transactions, and the ability to automate processes and conduct micro-transactions quickly and cheaply. The design and modeling of the local energy market is implemented in a private blockchain, providing real-time pricing data with manual agents. It simulates the best decision based on the predicted production capacity, thereby automatically executing well-founded cost decisions. In similar work, the manufacture and consumption load curves are converted to distance keeping inserts in order to find the right speed. It embeds protection while using blockchain to make computations for bid negotiations publicly transparent. On electric cars, this research was expanded upon and tested [59]. Data exchange is made possible, while sensitive user data is protected in a related work that proposes a blockchain-based privacy-preserving payments system for car to grid networks [60].

A strategy uses an instrument to integrate Bitcoin features into the market for renewable energy [61]. A robot that provides consumers with sales advice is also part of this project. An effective energy management system is created using modern technologies in the replicable smart area concept. Join a platform built with blockchain technology and the IoT [62]. A blockchain-based approach controls efficient aggregation and protects privacy for power grid interactions in smart communities [63]. By examining the user’s energy consumption profile, a blockchain-based solution is here offered to prevent application usage patterns. Similar to this, the security and privacy issues with smart grid are reduced by using a sovereign blockchain that offers transparency and provenance [64]. Coworkers may negotiate energy costs discreetly and safely using a proof of concept for a decentralized energy trading system that makes use of blockchain technology, multiple signatures, and anonymous encrypted message streams [65]. To enhance the system’s overall performance, certain network members in this initiative restricted energy output and sales. The blockchain is used to manage transactions. Table 5 presents the use cases, design challenges, and future directions in smart grid domain.

Application domainObjectives/use casesFuture directions
Modernize Grid [57]Blockchain—based smart, investment management, access control, and business flow.Less centralization of the system is desirable.
Smart energy grid [58]Energy exchanges among energy suppliers and individual consumers.Consideration should be given to rural residents.
Smart grid resilience [66]Keep track of real-time loads, while agreements carry out dispersed sales and purchases from clients.Applications should be simulated in a realistic setting.
Decentralized management of demand response [67]Energy demand and supply matching using consensus-based validation.Multi-stakeholder market places are implemented.
Blockchain based smart contracts [68]Shortened payment times and fewer middlemen required.Micro grids will improve the energy systems’ resilience.
Privacy Preserving smart grid tariff decisions [69]Provides dependability, verifiability, and transparency.Deployment with rigor.
Electric vehicle charging [59]Identify the least expensive charging station in a given area.Large-scale electric car scalability issues and managing the payment phase.
Payment mechanism for vehicle to grid network [60]Data sharing and privacy protection in grid networks connecting vehicles.Various pricing policies and privacy requirements.
Crypto-trading energy market [61]Robotic adviser to improve trading of energy.Energy users will connect to intelligent grid systems digitally.
Smart city through IoT [62]Using distributed storage to keep track of every transaction.Replication throughout several cities
Efficient aggregation for power grid communications [63]Improved computing speed to protect user privacyLessen the computation complexity that authentication causes, specifically at system startup.
Grid-monitoring [64]A invention that enables users to keep an eye on the electricity without outside interference.Application of the suggested model.

Table 5.

BC use cases, design challenges, and future directions in smart grid.

Advertisement

4. Blockchain limitations and future directions

As a large number of scientific studies discussed in this chapter have shown, blockchain technology has become very popular in recent years, which may change the way people work and connect, and lay the basis for new requests using network devices. However, it has certain boundaries, such as:

  • It does not scale through the amount of associated devices because it is restricted through the block size and the time required to calculating the hash.

  • In some cases, transaction fees need to be paid or around additional reward device for miners.

  • Although not as centralized as the single bank perception, it still relies on several large organizations such as miners.

  • The computing also storage necessities of blockchain members are very general because they must keep the whole ledger and contribute in the deal review procedure as an endorser or miner. These boundaries have not made blockchain an ideal skill for large systems connecting IoT devices. In this case, Tangle was launched in 2017 as a skill for verifying transactions then protecting applications related to the Internet of Things (IoT) [70].

Examples include low resource consumption, extensive interoperability, billions of nano-dealings, and data integrity because it is quicker, more energy and resource competent, and more resistant to quantization.

Tangle is an advanced transaction system and statistics argument layer intended to protect requests related to the Internet of Things. It is founded on a focused acyclic graph named Tangle, which is a typical information construction method. It aims to overcome approximately of the shortcomings of blockchain. In the tangled network, apiece transaction must be run PoW to confirm the previous two transactions. The basic theory is that the more transactions verified in parallel, the faster the network will expand. Tangle has the characteristics of scalability, resource optimization, data transmission safety, and quantum training. Tangle emerged as a third-generation crypto-currency, which does not require any additional costs to verify transactions, but is still safe. Table 6 compares blockchain and entanglement.

BlockchainTangle
Blockchain is made up of a number of nodes, or frames of transactions, each of which is attached to the one before it in a lengthy chain that is always growing. It has the ability to circle back.A collection of data components that only flow in one way make up a tangle. It cannot ever go backwards.
Ownership is semi-distributed and decentralized.Really dispersed ownership and decentralized.
Due to its frame process, which entails the solution of a mathematical problem and verification by group consensus, blockchain claims a substantial level of safety.To complete its own operation and subsequently establish a data node, a Tangle device simply has to validate and approve two prior ones. The tangle is less safe than blockchain because of this less reliable process.
With more operations competing for less available block spaces, transaction performance decreases as the size of the network grows. Blockchain requires a lot of processing power as a result.As the number of users rises, tangle adaptability grows, making it lightweight and necessitating less-processing resources.
High power demands result in high-energy needs.Low power usage reduces the need for energy.
Blockchain is not sustainable since it requires about 10 minutes to complete a transaction.Compared to blockchain, it is speedier and more scalable because of its low overhead PoW.
Transaction fees are charged by miners.Transaction fees are absent since there is no idea of miners.
Since it employs an elliptic curve signature technique, it is not quantum resistant.Security from quantum mechanics due to the usage of hash-based signatures.

Table 6.

Blockchain and tangle comparison.

Blockchain is less de-centralized than Tangle. Blockchain will likely link several IoT technologies to a single gateway, which will then take part in the blockchain network. This is known as a grouped or semi-decentralized method. It supports the idea that a small IoT device may participate directly in the tangle network.

Advertisement

5. Conclusions

This bankruptcy affords a holistic review of diverse CYPS in which dispersed database methods, together with blockchain or tangle, remain used. CYPSs and structures that manipulate also screen the bodily global round us. Blockchain and their inherent aggregate of consent algorithms, disbursed information loading, and then stable protocols may be applied to construct robustness and dependability in those structures. This broad side defines how packages, together with a clever grid, independent automobiles, and IoT devices, have advanced with the aid of using dispensing the function of facts validation throughout the community peers, thereby disposing of the dangers related to a centralized construction. This bankruptcy surveys improvements, use belongings, layout tasks, and destiny instructions in blockchain studies throughout the health care, clever grid, independent vehicle, and business manufacturing technique packages and demonstrates how those packages consume advanced from this skill. This bankruptcy defines blockchain skill, that is, a communal database that raises best with the aid of using joining new information, verifies customers with sturdy cryptography, and leverages financial incentives to inspire mistrustful strangers to control and stable updates. This investigation bankruptcy gives the blessings and drawbacks of this progressive skill. This bankruptcy additionally defines a scientific version that may remain used as a useful resource to decide if a selected utility container gets advantage from this skill. The version became examined on packages, specifically the linked automobile file and college database. For future work, we propose to furnish a complete list of applications and challenges of BC technology in smart grids, healthcare, and IoT.

References

  1. 1. National Institute of Standards and Technology. Available online: https://www.nist.gov/el/cyber-physicalsystems [Accessed: February 21, 2019]
  2. 2. Markham JW. A Financial History of the United States: From Enron-Era Scandals to the Subprime Crisis (2004-2006); from the Subprime Crisis to the Great Recession (2006-2009). Abingdon, UK: Routledge; 2015
  3. 3. Smith KT, Smith M, Smith JL. Case studies of cybercrime and its impact on marketing activity and shareholder value. Academic of Marketing Studies Journal. 2011;15:67
  4. 4. Gressin S. The Equifax Data Breach: What to Do. Washington, DC, USA: Federal Trade Commission; 2017
  5. 5. Evans D. The Internet of Things How the Next Evolution of the Internet Is Changing Everything. Cisco White Paper 2011. Available online: http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf [Accessed: January 1, 2020]
  6. 6. Haber S, Stornetta WS. How to time-stamp a digital document. In: Proceedings of the Conference on the Theory and Application of Cryptography, Santa Barbara, CA, USA, 11-15 August 1990. Berlin/Heidelberg, Germany: Springer; 1990. pp. 437-455
  7. 7. Coron JS, Dodis Y, Malinaud C, Puniya P. Merkle-Damgård revisited: How to construct a hash function. In: Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14-18 August 2015. Berlin/Heidelberg, Germany: Springer; 2005. pp. 430-448
  8. 8. Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. Berlin, Germany: ResearchGate; 2008
  9. 9. Ghafarian A, Seno SAH. Exploring digital forensics tools in backtrack 5.0 r3. In: Proceedings of the International Conference on Security and Management (SAM). Las Vegas, NV, USA: University of Mashhad; 2014
  10. 10. Goranovic A, Meisel M, Fotiadis L, Wilker S, Treytl A, Sauter T. Blockchain applications in microgrids an overview of current projects and concepts. In: Proceedings of the IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society. Beijing, China: IEEE; 2017. pp. 6153-6158
  11. 11. Arredondo A. Blockchain and Certificate Authority Cryptography for an Asynchronous on-Line Public Notary System. Ph.D. Thesis. Austin, TX, USA: The University of Texas; 2018
  12. 12. Zhang P, Walker MA, White J, Schmidt DC, Lenz G. Metrics for assessing blockchain-based healthcare decentralized apps. In: Proceedings of the 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom). Dalian, China: IEEE; 2017. pp. 1-4
  13. 13. Hölbl M, Kompara M, Kamišalic A, NemecZlatolas L. A systematic review of the use of blockchain in healthcare. Symmetry. 2018;10:470
  14. 14. HIMSS. What is Interoperability? Available online: https://www.himss.org/what-interoperability [Accessed: November 14, 2019]
  15. 15. Ekblaw A, Azaria A, Halamka JD, Lippman A. A case study for Blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data. In: Proceedings of the IEEE Open and Big Data Conference. Vol. 13. Washington, DC, USA: IEEE; 2016. p. 13
  16. 16. Liang X, Zhao J, Shetty S, Liu J, Li D. Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Montreal, QC, Canada: IEEE; 2017. pp. 1-5
  17. 17. Esposito C, De Santis A, Tortora G, Chang H, Choo KK. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computers. IEEE. 2018;5:31-37
  18. 18. Jiang S, Cao J, Wu H, Yang Y, Ma M, He J. Blochie: A blockchain-based platform for healthcare information exchange. In: Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP). Sicily, Italy: IEEE; 2018. pp. 49-56
  19. 19. Theodouli A, Arakliotis S, Moschou K, Votis K, Tzovaras D. On the design of a Blockchain-based system to facilitate healthcare data sharing. In: Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). New York, NY, USA: IEEE; 2018. pp. 1374-1379
  20. 20. Peterson K, Deeduvanu R, Kanjamala P, Boles K. A blockchain-based approach to health information exchange networks. In: Proceedings of the NIST Workshop Blockchain Healthcare. Vol. 1. Los Angeles, CA, USA; 2019. pp. 1-10. Available from: https://www.healthit.gov/sites/default/files/12-55-blockchain-based-approach-final.pdf
  21. 21. Al Omar A, Rahman MS, Basu A, Kiyomoto S. Medibchain: A blockchain based privacy preserving platform for healthcare data. In: Proceedings of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Guangzhou, China, Berlin/Heidelberg, Germany: Springer; 2017. pp. 534-543
  22. 22. Wang S, Wang J, Wang X, Qiu T, Yuan Y, Ouyang L, et al. Blockchain-powered parallel healthcare systems based on the ACP approach. IEEE Transactions on Computational Social Systems. 2018;28:942-950
  23. 23. Bhuiyan MZ, Zaman A, Wang T, Wang G, Tao H, Hassan MM. Blockchain and big data to transform the healthcare. In: Proceedings of the ACM International Conference on Data Processing and Applications. Guangzhou, China: Association for Computing Machinery; 2018. pp. 62-68
  24. 24. Rathore H, Al-Ali AK, Mohamed A, Du X, Guizani M. A novel deep learning strategy for classifying different attack patterns for deep brain implants. IEEE Access. 2019;7:24154-24164
  25. 25. Rathore H, Fu C, Mohamed A, Al-Ali A, Du X, Guizani M, et al. Multi-layer security scheme for implantable medical devices. In: Neural Computing and Applications. Berlin/Heidelberg, Germany: Springer; 2018. pp. 1-14
  26. 26. Rathore H, Mohamed A, Al-Ali A, Du X, Guizani M. A review of security challenges, attacks and resolutions for wireless medical devices. In: Proceedings of the 13th IEEE International Conference on Wireless Communications and Mobile Computing (IWCMC). Valencia, Spain: IEEE; 2017. pp. 1495-1501
  27. 27. Rathore H, Wenzel L, Al-Ali AK, Mohamed A, Du X, Guizani M. Multi-layer perceptron model on chip for secure diabetic treatment. IEEE Access. 2018;6:44718-44730
  28. 28. Medtech. The U.S. Market for Medical Devices: Opportunities and Challenges for Swiss Companies. Bern, Switzerland: Medtech; 2017
  29. 29. SelectUSA. Medical Technology Spotlight. Available online: https://www.selectusa.gov/medicaltechnology-industry-united-states [Accessed: January 11, 2017]
  30. 30. Gordon, W.J.; Catalini, C. Blockchain technology for healthcare: Facilitating the transition to patient-driven interoperability. Computational and Structural Biotechnology Journal 2018, 16, 224-230
  31. 31. Le Nguyen T. Blockchain in healthcare: A new technology benefit for both patients and doctors. In: Proceedings of the 2018 Portland International Conference on Management of Engineering and Technology (PICMET). Honolulu, HI, USA: IEEE; 2018. pp. 1-6
  32. 32. Karafiloski E, Mishev A. Blockchain solutions for big data challenges: A literature review. In: Proceedings of the IEEE EUROCON 2017-17th International Conference on Smart Technologies. Ohrid, Macedonia: IEEE; 2017. pp. 763-768
  33. 33. Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access. 2017;5:14757-14767
  34. 34. Yue X, Wang H, Jin D, Li M, Jiang W. Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. Journal of Medical Systems. 2016;40:218
  35. 35. Huh S, Cho S, Kim S. Managing IoT devices using blockchain platform. In: Proceedings of the 19th International Conference on IEEE Advanced Communication Technology (ICACT). PyeongChang, Korea: IEEE; 2017. pp. 464-467
  36. 36. Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics. 2018;14:3690-3700
  37. 37. Liu H, Zhang Y, Yang T. Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Network. 2018;32:78-83
  38. 38. Stanciu A. Blockchain based distributed control system for edge computing. In: Proceedings of the IEEE 21st International Conference on Control Systems and Computer Science (CSCS). Bucharest, Romania: IEEE; 2017. pp. 667-671
  39. 39. Lin C, He D, Huang X, Choo KK, Vasilakos AV. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Journal of Network and Computer Applications. 2018;116:42-52
  40. 40. Dorri A, Kanhere SS, Jurdak R, Gauravaram P. Blockchain for IoT security and privacy: The case study of a smart home. In: Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). Kona, HI, USA: IEEE; 2017.pp. 618-623
  41. 41. Hammi MT, Hammi B, Bellot P, Serhrouchni A. Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Computers & Security. 2018;78:126-142
  42. 42. Novo O. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE IOT Journal. 2018;5:1184-1195
  43. 43. He Q, Xu Y, Liu Z, He J, Sun Y, Zhang R. A privacy-preserving IoT device management scheme based on blockchain. International Journal of Distributed Sensor Networks. 2018;14:11
  44. 44. Ouaddah A, Elkalam AA, Ouahman AA. Towards a novel privacy-preserving access control model based on Blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies. Cham, Switzerland: Springer; 2017
  45. 45. Dorri, A.; Kanhere, S.S.; Jurdak, R. Blockchain in IoT: Challenges and solutions. arXiv 2016, abs/1608.05187.2016:1-13
  46. 46. Yuan Y, Wang FY. Towards blockchain-based intelligent transportation systems. In: Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC). Rio de Janeiro, Brazil: IEEE; 2016. pp. 2663-2668
  47. 47. Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CP, Sun Z. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet of Things Journal. 2017;4:1832-1843
  48. 48. Morgan YL. Notes on DSRC and WAVE standards suite: Its architecture, design, and characteristics. IEEE Communications Surveys and Tutorials. 2010;12:504-518
  49. 49. Pedrosa AR, Pau G. ChargeltUp: On blockchain-based technologies for autonomous vehicles. In: Proceedings of the ACM 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. Munich, Germany: Association for Computing Machinery; 2018. pp. 87-92
  50. 50. Singh M, Kim S. Blockchain based intelligent vehicle data sharing framework. arXiv. abs/1708.09721.2017:1-4
  51. 51. Rathore H, Samant A, Jadliwala M, Mohamed A. TangleCV: Decentralized technique for secure message sharing in connected vehicles. In: Proceedings of the ACM Workshop on Automotive Cybersecurity. Richardson, TX, USA: Association for Computing Machinery; 2019. pp. 45-48
  52. 52. Singh M, Kim S. Trust bit: Reward-based intelligent vehicle commination using blockchain. In: Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). Singapore: IEEE; 2018. pp. 62-67
  53. 53. Singh M, Kim S. Branch based blockchain technology in intelligent vehicle. Computer Networks. 2018;145:219-231
  54. 54. Calvo JAL, Mathar R. Secure Blockchain-based communication scheme for connected vehicles. In: Proceedings of the 2018 IEEE European Conference on Networks and Communications (EuCNC). Ljubljana, Slovenia: IEEE; 2018. pp. 347-351
  55. 55. Steger M, Dorri A, Kanhere SS, Römer K, Jurdak R, Karner M. Secure wireless automotive software updates using blockchains: A proof of concept. In: Springer Advanced Microsystems for Automotive Applications 2017. Berlin/Heidelberg, Germany: Springer; 2018. pp. 137-149
  56. 56. CUBE. Autonomous Car Network Security Platform Based on Blockchain. White Paper, Cube. 2017. Available online: https://cubeint.io/wp-content/uploads/2019/10/Cube-Whitepaper-Centered-v2-3.pdf [Accessed: January 3, 2020]
  57. 57. Basden J, Cottrell M. How Utilities Are Using Blockchain to Modernize the Grid. Boston, MA, USA: Harvard Business; 2017
  58. 58. Alessandra P, Scarpato N, Di Nunzio L, Francesca F, Mario R. Smarter city: Smart energy grid based on blockchain technology. International Journal on Advanced Science, Engineering and Information Technology. 2018;8:298-306
  59. 59. Knirsch F, Unterweger A, Engel D. Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions. Computer Science – Research and Development. 2018;33:71-79
  60. 60. Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K. A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Network. 2018;32:184-192
  61. 61. Mannaro K, Pinna A, Marchesi M. Crypto-trading: Blockchain-oriented energy market. In: Proceedings of the IEEE AEIT International Annual Conference. Cagliari, Italy: IEEE; 2017. pp. 1-5
  62. 62. Lazaroiu C, Roscia M. Smart district through IoT and blockchain. In: Proceedings of the 2017 IEEE 6th International Conference on Renewable Energy Research and Applications (ICRERA). San Diego, CA, USA: IEEE; 2017. pp. 454-461
  63. 63. Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, et al. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Communications Magazine. 2018;56:82-88
  64. 64. Gao J, Asamoah KO, Sifah EB, Smahi A, Xia Q, Xia H, et al. Gridmonitoring: Secured sovereign blockchain based monitoring on smart grid. IEEE Access. 2018;6:9917-9925 [CrossRef]
  65. 65. Aitzhan NZ, Svetinovic D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions on Dependable and Secure Computing. 2016;15:840-852
  66. 66. Mylrea M, Gourisetti SNG. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In: Proceedings of the IEEE Resilience Week (RWS). Wilmington, DE, USA: IEEE; 2017. pp. 18-23
  67. 67. Pop C, Cioara T, Antal M, Anghel I, Salomie I, Bertoncini M. Blockchain based decentralized management of demand response programs in smart energy grids. Sensors. 2018;18:162
  68. 68. Cohn A, West T, Parker C. Smart after all: Blockchain, smart contracts, parametric insurance, and smart energy grids. The Georgetown Law Technology Review. 2017;1:273-304
  69. 69. Knirsch F, Unterweger A, Eibl G, Engel D. Privacy-preserving smart grid tariff decisions with blockchain-based smart contracts. In: Springer Sustainable Cloud and Energy Services. Berlin/Heidelberg, Germany: Springer; 2018. pp. 85-116
  70. 70. Popov S. The Tangle. White Paper. 2018. Available online: https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf [Accessed: December 16, 2019]

Written By

Doddi Srilatha and Thillaiarasu Nadesan

Submitted: 23 August 2022 Reviewed: 06 February 2023 Published: 26 July 2023