A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0

: A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classiﬁcation of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also deﬁned and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of conﬁdentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data conﬁdentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial ﬁeld by considering machine learning, 5G / 6G mobile systems and new emergent technologies are presented.


Introduction
The term blockchain technology (BCT) appeared in 2008 with Bitcoin [1][2][3][4]; it is part of a set of disruptive technologies that promise to be the key to revolutionizing and changing the future of our industry, created so that smart and digitally connected factories perform more autonomous, efficient, fast and secure processes without the need for a third party to control operations [1,2]. BCT provides data immutability, provenance, consistency and failure tolerance and is verifiable and data auditable using built-in cryptographic mechanisms. These features match the low-trust environment Table 1. Related literature reviews in the usage of blockchain technology (BCT).

Years
Authors Focus 2016 Christidis and al. [5] Blockchain and smart contract for Internet-of-Things 2018 Fernandez-Carames and al. [6] Challenges and recommendations for developing blockchain-based IoT applications 2018 Ferrag and al. [7] Blockchain-based security and privacy solutions for IoT 2018 Salman et al. [3] Blockchain solutions to achieve distributed network security 2018 Shen and al. [8] Review of blockchain use cases for cities 2019 Fraga and al. [9] Review of blockchain in automotive industry 2019 Lu and al. [10] Review of blockchain in oil and gas industry 2019 Yang and al. [11] Integration of blockchain and edge computing technologies 2019 Xie and al. [12] Blockchain applicability to smart cities 2020 Madhusudan Singh [13] Blockchain technology for data management in Industry 4.0 On the other hand, security threats in Industry 4.0 are studied by proposing a classification of the most important cyber-threats in Industry 4.0 that happened in the last decade. In Section 4, blockchain technology is introduced by presenting the various protocols and implementation models that belong to blockchain technology. In Section 5, the most pertinent related works based on BCT in Industry 4.0 are presented, discussed and compared in term of confidentiality, integrity, availability and privacy security features. Then, open issues and future directions are discussed in Section 6. Finally, Section 5, presents a synthesis of the survey and a conclusion is suggested.

Methodology
A review methodology has been applied to rigorously locate relevant research and to guarantee the quality and veracity of the articles ultimately selected. The process for this approach is illustrated in Figure 1. First, "Blockchain," and "Industry 4.0" were chosen as keywords to search for articles (journal paper, conference, book chapter) published from 2018 to 2020 (recent works) collected from ScienceDirect, Emerald Insight, Wiley Online Library, Taylor & Francis Online, Sage Publications, IEEE Xplore and Springer Link. The research yielded 109 results, which indicates that Industry 4.0 and blockchain technology are emerging research topics. In the second step, these 109 articles were carefully reviewed, and inefficiently related articles were dropped (unclassified conference, unindexed journal, etc.). At the end, 58 documents were tabled. The 58 articles were then examined in depth, which led to 22 articles as a final selection.

Definition
The concept of Industry 4.0 was originally proposed to develop the German economy in 2011. Industry 4.0 is the subset of the fourth industrial revolution that concerns industry [14]. Industry 4.0 encompasses many paradigms, including enterprise resource planning (ERP), big data, cloud manufacturing, logistics and social product development [13][14][15]. Particularly, Industry 4.0 is based on the smart contract concept. A smart contract is broader than a service level agreement (SLA) and can be a guarantor of protecting a SLA specification between a provider and consumers from violation while providing the security services required by the blockchain by enforcing data integrity and trustability [16]. The stakeholders in Industry 4.0 will refer to the smart contract for satisfaction of the SLA specification. SLA is a service that can be integrated with a smart contract between different participants. Therefore, BCT with the smart contract component is the ideal location to implement SLA by taking advantage of blockchain integrity and traceability.

Related Technology
Various technologies or techniques can be used to implement Industry 4.0. These technologies include IoT and radio frequency identification (RFID), cyber-physical systems (CPS), cloud computing, edge computing and other related technologies [17][18][19].

Internet of Things (IoT)
Several architectures have been proposed in recent years and the most basic architecture is composed of four layers including the perception layer, network layer, middleware layer (service layer) and application layer, as shown in Figure 2 [20]. The perception layer is also called as 'Sensing Layer'. It is composed of physical objects and sensing devices such as various forms of sensory technologies, such as RFID sensors. The network layer is the infrastructure to support wireless or wired connections between sensor devices and the information processing system. The middleware layer is responsible for ensuring and managing services required by users or applications. When the term IoT first appeared, it referred to uniquely identifiable interoperable connected objects using radio RFID technology. By connecting the RFID reader to the internet, readers can automatically and uniquely identify and track objects attached with labels in real time. Figure 3 illustrates technologies and devices used to support the IoT. The key technologies include RFID and a wireless sensor network (WSN) and other relevant technologies such as barcodes, smart-phones, cloud computing, location-based service, service-oriented architecture (SOA), near field communication and social networks. Industry 4.0 combines intelligent sensors, artificial intelligence and data analysis to optimize real-time manufacturing. With advances in sensor network technologies, wireless communication and other emerging technologies, more and more networked objects, or intelligent objects, are involved in the IoT. At the same time, these IoT-related technologies have also had a significant impact on new information and communication technologies.

Cyber-Physical-System (CPS)
CPS [22] is an autonomous system that integrates electronics and software, sensors and actuators and has communication capability. A CPS interacts with its environment in which it takes data, processes it through a control feedback loop or influences the process with which it is associated. CPSs are used to control and drive physical processes and thus "augment" these new feature processes. Because of its communication capabilities, a CPS can collaborate with other systems and exchange data with remote systems. When a CPS uses internet communication technologies, it becomes a basic building block of the IoT. A CPS [22][23][24] is characterized by a high degree of complexity that is partly intrinsic and especially because of interconnection and dynamic interactions with other systems. The networked use allows us to play with distributed intelligence on different CPSs as well as their individual specificities. The smart factory relies on CPSs that autonomously exchange information, control processes and trigger actions according to "circumstances". Such a system acquires a capacity of self-adaptability and agility according to the analysis of key parameters. A CPS can also trigger a preventive maintenance alert because the set of monitored parameters shows a high probability of failure. This is obtained both by correlation of the parameters with fault scenarios but also by correlation with the history of the stored data.

Cloud Computing
In the area of industrial infrastructures dominated by physical systems, a large amount of data is collected in real time by a large number of networked sensors that must be analyzed in real time. Big data and real-time analytics applied to big data in cloud systems enable the implementation of these techniques to extract new information from the data. Several industrial applications already use cloud architectures and services [25]. The trend towards virtualization of resources and critical aspects of real-world processes addresses the needs of many organizations for scalability, more efficient use of resources and lower total cost of ownership, to name just a few each. Cloud computing has been widely adopted by the industry as it captures the benefits of virtualization, SOA and consumer computing. CPS [22] services are accessible via the internet but nevertheless offer the application the feeling of being installed locally. Vast computing and storage resources available in the cloud, which can scale or meet the needs of the specific application, are a motivating factor for using cloud computing in industrial scenarios.
Most modern industrial enterprises already rely on applications deployed on local or remote cloud computing systems, allowing multiple industry 4.0 participants to easily collaborate with each other. However, such a system suffers from a major limitation [25,26]: if the cloud is affected in one way or another by software problems, high workloads or attacks, the entire system can be blocked for all users.

Cyber-Threats in Industry 4.0
As authors in [27] note in 2017, the transformation from Industry 3.0 to Industry 4.0 has been associated with technological changes and subsequent increased cyber-threats. For example, Industry 3.0 relied on serial and relay logic systems that depended on local area network (LAN), TCP/IP and programmable logic controller (PLC), which is a special computer device used for industrial control systems, and the scripting language of vendors who exposed systems to threats such as system failure due to a malfunction of the packages, the man in the middle (MIM) analyzing false information for the operators and mainly denial of service (DoS). In Table 2, a layer-based attack in IIoT systems is exhibited according to IoT architecture based on four layers [20,28]. Modifying a content of a tag or trying to disable it Jamming Creating radio interference and exhaustion on IIoT devices A denial of service (DoS) attack is an attack that targets the availability of a system or service by flooding it with requests that make the service unavailable to its legitimate users [23]. A specific type called distributed DoS (DDoS) is a type of DoS attack in which flood requests come simultaneously from multiple sources on the network. In conventional DoS attacks, the attacker bombards the target server with a huge quantity of requests forcing it to commit all available computer resources, and the input data forces the server to malfunction resulting in a crash. The technique can also be used as a listening support tool in MIM attacks.
In general, the buffer overflow that occurs within the server can result in the disabling of security systems, in particular the network intrusion detection system (NIDS) and the firewall. Industry 4.0 depends on the interconnection and integration of many systems and processes, creating environments that may be suitable for successful DoS attacks [29]. In addition, the increasing use of cloud-based techniques in manufacturing processes and intelligent factories will expose many DoS attacks if the cloud system is not well designed to defend against them [30]. As organizations move forward with applications, many other unknown vulnerabilities are emerging [31]. The consequences and impacts of DoS attacks can severely affect an organization's operations in the context of Industry 4.0 due to the use of sensors. The main challenge of DoS is that it is difficult to detect and therefore its risks cannot be easily quantified and planned for, and the constraint extends to the creation of controls within systems and processes to minimize impacts. However, it was noted that the origin of vulnerabilities in supply chains can be traced back to vendors where the potential for portal hacking, MIM attacks, DoS and lateral attacks resulting from unencrypted connections and data transmission remain. Authors in [21,32] suggest that the transition to Industry 4.0 requires plans to create security awareness and develop control mechanisms and authentication policies, including encryption technologies and behavioral analysis tools to prevent hacking of supply chains and their dependent processes. Industry 4.0 is mainly based on the industrial IoT and relies on ad hoc connections facilitating rigorous collection and monitoring to improve product life cycles. The flow of data on the system presents innumerable points of vulnerability, and attackers can steal data at any point and without appropriate protective measures [33]. In particular, attackers can physically or logically access cyberphysical production systems (CPPS): "systems of collaborating computational entities which are in intensive connection with the surrounding physical world and its on-going processes, providing and using, at the same time, data-accessing and data-processing services available on the internet" or programmable logic controllers within the IoT [34]. A layer-based attack and the attempt by an adversary to attack through communication protocol stack is shown in Table 2. There are five levels involved where the attacker can try to compromise the objects of IoT [20].
In cloud computing, especially in the context of big data, it is becoming increasingly difficult to secure data transmission between physical and virtual assets, and authentication is even difficult when disseminating information across several vulnerable interconnected devices [35]. Some of the threats to data are confidentiality, integrity and authentication, data availability and misconfiguration. Wide-area attack threats are associated with a single point of failure, and most reports have cited denial of service (DoS) as the primary mode of attack [36]. In the context of Industry 4.0, and given the speed at which organizations and companies in all sectors are adopting certain concepts and technologies, the threats related to espionage and theft of confidential information are much greater due to the interaction of partners and devices within the network. Moreover, the theft of sensitive information, in particular intellectual property of products and production processes, compromises the competitive ability of the undertaking concerned on the market. Collaborative theft and industrial espionage continue to increase as many companies seek more technologies to achieve intelligent factory configuration [37,38]. Therefore, establishing security techniques and control mechanisms to ensure transparency and trust within all types of Industry 4.0 platforms is crucial, and these measures should focus on protecting confidential information [30,39]. It would be prudent for individual organizations to pursue some of the modern and advanced data protection and encryption technologies, including the possibility of implementing quantum cryptography at the production, manufacturing and distribution levels. On the other hand, according to a survey conducted in the Swedish manufacturing industry, the effective implemented cyber security measures in Industry 4.0 by order of merit are technical solutions, rules and processes, strategy, annual review, continuity plan, cyber insurance, training, exercise and certification [25]. Table 3 presents a classification of the most important cyber-attacks in Industry 4.0 based on the four classes proposed by authors in [33] involving scanning, remote to local, user to root and DoS for class 1, class 2, class 3 and class 4 attacks, respectively.

Mathematical Models
The selection of mathematical models of the system main components is based on what i recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are app solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced 22] is selected because it covers most of the characteristics and it is employed in the majority consulted references.

Wind Turbine
Similarly, about 12 mathematical models for wind turbines are found in literature th applied to solar-wind hybrid systems as shown in Table 2. For this work, the model referen [21,23,26] is selected because it covers all the characteristics and it is employed in the majority consulted references.

Stuxnet'2010
It was designed to target and disrupt industrial control systems based on the supervisory control and data acquisition (SCADA) system.
Energies 2020, 13, x FOR PEER REVIEW

Mathematical Models
The selection of mathematical models of the system main components is based on what i recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are app solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced 22] is selected because it covers most of the characteristics and it is employed in the majority consulted references.

Wind Turbine
Similarly, about 12 mathematical models for wind turbines are found in literature th applied to solar-wind hybrid systems as shown in Table 2. For this work, the model referen [21,23,26] is selected because it covers all the characteristics and it is employed in the majority consulted references.

Spamhaus'2013
It is considered as the biggest cyber-attack in history, it is a filtering service used to extract spam e-mails.

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.
Thus, given the selected model the governing equation that describes the solar-panel generated power is:

Wind Turbine
Similarly, about 12 mathematical models for wind turbines are found in literature that are applied to solar-wind hybrid systems as shown in Table 2. For this work, the model referenced in [21,23,26] is selected because it covers all the characteristics and it is employed in the majority of the consulted references.

Steel mill'2014
The hackers attacked a steel mill in Germany. By manipulating or disrupting the control systems, it caused major damages in the foundry.
Energies 2020, 13, x FOR PEER REVIEW

Mathematical Models
The selection of mathematical models of the system main components is based on what i recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are app solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced 22] is selected because it covers most of the characteristics and it is employed in the majority consulted references.

Wind Turbine
Similarly, about 12 mathematical models for wind turbines are found in literature th applied to solar-wind hybrid systems as shown in Table 2. For this work, the model referen [21,23,26] is selected because it covers all the characteristics and it is employed in the majority consulted references.

Black Energy malware'2015
The malware exploited the macros in Microsoft Excel documents. The bug was planted into a company's network using spam emails.

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Solar radiation
Thus, given the selected model the governing equation that describes the solar-panel generated power is:

Wind Turbine
Norsk Hydro Aluminum'2019 Norsk Hydro, a global aluminium and renewable energy company based in Norway, was hit by a ransomware called LockerGoga.

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Solar radiation
Thus, given the selected model the governing equation that describes the solar-panel generated power is: In fact, blockchain technology is based on the implementation of the consensus algorithm via a smart contract between participants. Therefore, smart contracts are linked blocks using a hash function to ensure blockchain integrity. In addition, using a hash function between the different smart contract blocks can preserve the data integrity and can be useful to detect any malicious modifications. On the other hand, using a Mongo database with blockchain implementation can also enforce the security mechanism, adding more cryptography proofs against various confidentiality threats and attacks. Finally, a hash function and cryptography proofs are effective solutions against various attacks to IIoT systems such as injection and malware attacks targeting the data confidentiality and integrity related to databases and blockchain as well.

Blockchain Technology
In this section a definition of blockchain technology (BCT) is provided, exhibiting various types that belong to BCT. The BCT protocols and implementation models are discussed at the end of this section.
BCT is defined as a secured agreement among users via a consensus algorithm leading to a new transaction (i.e., new block) added in the ledger [40]. Likewise, transaction validation requested by a node in the network in BCT is based on a validation algorithm like a public key. BCT is seen as a promising and emerging technology to benefit the cyber security domain. BCT is made up of different components working together in a distributed decentralized network. The technology aims to ensure trust in a completely untrusted network with unknown parties [19]. A very significant added value of BCT is that it solves two of the most dreaded problems of currency-based transactions, which have so long necessitated the validation of a third party [41]. These problems are popularly known as the Byzantine generals' problem and the double spend problem. The original idea of BCT implementation propounded by Nakamoto [1,42] was that of a publicly distributed ledger. In theory, based on who can access the BCT network and how the permissions to write to the BCT network are assigned, four types of BCTs can be defined including permission less (i.e., anyone with computing power can join), permissioned (i.e., approved users only), public (i.e., all who access can modify) and private (i.e., only specific users can write/modify).
Public BCTs are open for everyone to participate. Anyone can join them to perform transactions and to participate in the mining and consensus process to add new blocks of transactions to the BCT [18]. These BCTs usually use proof of work (PoW) or proof of stake (PoS) for the consensus mechanism.
Permissioned BCTs are built usually by organizations for their specific business need. Such BCTs are likely to have interfaces with existing applications of the organization. Organizations may opt for consortium BCTs where limited trusted members mandatorily need to sign off a transaction. In fully private BCTs, the write permission over the BCT is given to a central organization. The former are referred to as partially decentralized according to authors in [43]. Much value is seen in private BCTs due to the flexibility offered by increased control over the rules of transaction, which may be altered by overall consensus. This becomes easier in a private or consortium BCT than a public one. There is also increased accountability as all the nodes are named.
BCT protocols fall into three categories covering proof of work (PoW), proof of stake (PoS) and practical Byzantine fault tolerance (PBFT).
On the one hand, PoW protocol requires cryptographic puzzles to be solved using brute force [19,44] in order to create a new block. This process of creating a new block is called mining. Miners represent the nodes in the network that mean new blocks. Every miner will create a new block individually by solving the cryptographic puzzle. The winning miner is the first one who solves the puzzle and creates the block. They are rewarded with an amount of cryptocurrency which varies from one BCT platform to another. Furthermore, the PoW behaves like a lottery system. The more processing power the node detains, the more its chance increases to be the winning miner. PoW has a property that anyone can easily prove that a certain amount of work was done to produce a block. However, it is an expansive process that expands significant computational resources.
On the other hand, PoS is an alternative to the PoW consensus protocol [45][46][47][48]. It does not rely on the mining process, but performs a validating one. Peers who perform block validation are called validators. Each validator owns a stake in the network, which is a security deposit also called a bond.
Finally, an approach dealing with the Byzantine general's problem is the federated Byzantine agreement (FBA) [19,44]. In this approach, it is assumed that the participants of the network know each other and can distinguish which ones are important and which ones are not. PBFT is a replication algorithm, which utilizes this principle. Hyperledger utilizes the PBFT as its consensus algorithm [48,49].
In the decade since its inception, the BCT model has faced growing difficulties. Two of the largest challenges facing BCT are its inability to handle a large volume of transactions simultaneously and its high transaction fees. In order to resolve these drawbacks, a more recent solution is to use a directed acyclic graph (DAG) to implement a distributed ledger [45,46] instead of the BCT linear structure as shown in Figure 4. In mathematics, DAG is a graph that travels in one direction without cycles connecting to other edges. An example of DAG-based distributed ledger technology is the tangle implemented by IOTA [47,48]. The tangle is a DAG composed of a network with a number of different nodes confirming transactions. Every new transaction that is submitted requires the confirmation of at least two earlier transactions before it is successfully recorded on the network [44]. Unlike the BCT model, tangle requires no miners to confirm each transaction as being authentic. Having two parent transactions confirms the validity of a subsequent transaction.

Related Works Based on BCT for Industry 4.0
In this section, we select the five most pertinent proposals on BCT for Industry 4.0 among 22 papers provided by the result of the systematic review process. The latter selected works cover the implementation of the Hydro Raindrop multifactor authentication solution on a WordPress page (named 2FA) [50], a sample system data exchange between sample participants using smart contracts (called FabRec) [51], a middleware approach for utilizing BCT services by integrating IIoT embedded in a robot, manufacturing CPS, cloud and fog manufacturing for a smart manufacturing solution (called Man4Ware) [52], BSeIn [53] and FAR-EDGE [43]. The author in [50] presents how the usage of a BCT two-factor authentication solution (2FA) on a page developed on WordPress can contribute to information security regarding user authentication. The research method employed is characterized as exploratory research, since all the analysis is based on the theoretical reference data available on the subject. Field research was carried out in relation to the implementation of the multi-factor authentication plugin Hydro Raindrop MFA (i.e., MFA, sometimes referred to as two-factor authentication or 2FA, is a security enhancement that allows a user to present two pieces of evidence or credentials when logging into an account). Additionally, user credentials must come from two different categories to enhance security according to the National Institute of Standards and Technology (NIST) recommendation, which uses BCT technology [1] offered by the Hydrogen Technology Corporation and the Project Hydro platform over the Ethereum network [2]. Thus, this paper sought to present and conceptualize some of the technologies used, pointing out their contribution to information security. The main results showed that the use of decentralized technology, such as BCT and the Hydro Raindrop plugin, can contribute considerably in the process of user authentication, which may strengthen the safeguarding of the information and assets of individuals and organizations by inhibiting or reducing the possibility of successful hacker attacks. This solution is at the forefront of innovation with regard to data security because it uses advanced BCT technology [23]. It might contribute in a satisfactory way to the preservation of critical data and information, which are the core value of many organizations of Industry 4.0 [6,24]. This research was limited to analyzing how the implementation of the Hydro Raindrop multifactor authentication solution on a WordPress page can be beneficial to ensuring information security. Authors in [51] proposed FabRec, which is defined as a decentralized approach to handling manufacturing information by various organizations using BCT technology. A system in which a decentralized network of manufacturing machines and computing nodes can enable automated transparency of an organization's capability based on past events and automated mechanisms to drive paperless contracts between participants using smart contracts [2]. This system decentralizes critical information about the manufacturer and makes it available on a peer to network provenance of fiduciary nodes to ensure transparency and data provenance through a verifiable audit trail. Authors in [51] present a testbed platform through a combination of machine and system-on-chip platforms computing nodes to be able to work through a consortium of disparate organizations through a decentralized network. This prototype testbed demonstrates the value of the residing computer code residing and can be divided into two groups autonomously initiated in the physical world. Middleware solutions and BCT functionality are useful methods to provide a development and execution environment to address many of these challenges. As shown in Figure 5, the designer has introduced four software components: 1) a machine's virtual twin library; 2) an Ethereum client; 3) a nodal database sentry and 4) a FabRec blockchain view manager. Each component has a specific purpose: The virtual twin library enables machine communication with the digital twin/virtual manufacturing machine built on top of a not only SQL(NoSQL) database. The Ethereum client is hosted at the client to enable interaction with the BCT. The nodal database sentry can be envisioned as a program enforcing cryptographic proofs that the data coming from the virtual machine node have not been tampered with. The BCT manager can be thought of as an indexing and visualization server to keep track of the transactions on the BCT in a human readable format (similar to etherscan.io but for machine data). The FabRec smart contract structure is composed of a global register contract (RC) that contains a list of participant historical event contracts (PHECs). Each PHEC contains a list of participant relationship contract (PRC) addresses and status. The relationship between the RC and PHEC represents the blockchain structure. Likewise, each entry in the PRC in the Oracle database represents an agreement between the participant (for instance, the user requests a fabrication service) and meta-data that belongs to this relationship. Finally, the usage of a cloud Mongo database can be viewed as a security mechanism to enforce cryptographic proof that data sent by the virtual machine node are not altered.
Another pertinent work presented in [52] proposes a middleware approach for utilizing BCT services and capabilities to enable more secure, trustable, traceable, reliable and autonomous smart manufacturing applications. This approach will offer many advantages to secure and establish good trust among involved parties in the manufacturing value chain. A Man4Ware proposal in [52] views all resources in the smart manufacturing environment including sensors, actuators and IoT [26] devices as services that can be requested and deployed by other services in smart manufacturing applications. Furthermore, the addition of BCT services in Man4Ware will further improve the environment and facilitate more secure, traceable and immutable features in intelligent manufacturing applications. In addition, this will enable a variety of new applications to realize the promising benefits of Industry 4.0 for smart manufacturing. Man4Ware can be used as the supporting development and execution framework and to provide the integration mechanisms for these applications. Man4Ware is a service-oriented middleware (SOM) [52] designed to develop, execute and support distributed services for smart manufacturing applications. It offers the essential services to provision the development of the proposed model for smart manufacturing. It can be used to integrate the different technologies needed for complete smart manufacturing solutions that include various components like industrial IoT embedded in a robot, manufacturing CPS, fog manufacturing and cloud manufacturing, as shown in Figure 6 [52]. Industry 4.0 is not a far-fetched concept, and the complexity of such systems requires a more robust security solution [53]. To establish secure remote user authentication with detailed access control for Industry 4.0 applications, the author in [53] offers a new framework based on a BCT named BSeIn. The proposed framework exploits the underlying characteristics of the BCT as well as several cryptographic materials to create a decentralized, confidential and auditable solution. In particular, it used anonymous terminal authentication (i.e., attribute-based signature (ABS)), efficient gateway authentication (i.e., message authentication code (MAC)) and confidentiality of requested messages (via certificateless multi-receiver encryption (CL-MRE)). In addition, it is demonstrated that BSeIn is safe, and an evaluation of the performance of the prototype is addressed. The latter, contains a hierarchical framework comprising four tangible layers, which is designed to vertically integrate inter-organizational value networks, an engineering value chain, manufacturing factories, etc. The conceptual framework allows a flexible and reconfigurable smart factory to be efficiently implemented. However, authors need to consider security inherent in existing (stand-alone) devices and networks as well as those that may arise in such integrations. Especially the existing solutions are insufficient to address these fundamental security concerns. BSeIn is a BCT-based system for secure mutual authentication to enforce fine-grained access control polices. The proposed system (with integrated attribute signature, multi receiver encryption and message authentication code) is designed to provide privacy and security guarantees such as anonymous authentication, auditability and confidentiality. BSeIn [53] also scales well due to the utilization of a smart contract. Then, authors evaluate the security and performance of BSeIn. The participants involved in BSeIn include terminals, a BCT network, a cloud, an industrial network and physical resources, as shown in Figure 7. Terminals are often some remote telecommunication devices (e.g., mobile devices) that can remotely request access or process the commands. When these participants wish to make a request, they need to publish a corresponding transaction to the BCT network. In the BCT network [53], the authors adopt a permissioned fabric that comprises some processing and consensus nodes (i.e., permissioned nodes) responsible for maintaining the BCT according to a consensus mechanism. In this system, they adopt a practical consensus mechanism (PBFT) unlike the Bitcoin BCT (uses proof of work, PoW). Permissioned nodes are classified into a "validation node" (responsible for verifying transactions, abbreviated as "vdn") and "bookkeeping node" (takes charge of chaining validated transactions into the BCT, abbreviated as "bkn"). After permissioned nodes reach a consensus on the received requests from terminals, the requests will be recorded in the BCT. The cloud hosts a number of information systems (e.g., ERP) which collect and process massive data from various physical resources and respond to the access data requests from terminals. That is, the cloud monitors the BCT network and responds to the requested data or terminals. Regarding the industrial network, in contrast to the cloud, it is mainly tasked with dealing with requests from terminals, and such requests are mainly control commands. Once the industrial network has monitored the BCT network and received the control requests, it communicates with the relevant physical resource to execute the control commands and send the results to the relevant terminals. Finally, for physical resources, the function of this participant in BSeIn is the same as that in the conventional system, in the sense that they need to transfer the (massive) data to the cloud via the industrial network and execute the control orders from the industrial network.
The final work is presented in [43], which provides a comprehensive overview of the FAR-EDGE reference architecture (RA). The FAR-EDGE RA is the conceptual framework that drives the design and the implementation of the FAR-EDGE platform, which describes the basic elements necessary for the development of digital automation platforms using advanced computing capabilities and BCT for industry. In addition, the paper also describes the design of a platform that adheres to the FAR-EDGE RA, including details of the various components it includes and how they interact. The design for each individual tier of the FAR-EDGE platform, which adheres to the RA, is presented in Figure 8. The different proposed layers are field tier, edge tier, ledge tier and cloud tier. The field tier is the realm of edge nodes (EN), which connect the real world to the digital world of information technology (IT) and vice versa. The ENs have enough computing capabilities on board to be active actors in a CPS, i.e., intelligent devices that are conveniently called "Smart Objects", ranging from a simple PLC to a fully-autonomous smart plant. Typically, smart objects are controller boards with some significant processing power and a good network connection but lack any (usable) local storage. The platform defines two components that can be run on such a device, namely policy decision point (PDP) and ledger clients. At the platform level, edge computing is supported by seven components, two of them with enabler status such as edge automation services, an edge analytics engine, field abstraction, data routing and pre-processing, policy decision point a system entity that makes authorization decisions for itself or for other system entities that request such decisions, ledger clients and node management. All Components are meant to be deployed on edge gateway (EG) machines. The ledger tier is where the full potential of edge computing is unleashed. It allows for truly distributed process logic to work in use cases that require some level of coordination as is true for most industrial scenarios without any centralized service being in charge of it. It employs the distributed ledger and smart contract patterns both key elements of BCT technologies. The peer nodes run the distributed ledger enabler and the orchestration services, configuration services, data publishing services and synchronization services components. Finally, the cloud tier includes a total of eleven components, three of them having enabler status. They are classified as (i) public cloud services, which are accessible through three open application programming interfaces (API)s, namely the open API for automation, the open API for analytics and the open API for virtualization; (ii) internal cloud services, including identity management, model repository and data storage; and (iii) platform cloud tools, including security management, policy decision point (edger clients, real-to-digital synchronization) and platform management components. In light of the security challenges and requirements of the main related works presented above, Table 4 contains a summary of requirements, highlighting the main aspects inherent in each framework based on BCT in the context of Industry 4.0. argued that learners should be provided with computer-related and technolo succeed in a blended learning setting because some students from different so background might be facing difficulties in accessing or adapting to the on component in blended learning due to lack of IT skills and knowledge;  Some of the weaknesses found include; dependent on internet connectivity, lack o among students and readers to use blended learning, stressful when time-specia are granted, resistance by some students and lecturers' to adopt new techn awareness to implement blended learning, absence of an up-to-date blended lear and absence of university policy on blended learning.

The opportunities for blended learning include:
 It is in line with university expansion plans and the growing trend towards ble adoption. This outcome is consistent with the study conducted by Reference [25] observed that the development of e-learning is in line with the university's expan so that it can reach more students;  Availability of external support of blended learning specialists. This finding is al another earlier study conducted by Reference [25] where they opined that externa help the institution in training staff on professional competencies of using e-learn great opportunity;  Respondents also identified the accessible means of learning regardless of l opportunity. This result is logical with the work conducted by Reference [11] whe that using a single method of teaching and learning limits the range and number

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Solar radiation
Thus, given the selected model the governing equation that describes the solar-panel generated power is: argued that learners should be provided with com succeed in a blended learning setting because some background might be facing difficulties in access component in blended learning due to lack of IT skill  Some of the weaknesses found include; dependent on among students and readers to use blended learning are granted, resistance by some students and lect awareness to implement blended learning, absence o and absence of university policy on blended learning The opportunities for blended learning include:  It is in line with university expansion plans and the adoption. This outcome is consistent with the study c observed that the development of e-learning is in line so that it can reach more students;  Availability of external support of blended learning another earlier study conducted by Reference [25] wh help the institution in training staff on professional c great opportunity;  Respondents also identified the accessible means opportunity. This result is logical with the work cond that using a single method of teaching and learning li

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Solar radiation
Thus, given the selected model the governing equation that describes the solar-panel generated power is: Energies 2020, 13, x FOR PEER REVIEW 5

Mathematical Models
The selection of mathematical models of the system main components is based on what is m recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applie solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in 22] is selected because it covers most of the characteristics and it is employed in the majority of consulted references.  argued that learners should be provided with computer-related and technolo succeed in a blended learning setting because some students from different so background might be facing difficulties in accessing or adapting to the on component in blended learning due to lack of IT skills and knowledge;  Some of the weaknesses found include; dependent on internet connectivity, lack o among students and readers to use blended learning, stressful when time-specia are granted, resistance by some students and lecturers' to adopt new techn awareness to implement blended learning, absence of an up-to-date blended lear and absence of university policy on blended learning.

Solar radiation
The opportunities for blended learning include:  It is in line with university expansion plans and the growing trend towards ble adoption. This outcome is consistent with the study conducted by Reference [25] observed that the development of e-learning is in line with the university's expan so that it can reach more students;  Availability of external support of blended learning specialists. This finding is al another earlier study conducted by Reference [25] where they opined that externa help the institution in training staff on professional competencies of using e-learn great opportunity;  Respondents also identified the accessible means of learning regardless of l opportunity. This result is logical with the work conducted by Reference [11] whe

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Solar radiation
Thus, given the selected model the governing equation that describes the solar-panel generated power is: where Energies 2020, 13, x FOR PEER REVIEW 5 of 20

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Solar radiation
Thus, given the selected model the governing equation that describes the solar-panel generated power is: argued that learners should be prov succeed in a blended learning setting background might be facing difficu component in blended learning due to  Some of the weaknesses found include among students and readers to use bl are granted, resistance by some stud awareness to implement blended learn and absence of university policy on ble The opportunities for blended learning  It is in line with university expansion adoption. This outcome is consistent w observed that the development of e-lea so that it can reach more students;  Availability of external support of ble another earlier study conducted by Re help the institution in training staff on great opportunity;  Respondents also identified the acce opportunity. This result is logical with Energies 2020, 13, x FOR PEER REVIEW 5

Mathematical Models
The selection of mathematical models of the system main components is based on what is m recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applie solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in 22] is selected because it covers most of the characteristics and it is employed in the majority of consulted references.  argued that learners should be provided with computer-related and technolo succeed in a blended learning setting because some students from different so background might be facing difficulties in accessing or adapting to the on component in blended learning due to lack of IT skills and knowledge;  Some of the weaknesses found include; dependent on internet connectivity, lack o among students and readers to use blended learning, stressful when time-specia are granted, resistance by some students and lecturers' to adopt new techn awareness to implement blended learning, absence of an up-to-date blended lear and absence of university policy on blended learning.

Solar radiation
The opportunities for blended learning include:  It is in line with university expansion plans and the growing trend towards ble adoption. This outcome is consistent with the study conducted by Reference [25] observed that the development of e-learning is in line with the university's expan so that it can reach more students;  Availability of external support of blended learning specialists. This finding is al another earlier study conducted by Reference [25] where they opined that externa help the institution in training staff on professional competencies of using e-learn great opportunity;  Respondents also identified the accessible means of learning regardless of l opportunity. This result is logical with the work conducted by Reference [11] whe Energies 2020, 13, x FOR PEER REVIEW 5 of 20

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Solar radiation
Thus, given the selected model the governing equation that describes the solar-panel generated power is: argued that learners should be provided with com succeed in a blended learning setting because some background might be facing difficulties in access component in blended learning due to lack of IT skill  Some of the weaknesses found include; dependent on among students and readers to use blended learning are granted, resistance by some students and lect awareness to implement blended learning, absence o and absence of university policy on blended learning The opportunities for blended learning include:  It is in line with university expansion plans and the adoption. This outcome is consistent with the study c observed that the development of e-learning is in line so that it can reach more students;  Availability of external support of blended learning another earlier study conducted by Reference [25] wh help the institution in training staff on professional c great opportunity;  Respondents also identified the accessible means opportunity. This result is logical with the work cond argued that learners should be prov succeed in a blended learning setting background might be facing difficu component in blended learning due to  Some of the weaknesses found include among students and readers to use bl are granted, resistance by some stud awareness to implement blended learn and absence of university policy on ble argued that learners should be provided with computer-related a succeed in a blended learning setting because some students from background might be facing difficulties in accessing or adaptin component in blended learning due to lack of IT skills and knowledg  Some of the weaknesses found include; dependent on internet connec among students and readers to use blended learning, stressful when are granted, resistance by some students and lecturers' to adopt awareness to implement blended learning, absence of an up-to-date b and absence of university policy on blended learning.
The opportunities for blended learning include:  It is in line with university expansion plans and the growing trend adoption. This outcome is consistent with the study conducted by Re observed that the development of e-learning is in line with the univer so that it can reach more students;  Availability of external support of blended learning specialists. This another earlier study conducted by Reference [25] where they opined help the institution in training staff on professional competencies of u great opportunity;  Respondents also identified the accessible means of learning reg argued that learners should be provided with com succeed in a blended learning setting because some background might be facing difficulties in access component in blended learning due to lack of IT skill  Some of the weaknesses found include; dependent on among students and readers to use blended learning are granted, resistance by some students and lect awareness to implement blended learning, absence o and absence of university policy on blended learning The opportunities for blended learning include:  It is in line with university expansion plans and the adoption. This outcome is consistent with the study c observed that the development of e-learning is in line so that it can reach more students;  Availability of external support of blended learning another earlier study conducted by Reference [25] wh help the institution in training staff on professional c great opportunity;  Respondents also identified the accessible means Energies 2020, 13, x FOR PEER REVIEW 5 of 20

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.
Thus, given the selected model the governing equation that describes the solar-panel generated power is: argued that learners should be provided with computer-related a succeed in a blended learning setting because some students from background might be facing difficulties in accessing or adaptin component in blended learning due to lack of IT skills and knowledg  Some of the weaknesses found include; dependent on internet connec among students and readers to use blended learning, stressful when are granted, resistance by some students and lecturers' to adopt awareness to implement blended learning, absence of an up-to-date b and absence of university policy on blended learning.
The opportunities for blended learning include:  It is in line with university expansion plans and the growing trend adoption. This outcome is consistent with the study conducted by Re observed that the development of e-learning is in line with the univer so that it can reach more students;  Availability of external support of blended learning specialists. This another earlier study conducted by Reference [25] where they opined help the institution in training staff on professional competencies of u great opportunity; Energies 2020, 13, x FOR PEER REVIEW 5 of 20

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references.

Mathematical Models
The selection of mathematical models of the system main components is based on what is most recommended in literature as follows.

Solar Panel
About 12 mathematical models for solar panels are found in the literature that are applied to solar-wind hybrid systems as shown in Table 1 [3,[16][17][18][19][20][21][22][23][24][25][26]. For this work, the model referenced in [20][21][22] is selected because it covers most of the characteristics and it is employed in the majority of the consulted references. argued that learners should be provided with computer-rela succeed in a blended learning setting because some students background might be facing difficulties in accessing or ad component in blended learning due to lack of IT skills and kno  Some of the weaknesses found include; dependent on internet c among students and readers to use blended learning, stressful are granted, resistance by some students and lecturers' to awareness to implement blended learning, absence of an up-to and absence of university policy on blended learning.
The opportunities for blended learning include:  It is in line with university expansion plans and the growing adoption. This outcome is consistent with the study conducted observed that the development of e-learning is in line with the so that it can reach more students;  Availability of external support of blended learning specialists another earlier study conducted by Reference [25] where they o help the institution in training staff on professional competenci No.
According to Table 4, we found that no work can provide the complete security features. Secondly, 60% of works provide confidentiality, integrity and multifactor authentication. In contrast, only 20% of works take care of availability and privacy issues. In conclusion, we believe that more efforts should be accorded to preserve availability and privacy in future works based on BCT in the context of Industry 4.0 by employing fine grained access control mechanisms and using lightweight attribute-based encryption (ABE) techniques [54].

Open Issues and Future Research Directions
There are some performance and security issues regarding the usage of BCT for Industry 4.0 that still remain without solution until now. Firstly, the security of BCT depends on its method of implementation and the usage of software and hardware in that implementation. Since all the transactions made by users in BCT are public, there is a possibility that private information of users can be revealed. A compromised data user can be viewed as a potential risk to launch an intrusion attack and DoS attack as well. One solution is to enforce IT staff working in the industrial environment by supporting Industry 4.0 to follow a policy for protecting confidential data by applying information security standards like ISO/IEC 27000-series and NIST recommendations. Secondly, as the number of miners (i.e., block) increases, the size of the BCT also increases continuously [19,42]. This increases the cost of storage and reduces the speed of distribution over the whole network, leading to a rise in the number of issues like the scalability and availability of BCT [55]. For instance, when the number of blocks is increased dramatically the scalability of the BCT becomes an issue and can lead to an increase in the latency of the entire network.
Some of the future research directions in using BCT in Industry 4.0 are as follows: 1.
Various consensus algorithms are being designed to support high throughput along with a large number of nodes or users. More efficient and reliable consensus mechanisms can be designed to reach consensus among the nodes along with preventing rampant use of computation power. The current consensus algorithms are highly resource intensive and less efficient.

2.
The data analysis and prediction in near real time and in the proximity of the IIoT node is crucial for successful deployment of IIoT applications in the industrial field. Various machine learning (ML)-based algorithms can be designed to analyze the data in the node itself to prevent the data transit for analysis and prediction. The latter process can further enhance the security of the application by preventing data movement [56]. Moreover, integration of BCT in IIoT applications is an emergent technique getting more attention from researchers recently, which can play an important role in tackling security issues and privacy violations.

3.
We believe that the new architecture of IIoT has to include a BCT layer [57] that can be viewed as a roadmap towards a definition of standard architecture and can be implemented effectively in industrial IoT applications.

4.
A limitation regarding the implementation of BCT in the 5G mobile system and further applications, for instance 6G, in spite of the existence of a limited number of works [7,[57][58][59], is a big challenge for researchers in the near future.

5.
Integration of new technologies based on BCT for Industry 4.0 is a big challenge for researchers that can be considered as double-edged sword. On the one hand, digital transformation is an effective solution to enhance process and productivity in industry. On the other hand, adding more technologies can lead to more vulnerability and raising the number of cyber-attacks targeting manufacturing based on Industry 4.0. Finally, some recent works are oriented to creating a dataset for cyber-security attacks in the context of IoT and IIoT in cloud/fog systems by using ML and deep learning to build an adaptive learning model that can classify and detect a wide range of cyber-threats and attacks [60].

6.
BCT is a better guarantor compared to other technologies with an effective cost by exploiting traceability and nonrepudiation of BCT features, to check and verify who and which action is leading to hampering the sustainability charter (i.e., societal environment). Additionally, in parallel to economic performances, a smart contract is considered as a core component of BCT that can take into consideration environmental performances (i.e., minimize negative external factors of the fabrication process) and societal as shown in Figure 9 (i.e., promote employability and enhancement of citizen quality of life) [61][62][63]. 7.
It will be useful to design global implementation frameworks and develop methodological guides to support the deployment of BCT in Industry 4.0 systems and architectures.

Conclusions
Industry 4.0 is a paradigm that is changing the way that factories operate in edge of cloud computing, big data and new emergent technologies. A driver of industrial sustainability concerns the security and the safety of these technologies. BCT, which has been used successfully for cryptocurrencies, contributes to this industrial sustainability by adding security, trust, immutability, disintermediation, decentralization and a higher degree of automation through the smart contracts concept. This article presented a detailed analysis related to the usage of BCT for cyber-threats in Industry 4.0. A classification of the most important cyber-threats in Industry 4.0 for the last decade was presented and the common security solutions were exhibited as well. It was demonstrated in this work that the usage of a hash function and cryptography proofs by BCT were effective solutions against various attacks on IIoT systems such as injection and malware attacks targeting the data confidentiality and integrity related to databases and blockchain as well. Then, a detailed investigation of the most relevant BCT-based related works was presented and a solution involving two-factor authentication (2FA), FabRec, Man4Ware, BSeIn and FAR-EDGE was presented. Then, a comparison between the different frameworks based on BCT in the context of Industry 4.0 was performed as a function of security components covering confidentiality, integrity, availability, privacy and multifactor authentication. Our results revealed that 60% of the compared works in Industry 4.0 can ensure the confidentiality and integrity security components, inherited from the usage of BCT. In contrast, only 20% of works solve availability and privacy issues. In the last section, open issues and future research directions regarding the usage of BCT in the industrial field were discussed. Firstly, open research issues were exhibited including performance and security issues in terms of scalability, network latency and data confidentiality. Secondly, future research directions covered how to improve consensus algorithms, data analysis and prediction of IIoT nodes across the implementation of ML-based solutions (i.e., via the preservation of data movement), defining a standard architecture for IIoT, the integration of new technologies based on BCT for Industry 4.0 to enforce the digital transformation process and how BCT can play a crucial role in sustainability by preserving the environment and enhancing the quality of life of citizens.