Blockchain Technology Application in Security: A Systematic Review
Abstract
:1. Introduction
1.1. Related Articles
1.2. Research Goals and Motivation
- What prominent domains employ blockchain security applications and their specific use cases?
- What are the prevailing consensus mechanisms in use?
- What influences the selection of blockchain types?
- How do smart contracts bolster blockchain security?
- Which software-based technologies are integrated with blockchain to enhance security?
1.3. Contributions
- We selected 54 articles relating to blockchain applications in security solutions.
- We organized a complete data analysis within selected articles to propose their research idea and considerations in blockchain security applications.
- We offered a meta-analysis concerning mechanisms in which blockchain technology is used to overcome security challenges.
- We proposed future research and topics for further investigation around security topics in blockchain applications.
1.4. Paper Outline
2. Methodology
2.1. Primary Selection
2.2. Inclusion and Exclusion Criteria
2.3. Selection Results
2.4. Publication Year
3. Findings
4. Discussion
- A.
- What prominent domains employ blockchain security applications and their specific use cases?
- B.
- What are the prevailing consensus mechanisms in use?
- C.
- What influences the selection of blockchain types?
- D.
- How do smart contracts bolster blockchain security?
- E.
- Which software-based technologies are integrated with blockchain to enhance security?
Future Research
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. [Google Scholar] [CrossRef]
- Niranjanamurthy, M.; Nithya, B.; Jagannatha, S. Analysis of Blockchain technology: Pros, cons and SWOT. Clust. Comput. 2019, 22, 14743–14757. [Google Scholar] [CrossRef]
- Amirifard, M.; Taherdoost, H. Employment of Blockchain Technology in the Field of Renewable Energy. In Proceedings of the International Conference Interdisciplinarity in Engineering, Târgu Mureș, Romania, 6–7 October 2022; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain meets cloud computing: A survey. IEEE Commun. Surv. Tutor. 2020, 22, 2009–2030. [Google Scholar] [CrossRef]
- Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain technology overview. arXiv 2019, arXiv:1906.11078. [Google Scholar]
- Taherdoost, H. Blockchain technology and artificial intelligence together: A critical review on applications. Appl. Sci. 2022, 12, 12948. [Google Scholar] [CrossRef]
- Xiao, Y.; Zhang, N.; Lou, W.; Hou, Y.T. A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 2020, 22, 1432–1465. [Google Scholar] [CrossRef]
- Gai, K.; Wu, Y.; Zhu, L.; Zhang, Z.; Qiu, M. Differential privacy-based blockchain for industrial internet-of-things. IEEE Trans. Ind. Inform. 2019, 16, 4156–4165. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Taherdoost, H. A critical review of blockchain acceptance models—Blockchain technology adoption frameworks and applications. Computers 2022, 11, 24. [Google Scholar] [CrossRef]
- Gai, K.; She, Y.; Zhu, L.; Choo, K.-K.R.; Wan, Z. A blockchain-based access control scheme for zero trust cross-organizational data sharing. ACM Trans. Internet Technol. 2023, 23, 1–25. [Google Scholar] [CrossRef]
- Taherdoost, H. Smart Contracts in Blockchain Technology: A Critical Review. Information 2023, 14, 117. [Google Scholar] [CrossRef]
- Taylor, P.J.; Dargahi, T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.-K.R. A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 2020, 6, 147–156. [Google Scholar] [CrossRef]
- Gupta, R.; Tanwar, S.; Kumar, N.; Tyagi, S. Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review. Comput. Electr. Eng. 2020, 86, 106717. [Google Scholar] [CrossRef]
- Da Xu, L.; Lu, Y.; Li, L. Embedding blockchain technology into IoT for security: A survey. IEEE Internet Things J. 2021, 8, 10452–10473. [Google Scholar]
- Ferrag, M.A.; Shu, L. The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial. IEEE Internet Things J. 2021, 8, 17236–17260. [Google Scholar] [CrossRef]
- Shammar, E.A.; Zahary, A.T.; Al-Shargabi, A.A. A Survey of IoT and Blockchain Integration: Security Perspective. IEEE Access 2021, 9, 156114–156150. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Shu, L.; Yang, X.; Derhab, A.; Maglaras, L. Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges. IEEE Access 2020, 8, 32031–32053. [Google Scholar] [CrossRef]
- Ren, J.; Li, J.; Liu, H.; Qin, T. Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Sci. Technol. 2021, 27, 760–776. [Google Scholar] [CrossRef]
- Sun, S.; Du, R.; Chen, S.; Li, W. Blockchain-based IoT access control system: Towards security, lightweight, and cross-domain. IEEE Access 2021, 9, 36868–36878. [Google Scholar] [CrossRef]
- Medhane, D.V.; Sangaiah, A.K.; Hossain, M.S.; Muhammad, G.; Wang, J. Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach. IEEE Internet Things J. 2020, 7, 6143–6149. [Google Scholar] [CrossRef]
- Hsiao, S.-J.; Sung, W.-T. Employing blockchain technology to strengthen security of wireless sensor networks. IEEE Access 2021, 9, 72326–72341. [Google Scholar] [CrossRef]
- Mohanta, B.K.; Jena, D.; Ramasubbareddy, S.; Daneshmand, M.; Gandomi, A.H. Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J. 2020, 8, 881–888. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Karimipour, H.; Srivastava, G.; Aledhari, M. Enabling drones in the internet of things with decentralized blockchain-based security. IEEE Internet Things J. 2020, 8, 6406–6415. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Zhang, Q.; Choo, K.-K.R. An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans. Serv. Comput. 2020, 13, 625–638. [Google Scholar] [CrossRef]
- Zulkifl, Z.; Khan, F.; Tahir, S.; Afzal, M.; Iqbal, W.; Rehman, A.; Saeed, S.; Almuhaideb, A.M. FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs. IEEE Access 2022, 10, 15644–15656. [Google Scholar] [CrossRef]
- Rathore, S.; Park, J.H.; Chang, H. Deep learning and blockchain-empowered security framework for intelligent 5G-enabled IoT. IEEE Access 2021, 9, 90075–90083. [Google Scholar] [CrossRef]
- Azbeg, K.; Ouchetto, O.; Andaloussi, S.J. BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security. Egypt. Inform. J. 2022, 23, 329–343. [Google Scholar] [CrossRef]
- Abualsauod, E.H. A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network. Comput. Electr. Eng. 2022, 99, 107847. [Google Scholar] [CrossRef]
- Annane, B.; Alti, A.; Lakehal, A. Blockchain based context-aware CP-ABE schema for Internet of Medical Things security. Array 2022, 14, 100150. [Google Scholar] [CrossRef]
- Latif, S.A.; Wen, F.B.X.; Iwendi, C.; Li-li, F.W.; Mohsin, S.M.; Han, Z.; Band, S.S. AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 2022, 181, 274–283. [Google Scholar] [CrossRef]
- Krishna, B.; Rajkumar, P.; Velde, V. Integration of blockchain technology for security and privacy in internet of things. Mater. Today Proc. 2021. [Google Scholar] [CrossRef]
- Ge, C.; Liu, Z.; Fang, L. A blockchain based decentralized data security mechanism for the Internet of Things. J. Parallel Distrib. Comput. 2020, 141, 1–9. [Google Scholar] [CrossRef]
- Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 2019, 134, 180–197. [Google Scholar] [CrossRef]
- Mohanty, S.N.; Ramya, K.; Rani, S.S.; Gupta, D.; Shankar, K.; Lakshmanaprabu, S.; Khanna, A. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Gener. Comput. Syst. 2020, 102, 1027–1037. [Google Scholar] [CrossRef]
- Si, H.; Sun, C.; Li, Y.; Qiao, H.; Shi, L. IoT information sharing security mechanism based on blockchain technology. Future Gener. Comput. Syst. 2019, 101, 1028–1040. [Google Scholar] [CrossRef]
- Rathore, S.; Kwon, B.W.; Park, J.H. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 2019, 143, 167–177. [Google Scholar] [CrossRef]
- Wang, Y.; Zhang, A.; Zhang, P.; Wang, H. Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain. IEEE Access 2019, 7, 136704–136719. [Google Scholar] [CrossRef]
- Lin, P.; Song, Q.; Yu, F.R.; Wang, D.; Guo, L. Task offloading for wireless VR-enabled medical treatment with blockchain security using collective reinforcement learning. IEEE Internet Things J. 2021, 8, 15749–15761. [Google Scholar] [CrossRef]
- Jayabalan, J.; Jeyanthi, N. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J. Parallel Distrib. Comput. 2022, 164, 152–167. [Google Scholar] [CrossRef]
- Lee, Y.-L.; Lee, H.-A.; Hsu, C.-Y.; Kung, H.-H.; Chiu, H.-W. SEMRES-A triple security protected blockchain based medical record exchange structure. Comput. Methods Programs Biomed. 2022, 215, 106595. [Google Scholar] [CrossRef]
- Parthiban, R.; Kumar, K.S. Effective resource scheduling using hybrid gradient descent cuckoo search algorithm and security enhancement in cloud via blockchain for healthcare 4.0. Mater. Today Proc. 2021, 56, 1802–1808. [Google Scholar] [CrossRef]
- Azzaoui, A.E.; Sharma, P.K.; Park, J.H. Blockchain-based delegated Quantum Cloud architecture for medical big data security. J. Netw. Comput. Appl. 2022, 198, 103304. [Google Scholar] [CrossRef]
- Sharma, P.; Borah, M.D.; Namasudra, S. Improving security of medical big data by using Blockchain technology. Comput. Electr. Eng. 2021, 96, 107529. [Google Scholar] [CrossRef]
- Johari, R.; Kumar, V.; Gupta, K.; Vidyarthi, D.P. BLOSOM: BLOckchain technology for Security of Medical records. ICT Express 2022, 8, 56–60. [Google Scholar] [CrossRef]
- Benil, T.; Jasper, J. Cloud based security on outsourcing using blockchain in E-health systems. Comput. Netw. 2020, 178, 107344. [Google Scholar] [CrossRef]
- Wan, J.; Li, J.; Imran, M.; Li, D. A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans. Ind. Inform. 2019, 15, 3652–3660. [Google Scholar] [CrossRef]
- Rathore, S.; Park, J.H. A blockchain-based deep learning approach for cyber security in next generation industrial cyber-physical systems. IEEE Trans. Ind. Inform. 2020, 17, 5522–5532. [Google Scholar] [CrossRef]
- Maw, A.; Adepu, S.; Mathur, A. ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 2019, 59, 101048. [Google Scholar] [CrossRef]
- Aitzhan, N.Z.; Svetinovic, D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 2016, 15, 840–852. [Google Scholar] [CrossRef]
- Kaur, K.; Kaddoum, G.; Zeadally, S. Blockchain-based cyber-physical security for electrical vehicle aided smart grid ecosystem. IEEE Trans. Intell. Transp. Syst. 2021, 22, 5178–5189. [Google Scholar] [CrossRef]
- Bhattacharya, P.; Ghafouri, M.; Soeanu, A.; Kassouf, M.; Debbabi, M. Security enhancement of time synchronization and fault identification in WAMS using a two-layer blockchain framework. Appl. Energy 2022, 315, 118955. [Google Scholar] [CrossRef]
- Esfahani, M.M. A hierarchical blockchain-based electricity market framework for energy transactions in a security-constrained cluster of microgrids. Int. J. Electr. Power Energy Syst. 2022, 139, 108011. [Google Scholar] [CrossRef]
- Ghiasi, M.; Dehghani, M.; Niknam, T.; Kavousi-Fard, A.; Siano, P.; Alhelou, H.H. Cyber-attack detection and cyber-security enhancement in smart dc-microgrid based on blockchain technology and hilbert huang transform. IEEE Access 2021, 9, 29429–29440. [Google Scholar] [CrossRef]
- Xiao, H.; Zhang, W.; Li, W.; Chronopoulos, A.T.; Zhang, Z. Joint Clustering and Blockchain for Real-Time Information Security Transmission at the Crossroads in C-V2X Networks. IEEE Internet Things J. 2021, 8, 13926–13938. [Google Scholar] [CrossRef]
- Huang, X.; Xu, C.; Wang, P.; Liu, H. LNSC: A security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 2018, 6, 13565–13574. [Google Scholar] [CrossRef]
- Zhang, X.; Chen, X. Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network. IEEE Access 2019, 7, 58241–58254. [Google Scholar] [CrossRef]
- Zeng, P.; Wang, X.; Li, H.; Jiang, F.; Doss, R. A scheme of intelligent traffic light system based on distributed security architecture of blockchain technology. IEEE Access 2020, 8, 33644–33657. [Google Scholar] [CrossRef]
- Cinque, M.; Esposito, C.; Russo, S.; Tamburis, O. Blockchain-empowered decentralised trust management for the Internet of Vehicles security. Comput. Electr. Eng. 2020, 86, 106722. [Google Scholar] [CrossRef]
- Wu, H.-T.; Tsai, C.-W. An intelligent agriculture network security system based on private blockchains. J. Commun. Netw. 2019, 21, 503–508. [Google Scholar] [CrossRef]
- Arif, S.; Khan, M.A.; Rehman, S.U.; Kabir, M.A.; Imran, M. Investigating smart home security: Is blockchain the answer? IEEE Access 2020, 8, 117802–117816. [Google Scholar] [CrossRef]
- Awadallah, R.; Samsudin, A. Using Blockchain in Cloud Computing to Enhance Relational Database Security. IEEE Access 2021, 9, 137353–137366. [Google Scholar] [CrossRef]
- Sowmiya, B.; Poovammal, E.; Ramana, K.; Singh, S.; Yoon, B. Linear Elliptical Curve Digital Signature (LECDS) With Blockchain Approach for Enhanced Security on Cloud Server. IEEE Access 2021, 9, 138245–138253. [Google Scholar] [CrossRef]
- Singh, C.E.J.; Sunitha, C.A. Chaotic and Paillier Secure Image Data Sharing Based On Blockchain and Cloud Security. Expert Syst. Appl. 2022, 198, 116874. [Google Scholar] [CrossRef]
- Bonnah, E.; Shiguang, J. DecChain: A decentralized security approach in Edge Computing based on Blockchain. Future Gener. Comput. Syst. 2020, 113, 363–379. [Google Scholar] [CrossRef]
- Wilczyński, A.; Kołodziej, J. Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology. Simul. Model. Pract. Theory 2020, 99, 102038. [Google Scholar] [CrossRef]
- Ch, R.; Srivastava, G.; Gadekallu, T.R.; Maddikunta, P.K.R.; Bhattacharya, S. Security and privacy of UAV data using blockchain technology. J. Inf. Secur. Appl. 2020, 55, 102670. [Google Scholar] [CrossRef]
- García-Magariño, I.; Lacuesta, R.; Rajarajan, M.; Lloret, J. Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Netw. 2019, 86, 72–82. [Google Scholar] [CrossRef]
- Li, C.; Sun, X.; Zhang, Z. Effective Methods and Performance Analysis of a Satellite Network Security Mechanism Based on Blockchain Technology. IEEE Access 2021, 9, 113558–113565. [Google Scholar] [CrossRef]
- Manogaran, G.; Rawal, B.S.; Saravanan, V.; Kumar, P.M.; Martínez, O.S.; Crespo, R.G.; Montenegro-Marin, C.E.; Krishnamoorthy, S. Blockchain based integrated security measure for reliable service delegation in 6G communication environment. Comput. Commun. 2020, 161, 248–256. [Google Scholar] [CrossRef]
- Meng, W.; Li, W.; Zhou, J. Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 2021, 70, 60–71. [Google Scholar] [CrossRef]
Criteria for Inclusion | Criteria for Exclusion |
---|---|
Papers must propose a security solution with blockchain. Papers must propose some information, including their used blockchain architecture. | Review or survey articles that give a general specific idea about blockchain as a security solution. Papers with no information on research questions. Papers analyzing security topics in blockchain technology. Paper giving solutions for security concerns in the blockchain. |
Ref | Data | Application Field | Category Type | Consensus Algorithm | Smart Contract | Integration with Other Tech |
---|---|---|---|---|---|---|
[19] | Blockchain ensures data privacy and confidentiality and manages resources against untrusted users. | IoT (healthcare) | Private | Time-dependent Consensus Algorithm | Yes | SDN/Fog computing |
[20] | A lightweight blockchain is designed to enable the IoT domain to deploy its blockchain network on its IoT devices on the Hyperledger Fabric blockchain platform. | IoT | Consortium (HLF) | PBFT | Yes | - |
[21] | A security framework as a distributed blockchain-based Platform-as-a-Service (PaaS) model is implemented to ensure data confidentiality, detect a security attack, and authorize its identification. | IoT | Not specified | Not specified | No | Edge/Cloud computing/SDN |
[22] | Blockchains secure WSN transmissions, IoT communications, and mobile databases. | IoT (Wireless Sensor Networks) | Public (HLF) | PoW | No | AI |
[23] | Ethereum platform is used to authenticate and authorize IoT devices with smart contracts deployed as business logic. | IoT (real-time monitoring) | Private or Consortium (Ethereum) | Not specified | Yes | - |
[24] | In smart city use cases, a secure, low-latency blockchain framework is used for drone authentication. | IoT (smart city) UAV | Public | Delegated PoS | No | Drone/UAV |
[25] | Providing P2P communication ensures the security of access control for IoT devices and guarantees data privacy. | IoT | Public and private | Customized Consensus Algorithm | Yes | SDN |
[26] | A fuzzy logic with blockchain technology is designed to reach Authentication, Authorization, and Audit Logs (AAA) in IoT systems. | IoT (healthcare) | Consortium (HLF) | PBFT | Yes | - |
[27] | Secure orchestration is developed in 5G-IoT using blockchain solutions. | 5G-IoT | Private | PBFT | Yes | Deep learning/Fog/Edge computing/SDN |
[28] | Blockchain is combined with a re-encryption proxy to ensure security criteria, such as confidentiality, integrity, privacy, and access control using smart contracts Ethereum to accelerate data storage. | IoT (healthcare) | Private or Consortium (Ethereum) | Proof of authority (PoA) | Yes | - |
[29] | Blockchain provides a security architecture for UAVs to help decrease security risks. | IoT (UAV) | Public (Ethereum) | PoW | No | Machine learning |
[30] | Blockchain proposes a solution for robust authentication of identity and privacy of healthcare data. | IoT (healthcare) | Not specified | Not specified | Yes | Fog computing |
[31] | A new routing protocol on blockchain integrated with SDN is presented to mitigate security and energy consumption. | IoT (cyber-physical systems) | Private and public | PoW | Yes | AI/SDN |
[32] | Blockchain technology solution with advanced scripts of Solidity and embedded programming is proposed. | IoT (wireless body area network) | Private | Not specified | Yes | - |
[33] | A storage mechanism based on blockchain is proposed to ensure security without third-party authority. | IoT | Public | PoW | Yes | - |
[34] | A lightweight, scalable blockchain is proposed for IoT requirements and security issues. | IoT | Public | Time-based Consensus Algorithm | No | - |
[35] | An efficient, lightweight, integrated blockchain (ELIB) is designed to meet the security needs of blockchain. | IoT (smart home) | Public | Time-dependent Consensus Algorithm | No | - |
[36] | The blockchain solution is proposed to secure the storage system for IoT device location information to aid in sharing services. | IoT | Private Public Consortium | PBFT | Yes | - |
[37] | Blockchain is used to decrease a single point of failure in the system. | IoT | Private (Ethereum) | Not specified | Yes | SDN/Fog/Edge |
[38] | A secure sharing protocol with blockchain technology for electronic health records is implemented. | Healthcare | Consortium (Ethereum) | PoA | Yes | - |
[39] | Blockchain is used to enhance the security of the task-offloading system. | Healthcare | Not specified | PBFT | No | Reinforcement learning/Edge computing/VR |
[40] | The proposed blockchain provides a decentralized solution to avoid failure and provide tamper-proof healthcare ledgers. | Healthcare | Public | PoW | No | - |
[41] | A triple encryption authentication architecture using blockchain is developed to secure the sharing of personal data. | Healthcare | Private | PoA | No | - |
[42] | Data storage and data transmission are secured with blockchain technology. | IoT (healthcare) | Not specified | Not specified | No | Cloud computing |
[43] | Medical data processing is secured with blockchain. | Healthcare | Consortium | PBFT | No | Cloud computing |
[44] | The blockchain solution is proposed for the secure management of medical big data. | Healthcare | Public (Ethereum) | PoW | Yes | - |
[45] | Blockchain framework used to secure patients’ medical data. | Healthcare | Public | PoW | No | - |
[46] | A new verification scheme with blockchain is designed to detect corruption in data in cloud servers. | Healthcare | Private | PoW | No | Cloud computing |
[47] | A distributed network with blockchain is introduced to reshape the traditional industrial IoT architecture. | IoT (industrial) | Private | PoW | No | Edge computing |
[48] | Blockchain provides decentralized and secure control for cyber-physical systems in the industry. | IoT (industrial) | Private (Ethereum) | PoW | Yes | Edge computing |
[49] | Operational data records in industrial systems are secured with blockchain. | Industry | Private | PoA | Yes | - |
[50] | Transactions in energy trading systems are secure and private with blockchain technology. | Energy | Private | PoW | Yes | - |
[51] | Blockchain provides a charging framework for electric taxis to handle charging disconnections and trust challenges among charging stations. | Energy | Consortium | PBFT | Yes | SDN |
[52] | Fault identification and secure and reliable store measurement data in smart grids are developed with blockchain. | Energy | Private | PBFT | Yes | - |
[53] | Blockchain is used to provide an electricity market framework for energy transactions. | Energy | Public | Not specified | No | - |
[51] | Blockchain is used to provide an energy trading framework that is designed for secure and optimal trading of AC microgrids. | Energy | Public | Not specified | No | - |
[54] | Enhancing the security of smart microgrids using blockchain. | Energy | Private/Consortium | PoA | No | Deep learning |
[55] | The vehicle trust management system is designed with blockchain to evaluate message sources. | Transportation | Public | PoW | No | - |
[56] | A decentralized, secure model and authentication mechanisms for a lightning network with smart contracts are provided. | Energy | Private | PoA | Yes | - |
[57] | The digital signature technique of blockchain ensures reliability and integrity. | Transportation | Consortium | PoW | Yes | - |
[58] | A secure and distributed model for intelligent traffic light systems is proposed. | Transportation | Not specified | PBFT | Yes | Edge computing |
[59] | A trust management system with blockchain is introduced for the internet of vehicle systems. | Transportation | Consortium (HLF) | PBFT | No | Fog/Edge computing |
[60] | Blockchain guarantees agriculture information preservation and accuracy. | IoT (agriculture) | Private | Not specified | Yes | - |
[61] | Smart home security is fulfilled using blockchain. | Smart home | Consortium | PoW | No | - |
[62] | Cloud relational database is secured with blockchain-based systems. | Cloud computing Database | Not specified | PBFT | No | Cloud computing |
[63] | Blockchain is used to maintain the privacy of sensitive data. | Cloud server | Private (HLF) | Not specified | No | Cloud computing |
[64] | Blockchain warrants the security of image data. | Cloud Image data sharing | Not specified | Not specified | Yes | Cloud computing |
[65] | A fully decentralized approach by eliminating the third party in the network is designed using blockchain. | Edge computing | Consortium | Not specified | No | Edge computing |
[66] | Blockchain provides a secure architecture for secure cloud schedulers. | Cloud computing | Public | Proof-of-schedule | No | Cloud computing |
[67] | Proposing a solution to improve security and privacy in UAVs. | IoT (UAV) | Public | Not specified | Yes | Cloud computing |
[68] | Compromised UAVs are detected based on trust policies with blockchain. | UAV | Consortium (HLF) | Not specified | No | -- |
[69] | Data transmission security in satellite networks is enhanced with blockchain. | Satellite network | Public | Context-based Consensus Algorithm | No | - |
[70] | Security issues due to heterogeneous standard integration and access delegations in 6G are mitigated via blockchain. | 6G | Not specified | Not specified | No | Machine learning/SDN |
[71] | Blockchain provides a security mechanism that creates a trust-based filtration to decrease malicious traffic. | IoT/SDN | Consortium | Not specified | No | SDN |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Moosavi, N.; Taherdoost, H. Blockchain Technology Application in Security: A Systematic Review. Blockchains 2023, 1, 58-72. https://doi.org/10.3390/blockchains1020005
Moosavi N, Taherdoost H. Blockchain Technology Application in Security: A Systematic Review. Blockchains. 2023; 1(2):58-72. https://doi.org/10.3390/blockchains1020005
Chicago/Turabian StyleMoosavi, Nazanin, and Hamed Taherdoost. 2023. "Blockchain Technology Application in Security: A Systematic Review" Blockchains 1, no. 2: 58-72. https://doi.org/10.3390/blockchains1020005
APA StyleMoosavi, N., & Taherdoost, H. (2023). Blockchain Technology Application in Security: A Systematic Review. Blockchains, 1(2), 58-72. https://doi.org/10.3390/blockchains1020005