2021
DOI: 10.3390/a14040121
|View full text |Cite
|
Sign up to set email alerts
|

Security Audit of a Blockchain-Based Industrial Application Platform

Abstract: In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indisputable loggin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 50 publications
0
16
0
Order By: Relevance
“…Here, the valid request can be captured and resent after a periodic interval to send time-critical data, which can raise false alarms in industries [28]. Code Injection: Code injection happens when malicious code is passed as input to a vulnerable computer program or web application, which results in unexpected output [3]. Session Hijacking: Session/HTTP cookies are used to validate a session; if an attacker can steal the live session cookies, he can take over the session, which is known as session hijacking.…”
Section: Security Issues In Industrial Iotmentioning
confidence: 99%
See 3 more Smart Citations
“…Here, the valid request can be captured and resent after a periodic interval to send time-critical data, which can raise false alarms in industries [28]. Code Injection: Code injection happens when malicious code is passed as input to a vulnerable computer program or web application, which results in unexpected output [3]. Session Hijacking: Session/HTTP cookies are used to validate a session; if an attacker can steal the live session cookies, he can take over the session, which is known as session hijacking.…”
Section: Security Issues In Industrial Iotmentioning
confidence: 99%
“…Session Hijacking: Session/HTTP cookies are used to validate a session; if an attacker can steal the live session cookies, he can take over the session, which is known as session hijacking. Session hijacking can be prevented by using hashing techniques [3]. Malware: Malware comprises a huge collection of potential unwanted programs that are designed for malicious purposes.…”
Section: Security Issues In Industrial Iotmentioning
confidence: 99%
See 2 more Smart Citations
“…IoT devices can easily be a goal of distributed denial-of-service attacks, malicious attackers, and security data breaches. The marriage of IoT and blockchain opens the doors to new opportunities which eliminate inherent inefficiencies, increase security and enhance transparency among all parties involved while allowing safe machine-to-machine transactions [33]. Figure 2 shows blockchain and IoT advantages.…”
Section: Internet Of Things and Blockchain Benefitsmentioning
confidence: 99%