Enhanced Security in Blockchain-Based Cyber Physical Systems

Enhanced Security in Blockchain-Based Cyber Physical Systems

Copyright: © 2024 |Pages: 20
DOI: 10.4018/979-8-3693-2081-5.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Consortium blockchain provides pooled trust for the proposed method. It uses a unique certificateless authentication method based on the multi-signature scheme to guarantee safety. Software, and physical components comprise the cyber-physical system. Each piece functions on various time-based and three-dimensional stages and constantly interacts with other members. The framework eliminates the centralized trust model, i.e., the dependence on a single PKI certificate authority (CA) for public keys, works over an associate consortium, and uses smart-edge computation. Different industry partners cooperatively confirm both the gadget's character and information. It prevents disasters by reducing the impact of potentially malevolent associates. It agrees to a novel contract without requiring manifold authorisations, eliminating the need for a waiting period after each block addition. It adjusts, putting away information at the conveyed hash table. The suggestion adds more reliability to the transaction by 4.17%. The suggestion conserves energy by 12.5%.
Chapter Preview
Top

Introduction

Cyber-Physical Systems (CPSs) (Ambika N., 2020) (Fachkha & Debbabi, 2015) combine the dynamics of software, communication, and physical processes with abstractions and methods for modeling, designing, and analyzing the whole. Physical systems and networking interact in ways that necessitate primarily novel scheme proficiency. The knowledge is based on many regulations like entrenched technology, processors, and broadcastings. Package is inserted in cars, medical devices, scientific instruments, and intelligent transportation systems whose primary purpose isn't just computation.

They carefully plan out their attacks, employ anti-forensic methods, and disperse their activity over a long period to avoid discovery as part of their strategic nature. These qualities have increased complexity, expertise demand, and time requirements of cyber forensic investigations. It deals with the change in the current threat landscape. The examination must invest effort in keeping their expertise and training current. The skill of gathering, interpreting, and writing indication from information obtained on automated device is known as “digital forensics.” It uses a combination of computer science and traditional investigation techniques. First illegal conduct uses electronic devices or computer systems but does not directly target them. Second harmful behavior directly affects or involves networks and computer systems. The steps of a typical cyber forensics’ investigation include collection, inspection, correlation, and reporting. It has numerous alike or equivalent exploratory development reproductions. Each of those phases has a variety of technical and non-technical responsibilities. The authorization of the channels or information that may be pertinent to the instance, as well as its labeling, footage, attainment, and truthfulness conservancy following the applicable criteria, are all included in the collecting stage. The investigator must evaluate and manually or automatically extract pertinent data from the assembled data during the examination stage once data collection. It mainly entails the procedural investigation of the information assembled. It has several activities, including network analysis, registry inspection, event analysis from the gathered records, procedure investigation, or malicious content removal from the gathered recollection scrapheaps. It could entail activities like decoding, de- complication, contrary production, or getting beyond some safety measures. The information is linked and evaluated logically and objectively using multiple inference and reasoning techniques. Guidelines and frameworks for best practices use methods like case-based reasoning, temporal aggregation, and forward and backward reasoning.

Blockchain has various advantages of decentralization, persistence, namelessness, and auditability. Like a traditional public ledger, the blockchain is a sequence of blocks containing an exhaustive list of transaction records. It is essentially the muddle text of the parent mass, each chunk links to the block that came before it. A blockchain's origin mass, which does not have a parental mass, is the first block. A business stall and trades make up the chuck frame. The large number of blocks can contain the chunk size and the magnitude of every trade. Blockchain uses an uneven cryptography component to approve the confirmation of exchanges.

Complete Chapter List

Search this Book:
Reset