A systematic

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security,etc.

[1]  Robert W. Harrison,et al.  Distributed Decentralized Domain Name Service , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).

[2]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[3]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[4]  Ali Dehghantanha,et al.  On the Understanding of Gamification in Blockchain Systems , 2018, 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[5]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[6]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[7]  Stefan Seebacher,et al.  Blockchain Technology as an Enabler of Service Systems: A Structured Literature Review , 2017, IESS.

[8]  Himanshu Gupta,et al.  A security framework for IOT devices against wireless threats , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).

[9]  Reza Meimandi Parizi On the gamification of human-centric traceability tasks in software testing and coding , 2016, 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA).

[10]  Yu Wei,et al.  A Multiple Blockchains Architecture on Inter-Blockchain Communication , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[11]  Bharadwaj Veeravalli,et al.  Blockchain-based decentralized content trust for docker images , 2017, Multimedia Tools and Applications.

[12]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[13]  Ali Dehghantanha,et al.  Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security , 2018, ICBC.

[14]  Ali Dehghantanha,et al.  Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence , 2018, IEEE Transactions on Emerging Topics in Computing.

[15]  Ralph Deters,et al.  Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[16]  Ali Dehghantanha,et al.  Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains , 2018, CASCON.

[17]  Nabil Rifi,et al.  Towards using blockchain technology for IoT data access protection , 2017, 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB).

[18]  André Ricardo Abed Grégio,et al.  ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[19]  Yunpeng Zhang,et al.  Decentralized, BlockChain Based Access Control Framework for the Heterogeneous Internet of Things , 2018 .

[20]  Chunhua Su,et al.  A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things , 2018, IEEE Access.

[21]  Lin Chen,et al.  DL-BAC: Distributed Ledger Based Access Control for Web Applications , 2017, WWW.

[22]  Claes Wohlin,et al.  Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.

[23]  Dennis Miller,et al.  Blockchain and the Internet of Things in the Industrial Sector , 2018, IT Professional.

[24]  Jean-Luc Baril,et al.  Blockchain based trust & authentication for decentralized sensor networks , 2017, ArXiv.

[25]  Ladislav Hudec,et al.  Advances In Distributed Security For Mobile Ad Hoc Networks , 2016, CompSysTech.

[26]  N. Kshetri Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .

[27]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[28]  Hiroki Watanabe,et al.  Blockchain contract: Securing a blockchain applied to smart contracts , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).

[29]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[30]  Cong Wang,et al.  Hardening Distributed and Encrypted Keyword Search via Blockchain , 2017, 2017 IEEE Symposium on Privacy-Aware Computing (PAC).

[31]  Otto Carlos Muniz Bandeira Duarte,et al.  Securing configuration management and migration of virtual network functions using blockchain , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[32]  Ali Dehghantanha,et al.  Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing , 2016, EURASIP Journal on Wireless Communications and Networking.

[33]  Yuguang Fang,et al.  An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).

[34]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[35]  Jeffrey D. Tew,et al.  The applicability of blockchain in the Internet of Things , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).

[36]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[37]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[38]  Antônio A. de A. Rocha,et al.  A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.

[39]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[40]  Morgen E. Peck,et al.  Blockchains: How they work and why they'll change the world , 2017, IEEE Spectrum.

[41]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[42]  Muneeb Ali,et al.  Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.

[43]  Dongqi Fu,et al.  Blockchain-based trusted computing in social network , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[44]  Burak Turhan,et al.  A Systematic Literature Review and Meta-Analysis on Cross Project Defect Prediction , 2019, IEEE Transactions on Software Engineering.

[45]  Francesco Buccafurri,et al.  Overcoming Limits of Blockchain for IoT Applications , 2017, ARES.

[46]  Hui Li,et al.  ConsortiumDNS: A Distributed Domain Name Service Based on Consortium Chain , 2017, 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[47]  Nan Meng,et al.  From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).

[48]  Lianbing Deng,et al.  Information security model of block chain based on intrusion sensing in the IoT environment , 2018, Cluster Computing.

[49]  E. Somer,et al.  Securing the supply chain , 2011 .

[50]  Yanxin Zhang,et al.  A decentralized solution for IoT data trusted exchange based-on blockchain , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[51]  Luca Veltri,et al.  IoTChain: A blockchain security architecture for the Internet of Things , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[52]  Beng Chin Ooi,et al.  BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.

[53]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[54]  Ki-Hyung Kim,et al.  Block chain based data security enhanced IoT server platform , 2018, 2018 International Conference on Information Networking (ICOIN).

[55]  Peter Robinson,et al.  Requirements for Ethereum Private Sidechains , 2018, ArXiv.

[56]  Stefano Secci,et al.  Securing virtual machine orchestration with blockchains , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[57]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[58]  Xiaojiang Du,et al.  Consortium Blockchain-Based Malware Detection in Mobile Devices , 2018, IEEE Access.

[59]  Paolo Tasca,et al.  Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.

[60]  Cheng Li,et al.  A Blockchain Based New Secure Multi-Layer Network Model for Internet of Things , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).

[61]  Bo Qin,et al.  Cecoin: A decentralized PKI mitigating MitM attacks , 2017, Future Gener. Comput. Syst..

[62]  Xiuzhen Cheng,et al.  A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications , 2018, IEEE Access.

[63]  Yong Yu,et al.  Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems , 2018, IEEE Access.

[64]  Jinan Fiaidhi,et al.  EDI with Blockchain as an Enabler for Extreme Automation , 2018, IT Professional.

[65]  Arda Yurdakul,et al.  Work-in-progress: integrating low-power IoT devices to a blockchain-based infrastructure , 2017, 2017 International Conference on Embedded Software (EMSOFT).

[66]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.