+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Blockchain Applications in Cybersecurity Solutions

  • Book

  • June 2023
  • Bentham Science Publishers Ltd
  • ID: 5849385

Applications of Blockchain in Cybersecurity Solutions is a comprehensive guide to blockchain applications in computer security. it presents the concepts and practical techniques that are useful in creating and designing decentralized cybersecurity software through 9 carefully edited chapters.

Topics covered in the book include:

  • An introduction to the use of blockchain technology in cybersecurity
  • Attack surfaces in blockchains
  • Anti-counterfeit solutions in blockchains
  • blockchain based access control systems
  • Multi-chain security deployment over smart contracts
  • Cybersecurity as a decentralized service

The book is an essential primer for computer science students and researchers, and a quick reference for IT professionals on blockchain based cybersecurity.

 

 

 

Table of Contents

Chapter 1 Introduction

  • Block
  • Distributed Ledger
  • Smart Contract
  • Blockchain Protocol Stack
  • Tamper Resistant
  • Consensus Protocol
  • Proof of Work (Pow)
  • Proof of Stake (Pos)
  • Delegated Proof of Stake (Dpos)
  • Practical Byzantine Fault Tolerance (Pbft)
  • Proof-Of-Burn (Pob)
  • Proof of Elapsed Time (Poet)
  • Proof of Identity (Poid)
  • Proof of Authority (Poau)
  • Implementation of Blockchain
  • Creation of New Block
  • Generation of Blockchain
  • Testing
  • Verify the Integrity of the Blockchain
  • Implementation of Proof-Of-Work
  • Challenges in Blockchain Technology
  • Scalability
  • Network Interoperability
  • Consumption of Energy
  • Talent Deficit
  • Standardization
  • Cross Chain Technology
  • Blockchain Consequences
  • Research Perspectives
  • Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 2 Cybersecurity and Blockchain

  • Introduction
  • Blockchain Technology is Secure or Not?
  • Role of Blockchain in Cybersecurity
  • Industries Using Blockchain in Cybersecurity
  • How Crypto Currencies Using Blockchain in Cyber Security
  • Mobilecoin
  • Coinbase
  • Javvy
  • How Healthcare Industries Using Blockchain in Cybersecurity
  • How the Government Using Blockchain in Cybersecurity?
  • How Military and Defense Using Blockchain in Cybersecurity
  • How Banking Systems Use Blockchain in Cybersecurity
  • Future Benefits of Blockchain to Strengthen Cybersecurity
  • Iot (Internet of Things) Security
  • Cyber-Physical Infrastructure’S Verification
  • Reducing Human Safety Adversity by Cyber-Attacks
  • The Origin of Computer Software
  • Private Message Security
  • Securing Domain Name System (Dns) and Distributed Denial of Services (Ddos)
  • Medium Storage Decentralization
  • Data Transfer Protection
  • Major Pros and Cons of Blockchain for Cybersecurity
  • Advantages and Disadvantages of Blockchain
  • Advantages of Blockchain
  • Disadvantages of Blockchain
  • Challenges With Blockchain
  • Regulations
  • Privacy of Data
  • Interoperability
  • Scalability
  • Risks Associated With Technology
  • Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgements
  • References

Chapter 3 Applications of Blockchain in Cyber Security Industry

  • Introduction
  • Objectives of the Study
  • Research Methodology
  • Role of Blockchain in Cyber Security
  • Eliminating Human Factor from Authentication
  • Decentralized Storage
  • Traceability
  • How Does Blockchain Provide Cyber Security?
  • Uses of Blockchain Technology in Cyber Security
  • Future of Blockchain Technology: Predictions for
  • Blockchain Will Be Leveraged for a Majority of the World Trade
  • Frictionless Flows and Digital Assets
  • Blockchain Identity for All
  • Considerable Improvements in the Global Standard of Living
  • Findings and Suggestions
  • Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 4 Overview of Attack Surfaces in Blockchain

  • Introduction
  • Blockchain Security Issues
  • Transaction Malleability
  • Network Security
  • Privacy
  • Redundancy
  • Regulatory Compliance
  • Criminal Activity
  • Taxonomy of Attack Surfaces
  • A. Blockchain Network Attacks
  • Transaction Malleability Attack
  • Timejacking
  • Ddos Attack
  • Routing Attacks
  • Sybil Attack
  • Eclipse Attacks
  • Long-Range Attacks
  • B. User Wallet Attacks
  • Phishing
  • Dictionary Attacks
  • Vulnerable Signatures
  • Flawed Key Generation
  • Attacks on Cold Wallets
  • Attacks on Hot Wallets
  • C. Smart Contract Attacks
  • Vulnerabilities in Contract Source Code
  • Vulnerabilities in Virtual Machines
  • Transaction Verification Mechanism Attacks
  • Double Spending Attack
  • Finney Attacks
  • Race Attacks
  • Vector
  • Alternative History Attacks
  • Selfish Mining
  • Fork After Withholding
  • Means of Protection Against Cyber Attack Interface
  • Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 5 Review of Anti-Counterfeit Solutions in Blockchain

  • Introduction
  • Counterfeit Solutions for Attack Surfaces
  • Countermeasure Against Blockchain Network Attacks
  • Countermeasures Against Distributed Denial of Service Attack
  • Countermeasures Against Transaction Malleability Attack-
  • Countermeasures Against Timejacking
  • Countermeasures Against Routing Attacks
  • Countermeasures Against Sybil Attacks
  • Countermeasures Against Eclipse Attacks
  • Random Node Selection:
  • Deterministic Node Selection:
  • Increased Node Connections:
  • Restrictions on New Nodes:
  • Countermeasures Against Long-Range Attacks on Proof of Stake Networks
  • Defence Mechanism Against User Wallet Attacks
  • Countermeasures Against Phishing
  • Countermeasures Against Dictionary Attacks
  • Countermeasures Against Vulnerable Signatures
  • Countermeasures Against Flawed Key Generation
  • Countermeasures Against Cold Wallets and Hot Wallets Attacks
  • Mechanism Against Smart Contract Attacks
  • Defense Mechanism Against Transaction Verification Mechanism Attacks
  • Countermeasures Against Finney Attacks
  • Countermeasures Against Race Attacks
  • Countermeasures Against Vector
  • Countermeasures Against Alternative History Attacks
  • Countermeasures for
  • Defense Mechanism Mining Pool Attacks
  • Countermeasures Against Selfish Mining
  • Countermeasures Against Fork After Withholding (Faw) Attack-
  • Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 6 Preserving the Privacy of Wearable IoT Device Data Using Blockchain

  • Introduction
  • Iot Architecture
  • Iot Fitbit
  • Introduction
  • Fitbit Architecture
  • Challenges of IoT Devices
  • Introduction to Blockchain
  • Characteristics of the Blockchain
  • Blockchain Architecture
  • Components of Blockchain
  • Security Using Blockchain
  • Authentication of IoT Device
  • Verification of the Sender

Author

  • R.Agrawal
  • N. Gupta