Applications of Blockchain in Cybersecurity Solutions is a comprehensive guide to blockchain applications in computer security. it presents the concepts and practical techniques that are useful in creating and designing decentralized cybersecurity software through 9 carefully edited chapters.
Topics covered in the book include:
- An introduction to the use of blockchain technology in cybersecurity
- Attack surfaces in blockchains
- Anti-counterfeit solutions in blockchains
- blockchain based access control systems
- Multi-chain security deployment over smart contracts
- Cybersecurity as a decentralized service
The book is an essential primer for computer science students and researchers, and a quick reference for IT professionals on blockchain based cybersecurity.
Table of Contents
Chapter 1 Introduction
- Block
- Distributed Ledger
- Smart Contract
- Blockchain Protocol Stack
- Tamper Resistant
- Consensus Protocol
- Proof of Work (Pow)
- Proof of Stake (Pos)
- Delegated Proof of Stake (Dpos)
- Practical Byzantine Fault Tolerance (Pbft)
- Proof-Of-Burn (Pob)
- Proof of Elapsed Time (Poet)
- Proof of Identity (Poid)
- Proof of Authority (Poau)
- Implementation of Blockchain
- Creation of New Block
- Generation of Blockchain
- Testing
- Verify the Integrity of the Blockchain
- Implementation of Proof-Of-Work
- Challenges in Blockchain Technology
- Scalability
- Network Interoperability
- Consumption of Energy
- Talent Deficit
- Standardization
- Cross Chain Technology
- Blockchain Consequences
- Research Perspectives
- Conclusion
- Consent for Publication
- Conflict of Interest
- Acknowledgement
- References
Chapter 2 Cybersecurity and Blockchain
- Introduction
- Blockchain Technology is Secure or Not?
- Role of Blockchain in Cybersecurity
- Industries Using Blockchain in Cybersecurity
- How Crypto Currencies Using Blockchain in Cyber Security
- Mobilecoin
- Coinbase
- Javvy
- How Healthcare Industries Using Blockchain in Cybersecurity
- How the Government Using Blockchain in Cybersecurity?
- How Military and Defense Using Blockchain in Cybersecurity
- How Banking Systems Use Blockchain in Cybersecurity
- Future Benefits of Blockchain to Strengthen Cybersecurity
- Iot (Internet of Things) Security
- Cyber-Physical Infrastructure’S Verification
- Reducing Human Safety Adversity by Cyber-Attacks
- The Origin of Computer Software
- Private Message Security
- Securing Domain Name System (Dns) and Distributed Denial of Services (Ddos)
- Medium Storage Decentralization
- Data Transfer Protection
- Major Pros and Cons of Blockchain for Cybersecurity
- Advantages and Disadvantages of Blockchain
- Advantages of Blockchain
- Disadvantages of Blockchain
- Challenges With Blockchain
- Regulations
- Privacy of Data
- Interoperability
- Scalability
- Risks Associated With Technology
- Conclusion
- Consent for Publication
- Conflict of Interest
- Acknowledgements
- References
Chapter 3 Applications of Blockchain in Cyber Security Industry
- Introduction
- Objectives of the Study
- Research Methodology
- Role of Blockchain in Cyber Security
- Eliminating Human Factor from Authentication
- Decentralized Storage
- Traceability
- How Does Blockchain Provide Cyber Security?
- Uses of Blockchain Technology in Cyber Security
- Future of Blockchain Technology: Predictions for
- Blockchain Will Be Leveraged for a Majority of the World Trade
- Frictionless Flows and Digital Assets
- Blockchain Identity for All
- Considerable Improvements in the Global Standard of Living
- Findings and Suggestions
- Conclusion
- Consent for Publication
- Conflict of Interest
- Acknowledgement
- References
Chapter 4 Overview of Attack Surfaces in Blockchain
- Introduction
- Blockchain Security Issues
- Transaction Malleability
- Network Security
- Privacy
- Redundancy
- Regulatory Compliance
- Criminal Activity
- Taxonomy of Attack Surfaces
- A. Blockchain Network Attacks
- Transaction Malleability Attack
- Timejacking
- Ddos Attack
- Routing Attacks
- Sybil Attack
- Eclipse Attacks
- Long-Range Attacks
- B. User Wallet Attacks
- Phishing
- Dictionary Attacks
- Vulnerable Signatures
- Flawed Key Generation
- Attacks on Cold Wallets
- Attacks on Hot Wallets
- C. Smart Contract Attacks
- Vulnerabilities in Contract Source Code
- Vulnerabilities in Virtual Machines
- Transaction Verification Mechanism Attacks
- Double Spending Attack
- Finney Attacks
- Race Attacks
- Vector
- Alternative History Attacks
- Selfish Mining
- Fork After Withholding
- Means of Protection Against Cyber Attack Interface
- Conclusion
- Consent for Publication
- Conflict of Interest
- Acknowledgement
- References
Chapter 5 Review of Anti-Counterfeit Solutions in Blockchain
- Introduction
- Counterfeit Solutions for Attack Surfaces
- Countermeasure Against Blockchain Network Attacks
- Countermeasures Against Distributed Denial of Service Attack
- Countermeasures Against Transaction Malleability Attack-
- Countermeasures Against Timejacking
- Countermeasures Against Routing Attacks
- Countermeasures Against Sybil Attacks
- Countermeasures Against Eclipse Attacks
- Random Node Selection:
- Deterministic Node Selection:
- Increased Node Connections:
- Restrictions on New Nodes:
- Countermeasures Against Long-Range Attacks on Proof of Stake Networks
- Defence Mechanism Against User Wallet Attacks
- Countermeasures Against Phishing
- Countermeasures Against Dictionary Attacks
- Countermeasures Against Vulnerable Signatures
- Countermeasures Against Flawed Key Generation
- Countermeasures Against Cold Wallets and Hot Wallets Attacks
- Mechanism Against Smart Contract Attacks
- Defense Mechanism Against Transaction Verification Mechanism Attacks
- Countermeasures Against Finney Attacks
- Countermeasures Against Race Attacks
- Countermeasures Against Vector
- Countermeasures Against Alternative History Attacks
- Countermeasures for
- Defense Mechanism Mining Pool Attacks
- Countermeasures Against Selfish Mining
- Countermeasures Against Fork After Withholding (Faw) Attack-
- Conclusion
- Consent for Publication
- Conflict of Interest
- Acknowledgement
- References
Chapter 6 Preserving the Privacy of Wearable IoT Device Data Using Blockchain
- Introduction
- Iot Architecture
- Iot Fitbit
- Introduction
- Fitbit Architecture
- Challenges of IoT Devices
- Introduction to Blockchain
- Characteristics of the Blockchain
- Blockchain Architecture
- Components of Blockchain
- Security Using Blockchain
- Authentication of IoT Device
- Verification of the Sender
Author
- R.Agrawal
- N. Gupta