Blockhain For Secure and Decentralized AI
Blockhain For Secure and Decentralized AI
PII: S2096-7209(24)00006-X
DOI: https://doi.org/10.1016/j.bcra.2024.100193
Reference: BCRA 100193
Please cite this article as: A.M. Shamsan Saleh, Blockchain for secure and decentralized artificial
intelligence in cybersecurity: A comprehensive review, Blockchain: Research and Applications (2024),
doi: https://doi.org/10.1016/j.bcra.2024.100193.
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition
of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of
record. This version will undergo additional copyediting, typesetting and review before it is published
in its final form, but we are providing this version to give early visibility of the article. Please note that,
during the production process, errors may be discovered which could affect the content, and all legal
disclaimers that apply to the journal pertain.
© 2024 The Author(s). Published by Elsevier B.V. on behalf of Zhejiang University Press.
Author Contribution Statement
I am writing to submit my manuscript titled " Blockchain for Secure and Decentralized Artificial
Intelligence in Cybersecurity: A Comprehensive Review" for consideration for publication in Blockchain:
Research and Applications Journal. I believe that this research article aligns well with the scope and interests
of your esteemed journal and will contribute significantly to the field of blockchain. I have reviewed the
submission guidelines and the aims and scope of Blockchain: Research and Applications Journal, and I am
confident that my research findings will be of great interest to your readership.
To ensure the high quality and originality of my work, this manuscript has not been submitted to any other
journal for consideration.
I believe that Blockchain: Research and Applications Journal is an ideal platform for disseminating these
research findings to a wide audience of experts and practitioners in the field of blockchain. The journal's
of
commitment to publishing cutting-edge research and promoting advancements in the blockchain domain
makes it an excellent fit for this manuscript.
ro
Thank you for considering this manuscript for publication in Blockchain: Research and Applications
Journal. I look forward to the opportunity to contribute to the journal's academic discourse and impact. I
-p
assure you that if accepted, I will promptly address any comments or suggestions from the reviewers to
enhance the quality and clarity of the manuscript.
re
Thank you for your time and consideration.
lP
Sincerely,
na
University of Tabuk
Tabuk, Saudi Arabia
Jo
13-6-2023
Blockchain for Secure and Decentralized Artificial Intelligence in Cybersecurity: A Comprehensive Review
Ahmed M. Shamsan Saleh
Department of Information Technology
University of Tabuk
Tabuk, Saudi Arabia
[email protected]
Abstract
As the usage of artificial intelligence (AI) grows within the field of cybersecurity, so too does the demand
for secure and decentralized AI systems to protect against potential cyber threats. Blockchain technology (BT) has
emerged as the ideal approach for increasing both the security and privacy of AI systems since it provides decentralized
and immutable data storage. This systematic literature review focuses on the integration of BT with decentralized AI
within cybersecurity. It provides a comprehensive taxonomy of BT and decentralized AI for cybersecurity serving as
the starting point for the study. This paper begins with an overview of BT and its possible uses in cybersecurity and
also analyzes its challenges and opportunities. Decentralized AI is also covered in the study, along with its potential
advantages and difficulties in decentralized AI cybersecurity. Building on that foundation, this study provides
convincing findings highlighting the beneficial relationships between BT and decentralized AI for cybersecurity,
of
contributing to a nuanced comprehension of their integration. Moreover, it offers real-world uses of blockchain-
enabled decentralized AI to discuss its usefulness in tackling cybersecurity concerns. Finally, this paper discusses
ro
future research directions for blockchain-enabled decentralized AI in cybersecurity, including potential applications
and implications of this technology in the field, emphasizing the potential of blockchain-enabled decentralized AI in
-p
cybersecurity to enhance security, privacy, and trust in AI systems.
Keywords: Blockchain, Artificial Intelligence, Decentralized, Cybersecurity
re
I. Introduction
lP
Modern cybersecurity relies heavily on artificial intelligence (AI), which offers sophisticated threat detection,
incident response, and risk assessment [1][2][3]. As technology continues to advance, so too do cyber threats, which
have become more sophisticated and complex to circumnavigate existing security measures. AI systems are
na
susceptible to numerous attacks that can damage their availability, confidentiality, and integrity, including adversarial
attacks, model stealing, and data poisoning [4][5]. Because these attacks happen quickly, enterprises are increasingly
relying on artificial intelligence to detect and respond to these risks in real time to prevent security breaches [6][7]. AI
ur
systems are equipped to do this because they are capable of analyzing massive amounts of data, identifying patterns,
and discovering anomalies that could be signs of potential cyber threats [8]. Using them can also speed up the process
of manually detecting and resolving security incidents as well as automating threat response. Though they have various
Jo
benefits, AI systems are not immune to cyber threats [9]. Instead, hackers will expose them to assaults intended to
take advantage of their flaws. For instance, data poisoning attacks might tamper with the data utilized for training AI
models, producing skewed or false predictions for users. Adversarial attacks can inject minor errors into the input data,
resulting in data misclassification. Model stealing attacks outright steal trained models, which leads to data breaches
and other security concerns. To solve these difficulties, there is an increasing demand in cybersecurity for secure and
decentralized AI systems [10]. Secure AI systems must be built to withstand, and protect against, these attacks and
other cyber risks. Decentralized AI systems are a solution that allows numerous stakeholders to collaborate and share
data while ensuring sensitive data's privacy and confidentiality.
A viable method for boosting the security and privacy of AI systems is blockchain technology (BT), which
provides decentralized and immutable data storage [11][12][13]. BT produces a distributed ledger that can safely hold
transactional data, creating tamper-proof and auditable records that can be verified by numerous parties [14][15]. BT
may also facilitate decentralized decision-making and consensus methods, which may increase trust and collaboration
among several stakeholders [16]. These technologies can enhance the privacy and security of critical information,
facilitate multi-stakeholder collaboration, and provide real-time threat detection and response [17] [18]. To construct
secure and decentralized AI systems capable of surviving possible cyber-attacks, organizations should utilize BT to
ensure the security and safety of digital infrastructures. To accomplish this, research into, and the development of,
blockchain-enabled, decentralized AI is critical.
In an effort to fill this gap, this study focuses on the dynamic relationship between blockchain technology
and AI. The primary goal is twofold: one, to examine blockchain's significant effect on cybersecurity, and two, to
explain how decentralization, which is inherent in blockchain architecture, strengthens cybersecurity measures. The
subtle interplay of these various technologies offer beneficial effects that emerge only when they converge, a state that
has not been previously studied. While current literature has shed light on the separate impacts of blockchain and AI,
there is a distinct lack of comprehensive studies clarifying their combined influence on cybersecurity. This study
tackles this crucial knowledge gap by combining, and then expanding on, existing knowledge.
In response to the growing need for cybersecurity measures, this research addresses key questions about combining
AI and BT, which were raised by a rigorous review of the main literature. It attempts to integrate and extend related
works that illuminate the specific consequences of blockchain and AI on cybersecurity. It poses the following research
questions in particular:
1. How does the integration of blockchain and artificial intelligence enhance the robustness of cybersecurity
measures?
2. What are the primary obstacles and opportunities associated with implementing decentralized AI in the field
of cybersecurity?
3. How have other researchers combined blockchain technology and decentralized AI within the realm of
cybersecurity?
of
4. How do real-world use cases demonstrate the practical application of blockchain-enabled, decentralized AI
solutions in effectively addressing cybersecurity challenges?
ro
This research seeks to add a nuanced perspective, with an emphasis on building on and filling the gaps highlighted in,
the existing literature. Figure 1 illustrates the taxonomy of blockchain technology and decentralized AI for
cybersecurity as a starting point.
-p
re
Taxonomy of Blockchain Technology and
Decentralized AI for Cybersecurity
lP
Blockchain-Enabled
Blockchain Technology Decentralized AI for
Decentralized AI for
for Cybersecurity Cybersecurity
Cybersecurity
na
Decentralized
Security Regulation and Enhanced Privacy Increased Network
Identity Interoperability Decentralized DeepBrain Chain
Jo
Secure Identity
Management Sovrin
Resilient Supply
Chain Management
• The study presents a comprehensive overview of the emerging domain that combines BT and decentralized
AI in the context of cybersecurity.
• The study conducts an in-depth analysis of the potential benefits and challenges associated with the
integration of blockchain and decentralized AI for addressing cybersecurity concerns.
• The study proposes a structured taxonomy that categorizes and organizes the key components and concepts
related to blockchain, decentralized AI, and their intersection with cybersecurity.
• The study reviews and presents real-world use cases that showcase the practical application of blockchain-
enabled, decentralized AI solutions in addressing cybersecurity challenges.
• The study suggests future research directions that can further enhance the application of blockchain-enabled,
decentralized AI in cybersecurity, addressing existing limitations and pushing the boundaries of innovation.
In the subsequent sections, this study will discover the convergence of BT, decentralized AI, and their implications
for cybersecurity. Section II explores the application of BT in cybersecurity, discussing its features, benefits, and
challenges as well as examining existing solutions. Section III focuses on the role of decentralized AI in cybersecurity,
evaluating its advantages and limitations, and reviewing established solutions. Section IV delves into the core of this
research by analyzing blockchain-enabled, decentralized AI for cybersecurity, highlighting real-world use cases and
assessing their effectiveness. Section V outlines the future of research in this field, identifying potential directions and
innovations. Lastly, Section VI provides a comprehensive conclusion that synthesizes key insights and contributions
drawn from this review.
II. Blockchain Technology for Cybersecurity
A) Overview of blockchain technology and its features
BT is a system of distributed ledgers that permit the development of secure and transparent digital records
[19]. BT operates by establishing a decentralized network of nodes that take part in transaction verification and
of
validation, assuring their consistency and immutability [20]. Figure 2 provides an overview of this process [21].
ro
-p
re
lP
na
of
communication platform in a smart city, as shown in Figure 4. To keep information secure and private, they utilized
blockchain technology to resist a variety of risks and give special benefits to the city, including increased
ro
dependability, fault tolerance, efficiency, and scalability. They developed a common platform by connecting
blockchain with smart city devices to permit secure communication in distributed environments. Future studies will
-p
focus on creating a system-level model to investigate the interoperability and scalability of the various platforms used
in smart cities.
re
Other researchers [29] have analyzed how blockchain technology can be advantageous for multiple
industries, such as supply chain, healthcare, Internet of things (IoT), governance, and finance. The authors investigated
lP
BT's potential for revolutionizing industrial application fields and providing insights into recent advancements.
According to their literature review, BT has the most promise in the banking and finance industries and can offer safe
solutions for every area of the manufacturing process, from supply chain management to commercial marketing. It
na
can manage a variety of applications, including managing loans, handling payments, digitizing currencies, conveying
assets, etc. Future applications of the smart contract include tracking the provenance of documents, establishing
ownership rights for digital or physical objects, and preventing fraud. The study's findings show that industries are
ur
gradually adopting BT and that this technology has enormous potential to transform practically all industries and
create a working environment that is safer, more secure, and more transparent.
Jo
Figure 3: A conceptual model based on the NIST Framework Proposal [24]. Figure 4: A smart city security
framework [28].
Another paper [30] outlined the current uses of BT in, and its influence on, cryptocurrency security. The
researchers focused on the security features of blockchain, such as its distributed design and consensus procedures,
and analyzed the different threats that can compromise cryptocurrency security. The study looked at several additional
methods and strategies, such as decentralized governance, smart contracts, and cryptography, all of which have been
suggested to increase the security of cryptocurrencies on the blockchain. They also outline issues like scalability,
privacy, and regulation, which pose a threat to the security of cryptocurrencies using blockchain technology.
3) Transparency: Blockchain technology provides security by allowing all users to see the ledger [31]. This ensures
that all transactions are visible to all parties, providing greater trust and accountability [32]. Transparency challenges
in corporate blockchain solutions can be solved in one of three ways, as shown in Figure 5.
of
ro
Figure 5: The main approaches to addressing transparency challenges [33].
-p
Another work [34] focused on choosing and evaluating BT to achieve sustainable supply chain transparency.
In addition to introducing a new hybrid group choice scheme that integrates hesitant fuzzy sets and regrets theory for
BT assessment and selection, the study also presented a measurement system that incorporated supply chain
re
transparency features for sustainability and characteristic features for technology. The suggested approach accounted
for decisionmakers' attitudes under uncertainty and incorporated various viewpoints. Their findings demonstrated the
lP
feasibility of multi-dimensional BT evaluation, and their suggested decision-making tool offered new perspectives on
technological governance and decision making. Areas for further research included the need to study links between
socially sustainable supply chain performance and supply chain transparency, and integrating advanced MCDM
na
health, wellness, and transparency; however, the industry is currently experiencing false and deceptive claims that
reduce consumer confidence. By introducing transparency to the food supply chain at relatively cheap price points,
Jo
blockchain technology can help solve this problem, as data is more difficult to tamper with, and there is no central
authority that can collapse the system. This study examined how blockchain can help the food industry prepare for the
future by giving consumers the power to check product claims and avoid food-related fraud.
Another study [36] investigated how BT might be used in the agricultural supply chain to increase
transparency and traceability. The authors emphasized the necessity of data in assisting traceability and proposed using
blockchain's guiding principles of authenticity, security, and transparency to accomplish this goal. They found that
applying blockchain technology to agriculture can improve transparency and traceability, which may help customers
trust agricultural products. Their research did highlight some issues with blockchain technology, including the
dematerialization of documents and energy usage, but the authors contended that for an effective and transparent
agricultural system that assures healthy and sustainable food for everybody, changing the culture and political will are
essential.
4) Immutability: Once a transaction is recorded on the blockchain, it can't be changed or deleted [37]. This
immutability guarantees that the data's integrity is maintained and that the ledger is a trustworthy record of all
transactions [38]. This can prevent sensitive information from being accessed, altered, or deleted without
authorization.
To guarantee the immutability of permissioned blockchains in business applications, one study [39] employed
Keyless Signatures' Infrastructure (KSI), as described in Figure 6. Blockchain has an immutable, distributed ledger,
but in permissioned contexts where end users are prohibited from monitoring or storing a copy of the blockchain, its
immutability becomes questionable. To maintain the long-term immutability of the blockchain in permissioned
environments, KSI provides irreversible and unchallengeable proof of block confirmations. The paper underlined how
crucial it is to keep the blockchain immutable in order to guarantee the dependability of the business apps that rely on
it.
of
Figure 6: A blockchain model based on a KSI hash chain [39]. Figure 7: Layers of blockchain
ro
immutability [40].
-p
Another paper [41] explored the difficulties encountered by digital archives when trying to keep digitally
signed or sealed records safe, and their certifications valid, over time. The authors suggested utilizing blockchain
technology to maintain the immutability of data while enabling metadata updates and archival bond management. The
re
suggested solution, termed TrustChain, can be implemented with either MongoDB or Apache Cassandra and is based
on a metadata model that is compatible with PREMIS, Dublin Core, and ISAD(G) standards. This strategy is a crucial
lP
step toward utilizing new technologies like blockchain and distributed ledger technology while upholding fundamental
archive science principles. Future work on the TrustChain VIP solution will assess its performance and scalability.
na
Another study [40] argued for for the advantages of early standardization in the blockchain industry. The
blockchain, according to these authors, has the potential to change the digital economy, and its success depends on the
technology's ability to be standardized. They offered a framework, as shown in Figure 7, which may be used as a best
ur
practice guideline for blockchain implementation to comprehend the scope and limits of blockchain immutability. The
article proposed that early standardization can have major benefits.
Jo
5) Consensus: Utilizing a consensus mechanism, blockchain technology makes sure that all network nodes agree on
the ledger's current state [42]. With the help of this consensus method, all transactions are validated and verified by a
number of participants, assuring their authenticity and accuracy.
Researchers [43] have suggested a consensus resource slicing model (CRSM) to increase the effectiveness
of blockchain systems in scenarios including energy trade, as seen in Figure 8. Due to its data transparency, trade
openness, and traceability, blockchain technology is naturally suited for these distributed energy transactions;
however, present consensus methods need to be more effective. CRSM divides consensus nodes into various
consensus zones for concurrent consensus while the storage zone only holds block data with no consensus. By creating
an experimental platform, the authors were able to demonstrate the effectiveness of CRSM, reduce the communication
load on the blockchain system, and significantly speed up consensus. The authors concluded by saying that more
research is necessary to examine the security and effectiveness of CRSM as well as its applicability in other sectors.
Figure 8: A CRSM model [43].
According to other research [44], consensus is an essential component of BT that maintains the agreement
of
and validity of transactions across distributed nodes in a decentralized network. This study covered four primary
consensus methods: proof of work (PoW), proof of stake (PoS), delegated proof of stake (DPoS), and Practical
ro
Byzantine fault tolerance (PBFT), as shown in Figure 9. The authors concluded that a solid consensus procedure would
not only offer fault-tolerance but would be created with the right application in mind.
-p
re
lP
na
(a) (b)
ur
Jo
(c) (d)
Figure 9: Flow of (a) PoW, (b) PoS, (c) DPoS, and (d) PBFT [44].
Another study [45] suggested the new consensus technique proof of authentication (PoA) for blockchain-
based IoT uses. Because of their high resource requirements and limited scalability, the authors contended that current
consensus algorithms may not be appropriate for IoT applications, so the study introduced the PoA algorithm to
leverage the authentication process used in IoT devices to decrease resource requirements. The authors described how
PoA authenticates transactions by employing the public key infrastructure (PKI), which allows it to reach consensus
without the use of energy-intensive PoW or PoS mechanisms. The authors demonstrated how PoA may provide a
transparent and tamper-evident recording of every transaction in a distributed IoT network, ensuring the transactions'
integrity and security.
In general, blockchain technology has the power to completely change how digital information is stored and
distributed. With its decentralization, security, transparency, immutability, and consensus features, it offers a robust
architecture for developing trustworthy and secure digital systems.
B) Challenges of Blockchain in Cybersecurity
While BT has the promise to enhance the security and robustness of cybersecurity systems, there are
significant challenges that need to be resolved before the technology can be widely used in this sector [46]. Blockchain
needs to address its scalability, regulation compliance, security threats, and lack of interoperability before it can fully
achieve its potential.
1) Scalability: The scalability of blockchain technology is a significant concern [47]. Large-scale cybersecurity
systems can be challenging to implement because of the distributed environment of the technology, which can cause
delayed transaction processing times and excessive network congestion.
2) Regulation Compliance: Blockchain technology's regulatory compliance difficulties are a key obstacle to its
adoption in cybersecurity [48]. Due to blockchain technology's decentralized nature, it can be challenging to adhere
to existing regulations and policies.
3) Security Risks: Despite the fact that BT is intended to be secure, there are still security risks involved [49] [50].
of
For instance, attacks on the consensus mechanism or specific nodes might compromise the network's security as a
whole.
ro
4) Lack of Interoperability: The lack of interoperability among various blockchain platforms and systems can make
it challenging to adopt blockchain-enabled cybersecurity solutions [51]. This may reduce the efficiency of how
-p
blockchain technology can address cybersecurity issues.
re
C) Review of existing blockchain-based cybersecurity solutions
lP
Although blockchain technology has many possible applications in cybersecurity [52], there are difficulties
that need to be handled prior to its adoption, such as issues of scalability, regulation compliance, security threats,
and a lack of interoperability. Despite these difficulties, numerous organizations are exploring the use of
na
blockchain technology in cybersecurity, and several blockchain-based cybersecurity solutions are currently in use.
Table 1 summarizes the main blockchain solutions along with their respective areas of cybersecurity and
highlights their main contributions in those domains.
ur
Areas of
Blockchain Solution Main Contributions and Benefits
Cybersecurity
2. Decentralized Identity Identity & Access Offers secure and verifiable identity
Management Management authentication, mitigating identity-related risks.
6. Resilient Supply Chain Supply Chain Enhances supply chain resilience by improving
Management Resilience transparency, security, and responsiveness.
1. Cryptographic Key Management: The management of cryptographic keys is one way that blockchain
technology is used in cybersecurity [53]. Organizations can guarantee that their cryptographic keys are safe
and resistant to attacks by using blockchain technology to store and manage them.
One paper [54] provided a novel method for efficient and secure key management and authentication in distributed
IoT networks utilizing BT. Absent a trustworthy third party, the researchers suggested a blockchain-based architecture,
as shown in Figure 10, that makes use of hash chains to assure data privacy as well as secure communication between
of
IoT devices. The suggested method employs a one-way hash chain mechanism to give the IoT devices a collection of
public and private keys for mutual authentication. The authors emphasized this method’s high efficacy and scalability,
ro
and recommended that future work develop inter-network communication schemes and asses security and
performance requirements. Overall, this study provided a promising solution to the security and privacy issues that
often arise in distributed IoT networks.
-p
Another study [55] proposed a body sensor network (BSN)-based lightweight backup and efficient recovery
re
mechanism for keys in a health blockchain. Healthcare systems must be protected by security measures since they
handle private and sensitive data. Figure 11 shows a smart healthcare structure using both BT and a BSN. The
biosensor devices in the BSN were responsible for producing, storing, and recovering the health blockchain's keys.
lP
The system’s benefits included improved key security and lower storage costs for encrypting blocks, which improved
the privacy on the health blockchain. The study's evaluations demonstrated that this structure has strong security and
performance, making it an effective solution for protecting private data on the health blockchain.
na
ur
Jo
Figure 10. A blockchain-based IoT model [54] Figure 11. A smart healthcare system with blockchain and a BSN
[55]
Another work [56] provided a powerful, decentralized key management mechanism for vehicular ad hoc networks
(VANET) with blockchain (DB-KMM) to address the security concerns and opportunities of VANET. Figure 12
depicts the proposed model with the three types of entities that make up the DB-KMM: vehicles, blockchain networks,
and vehicle service providers. The suggested system used a simple mutual-authentication and key-agreement protocol
based on bivariate polynomials and automatically registered, updated, and revoked user public keys. The authors
examined DB-KMM's security and demonstrated that it is capable of preventing common attacks including collusion,
DoS, internal, and public key tampering attacks. Additionally, they used simulations to examine the proposed scheme's
performance, which showed that it performed better than current solutions in terms of communication, storage,
computational overhead, and latency. In general, the suggested DB-KMM mechanism can offer an efficient VANET
key management solution that would improve the security of contemporary transportation systems.
of
Figure 12: A DB-KMM system model in [56]. Figure 13. Elements of a blockchain-based
self-sovereign identity framework [57].
ro
2. Decentralized Identity Management: Decentralized identity management solutions using blockchain
-p
technology can offer higher levels of security and privacy than conventional centralized systems [58]. Users
have more control over their personal data and reduced risk of identity theft and fraud when systems adopt
BT to store identity information and credentials.
re
Research [57] has offered a blockchain-based, decentralized identity management system for transportation that
lP
employs self-sovereign identity (SSI) to provide all parties with a high level of safety and transparency. Figure 13
displays elements of an SSI structure based on blockchain; it employs a shared ledger that is verified and stored by
numerous nodes within the network. The suggested system sought to eliminate the demand for multi-travel cards for
each transportation supplier and to allow users more authority over their identities while using interoperable ticketing
na
systems across Europe. Through a low-fidelity prototype created using the Hyperledger Indy blockchain, the study
provided a proof of concept. The prototype offered the EMC, a verified credential that can be used as an identity card
across Europe's public transportation network, and was based on a set of worldwide technical standards published by
ur
the W3C. The suggested approach was consistent with the EU's goal of developing a single transportation market
among member countries by 2050. Building more thorough and reliable prototypes, investigating the perspectives of
Jo
the cyber-physical social scheme and the intelligent transportation system, and evaluating the system from the
respective requirements of many stakeholders are all possible directions for future studies.
Other studies [59] have suggested a decentralized identity management system based on blockchain
technology to allow patients and healthcare suppliers to verify themselves securely and transparently in various
eHealth areas. Figures 14 and 15 illustrate the proposed design, including the smart healthcare identity management
method and digital health identity. Health identifiers (healthIDs) are used to uniquely identify patients and healthcare
providers. A healthcare regulator attests to their identity attributes, which are then maintained by the identity holder
and indexed on the blockchain. The authors set up smart contracts on an Ethereum consortium blockchain and assessed
their performance in terms of gas cost, speed, and synchronization delays. According to the findings, the consortium
blockchain could achieve a throughput of more over 100 TPS, and for optimal performance, less than half of the
network's sealers would be present. Future work will involve combining the block chain with a decentralized storage
technique like IPFS and managing and storing patient health data securely using zero knowledge proofs.
Figure 14. The framework of the smart healthcare identity management technique. Figure 15. A summary of
digital health identity [59].
A thorough examination of identity management systems (IDMS) utilizing BT is provided by another study
[60]. The authors claimed that BT can address issues with security, privacy, and trust that traditional IDMS may cannot.
The authors emphasized the benefits of utilizing blockchain to create IDMS, including improved security and privacy,
user control, and interoperability. While BT has received significant interest in identity management, the context of
the user experience is still not fully understood. The use of blockchain in identity management may be hindered by
privacy issues; therefore, further research is needed to better understand BT and identity management.
Other authors [61] have suggested a blockchain-based, decentralized authentication approach for VANET to
address security and privacy concerns connected with this technology, as shown in Figure 16. The suggested method
built a distributed architecture that preserved an immutable record of data, increasing the system's integrity, using a
permissioned blockchain technology called Hyperledger Fabric. The proposed approach permitted vehicles to preserve
restricted anonymity in the network, where only authorized entities could learn their true identities. The effectiveness
of the proposed strategy was compared in the study to the traditional PKI-based approach, and the former had promise.
of
ro
-p
re
lP
3. Secure Data Sharing: Blockchain technology can be utilized to build secure data-sharing networks that offer
more accountability and transparency [62]. Organizations can ensure that sensitive information is shared only
ur
be utilized for secure, decentralized medical record storage and sharing [63]. The suggested approach, Medi-Block,
employed bilinear mapping for authentication and eliminated the requirement for third-party trust. During the
authentication phase, the system employed two-way authentication among patients and hospitals while also complying
with several security requirements. The suggested architecture offered a safe platform for sharing medical data and
ensured accuracy, safe data sharing, and cost prediction.
Figure 17. Medi-Block system model and attributes. Figure 18: A blockchain-based medical record framework
[63].
Another study [64] presented a two-tier blockchain approach that integrated permissioned and permissionless
blockchains to permit secure data sharing, as presented in Figure 19. To do this, the study explored the history of
consensus systems for every form of blockchain and evaluated their concept in two distinct system environments. The
permissioned blockchain validated more blocks than the permissionless blockchain with a single sealer and miner. In
contrast to the permission-less blockchain, the permissioned blockchain showed a decrease in block count as more
miners and sealers were needed. The blockchain concept will be further developed in the future using both methods
to build a decentralized framework that would allow anybody to submit data but limit access to specific data to
authorized users. Alternative protocols and consensus techniques will also be investigated for forwarding and
receiving information from the blockchain.
4. Supply Chain Management: BT can be utilized to develop transparent and secure supply chain management
systems [65][66]. Organizations can minimize the risk of counterfeiting and maintain the integrity of the
supply chain by tracking the flow of products and confirming their authenticity using blockchain technology.
Research [67] has examined the implications of BT on supply chain management (SCM) from the perspective of
sustainable performance in the airport industry. An Italian airport effectively implemented the Airport Collaborative
of
Decision Making (A-CDM) platform, which is one of the most important BT uses in airport manufacturing. Although
implementing blockchain technology has many advantages for enhancing operations management (OM), it may not
ro
always result in the most effectiveness, efficiency, and sustainability. According to his study, managers and
policymakers should collaborate to establish a cooperative network based on shared culture and mutual trust. The
-p
results show that strategic manufacturing, like airports, are currently understudied. More investigation is required to
determine how cultural, and social factors and involve larger participant diversity such as managers, passengers, and
policymakers in SCM, are impacted by blockchain technology.
re
Another paper [68] addressed how contemporary supply chains have become sophisticated value networks that
lP
are challenging to manage while also retaining the visibility of products and merchandise. The authors suggested using
the IoT to watch, track, and control goods and procedures inside the value chain network to address this problem.
They also recommended blockchain technology to improve transparency and boost business-to-business trust. The
na
paper provided six research questions on how blockchain can affect key IoT characteristics—scalability, security,
immutability, information flows, traceability, and interoperability, as depicted in Figure 20. The authors suggested that
integrating blockchain and IoT can improve the efficacy and efficiency of contemporary supply chains. However, the
ur
authors pointed out many limitations and obstacles involved with integrating blockchain in an IoT environment, all of
which demand immediate attention from regulators and industry stakeholders.
Jo
Figure 19: Outline of a two-tier block chain model [64]. Figure 20. The effect of BT on IoT characteristics
[68].
Another paper [69] examined the barriers to adopting BT in renewable energy supply chain management. The
authors used hybrid approaches including SWARA-Gray, EDAS-Gray, WSM-Gray, COPRAS-Gray, and TOPSIS-
Gray to rank and assess the identified difficulties. The findings showed that "high investment cost" is the biggest
obstacle to the use of blockchain in sustainable energy supply chains. Despite this, the study emphasized that, in the
long run, BT can help the renewable energy industry overcome obstacles and improve supply chain sustainability,
traceability, and transparency.
5. Cyber Threat Intelligence Sharing: BT can be used to build decentralized networks for sharing cyber threat
intelligence [70]. Organizations can collaborate more successfully, and react to new threats faster, by adopting
blockchain technology to securely share information about cyber threats.
By offering novel distributed detection and reaction approaches based on data security methods, one study [71]
suggested a solution for improving the effectiveness and efficiency of identifying and countering cyber threats. The
suggested method was based on blockchain and artificial intelligence, which may automate incident classification and
management, provide cyber situational awareness, and enable rapid adoption of appropriate safety measures to take
in the event of an attack, as illustrated in Figure 21. The work investigated the accuracy and performance of a deep
autoencoder neural network using BT as a system for classifying and managing incidents. This approach reduced
manual procedures and conserved storage space by utilizing a blockchain smart-contract mechanism to construct an
automated, trusted model for incident management workflow that enabled the automatic collection, categorization,
and enhancement of incident data. The study also demonstrated how the strategies might be used to assist security
operation centers with incident handling.
For decentralized threat intelligence sharing utilizing BT and Trusted Execution Environment (TEE)
of
technologies, another study [72] presented a unique trust improvement system called TITAN, as represented in Figure
22. Decentralized blockchain-based sharing architectures can improve sharing efficiency, but they don’t address
ro
problems with trust, privacy, negative publicity, and legal concerns. TITAN intends to address these issues by utilizing
peer-to-peer reputation systems to foster trust, as well as blockchain and TEE technologies to guarantee the system's
-p
security, integrity, and privacy. re
lP
na
ur
Jo
Figure 21. The workflow of cyber incidents [71]. Figure 22. TITAN architecture [72].
Another paper [73] offered a new blockchain network framework for the safe sharing of cyber threat
intelligence (CTI) data, focusing on the difficulties faced by computer security and incident response teams (CSIRTs)
when sharing highly sensitive information inside systems where participants occasionally have different objectives or
preferences. The model made use of the blockchain's security features to provide a framework for CTI sharing
networks that is efficient and effective, and also has the ability to address trust challenges and data privacy concerns
inherent in this domain. The STIX 2.0 protocol and Hyperledger Fabric were, and the prototype successfully showed
how TLP (Traffic Light Protocol) could be enforced while STIX 2.0 security data could be distributed inside a network
using Fabric's chaincodes. Future work will concentrate on assessing the functionality and security of the CTI BT
network and creating a useful secured application that can be used in real-world applications.
6. Resilient Supply Chain Management: Organizations can follow the movement of items and verify their
authenticity by establishing a decentralized and transparent supply chain network. This can help avoid
counterfeiting and ensure the chain's integrity [74].
Research [75] has discussed the impacts of COVID-19 on food supply systems and the significance of
resilient and sustainable food supply chain management. To boost supply chain resilience, the paper suggested
implementing reverse logistics practices and integrating blockchain technology. They employed a fuzzy synthetic
evaluation method to recognize and eliminate risks connected to adopting blockchain. They emphasized the
significance of both information management and security risks in adopting BT in food supply chains.
Another study [76] investigated the application of BT in the humanitarian sector to enhance the accountability
and transparency of disaster relief supplies, information exchanges, and money transfers. The paper suggested the
theoretical framework shown in Figure 23 to comprehend how swift-trust (ST) can affect transparency in an
operational supply chain. The framework also demonstrated how BT-enabled ST can increase supply chain resilience
(SCR) and collaboration (CO) among entities involved in disaster relief activities. The study gathered information
from global non-governmental organizations and discovered that BT significantly and positively influenced
operational supply chain transparency and ST, which positively impacts CO and SCR.
of
ro
Figure 23: Theoretical model in the humanitarian sector [76].
-p
re
The advantages and disadvantages of each blockchain solution in different areas of cybersecurity can be summarized
as follows:
lP
data.
Disadvantages: There is increased complexity in managing and safeguarding private keys, the potential for loss of
ur
access if keys are lost, and scalability challenges when dealing with a large number of keys.
2. Decentralized Identity Management:
Jo
Advantages: This strategy allows for secure and verifiable identity authentication, reducing identity-related risks. It
also enhances privacy control for users, as they own their identity data.
Disadvantages: Adoption challenges, as transitioning from traditional identity management systems can be complex.
Privacy concerns arise from the need to balance transparency and user data protection.
3. Secure Data Sharing:
Advantages: This method facilitates the secure sharing of sensitive data while maintaining data integrity. It eliminates
the need for intermediaries, reducing risks associated with centralized data storage.
Disadvantages: It is difficult to ensure data confidentiality while still maintaining the benefits of transparency. There
are also scalability concerns when handling a large volume of data transactions.
4. Supply Chain Management:
Advantages: This method increases transparency, traceability, and authentication in complex supply chains. It
improves accountability and reduces fraud by providing an immutable record of transactions.
Disadvantages: Adoption challenges, as integrating existing supply chain systems with blockchain can be technically
demanding. Ensuring data accuracy and trust among participants remains a concern.
5. Cyber Threat Intelligence Sharing:
Advantages: This solution enables collaborative threat detection, sharing actionable intelligence across entities. It also
strengthens collective security efforts and accelerates response times.
Disadvantages: It can be difficult to balance information sharing with concerns about privacy and competitive
advantage. Ensuring the accuracy and quality of shared threat intelligence can be challenging.
6. Resilient Supply Chain Management:
Advantages: This solution enhances supply chain resilience by improving transparency, security, and responsiveness.
It mitigates risks by providing real-time visibility into supply chain operations.
Disadvantages: This solution is dependent on the accuracy and reliability of data fed into the blockchain. There are
implementation challenges when integrating legacy systems with blockchain-based solutions.
In each case, these lessons and insights shed light on the practical implications of implementing blockchain solutions
in different areas of cybersecurity, helping organizations make informed decisions while harnessing the benefits and
addressing potential challenges.
of
III. Decentralized AI for Cybersecurity
ro
A) Overview of decentralized AI and its benefits for cybersecurity
-p
Decentralized AI refers to the usage of artificial intelligence algorithms and models that are spread across
numerous network nodes. It facilitates the use of distributed computing infrastructure in contrast to centralized AI,
re
where all data and processing take place on a single system. One study [77] gave a general overview of AI applications
and investigated the most recent AI developments in cybersecurity, especially in security analysis and the evaluation
of potential upgrades. The work emphasized the value of utilizing AI technologies to address cybersecurity issues and
lP
suggested an AI approach to provide security. The study illustrated the need for more research in this area and offered
a helpful analysis of how AI might enhance the effectiveness of protection measures.
na
Another paper [78] analyzed the difficulties of cybersecurity in industrial control systems (ICS) in the context
of Industry 4.0, and suggested the use of AI techniques to boost resilience against cyber threats. The authors examined
the distinctions between ICS and information systems and suggested that a decentralized architecture with flock
ur
behavior is superior to a centralized management architecture for controlling large-scale industrial processes. The
study emphasized the importance of determining relevant indicators to evaluate and contrast the impacts on the
controlled elements in order to measure the efficacy of the suggested framework.
Jo
Other research [79] has focused on the Internet of Medical Things (IoMT), or technology used for healthcare
services, and highlighted its vulnerability to cyberattacks, raising privacy and security concerns. To address these
issues, the study explored the combination of blockchain technology and AI within the IoMT framework. This paper
emphasized the potential of technologies such as AI and BT in decentralized healthcare applications.
By enabling more efficient threat detection, response, and prevention, decentralized AI has the potential to
revolutionize the field of cybersecurity. Decentralized AI could have a number of benefits, including:
1. Improved Threat Detection: Decentralized AI allows organizations to better identify and analyze potential
cyber threats by leveraging multiple data sources and computational resources [80].
2. Enhanced Privacy and Security: Decentralized AI can assist in preserving the security and privacy of
sensitive information by dispersing the data and processing among several nodes, minimizing the possibility
of an attack or single point of failure [81].
3. Faster Response Times: Decentralized AI may decrease response times to emerging risks by distributing AI
models across numerous nodes, permitting organizations to react more rapidly and efficiently [82].
4. Increased Resilience: By dispersing data processing and storage across numerous nodes, decentralized AI
can help to increase the resilience of cybersecurity systems by minimizing the possibility of a single point of
failure or attack [83].
5. Better Collaboration: Decentralized AI can promote greater collaboration among many organizations and
stakeholders in cybersecurity, facilitating more efficient sharing of data and intelligence [84].
Despite these potential advantages, there are difficulties in implementing decentralized AI in cybersecurity. Among
these are problems with data integrity, interoperability, and regulatory compliance. Decentralized AI, however, has the
capability to improve the security and robustness of cybersecurity systems as this technology develops.
of
3. Scalability: Decentralized AI models may become computationally complicated, requiring significant
resources for training and deployment. This can cause scalability issues, especially if the models need to be
ro
deployed among large networks or data centers [86].
-p
4. Security Risks: Decentralized AI models may be susceptible to attacks or manipulation, especially if the
models are dispersed across a number of network nodes. Because of this, guaranteeing the security and
integrity of the models, and therefore the data they analyze, may be difficult [87].
re
5. Regulatory and Compliance Issues: Decentralized AI models could pose regulatory and compliance
lP
challenges in cybersecurity, especially if they process sensitive data or work in regulated industries [48].
6. Lack of Standardization: Due to the lack of standardization in decentralized AI models, evaluating and
comparing different models, as well as ensuring interoperability and compatibility across different networks
na
efficient threat detection, response, and prevention. To enable the full potential of decentralized AI in cybersecurity, it
will be crucial to address these difficulties and constraints.
Jo
of
Other research [92] has examined using federated cybersecurity (FC) to secure and improve the effectiveness of
ro
IoT devices. By creating a federation of learned and shared models on top of diverse participants, the authors sought
to discover security vulnerabilities and avoid the spread of risks over the IoT network. FL a privacy-aware machine
learning model, which is especially beneficial in securing the susceptible IoT environment. The study examined
-p
methods for addressing FL performance issues that may influence the security and overall effectiveness of the IoT,
with a primary focus on security.
re
A blockchain-in-the-loop FL technique called FabricFL has also been suggested for trusted and decentralized
systems [93]. This strategy incorporated traditional FL, the Hyperledger Fabric blockchain, and gamification
lP
components to address security issues with FL. The framework offered a collaborative training environment for
machine learning models that was secure and auditable, while also protecting user privacy. Utilizing three different
datasets, the suggested method increased the FL process' accuracy and convergence to the best performance. The paper
na
concluded that FabricFL may offer a secure and trusted environment for FL in industrial contexts.
Another study [94] focused on enhancing the efficiency of healthcare systems by introducing the energy-efficient
ur
distributed federated learning offloading and scheduling (EDFOS) system within blockchain-based networks.
Traditional disease detection applications often overlook processing performance and data privacy, and this study
Jo
addressed that gap by proposing EDFOS, a comprehensive system that optimizes energy-efficient offloading and
scheduling while meeting quality of service (QoS) requirements for healthcare applications. Simulation results
revealed that EDFOS significantly reduced power consumption, training and testing time, resource leakage, and
deadlines, compared to existing healthcare systems. This approach provided an effective solution to the challenges of
power consumption and data privacy in healthcare applications.
2. Blockchain-Based AI: Decentralized AI models can be developed using blockchain technology and
deployed across numerous network nodes [95]. This strategy can increase the security and resiliency of AI
models while still allowing for efficient training and deployment for cybersecurity applications.
One paper [96] presented a solution for challenges in industrial Internet of things (IIoT) healthcare
applications by introducing the deep reinforcement learning-aware blockchain-based task scheduling
(DRLBTS) algorithm. This algorithm ensured secure and efficient task scheduling in the healthcare context,
addressing concerns like security, privacy, and makespan requirements. The proposed scheme divided tasks
into mobile, fog, and cloud categories and executed them based on resource requirements, validation, and
time considerations. The proposed system achieved optimal results. While effective, the DRLBTS has its
limitations, particularly its energy consumption during task execution. Future work aims to consider factors
like energy consumption, electricity cost, and mobility-enabled power efficiency. it also requires other
improvements to enhance the algorithm's performance in executing healthcare workflows, including real-
time profiling, resource optimization, and energy consumption reduction.
3. Decentralized Intrusion Detection: By utilizing distributed computing resources and AI algorithms,
decentralized intrusion detection systems can be employed to identify and respond to cyber threats [97]. By
allowing faster detection of, and response to, emerging threats, this strategy can help increase the resilience
and responsiveness of cybersecurity systems.
As presented in Figures 26 and 27, one study [98] has suggested a decentralized machine learning framework to
facilitate cooperative intrusion detection in unmanned aerial vehicles (UAVs) based on BT. The authors contended
that conventional UAVs were susceptible to cyberattacks because they depended on centralized servers for data
processing. The authors discussed decentralized predictive analytics using blockchain technology and suggested a
framework for applying and sharing machine learning models. Cooperative intrusion detection was used as a case
study for evaluating the proposed system, proving the usefulness and efficiency of the suggested strategy for UAVs
and related applications. When compared to the centralized approach, the suggested system performed better in terms
of detection accuracy and performance overhead. By reducing the demand for data sharing among the nodes, the
framework improved data privacy and security as well. Future research will examine the presented structure's
scalability and robustness in real application-specific scenarios for UAVs facing various known attacks.
of
ro
-p
re
lP
Figure 26: A blockchain-based decentralized machine learning system. Figure 27: The conceptual
model for the machine learning process [98].
na
An intrusion detection structure for smart transportation systems (STS) known as FED-IDS has also been
proposed [99]. The proposed FED-IDS framework is illustrated in Figure 28. STS is susceptible to cyber attacks as a
result of the widespread use of software and the initiation of wireless interfaces. To combat this, FED-IDS uses a
ur
context-aware transformer network to offload the learning-process via servers to distributed vehicle edge-nodes in
order to effectively detect attacks. To permit multi-edge nodes to deliver accurate, safe, and distributed training without
Jo
the requirement for centralized control, the authors suggested a blockchain-managed, federated training strategy. The
evaluations conducted on two public datasets showed that FED-IDS outperformed other techniques, demonstrating
the credibility of protecting networks of intelligent transportation systems against cyberattacks.
4. Decentralized Access Control: In a distributed environment, access to sensitive data and systems can be
controlled via decentralized access control systems [100]. By lowering the potential of a single point of failure
or attack, this strategy may enhance the security and privacy of sensitive information.
One study [101] presented a secure architecture for IIoT in smart manufacturing applications, including BT and
machine learning (ML), as shown in Figure 29. The proposed framework includes five layers, including a transport
layer that is BCT-enforced and an attack detection layer based on ML. This architecture is contrasted with comparable
ones described in the literature, and experiments demonstrated that the suggested architecture may significantly
decrease threats from DDoS, injection, brute force, and XSS attacks.
To solve security and privacy problems with the storage of medical data, another study [102] suggested a
distributed, privacy-preserving information repository for smart health called Derepo that made use of homomorphic
encryption and decentralized access control. The double-layered architecture, which combined static and dynamic
processes, guaranteed controllability, manageability, and pseudonymity while maintaining computability. Fully
homomorphic encryption (FHE) ensured confidentiality and addressed privacy concerns, while the consortium
blockchain ensured the access control system's reliability. The suggested method made use of distributed ledger
technology to offer a reliable access control system and homomorphic encryption for protecting data privacy and
computability. The design was user-centric, and the sole holder of information was managing access and decrypting
their information. The encrypted data can be processed by authorized third parties without accessing its original
contents. A Derepo prototype was evaluated for security assessments, demonstrating its feasibility. Future work will
concentrate on optimizing the performance and expanding the functionality to an industrial level.
of
ro
Figure 28: Th FED-IDS framework [99].
-p Figure 29. The suggested secured IIoT system with
re
BT and ML [101].
lP
for its capacity to provide secure and decentralized record-keeping. One potential use for these technologies is the
creation of decentralized AI models for cybersecurity using blockchain and AI [95]. Decentralized AI models can be
Jo
distributed across several nodes by utilizing the distributed computing capabilities of blockchain networks, enhancing
the security and resiliency of AI models and cybersecurity systems. Decentralized AI is able to assist in addressing a
number of the obstacles brought on by conventional centralized AI models, such as issues with data privacy and
security. By utilizing federated learning and other decentralized methods of AI training, sensitive data can be secured
while still allowing for the efficient training of AI models.
In the context of the IIoT, one study [104] suggested a blockchain-enabled intelligent IoT framework that
used AI to facilitate efficient big data analysis, as shown in Figure 30. The proposed design sought to address issues
with centralized schemes, security, privacy, resource constraints, and the absence of training data for artificial
intelligence. A qualitative and quantitative evaluation of the design demonstrated that it exceeded current IoT
architectures in terms of accuracy, latency, security, privacy, computational complexity, and energy cost. The proposed
architecture converged blockchain and AI and enabled a scalable and accurate analysis of data in real time for IoT
applications. Although there are still challenges, including scalability, interoperability, and energy efficiency, the
authors recommended incorporating machine intelligence principles into the architecture to solve these issues.
In order to address issues with the electric vehicle (EV) charging systems, such as vulnerable charging
stations and inefficient charging schedules, another paper [105] suggested integrating blockchain with AI. The authors
reviewed the market's existing AI and BT charging systems and suggested use scenarios where both methodologies
might work together to create a safe, effective, and distributed charging system. The study explored possible trends
and executions for better-charging infrastructure for EVs as illustrated in Figure 31. The proposed framework sought
to provide a high quality of service (QoS) for end users. The authors assessed the existing state of the EV charging
ecosystem and highlighted two significant obstacles: balancing consumer satisfaction with grid operations, and
maintaining security and privacy. The potential of AI was assessed in scheduling EVs and improving the provisioning
of EV charging stations, and the impact of blockchain was evaluated in protecting the ecosystem and facilitating
trustless energy trade between EVs, private charging station owners, and power utilities. The authors provided use
scenarios emphasizing the potential advantages of combining both technologies, and they came to the conclusion that
integrating AI and Blockchain is necessary for developing an effective charging ecosystem.
In the context of 6G, another paper [106] suggested using blockchain technology for decentralized network
management. There is a rising need for fault-tolerant and censorship-resistant solutions as communication services
become more virtualized and software-defined to assure trust in the data and infrastructure. Blockchains are thought
to be a viable remedy that might automate some contractual agreements and offer a decentralized environment for
numerous parties and resources. This study examined the use of blockchain in various network functions, including
dynamic spectrum management, software-defined networking, resource management, and IoT services. Researchers
are becoming more interested in decentralized methods of network management, especially as operators look for ways
to guarantee the reliability of data, operations, and business transactions while preserving business continuity.
of
ro
-p
re
lP
na
Figure 30. The design overview of the proposed BlockIoTIntelligence Architecture [104]. Figure 31: Electric
ur
To create a trustworthy and respectful community according to the time banking concept, research [107] has
also suggested a blockchain-enabled decentralized time banking system (BlendTBS). BlendTBS is a system that
compensates users for taking part in socially positive activities and operates on a permissioned blockchain network.
An initial BlendTBS prototype was implemented, and small-scale research has assessed the system's usefulness in a
traditional community on the island of Aneityum, Republic of Vanuatu. The authors hope that by presenting this
position paper, more people will become interested in the uses of BT in contemporary society.
of
2. Increased Resilience: By facilitating more rapid and efficient threat detection and response, decentralized
ro
AI models can assist in strengthening cybersecurity systems. Decentralized AI models can identify and react
to emerging risks faster than centralized models using blockchain-distributed computing resources and AI
-p
algorithms, making the former more resilient [109].
One study [112] suggested that disaster aid networks could become more resilient by utilizing blockchain
re
technology. Getting supplies to those in need can be difficult in disaster zones because of their unpredictable and
dynamic nature. Collaboration, coordination, sovereignty, and equality in the provision of aid are essential for disaster
lP
response networks to succeed. Smart contracts enabled by blockchain technology allow for secure, real-time data
sharing and automation in a decentralized environment, making it a promising solution to this problem. As shown in
Figure 32, this paper investigated how blockchain technology can be integrated with the IoT and dynamic voltage
na
frequency scaling (DVFS) to improve disaster management resilience. The findings demonstrated that blockchain
technology can enhance disaster-aid network methods and provide insightful information for researchers and
management interested in practical implementation. Despite these promising results, the study itself has its
ur
shortcomings, such as restrictions on data collecting, reliance on a single case study, and absence of on-site verification
of simulation results. The collecting of accurate data is hampered by the confidentiality of data regarding agency
interaction and coordination during disasters. It is also challenging to validate model implementation on-site in the
Jo
3. Data Privacy: Sensitive data can be kept private when it is local to a device or node. Decentralized
approaches to AI training, such as federated learning, can assist in addressing data privacy issues highlighted
by centralized AI models while also allowing a decentralized model to train on this data securely [81].
of
One paper [116] investigated how BT and FL are used to enhance the privacy and security of information in
collaborative learning. FL is a new training approach that permits numerous scattered nodes to learn a deep learning
ro
(DL) model simultaneously without sharing information. However, the trained model may be compromised by
malicious actors using specific security flaws in present FL techniques. To combat this, the study suggested a
-p
blockchain-enabled security paradigm that can provide a better DL model without sharing information; doing so would
enhance privacy by enforcing greater data security and access rights as described in Figure 34. Data and model
poisoning attacks were studied using a blockchain-facilitated FL method constructed along the Ethereum network and
re
a conventional FL method (without blockchain). The study offered a transparent incentive structure that motivated
participating decentralized nodes for good behavior and prevented frequent problems. The study analyzed the potential
lP
of BT for improving privacy and data security in collaborative learning and offered insightful information for the FL
security literature. Future research could concentrate on analyzing how incentive based block chains affect FL methods
with asynchronous and heterogeneous training datasets. The study used Infura and Rinkeby Testnet to lower gas fees,
na
but further research is required to comprehend the full effect of an incentive-based blockchain utilizing the FL method
in practical situations including mainnet.
ur
In order to solve privacy and efficiency concerns in fog computing, another study [117] suggested a
new blockchain-enabled federated learning (FL-Block) system, as explained in Figure 35. The FL-Block architecture
enables local learning updates for end users, which are exchanged with a blockchain-based global learning scheme
Jo
validated by miners. The suggested model used a PoW consensus technique to facilitate autonomous machine learning
without a central authority. Additionally, the paper evaluated FL-Block's latency performance and determined the ideal
block generation rate, taking into account communication, consensus delays, and computing cost. Findings from the
assessment indicated that FL-Block performed better than other options in terms of protecting privacy, effectiveness,
and resilience to poisoning attacks. By maximizing the trade-off between efficiency and privacy protection, the authors
intended to expand the model to more generic scenarios in future work. Additionally, they wanted to investigate how
game theory and Markov decision processes might be used to find the ideal conditions for computing and
communication costs.
Figure 34: Collaborative learning system description [116]. Figure 35: Decentralized privacy in fog computing
based on FL-Block [117].
4. Improved Collaboration: Decentralized threat intelligence sharing and other collaborative cybersecurity
schemes can be facilitated by blockchain-enabled decentralized AI models. By utilizing the combined
knowledge and experience of various organizations and stakeholders, threats can be detected and handled
more effectively [109].
As seen in Figure 36, one study [118] proposed a blockchain-based accountability approach for digital-twin
environments that are distributed and cooperative. The approach incorporated a public or private authority that offered
complete security and privacy perseveration, with no repudiation of block chain transactions. The suggested method
was built on the "X-by-design" and "X-as-a-service" concepts and greater security, accountability, and integrity in
decentralized techniques. This study demonstrated that BT has the ability to develop various industries by introducing
novel features including smart contracts, content tokenization, the elimination of counterfeit products, supply chain
optimization, digital-twins, and end-to-end security.
An architecture for a blockchain enabled Internet of Vehicles (IoV) with cooperative positioning (CP) has also
been proposed [119] to increase the precision, resilience, and security of vehicular GPS location, as shown in Figure
37. The suggested framework includes: a self-positioning correction method based on the DNN algorithm for
increasing the positioning accuracy of intelligent vehicles; an intelligent multiple vehicle positioning error to decrease
of
GPS positioning errors for common vehicles; and a blockchain-enabled system for information sharing and security
among intelligent vehicles, CoVs, and roadside units. The suggested architecture was assessed using extensive
ro
simulation results, which revealed enhancements in vehicular positioning accuracy, information transfer, and sharing.
-p
re
lP
na
ur
Jo
Figure 36: Proposed model for digital twin environments [118]. Figure 37: IoV system
architecture [119].
of
4. Enigma: Enigma is a blockchain-based, decentralized privacy protocol that permits secure and private data
ro
sharing and analysis [125]. Without disclosing sensitive information to a single party, the platform uses secure
multi-party computational techniques to facilitate data analysis and AI model training.
-p
5. IOTA: Using blockchain technology, the IOTA Foundation has created a decentralized method of intrusion
detection. The system employs a distributed network of sensors and AI models to enhance the precision and
re
effectiveness of intrusion detection while also detecting cyber threats in real time [126].
6. Sovrin: A blockchain-based identity management system called Sovrin leverages decentralized AI to offer
lP
secure and accurate identity authentication [127]. By allowing individuals and entities to securely
communicate and verify identity information, a mechanism reduces the probability of fraud and identity theft
[128].
na
This section explains the future research directions for blockchain-enabled decentralized AI in cybersecurity to further
enhance this technology. The following need to be addressed by researchers:
Jo
1. Integration of blockchain and decentralized AI: Future studies should examine more sophisticated
applications of blockchain and decentralized AI technology for enhancing cybersecurity. For instance,
researchers can look into the possibility of using blockchain as a secure and transparent framework for
training and sharing AI models. By facilitating more secure and effective information sharing, threat
detection, and response capabilities, the integration of blockchain and decentralized AI technologies has the
capability to revolutionize cybersecurity. This direction of research may result in the creation of more
advanced and reliable cybersecurity systems, which may then assist in protecting enterprises from evolving
cyberthreats.
2. Improved interoperability: The advancement of blockchain and decentralized AI solutions that are more
standardized and interoperable would greatly improve the effectiveness and efficiency of cybersecurity
processes. In order to improve collaboration and data sharing, future research should investigate strategies
for achieving interoperability across various blockchain platforms and decentralized AI models. This research
direction can address the existing fragmentation of blockchain and AI technologies, allowing for improved
collaboration and information exchange. Consequently, enhanced interoperability could lead to more rapid,
precise, and efficient cybersecurity responses.
3. Decentralized identity management: A crucial component of cybersecurity is identity management, and
future studies should explore the potential of blockchain and decentralized AI in designing more effective
and secure identity management platforms. To create more reliable and scalable identity management
solutions, researchers should look into the adoption of decentralized identity protocols and their incorporation
with BT and AI technologies. The security and privacy of user information can be significantly enhanced
through decentralized identity management, which serves an essential role in cybersecurity. This research
could lead to the development of more robust and scalable identity management technologies, which could
then better protect user data and prevent illegal access to critical information.
4. Privacy-preserving blockchain and AI: Privacy is a significant concern in cybersecurity, and future studies
could investigate the potential of using privacy-preserving blockchain and AI technologies for enhancing the
security of highly sensitive data. To create more secure and private blockchain and AI solutions, researchers
should examine the usage of advanced cryptography and privacy-enhancing technology. This research may
lead to the building of more trustworthy and privacy-preserving blockchain and AI technologies, which may
protect more effectively critical data and avoid unauthorized access.
5. Regulatory and legal considerations: These concerns need to be resolved as blockchain and decentralized
AI technologies grow and develop. Future studies can examine the opportunities and challenges for
blockchain and decentralized AI in cybersecurity law, as well as how to assure compliance with pertinent
of
regulations. This direction can encourage the adoption of blockchain and decentralized AI technologies in
cybersecurity.
ro
In conclusion, there is a wide range of future research topics for blockchain-enabled, decentralized AI in cybersecurity.
By continuing to investigate these directions, researchers can contribute to the establishment of more secure, efficient,
-p
and effective cybersecurity solutions. re
VI. Conclusion
lP
The growing demand for secure and decentralized AI in cybersecurity has prompted this investigation of blockchain
technology. The potential benefits and drawbacks of utilizing BT and decentralized AI in cybersecurity, as well as
current solutions and practical use cases, have all been examined in this paper, and the analysis has revealed that the
na
integration of BT and decentralized AI mechanisms holds enormous promise. It can revolutionize cybersecurity by
facilitating more secure and efficient information sharing, threat detection, and response. However, in order to do this
successfully, various obstacles and restrictions must be addressed, such as scalability, interoperability, and regulatory
ur
considerations. Current solutions, such as decentralized AI systems and blockchain-based cybersecurity platforms,
have shown promise in addressing these issues. Even so, there is still potential for advancement and further
Jo
of
10.1109/ICSA-C52384.2021.00031.
[11] M. Liu, W. Yeoh, F. Jiang, and K. K. R. Choo, “Blockchain for Cybersecurity: Systematic Literature Review and Classification,”
https://doi.org/10.1080/08874417.2021.1995914, vol. 62, no. 6, pp. 1182–1198, 2021, doi: 10.1080/08874417.2021.1995914.
ro
[12] A. Deshmukh, N. Sreenath, A. K. Tyagi, and U. V. E. Abhichandan, “Blockchain Enabled Cyber Security: A Comprehensive Survey,”
2022 Int. Conf. Comput. Commun. Informatics, ICCCI 2022, 2022, doi: 10.1109/ICCCI54379.2022.9740843.
[13] J. Angelis and E. Ribeiro da Silva, “Blockchain adoption: A value driver perspective,” Bus. Horiz., vol. 62, no. 3, pp. 307–314, May
-p
2019, doi: 10.1016/J.BUSHOR.2018.12.001.
[14] M. Swan, Blockchain: Blueprint for a New Economy, 1st ed. O’Reilly Media, 2015.
[15] K. Y. Yap, H. H. Chin, and J. J. Klemeš, “Blockchain technology for distributed generation: A review of current development,
re
challenges and future prospect,” Renew. Sustain. Energy Rev., vol. 175, p. 113170, Apr. 2023, doi: 10.1016/J.RSER.2023.113170.
[16] Y. Maleh, S. Lakkineni, L. Tawalbeh, and A. A. AbdEl-Latif, “Blockchain for Cyber-Physical Systems: Challenges and Applications,”
Internet of Things, pp. 11–59, 2022, doi: 10.1007/978-3-030-93646-4_2/COVER.
lP
[17] A. Ekramifard, H. Amintoosi, A. H. Seno, A. Dehghantanha, and R. M. Parizi, “A systematic literature review of integration of
blockchain and artificial intelligence,” Adv. Inf. Secur., vol. 79, pp. 147–160, 2020, doi: 10.1007/978-3-030-38181-3_8/FIGURES/3.
[18] V. Buterin, J. Illum, M. Nadler, F. Schär, and A. Soleimani, “Blockchain Privacy and Regulatory Compliance: Towards a Practical
Equilibrium,” Blockchain Res. Appl., p. 100176, Dec. 2023, doi: 10.1016/J.BCRA.2023.100176.
na
[19] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system.,” Decentralized Bus. Rev., 2008.
[20] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and G. Das, “Everything You Wanted to Know about the Blockchain: Its Promise,
Components, Processes, and Problems,” IEEE Consum. Electron. Mag., vol. 7, no. 4, pp. 6–14, Jul. 2018, doi:
10.1109/MCE.2018.2816299.
ur
[21] W. Li, M. He, and S. Haiquan, “An Overview of Blockchain Technology: Applications, Challenges and Future Trends,” ICEIEC 2021 -
Proc. 2021 IEEE 11th Int. Conf. Electron. Inf. Emerg. Commun., pp. 31–39, Jun. 2021, doi: 10.1109/ICEIEC51955.2021.9463842.
[22] W. Cai, Z. Wang, J. B. Ernst, Z. Hong, C. Feng, and V. C. M. Leung, “Decentralized Applications: The Blockchain-Empowered
Jo
Software System,” IEEE Access, vol. 6, pp. 53019–53033, Sep. 2018, doi: 10.1109/ACCESS.2018.2870644.
[23] Y. Chen and C. Bellavitis, “Decentralized Finance: Blockchain Technology and the Quest for an Open Financial System,” SSRN
Electron. J., Jul. 2019, doi: 10.2139/SSRN.3418557.
[24] A. Aderibole et al., “Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model,” IEEE Access, vol. 8, pp.
43177–43190, 2020, doi: 10.1109/ACCESS.2020.2977149.
[25] A. P. Balcerzak, E. Nica, E. Rogalska, M. Poliak, T. Klieštik, and O.-M. Sabie, “Blockchain Technology and Smart Contracts in
Decentralized Governance Systems,” Adm. Sci. 2022, Vol. 12, Page 96, vol. 12, no. 3, p. 96, Aug. 2022, doi:
10.3390/ADMSCI12030096.
[26] H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain Res. Appl., vol. 3, no. 2, p. 100067, Jun. 2022,
doi: 10.1016/J.BCRA.2022.100067.
[27] O. Popoola, M. Rodrigues, J. Marchang, A. Shenfield, A. Ikpehia, and J. Popoola, “A critical literature review of security and privacy
in smart home healthcare schemes adopting IoT & blockchain: Problems, Challenges and Solutions,” Blockchain Res. Appl., p. 100178,
Dec. 2023, doi: 10.1016/J.BCRA.2023.100178.
[28] K. Biswas and V. Muthukkumarasamy, “Securing smart cities using blockchain technology,” Proc. - 18th IEEE Int. Conf. High
Perform. Comput. Commun. 14th IEEE Int. Conf. Smart City 2nd IEEE Int. Conf. Data Sci. Syst. HPCC/SmartCity/DSS 2016, pp.
1392–1393, Jan. 2017, doi: 10.1109/HPCC-SMARTCITY-DSS.2016.0198.
[29] S. M. Idrees, M. Nowostawski, R. Jameel, and A. K. Mourya, “Security Aspects of Blockchain Technology Intended for Industrial
Applications,” Electron. 2021, Vol. 10, Page 951, vol. 10, no. 8, p. 951, Apr. 2021, doi: 10.3390/ELECTRONICS10080951.
[30] A. Ghosh, S. Gupta, A. Dua, and N. Kumar, “Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future
prospects,” J. Netw. Comput. Appl., vol. 163, p. 102635, Aug. 2020, doi: 10.1016/J.JNCA.2020.102635.
[31] M. AlShamsi, S. A. Salloum, M. Alshurideh, and S. Abdallah, “Artificial intelligence and blockchain for transparency in governance,”
Stud. Comput. Intell., vol. 912, pp. 219–230, 2021, doi: 10.1007/978-3-030-51920-9_11/COVER.
[32] M. M. Ibrahimy, A. Norta, and P. Normak, “Blockchain-Based Governance Models Supporting Corruption-Transparency: A
Systematic Literature Review,” Blockchain Res. Appl., p. 100186, Dec. 2023, doi: 10.1016/J.BCRA.2023.100186.
[33] J. Sedlmeir, J. Lautenschlager, G. Fridgen, and N. Urbach, “The transparency challenge of blockchain in organizations,” Electron.
Mark., vol. 32, no. 3, pp. 1779–1794, Sep. 2022, doi: 10.1007/S12525-022-00536-0/FIGURES/2.
[34] C. Bai and J. Sarkis, “A supply chain transparency and sustainability technology appraisal model for blockchain technology,”
https://doi.org/10.1080/00207543.2019.1708989, vol. 58, no. 7, pp. 2142–2162, Apr. 2020, doi: 10.1080/00207543.2019.1708989.
[35] V. Singh and S. K. Sharma, “Application of blockchain technology in shaping the future of food industry based on transparency and
consumer trust,” J. Food Sci. Technol., vol. 60, no. 4, pp. 1237–1254, Jan. 2022, doi: 10.1007/S13197-022-05360-0/METRICS.
[36] S. F. Papa, “Use of Blockchain Technology in Agribusiness: Transparency and Monitoring in Agricultural Trade,” pp. 38–40, Jun.
2017, doi: 10.2991/MSMI-17.2017.9.
[37] D. Ahmad, N. Lutfiani, A. D. A. R. Ahmad, U. Rahardja, and Q. Aini, “Blockchain Technology Immutability Framework Design in E-
Government,” J. Adm. Publik (Public Adm. Journal) , vol. 11, no. 1, pp. 32–41, Jun. 2021, doi: 10.31289/jap.v11i1.4310.
[38] S. Rashidibajgan and T. Hupperich, “Utilizing Blockchains in Opportunistic Networks for Integrity and Confidentiality,” Blockchain
Res. Appl., p. 100167, Nov. 2023, doi: 10.1016/J.BCRA.2023.100167.
[39] N. Emmadi and H. Narumanchi, “Reinforcing immutability of permissioned blockchains with Keyless Signatures’ Infrastructure,”
ACM Int. Conf. Proceeding Ser., Jan. 2017, doi: 10.1145/3007748.3018280.
[40] F. Hofmann, S. Wurster, E. Ron, and M. Böhmecke-Schwafert, “The immutability concept of blockchains and benefits of early
standardization,” Proc. 2017 ITU Kaleidosc. Acad. Conf. Challenges a Data-Driven Soc. ITU K 2017, vol. 2018-January, pp. 1–8, Jun.
2017, doi: 10.23919/ITU-WT.2017.8247004.
[41] H. Stančić and V. Bralić, “Digital Archives Relying on Blockchain: Overcoming the Limitations of Data Immutability,” Comput. 2021,
Vol. 10, Page 91, vol. 10, no. 8, p. 91, Jul. 2021, doi: 10.3390/COMPUTERS10080091.
[42] C. Zhang, C. Wu, and X. Wang, “Overview of blockchain consensus mechanism,” ACM Int. Conf. Proceeding Ser., pp. 7–12, May
2020, doi: 10.1145/3404512.3404522.
[43] M. Hu, T. Shen, J. Men, Z. Yu, and Y. Liu, “CRSM: An Effective Blockchain Consensus Resource Slicing Model for Real-Time
Distributed Energy Trading,” IEEE Access, vol. 8, pp. 206876–206887, 2020, doi: 10.1109/ACCESS.2020.3037694.
[44] S. Zhang and J. H. Lee, “Analysis of the main consensus protocols of blockchain,” ICT Express, vol. 6, no. 2, pp. 93–97, Jun. 2020,
of
doi: 10.1016/J.ICTE.2019.08.001.
[45] S. Maitra, V. P. Yanambaka, A. Abdelgawad, D. Puthal, and K. Yelamarthi, “Proof-of-Authentication Consensus Algorithm:
ro
Blockchain-based IoT Implementation,” IEEE World Forum Internet Things, WF-IoT 2020 - Symp. Proc., Jun. 2020, doi: 10.1109/WF-
IOT48130.2020.9221187.
[46] S. Mahmood, M. Chadhar, and S. Firmin, “Cybersecurity Challenges in Blockchain Technology: A Scoping Review,” Hum. Behav.
-p
Emerg. Technol., vol. 2022, pp. 1–11, Apr. 2022, doi: 10.1155/2022/7384000.
[47] D. Yang, C. Long, H. Xu, and S. Peng, “A Review on Scalability of Blockchain,” ACM Int. Conf. Proceeding Ser., pp. 1–6, Mar. 2020,
doi: 10.1145/3390566.3391665.
re
[48] P. Yeoh, “Regulatory issues in blockchain technology,” J. Financ. Regul. Compliance, vol. 25, no. 2, pp. 196–208, 2017, doi:
10.1108/JFRC-08-2016-0068/FULL/PDF.
[49] E. Zamani, Y. He, and M. Phillips, “On the Security Risks of the Blockchain,” https://doi.org/10.1080/08874417.2018.1538709, vol.
lP
Trends,” ACM Comput. Surv., vol. 54, no. 8, Oct. 2021, doi: 10.1145/3471140.
[52] A. Lakhan, M. A. Mohammed, J. Nedoma, R. Martinek, P. Tiwari, and N. Kumar, “Blockchain-Enabled Cybersecurity Efficient IIOHT
Cyber-Physical System for Medical Applications,” IEEE Trans. Netw. Sci. Eng., 2022, doi: 10.1109/TNSE.2022.3213651.
[53] O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT Express, vol. 7, no. 1, pp. 76–80, Mar.
ur
10.1109/JIOT.2021.3063806.
[55] H. Zhao, P. Bai, Y. Peng, and R. Xu, “Efficient key management scheme for health blockchain,” CAAI Trans. Intell. Technol., vol. 3,
no. 2, pp. 114–118, Jun. 2018, doi: 10.1049/TRIT.2018.0014.
[56] Z. Ma, J. Zhang, Y. Guo, Y. Liu, X. Liu, and W. He, “An Efficient Decentralized Key Management Mechanism for VANET with
Blockchain,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 5836–5849, Jun. 2020, doi: 10.1109/TVT.2020.2972923.
[57] L. Stockburger, G. Kokosioulis, A. Mukkamala, R. R. Mukkamala, and M. Avital, “Blockchain-enabled decentralized identity
management: The case of self-sovereign identity in public transportation,” Blockchain Res. Appl., vol. 2, no. 2, p. 100014, Jun. 2021,
doi: 10.1016/J.BCRA.2021.100014.
[58] Y. Liu, D. He, M. S. Obaidat, N. Kumar, M. K. Khan, and K. K. Raymond Choo, “Blockchain-based identity management systems: A
review,” J. Netw. Comput. Appl., vol. 166, p. 102731, Sep. 2020, doi: 10.1016/J.JNCA.2020.102731.
[59] I. T. Javed, F. Alharbi, B. Bellaj, T. Margaria, N. Crespi, and K. N. Qureshi, “Health-ID: A Blockchain-Based Decentralized Identity
Management for Remote Healthcare,” Healthc. 2021, Vol. 9, Page 712, vol. 9, no. 6, p. 712, Jun. 2021, doi:
10.3390/HEALTHCARE9060712.
[60] S. El Haddouti and M. D. Ech-Cherif El Kettani, “Analysis of identity management systems using blockchain technology,” Proc. -
2019 Int. Conf. Adv. Commun. Technol. Networking, CommNet 2019, Apr. 2019, doi: 10.1109/COMMNET.2019.8742375.
[61] S. A. George, A. Jaekel, and I. Saini, “Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain,”
Proc. - IEEE Symp. Comput. Commun., vol. 2020-July, Jul. 2020, doi: 10.1109/ISCC50000.2020.9219736.
[62] M. Naz et al., “A Secure Data Sharing Platform Using Blockchain and Interplanetary File System,” Sustain. 2019, Vol. 11, Page 7054,
vol. 11, no. 24, p. 7054, Dec. 2019, doi: 10.3390/SU11247054.
[63] C. Singh, D. Chauhan, S. A. Deshmukh, S. S. Vishnu, and R. Walia, “Medi-Block record: Secure data sharing using block chain
technology,” Informatics Med. Unlocked, vol. 24, p. 100624, Jan. 2021, doi: 10.1016/J.IMU.2021.100624.
[64] M. Cash and M. Bassiouni, “Two-tier permission-ed and permission-less blockchain for secure data sharing,” Proc. - 3rd IEEE Int.
Conf. Smart Cloud, SmartCloud 2018, pp. 138–144, Oct. 2018, doi: 10.1109/SMARTCLOUD.2018.00031.
[65] M. M. Queiroz, R. Telles, and S. H. Bonilla, “Blockchain and supply chain management integration: a systematic review of the
literature,” Supply Chain Manag., vol. 25, no. 2, pp. 241–254, Feb. 2020, doi: 10.1108/SCM-03-2018-0143/FULL/PDF.
[66] C. Allenbrand, “Smart contract-enabled consortium blockchains for the control of supply chain information distortion,” Blockchain
Res. Appl., vol. 4, no. 3, p. 100134, Sep. 2023, doi: 10.1016/J.BCRA.2023.100134.
[67] A. Di Vaio and L. Varriale, “Blockchain technology in supply chain management for sustainable performance: Evidence from the
airport industry,” Int. J. Inf. Manage., vol. 52, p. 102014, Jun. 2020, doi: 10.1016/J.IJINFOMGT.2019.09.010.
[68] A. Rejeb, J. G. Keogh, and H. Treiblmaier, “Leveraging the Internet of Things and Blockchain Technology in Supply Chain
Management,” Futur. Internet 2019, Vol. 11, Page 161, vol. 11, no. 7, p. 161, Jul. 2019, doi: 10.3390/FI11070161.
[69] K. Almutairi et al., “Blockchain Technology Application Challenges in Renewable Energy Supply Chain Management,” Environ. Sci.
Pollut. Res., pp. 1–18, Jan. 2022, doi: 10.1007/S11356-021-18311-7/METRICS.
[70] R. Saxena and E. Gayathri, “Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution,” Mater.
Today Proc., vol. 51, pp. 682–689, Jan. 2022, doi: 10.1016/J.MATPR.2021.06.204.
[71] R. Graf and R. King, “Neural network and blockchain based technique for cyber threat intelligence and situational awareness,” Int.
Conf. Cyber Conflict, CYCON, vol. 2018-May, pp. 409–425, Jul. 2018, doi: 10.23919/CYCON.2018.8405028.
[72] Y. Wu, Y. Qiao, Y. Ye, and B. Lee, “Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted
Computing,” 2019 6th Int. Conf. Internet Things Syst. Manag. Secur. IOTSMS 2019, pp. 474–481, Oct. 2019, doi:
10.1109/IOTSMS48152.2019.8939192.
[73] D. Homan, I. Shiel, and C. Thorpe, “A new network model for cyber threat intelligence sharing using blockchain technology,” 2019
10th IFIP Int. Conf. New Technol. Mobil. Secur. NTMS 2019 - Proc. Work., Jun. 2019, doi: 10.1109/NTMS.2019.8763853.
[74] H. Min, “Blockchain technology for enhancing supply chain resilience,” Bus. Horiz., vol. 62, no. 1, pp. 35–45, Jan. 2019, doi:
10.1016/J.BUSHOR.2018.08.012.
[75] Y. Kazancoglu, M. Ozbiltekin-Pala, M. D. Sezer, S. Luthra, and A. Kumar, “Resilient reverse logistics with blockchain technology in
sustainable food supply chain management during COVID-19,” Bus. Strateg. Environ., 2022, doi: 10.1002/BSE.3251.
[76] R. Dubey, A. Gunasekaran, D. J. Bryde, Y. K. Dwivedi, and T. Papadopoulos, “Blockchain technology for enhancing swift-trust,
collaboration and resilience within a humanitarian supply chain setting,” https://doi.org/10.1080/00207543.2020.1722860, vol. 58, no.
of
11, pp. 3381–3398, Jun. 2020, doi: 10.1080/00207543.2020.1722860.
[77] B. S. Rawat, D. Gangodkar, V. Talukdar, K. Saxena, C. Kaur, and S. P. Singh, “The Empirical Analysis of Artificial Intelligence
ro
Approaches for Enhancing the Cyber Security for Better Quality,” 2022 5th Int. Conf. Contemp. Comput. Informatics, pp. 247–250,
Dec. 2022, doi: 10.1109/IC3I56241.2022.10072877.
[78] R. Trifonov, S. Manolov, G. Tsochev, G. Pavlova, and K. Raynova, “Analytical Choice of an Effective Cyber Security Structure with
-p
Artificial Intelligence in Industrial Control Systems,” 2022 10th Int. Sci. Conf. Comput. Sci. COMSCI 2022 - Proc., 2022, doi:
10.1109/COMSCI55378.2022.9912608.
[79] A. H. Ameen, M. A. Mohammed, and A. N. Rashid, “Dimensions of artificial intelligence techniques, blockchain, and cyber security in
re
the Internet of medical things: Opportunities, challenges, and future directions,” J. Intell. Syst., vol. 32, no. 1, Jan. 2023, doi:
10.1515/JISYS-2022-0267/XML.
[80] H. Karimipour and F. Derakhshan, “Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and
lP
Challenges,” AI-Enabled Threat Detect. Secur. Anal. Ind. IoT, pp. 1–6, 2021, doi: 10.1007/978-3-030-76613-9_1.
[81] V. Wylde et al., “Cybersecurity, Data Privacy and Blockchain: A Review,” SN Comput. Sci. 2022 32, vol. 3, no. 2, pp. 1–12, Jan. 2022,
doi: 10.1007/S42979-022-01020-4.
[82] C. Cicconetti, M. Conti, and A. Passarella, “A Decentralized Framework for Serverless Edge Computing in the Internet of Things,”
na
IEEE Trans. Netw. Serv. Manag., vol. 18, no. 2, pp. 2166–2180, Jun. 2021, doi: 10.1109/TNSM.2020.3023305.
[83] X. Liang, C. Konstantinou, S. Shetty, E. Bandara, and R. Sun, “Decentralizing Cyber Physical Systems for Resilience: An Innovative
Case Study from A Cybersecurity Perspective,” Comput. Secur., vol. 124, p. 102953, Jan. 2023, doi: 10.1016/J.COSE.2022.102953.
[84] P. Trakadas et al., “An Artificial Intelligence-Based Collaboration Approach in Industrial IoT Manufacturing: Key Concepts,
ur
Architectural Extensions and Potential Applications,” Sensors 2020, Vol. 20, Page 5480, vol. 20, no. 19, p. 5480, Sep. 2020, doi:
10.3390/S20195480.
[85] A. Sundararajan, T. Khan, A. Moghadasi, and A. I. Sarwat, “Survey on synchrophasor data quality and cybersecurity challenges, and
Jo
evaluation of their interdependencies,” J. Mod. Power Syst. Clean Energy, vol. 7, no. 3, pp. 449–467, May 2019, doi: 10.1007/S40565-
018-0473-6.
[86] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha, “Blockchain for AI: Review and open research challenges,” IEEE
Access, vol. 7, pp. 10127–10149, 2019, doi: 10.1109/ACCESS.2018.2890507.
[87] H. Yuan and S. Li, “Cyber Security Risks of Net Zero Technologies,” 5th IEEE Conf. Dependable Secur. Comput. DSC 2022 SECSOC
2022 Work. PASS4IoT 2022 Work. SICSA Int. Pap. Compet. Cybersecurity, 2022, doi: 10.1109/DSC54232.2022.9888883.
[88] P. Asuquo, C. Ogah, W. Hathal, and S. Bao, “Blockchain Meets Cybersecurity: Security, Privacy, Challenges, and Opportunity,” Stud.
Big Data, vol. 60, pp. 115–127, 2020, doi: 10.1007/978-981-13-8775-3_5/COVER.
[89] L. Bhatia and S. Samet, “A decentralized data evaluation framework in federated learning,” Blockchain Res. Appl., vol. 4, no. 4, p.
100152, Dec. 2023, doi: 10.1016/J.BCRA.2023.100152.
[90] M. Alazab, S. P. Rm, M. Parimala, P. K. R. Maddikunta, T. R. Gadekallu, and Q. V. Pham, “Federated Learning for Cybersecurity:
Concepts, Challenges, and Future Directions,” IEEE Trans. Ind. Informatics, vol. 18, no. 5, pp. 3501–3509, May 2022, doi:
10.1109/TII.2021.3119038.
[91] K. Li, H. Zhou, Z. Tu, F. Liu, and H. Zhang, “Blockchain Empowered Federated Learning for Distributed Network Security Behaviour
Knowledge Base in 6G,” Secur. Commun. Networks, vol. 2022, 2022, doi: 10.1155/2022/4233238.
[92] B. Ghimire and D. B. Rawat, “Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for
Internet of Things,” IEEE Internet Things J., vol. 9, no. 11, pp. 8229–8249, Jun. 2022, doi: 10.1109/JIOT.2022.3150363.
[93] V. Mothukuri, R. M. Parizi, S. Pouriyeh, A. Dehghantanha, and K. K. R. Choo, “FabricFL: Blockchain-in-the-Loop Federated Learning
for Trusted Decentralized Systems,” IEEE Syst. J., vol. 16, no. 3, pp. 3711–3722, Sep. 2022, doi: 10.1109/JSYST.2021.3124513.
[94] M. A. Mohammed et al., “Energy-efficient distributed federated learning offloading and scheduling healthcare system in blockchain
based networks,” Internet of Things, vol. 22, p. 100815, Jul. 2023, doi: 10.1016/J.IOT.2023.100815.
[95] F. Muheidat and L. Tawalbeh, “Artificial Intelligence and Blockchain for Cybersecurity Applications,” pp. 3–29, 2021, doi:
10.1007/978-3-030-74575-2_1.
[96] A. Lakhan, M. A. Mohammed, J. Nedoma, R. Martinek, P. Tiwari, and N. Kumar, “DRLBTS: deep reinforcement learning-aware
blockchain-based healthcare system,” Sci. Reports 2023 131, vol. 13, no. 1, pp. 1–15, Mar. 2023, doi: 10.1038/s41598-023-29170-2.
[97] S. D. Roy, S. Debbarma, and A. Iqbal, “A Decentralized Intrusion Detection System for Security of Generation Control,” IEEE Internet
Things J., 2022, doi: 10.1109/JIOT.2022.3163502.
[98] A. A. Khan, M. M. Khan, K. M. Khan, J. Arshad, and F. Ahmad, “A blockchain-based decentralized machine learning framework for
collaborative intrusion detection within UAVs,” Comput. Networks, vol. 196, p. 108217, Sep. 2021, doi:
10.1016/J.COMNET.2021.108217.
[99] M. Abdel-Basset, N. Moustafa, H. Hawash, I. Razzak, K. M. Sallam, and O. M. Elkomy, “Federated Intrusion Detection in Blockchain-
Based Smart Transportation Systems,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 3, pp. 2523–2537, Mar. 2022, doi:
10.1109/TITS.2021.3119968.
[100] R. Amirta, M. S. Deepika, and R. G. Franklin, “Decentralized access control with anonymous authentication of data stored using
blockchain,” Res. J. Eng. Technol., vol. 11, no. 1, p. 10, 2020, doi: 10.5958/2321-581X.2020.00002.1.
[101] D. A. Secured et al., “A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning
for Sensor Access Control Systems in Smart Manufacturing,” Appl. Sci. 2022, Vol. 12, Page 4641, vol. 12, no. 9, p. 4641, May 2022,
doi: 10.3390/APP12094641.
[102] Y. Ding and H. Sato, “Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart
Health,” Proc. - 2020 7th IEEE Int. Conf. Cyber Secur. Cloud Comput. 2020 6th IEEE Int. Conf. Edge Comput. Scalable Cloud,
CSCloud-EdgeCom 2020, pp. 29–35, Aug. 2020, doi: 10.1109/CSCLOUD-EDGECOM49738.2020.00015.
[103] M. Javaid, A. Haleem, R. Pratap Singh, S. Khan, and R. Suman, “Blockchain technology applications for Industry 4.0: A literature-
based review,” Blockchain Res. Appl., vol. 2, no. 4, p. 100027, Dec. 2021, doi: 10.1016/J.BCRA.2021.100027.
[104] S. K. Singh, S. Rathore, and J. H. Park, “BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial
Intelligence,” Futur. Gener. Comput. Syst., vol. 110, pp. 721–743, Sep. 2020, doi: 10.1016/J.FUTURE.2019.09.002.
[105] H. ElHusseini, C. Assi, B. Moussa, R. Attallah, and A. Ghrayeb, “Blockchain, AI and Smart Grids: The Three Musketeers to a
Decentralized EV Charging Infrastructure,” IEEE Internet Things Mag., vol. 3, no. 2, pp. 24–29, Jun. 2020, doi:
10.1109/IOTM.0001.1900081.
of
[106] S. A. Wright, “Blockchain-Enabled Decentralized Network Management in 6G,” pp. 45–69, 2022, doi: 10.1007/978-981-19-2868-0_3.
[107] X. Lin, R. Xu, Y. Chen, and J. Koji Lum, “A Blockchain-Enabled Decentralized Time Banking for a New Social Value System,” 2019
ro
IEEE Conf. Commun. Netw. Secur. CNS 2019, Jun. 2019, doi: 10.1109/CNS.2019.8802734.
[108] S. Ismail, M. Nouman, D. W. Dawoud, and H. Reza, “Towards a lightweight security framework using blockchain and machine
learning,” Blockchain Res. Appl., p. 100174, Nov. 2023, doi: 10.1016/J.BCRA.2023.100174.
-p
[109] K. Kaushik, “Blockchain Enabled Artificial Intelligence for Cybersecurity Systems,” Stud. Big Data, vol. 111, pp. 165–179, 2022, doi:
10.1007/978-3-031-05752-6_11/COVER.
[110] E. Rabieinejad, A. Yazdinejad, A. Dehghantanha, R. M. Parizi, and G. Srivastava, “Secure AI and Blockchain-enabled Framework in
re
Smart Vehicular Networks,” 2021 IEEE Globecom Work. GC Wkshps 2021 - Proc., 2021, doi:
10.1109/GCWKSHPS52748.2021.9682140.
[111] A. K. Das, B. Bera, S. Saha, N. Kumar, I. You, and H. C. Chao, “AI-Envisioned Blockchain-Enabled Signature-Based Key
lP
Management Scheme for Industrial Cyber-Physical Systems,” IEEE Internet Things J., vol. 9, no. 9, pp. 6374–6388, May 2022, doi:
10.1109/JIOT.2021.3109314.
[112] F. S. A. Pour and P. N.-M. Gheorghe, “A Blockchain-Enabled Model to Enhance Disaster Aids Network Resilience,” Rom. Cyber
Secur. J., vol. 3, no. 2, Jan. 2021, Accessed: Mar. 30, 2023. [Online]. Available: https://digitalcommons.odu.edu/emse_fac_pubs/87.
na
[113] M. Mylrea and S. N. G. Gourisetti, “Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security,”
Proc. - 2017 Resil. Week, RWS 2017, pp. 18–23, Oct. 2017, doi: 10.1109/RWEEK.2017.8088642.
[114] A. Hajian and H.-C. Chang, “A Blockchain-Based Smart Grid to Build Resilience Through Zero-Trust Cybersecurity,” Handb. Smart
Energy Syst., pp. 1–19, 2022, doi: 10.1007/978-3-030-72322-4_161-1.
ur
[115] F. S. A. Pour, “Application of a Blockchain Enabled Model in Disaster Aids Supply Network Resilience - ProQuest,” Old Dominion
University, 2021.
[116] Z. Mahmood and V. Jusas, “Blockchain-Enabled: Multi-Layered Security Federated Learning Platform for Preserving Data Privacy,”
Jo
Electron. 2022, Vol. 11, Page 1624, vol. 11, no. 10, p. 1624, May 2022, doi: 10.3390/ELECTRONICS11101624.
[117] Y. Qu et al., “Decentralized privacy using blockchain-enabled federated learning in fog computing,” IEEE Internet Things J., vol. 7,
no. 6, pp. 5171–5183, Jun. 2020, doi: 10.1109/JIOT.2020.2977383.
[118] A. Kanak, N. Ugur, and S. Ergun, “A visionary model on blockchain-based accountability for secure and collaborative digital twin
environments,” Conf. Proc. - IEEE Int. Conf. Syst. Man Cybern., vol. 2019-October, pp. 3512–3517, Oct. 2019, doi:
10.1109/SMC.2019.8914304.
[119] Y. Song, Y. Fu, F. R. Yu, and L. Zhou, “Blockchain-Enabled Internet of Vehicles With Cooperative Positioning: A Deep Neural
Network Approach,” IEEE Internet Things J., vol. 7, no. 4, pp. 3485–3498, Apr. 2020, doi: 10.1109/JIOT.2020.2972337.
[120] A. Kumari, R. Gupta, S. Tanwar, and N. Kumar, “A taxonomy of blockchain-enabled softwarization for secure UAV network,”
Comput. Commun., vol. 161, pp. 304–323, Sep. 2020, doi: 10.1016/J.COMCOM.2020.07.042.
[121] R. Shinde, S. Patil, K. Kotecha, and K. Ruikar, “Blockchain for Securing AI Applications and Open Innovations,” J. Open Innov.
Technol. Mark. Complex., vol. 7, no. 3, p. 189, Sep. 2021, doi: 10.3390/JOITMC7030189.
[122] “PolySwarm - Crowdsourced threat detection.” https://polyswarm.io/ (accessed Mar. 18, 2023).
[123] I. Reshi, M. Khan, S. Shafi, S. Sholla, A. Assad, and H. Shafi, “AI-Powered Smart Contracts: The Dawn of Web 4. O,” TechRxiv, Mar.
2023, doi: 10.36227/TECHRXIV.22189438.V1.
[124] C. B. Goertzel, S. Giacomelli, D. Hanson and and M. A. Pennachin, “SingularityNET: A decentralized, open market and inter-network
for AIs,” Thoughts, Theor. Stud. Artif. Intell. Res., 2017.
[125] S. K. Rana et al., “Blockchain Technology and Artificial Intelligence Based Decentralized Access Control Model to Enable Secure
Interoperability for Healthcare,” Sustain. 2022, Vol. 14, Page 9471, vol. 14, no. 15, p. 9471, Aug. 2022, doi: 10.3390/SU14159471.
[126] “Home | IOTA.” https://www.iota.org/ (accessed Apr. 01, 2023).
[127] “Home - Sovrin.” https://sovrin.org/ (accessed Apr. 01, 2023).
[128] N. Naik and P. Jenkins, “Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on
Distributed Ledger Technology,” ISSE 2021 - 7th IEEE Int. Symp. Syst. Eng. Proc., Sep. 2021, doi: 10.1109/ISSE51541.2021.9582551.
Declaration of interests
☒ The authors declare that they have no known competing financial interests or personal relationships
that could have appeared to influence the work reported in this paper.
☐ The authors declare the following financial interests/personal relationships which may be considered
as potential competing interests:
of
ro
-p
re
lP
na
ur
Jo