0% found this document useful (0 votes)
68 views32 pages

Blockhain For Secure and Decentralized AI

Uploaded by

Gle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views32 pages

Blockhain For Secure and Decentralized AI

Uploaded by

Gle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Journal Pre-proof

Blockchain for secure and decentralized artificial intelligence in cybersecurity: A


comprehensive review

Ahmed M. Shamsan Saleh

PII: S2096-7209(24)00006-X
DOI: https://doi.org/10.1016/j.bcra.2024.100193
Reference: BCRA 100193

To appear in: Blockchain: Research and Applications

Received Date: 13 June 2023


Revised Date: 11 January 2024
Accepted Date: 22 February 2024

Please cite this article as: A.M. Shamsan Saleh, Blockchain for secure and decentralized artificial
intelligence in cybersecurity: A comprehensive review, Blockchain: Research and Applications (2024),
doi: https://doi.org/10.1016/j.bcra.2024.100193.

This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition
of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of
record. This version will undergo additional copyediting, typesetting and review before it is published
in its final form, but we are providing this version to give early visibility of the article. Please note that,
during the production process, errors may be discovered which could affect the content, and all legal
disclaimers that apply to the journal pertain.

© 2024 The Author(s). Published by Elsevier B.V. on behalf of Zhejiang University Press.
Author Contribution Statement

Dear Dr. Chun Chen,

I am writing to submit my manuscript titled " Blockchain for Secure and Decentralized Artificial
Intelligence in Cybersecurity: A Comprehensive Review" for consideration for publication in Blockchain:
Research and Applications Journal. I believe that this research article aligns well with the scope and interests
of your esteemed journal and will contribute significantly to the field of blockchain. I have reviewed the
submission guidelines and the aims and scope of Blockchain: Research and Applications Journal, and I am
confident that my research findings will be of great interest to your readership.
To ensure the high quality and originality of my work, this manuscript has not been submitted to any other
journal for consideration.
I believe that Blockchain: Research and Applications Journal is an ideal platform for disseminating these
research findings to a wide audience of experts and practitioners in the field of blockchain. The journal's

of
commitment to publishing cutting-edge research and promoting advancements in the blockchain domain
makes it an excellent fit for this manuscript.

ro
Thank you for considering this manuscript for publication in Blockchain: Research and Applications
Journal. I look forward to the opportunity to contribute to the journal's academic discourse and impact. I

-p
assure you that if accepted, I will promptly address any comments or suggestions from the reviewers to
enhance the quality and clarity of the manuscript.
re
Thank you for your time and consideration.
lP

Sincerely,
na

Ahmed M. Shamsan Saleh


Department of Information Technology
ur

University of Tabuk
Tabuk, Saudi Arabia
Jo

13-6-2023
Blockchain for Secure and Decentralized Artificial Intelligence in Cybersecurity: A Comprehensive Review
Ahmed M. Shamsan Saleh
Department of Information Technology
University of Tabuk
Tabuk, Saudi Arabia
[email protected]
Abstract
As the usage of artificial intelligence (AI) grows within the field of cybersecurity, so too does the demand
for secure and decentralized AI systems to protect against potential cyber threats. Blockchain technology (BT) has
emerged as the ideal approach for increasing both the security and privacy of AI systems since it provides decentralized
and immutable data storage. This systematic literature review focuses on the integration of BT with decentralized AI
within cybersecurity. It provides a comprehensive taxonomy of BT and decentralized AI for cybersecurity serving as
the starting point for the study. This paper begins with an overview of BT and its possible uses in cybersecurity and
also analyzes its challenges and opportunities. Decentralized AI is also covered in the study, along with its potential
advantages and difficulties in decentralized AI cybersecurity. Building on that foundation, this study provides
convincing findings highlighting the beneficial relationships between BT and decentralized AI for cybersecurity,

of
contributing to a nuanced comprehension of their integration. Moreover, it offers real-world uses of blockchain-
enabled decentralized AI to discuss its usefulness in tackling cybersecurity concerns. Finally, this paper discusses

ro
future research directions for blockchain-enabled decentralized AI in cybersecurity, including potential applications
and implications of this technology in the field, emphasizing the potential of blockchain-enabled decentralized AI in

-p
cybersecurity to enhance security, privacy, and trust in AI systems.
Keywords: Blockchain, Artificial Intelligence, Decentralized, Cybersecurity
re
I. Introduction
lP

Modern cybersecurity relies heavily on artificial intelligence (AI), which offers sophisticated threat detection,
incident response, and risk assessment [1][2][3]. As technology continues to advance, so too do cyber threats, which
have become more sophisticated and complex to circumnavigate existing security measures. AI systems are
na

susceptible to numerous attacks that can damage their availability, confidentiality, and integrity, including adversarial
attacks, model stealing, and data poisoning [4][5]. Because these attacks happen quickly, enterprises are increasingly
relying on artificial intelligence to detect and respond to these risks in real time to prevent security breaches [6][7]. AI
ur

systems are equipped to do this because they are capable of analyzing massive amounts of data, identifying patterns,
and discovering anomalies that could be signs of potential cyber threats [8]. Using them can also speed up the process
of manually detecting and resolving security incidents as well as automating threat response. Though they have various
Jo

benefits, AI systems are not immune to cyber threats [9]. Instead, hackers will expose them to assaults intended to
take advantage of their flaws. For instance, data poisoning attacks might tamper with the data utilized for training AI
models, producing skewed or false predictions for users. Adversarial attacks can inject minor errors into the input data,
resulting in data misclassification. Model stealing attacks outright steal trained models, which leads to data breaches
and other security concerns. To solve these difficulties, there is an increasing demand in cybersecurity for secure and
decentralized AI systems [10]. Secure AI systems must be built to withstand, and protect against, these attacks and
other cyber risks. Decentralized AI systems are a solution that allows numerous stakeholders to collaborate and share
data while ensuring sensitive data's privacy and confidentiality.
A viable method for boosting the security and privacy of AI systems is blockchain technology (BT), which
provides decentralized and immutable data storage [11][12][13]. BT produces a distributed ledger that can safely hold
transactional data, creating tamper-proof and auditable records that can be verified by numerous parties [14][15]. BT
may also facilitate decentralized decision-making and consensus methods, which may increase trust and collaboration
among several stakeholders [16]. These technologies can enhance the privacy and security of critical information,
facilitate multi-stakeholder collaboration, and provide real-time threat detection and response [17] [18]. To construct
secure and decentralized AI systems capable of surviving possible cyber-attacks, organizations should utilize BT to
ensure the security and safety of digital infrastructures. To accomplish this, research into, and the development of,
blockchain-enabled, decentralized AI is critical.
In an effort to fill this gap, this study focuses on the dynamic relationship between blockchain technology
and AI. The primary goal is twofold: one, to examine blockchain's significant effect on cybersecurity, and two, to
explain how decentralization, which is inherent in blockchain architecture, strengthens cybersecurity measures. The
subtle interplay of these various technologies offer beneficial effects that emerge only when they converge, a state that
has not been previously studied. While current literature has shed light on the separate impacts of blockchain and AI,
there is a distinct lack of comprehensive studies clarifying their combined influence on cybersecurity. This study
tackles this crucial knowledge gap by combining, and then expanding on, existing knowledge.
In response to the growing need for cybersecurity measures, this research addresses key questions about combining
AI and BT, which were raised by a rigorous review of the main literature. It attempts to integrate and extend related
works that illuminate the specific consequences of blockchain and AI on cybersecurity. It poses the following research
questions in particular:
1. How does the integration of blockchain and artificial intelligence enhance the robustness of cybersecurity
measures?
2. What are the primary obstacles and opportunities associated with implementing decentralized AI in the field
of cybersecurity?
3. How have other researchers combined blockchain technology and decentralized AI within the realm of
cybersecurity?

of
4. How do real-world use cases demonstrate the practical application of blockchain-enabled, decentralized AI
solutions in effectively addressing cybersecurity challenges?

ro
This research seeks to add a nuanced perspective, with an emphasis on building on and filling the gaps highlighted in,
the existing literature. Figure 1 illustrates the taxonomy of blockchain technology and decentralized AI for
cybersecurity as a starting point.
-p
re
Taxonomy of Blockchain Technology and
Decentralized AI for Cybersecurity
lP

Blockchain-Enabled
Blockchain Technology Decentralized AI for
Decentralized AI for
for Cybersecurity Cybersecurity
Cybersecurity
na

Existing Existing Existing


Benefits Challenges Benefits Challenges Benefits Challenges
Solutions Solutions Solutions
ur

Decentralization Cryptographic Key Improved Threat Data Quality and


Scalability Federated Learning Improved Security Scalability PolySwarm
Management Detection Integrity

Decentralized
Security Regulation and Enhanced Privacy Increased Network
Identity Interoperability Decentralized DeepBrain Chain
Jo

Compliance and Security Resilience Connectivity


Management Intrusion Detection

Transparency Faster Response


Security Risks Secure Data Sharing Scalability Decentralized Access Data Privacy Lack of Standards SingularityNET
Times
Control

Immutability Lack of Supply Chain Increased Blockchain-Based Improved Regulatory and


Security Risks Enigma
Interoperability Management Resilience AI Collaboration Legal Issues

Consensus Cyber Threat Better Lack of


IOTA
Intelligence Sharing Collaboration Standardization

Secure Identity
Management Sovrin

Resilient Supply
Chain Management

Figure 1: A taxonomy of blockchain and decentralized AI for cybersecurity.


The main contributions of this study can be summarized as follows:

• The study presents a comprehensive overview of the emerging domain that combines BT and decentralized
AI in the context of cybersecurity.
• The study conducts an in-depth analysis of the potential benefits and challenges associated with the
integration of blockchain and decentralized AI for addressing cybersecurity concerns.
• The study proposes a structured taxonomy that categorizes and organizes the key components and concepts
related to blockchain, decentralized AI, and their intersection with cybersecurity.
• The study reviews and presents real-world use cases that showcase the practical application of blockchain-
enabled, decentralized AI solutions in addressing cybersecurity challenges.
• The study suggests future research directions that can further enhance the application of blockchain-enabled,
decentralized AI in cybersecurity, addressing existing limitations and pushing the boundaries of innovation.
In the subsequent sections, this study will discover the convergence of BT, decentralized AI, and their implications
for cybersecurity. Section II explores the application of BT in cybersecurity, discussing its features, benefits, and
challenges as well as examining existing solutions. Section III focuses on the role of decentralized AI in cybersecurity,
evaluating its advantages and limitations, and reviewing established solutions. Section IV delves into the core of this
research by analyzing blockchain-enabled, decentralized AI for cybersecurity, highlighting real-world use cases and
assessing their effectiveness. Section V outlines the future of research in this field, identifying potential directions and
innovations. Lastly, Section VI provides a comprehensive conclusion that synthesizes key insights and contributions
drawn from this review.
II. Blockchain Technology for Cybersecurity
A) Overview of blockchain technology and its features
BT is a system of distributed ledgers that permit the development of secure and transparent digital records
[19]. BT operates by establishing a decentralized network of nodes that take part in transaction verification and

of
validation, assuring their consistency and immutability [20]. Figure 2 provides an overview of this process [21].

ro
-p
re
lP
na

Figure 2. An overview of blockchain technologies [21].


ur

The following are the key characteristics/benefits of BT:


Jo

1) Decentralization: BT relies on a decentralized network of nodes, meaning there is no centralized authority or


controlling entity [22]. This decentralization protects the network from attacks and failures while also increasing
transparency and trust among participants. Organizations can build more secure and robust systems that are also less
susceptible to failures and assaults by dividing control and decision making among several nodes.
One study [23] described decentralized finance as a new financial system based on BT that permits financial
transactions to take place without the need for intermediaries like banks. The benefits of decentralized finance include
improved accessibility, lower costs, and enhanced transparency. The study implied that, for decentralized finance to
realize its full potential, solutions to challenges such as regulation, scalability, and security will be required.
Additionally, this article drew attention to some of the promising developments in the field of decentralized finance,
including the expansion of decentralized exchanges and the rising popularity of stablecoins. However, the paper did
not go into great detail about some of the technical aspects of decentralized finance, like the operation of smart
contracts and the compatibility of various blockchain protocols. Furthermore, the paper did not explore the potential
negative consequences of decentralized finance, such as the potential for money laundering and other illegal activities.
Another paper [24] suggested a decentralized conceptual model based on BT for smart grids to overcome the
difficulties in controlling the complicated energy infrastructure and facilitating safe and reliable energy transactions.
Figure 3 describes the framework for interoperability of the smart-grid from the National Institute of Standards and
Technology (NIST) that served as a foundation for a suggested conceptual model, made up of four layers: the physical,
communication, transaction, and application layers. Each layer is intended to facilitate a certain functionality, such as
energy production, transmission, and consumption, as well as secure and transparent energy transactions. One of its
features is its decentralized nature, which assures that no single body has authority over the full energy system. Despite
this benefit, this model has the potential for high energy consumption and requires a strong governance structure to
guarantee the system's integrity and security.
Another study [25] investigated how BT and smart contracts can be used in decentralized government
techniques. The authors undertook a thorough literature review and highlighted the benefits of blockchain-based smart
government systems, such as enhanced public engagement, trust in computationally networked urbanism, and
democratized governing structures. Additionally, they identified strategies to ensure reliable and secure blockchain-
based smart-contracts, including digital twin technology, remote-sensing schemes, and virtual connectivity
instruments, as well as the use of analytical AI, spatial computing, and predictive procedures in decentralized decision
making. The authors concluded that smart contracts are essential to blockchain platform transactions, and that the
decentralized environment of BT enables smart-city self-governance and citizen empowerment.
2) Security: Blockchain technology ensures tamper-proof transaction security by utilizing cryptographic methods
[26][27]. There is a permanent record of all transactions on the blockchain since once a transaction is logged there, it
cannot be changed or removed.
One study [28] suggested a security architecture that combined smart devices and BT to establish a secure

of
communication platform in a smart city, as shown in Figure 4. To keep information secure and private, they utilized
blockchain technology to resist a variety of risks and give special benefits to the city, including increased

ro
dependability, fault tolerance, efficiency, and scalability. They developed a common platform by connecting
blockchain with smart city devices to permit secure communication in distributed environments. Future studies will

-p
focus on creating a system-level model to investigate the interoperability and scalability of the various platforms used
in smart cities.
re
Other researchers [29] have analyzed how blockchain technology can be advantageous for multiple
industries, such as supply chain, healthcare, Internet of things (IoT), governance, and finance. The authors investigated
lP

BT's potential for revolutionizing industrial application fields and providing insights into recent advancements.
According to their literature review, BT has the most promise in the banking and finance industries and can offer safe
solutions for every area of the manufacturing process, from supply chain management to commercial marketing. It
na

can manage a variety of applications, including managing loans, handling payments, digitizing currencies, conveying
assets, etc. Future applications of the smart contract include tracking the provenance of documents, establishing
ownership rights for digital or physical objects, and preventing fraud. The study's findings show that industries are
ur

gradually adopting BT and that this technology has enormous potential to transform practically all industries and
create a working environment that is safer, more secure, and more transparent.
Jo

Figure 3: A conceptual model based on the NIST Framework Proposal [24]. Figure 4: A smart city security
framework [28].

Another paper [30] outlined the current uses of BT in, and its influence on, cryptocurrency security. The
researchers focused on the security features of blockchain, such as its distributed design and consensus procedures,
and analyzed the different threats that can compromise cryptocurrency security. The study looked at several additional
methods and strategies, such as decentralized governance, smart contracts, and cryptography, all of which have been
suggested to increase the security of cryptocurrencies on the blockchain. They also outline issues like scalability,
privacy, and regulation, which pose a threat to the security of cryptocurrencies using blockchain technology.
3) Transparency: Blockchain technology provides security by allowing all users to see the ledger [31]. This ensures
that all transactions are visible to all parties, providing greater trust and accountability [32]. Transparency challenges
in corporate blockchain solutions can be solved in one of three ways, as shown in Figure 5.

of
ro
Figure 5: The main approaches to addressing transparency challenges [33].

-p
Another work [34] focused on choosing and evaluating BT to achieve sustainable supply chain transparency.
In addition to introducing a new hybrid group choice scheme that integrates hesitant fuzzy sets and regrets theory for
BT assessment and selection, the study also presented a measurement system that incorporated supply chain
re
transparency features for sustainability and characteristic features for technology. The suggested approach accounted
for decisionmakers' attitudes under uncertainty and incorporated various viewpoints. Their findings demonstrated the
lP

feasibility of multi-dimensional BT evaluation, and their suggested decision-making tool offered new perspectives on
technological governance and decision making. Areas for further research included the need to study links between
socially sustainable supply chain performance and supply chain transparency, and integrating advanced MCDM
na

techniques for a more comprehensive ranking procedure.


Other authors [35] analyzed how BT might influence food manufacturing by fostering greater client
confidence and transparency. Future changes in the food sector will be driven by customer needs for sustainability,
ur

health, wellness, and transparency; however, the industry is currently experiencing false and deceptive claims that
reduce consumer confidence. By introducing transparency to the food supply chain at relatively cheap price points,
Jo

blockchain technology can help solve this problem, as data is more difficult to tamper with, and there is no central
authority that can collapse the system. This study examined how blockchain can help the food industry prepare for the
future by giving consumers the power to check product claims and avoid food-related fraud.
Another study [36] investigated how BT might be used in the agricultural supply chain to increase
transparency and traceability. The authors emphasized the necessity of data in assisting traceability and proposed using
blockchain's guiding principles of authenticity, security, and transparency to accomplish this goal. They found that
applying blockchain technology to agriculture can improve transparency and traceability, which may help customers
trust agricultural products. Their research did highlight some issues with blockchain technology, including the
dematerialization of documents and energy usage, but the authors contended that for an effective and transparent
agricultural system that assures healthy and sustainable food for everybody, changing the culture and political will are
essential.
4) Immutability: Once a transaction is recorded on the blockchain, it can't be changed or deleted [37]. This
immutability guarantees that the data's integrity is maintained and that the ledger is a trustworthy record of all
transactions [38]. This can prevent sensitive information from being accessed, altered, or deleted without
authorization.
To guarantee the immutability of permissioned blockchains in business applications, one study [39] employed
Keyless Signatures' Infrastructure (KSI), as described in Figure 6. Blockchain has an immutable, distributed ledger,
but in permissioned contexts where end users are prohibited from monitoring or storing a copy of the blockchain, its
immutability becomes questionable. To maintain the long-term immutability of the blockchain in permissioned
environments, KSI provides irreversible and unchallengeable proof of block confirmations. The paper underlined how
crucial it is to keep the blockchain immutable in order to guarantee the dependability of the business apps that rely on
it.

of
Figure 6: A blockchain model based on a KSI hash chain [39]. Figure 7: Layers of blockchain

ro
immutability [40].

-p
Another paper [41] explored the difficulties encountered by digital archives when trying to keep digitally
signed or sealed records safe, and their certifications valid, over time. The authors suggested utilizing blockchain
technology to maintain the immutability of data while enabling metadata updates and archival bond management. The
re
suggested solution, termed TrustChain, can be implemented with either MongoDB or Apache Cassandra and is based
on a metadata model that is compatible with PREMIS, Dublin Core, and ISAD(G) standards. This strategy is a crucial
lP

step toward utilizing new technologies like blockchain and distributed ledger technology while upholding fundamental
archive science principles. Future work on the TrustChain VIP solution will assess its performance and scalability.
na

Another study [40] argued for for the advantages of early standardization in the blockchain industry. The
blockchain, according to these authors, has the potential to change the digital economy, and its success depends on the
technology's ability to be standardized. They offered a framework, as shown in Figure 7, which may be used as a best
ur

practice guideline for blockchain implementation to comprehend the scope and limits of blockchain immutability. The
article proposed that early standardization can have major benefits.
Jo

5) Consensus: Utilizing a consensus mechanism, blockchain technology makes sure that all network nodes agree on
the ledger's current state [42]. With the help of this consensus method, all transactions are validated and verified by a
number of participants, assuring their authenticity and accuracy.
Researchers [43] have suggested a consensus resource slicing model (CRSM) to increase the effectiveness
of blockchain systems in scenarios including energy trade, as seen in Figure 8. Due to its data transparency, trade
openness, and traceability, blockchain technology is naturally suited for these distributed energy transactions;
however, present consensus methods need to be more effective. CRSM divides consensus nodes into various
consensus zones for concurrent consensus while the storage zone only holds block data with no consensus. By creating
an experimental platform, the authors were able to demonstrate the effectiveness of CRSM, reduce the communication
load on the blockchain system, and significantly speed up consensus. The authors concluded by saying that more
research is necessary to examine the security and effectiveness of CRSM as well as its applicability in other sectors.
Figure 8: A CRSM model [43].
According to other research [44], consensus is an essential component of BT that maintains the agreement

of
and validity of transactions across distributed nodes in a decentralized network. This study covered four primary
consensus methods: proof of work (PoW), proof of stake (PoS), delegated proof of stake (DPoS), and Practical

ro
Byzantine fault tolerance (PBFT), as shown in Figure 9. The authors concluded that a solid consensus procedure would
not only offer fault-tolerance but would be created with the right application in mind.

-p
re
lP
na

(a) (b)
ur
Jo

(c) (d)
Figure 9: Flow of (a) PoW, (b) PoS, (c) DPoS, and (d) PBFT [44].
Another study [45] suggested the new consensus technique proof of authentication (PoA) for blockchain-
based IoT uses. Because of their high resource requirements and limited scalability, the authors contended that current
consensus algorithms may not be appropriate for IoT applications, so the study introduced the PoA algorithm to
leverage the authentication process used in IoT devices to decrease resource requirements. The authors described how
PoA authenticates transactions by employing the public key infrastructure (PKI), which allows it to reach consensus
without the use of energy-intensive PoW or PoS mechanisms. The authors demonstrated how PoA may provide a
transparent and tamper-evident recording of every transaction in a distributed IoT network, ensuring the transactions'
integrity and security.
In general, blockchain technology has the power to completely change how digital information is stored and
distributed. With its decentralization, security, transparency, immutability, and consensus features, it offers a robust
architecture for developing trustworthy and secure digital systems.
B) Challenges of Blockchain in Cybersecurity
While BT has the promise to enhance the security and robustness of cybersecurity systems, there are
significant challenges that need to be resolved before the technology can be widely used in this sector [46]. Blockchain
needs to address its scalability, regulation compliance, security threats, and lack of interoperability before it can fully
achieve its potential.
1) Scalability: The scalability of blockchain technology is a significant concern [47]. Large-scale cybersecurity
systems can be challenging to implement because of the distributed environment of the technology, which can cause
delayed transaction processing times and excessive network congestion.
2) Regulation Compliance: Blockchain technology's regulatory compliance difficulties are a key obstacle to its
adoption in cybersecurity [48]. Due to blockchain technology's decentralized nature, it can be challenging to adhere
to existing regulations and policies.
3) Security Risks: Despite the fact that BT is intended to be secure, there are still security risks involved [49] [50].

of
For instance, attacks on the consensus mechanism or specific nodes might compromise the network's security as a
whole.

ro
4) Lack of Interoperability: The lack of interoperability among various blockchain platforms and systems can make
it challenging to adopt blockchain-enabled cybersecurity solutions [51]. This may reduce the efficiency of how

-p
blockchain technology can address cybersecurity issues.
re
C) Review of existing blockchain-based cybersecurity solutions
lP

Although blockchain technology has many possible applications in cybersecurity [52], there are difficulties
that need to be handled prior to its adoption, such as issues of scalability, regulation compliance, security threats,
and a lack of interoperability. Despite these difficulties, numerous organizations are exploring the use of
na

blockchain technology in cybersecurity, and several blockchain-based cybersecurity solutions are currently in use.
Table 1 summarizes the main blockchain solutions along with their respective areas of cybersecurity and
highlights their main contributions in those domains.
ur

Table 1: Summary of the main blockchain solutions


Jo

Areas of
Blockchain Solution Main Contributions and Benefits
Cybersecurity

1. Cryptographic Key Access Control, Enhances key management and authentication,


Management Encryption safeguarding access to sensitive data.

2. Decentralized Identity Identity & Access Offers secure and verifiable identity
Management Management authentication, mitigating identity-related risks.

Data Protection, Facilitates secure sharing of sensitive data while


3. Secure Data Sharing
Privacy maintaining data integrity.

4. Supply Chain Supply Chain Increases transparency, traceability, and


Management Security authentication in complex supply chains.
5. Cyber Threat Threat Detection & Enables collaborative threat detection, sharing
Intelligence Sharing Response actionable intelligence across entities.

6. Resilient Supply Chain Supply Chain Enhances supply chain resilience by improving
Management Resilience transparency, security, and responsiveness.

1. Cryptographic Key Management: The management of cryptographic keys is one way that blockchain
technology is used in cybersecurity [53]. Organizations can guarantee that their cryptographic keys are safe
and resistant to attacks by using blockchain technology to store and manage them.
One paper [54] provided a novel method for efficient and secure key management and authentication in distributed
IoT networks utilizing BT. Absent a trustworthy third party, the researchers suggested a blockchain-based architecture,
as shown in Figure 10, that makes use of hash chains to assure data privacy as well as secure communication between

of
IoT devices. The suggested method employs a one-way hash chain mechanism to give the IoT devices a collection of
public and private keys for mutual authentication. The authors emphasized this method’s high efficacy and scalability,

ro
and recommended that future work develop inter-network communication schemes and asses security and
performance requirements. Overall, this study provided a promising solution to the security and privacy issues that
often arise in distributed IoT networks.

-p
Another study [55] proposed a body sensor network (BSN)-based lightweight backup and efficient recovery
re
mechanism for keys in a health blockchain. Healthcare systems must be protected by security measures since they
handle private and sensitive data. Figure 11 shows a smart healthcare structure using both BT and a BSN. The
biosensor devices in the BSN were responsible for producing, storing, and recovering the health blockchain's keys.
lP

The system’s benefits included improved key security and lower storage costs for encrypting blocks, which improved
the privacy on the health blockchain. The study's evaluations demonstrated that this structure has strong security and
performance, making it an effective solution for protecting private data on the health blockchain.
na
ur
Jo

Figure 10. A blockchain-based IoT model [54] Figure 11. A smart healthcare system with blockchain and a BSN
[55]
Another work [56] provided a powerful, decentralized key management mechanism for vehicular ad hoc networks
(VANET) with blockchain (DB-KMM) to address the security concerns and opportunities of VANET. Figure 12
depicts the proposed model with the three types of entities that make up the DB-KMM: vehicles, blockchain networks,
and vehicle service providers. The suggested system used a simple mutual-authentication and key-agreement protocol
based on bivariate polynomials and automatically registered, updated, and revoked user public keys. The authors
examined DB-KMM's security and demonstrated that it is capable of preventing common attacks including collusion,
DoS, internal, and public key tampering attacks. Additionally, they used simulations to examine the proposed scheme's
performance, which showed that it performed better than current solutions in terms of communication, storage,
computational overhead, and latency. In general, the suggested DB-KMM mechanism can offer an efficient VANET
key management solution that would improve the security of contemporary transportation systems.

of
Figure 12: A DB-KMM system model in [56]. Figure 13. Elements of a blockchain-based
self-sovereign identity framework [57].

ro
2. Decentralized Identity Management: Decentralized identity management solutions using blockchain

-p
technology can offer higher levels of security and privacy than conventional centralized systems [58]. Users
have more control over their personal data and reduced risk of identity theft and fraud when systems adopt
BT to store identity information and credentials.
re
Research [57] has offered a blockchain-based, decentralized identity management system for transportation that
lP

employs self-sovereign identity (SSI) to provide all parties with a high level of safety and transparency. Figure 13
displays elements of an SSI structure based on blockchain; it employs a shared ledger that is verified and stored by
numerous nodes within the network. The suggested system sought to eliminate the demand for multi-travel cards for
each transportation supplier and to allow users more authority over their identities while using interoperable ticketing
na

systems across Europe. Through a low-fidelity prototype created using the Hyperledger Indy blockchain, the study
provided a proof of concept. The prototype offered the EMC, a verified credential that can be used as an identity card
across Europe's public transportation network, and was based on a set of worldwide technical standards published by
ur

the W3C. The suggested approach was consistent with the EU's goal of developing a single transportation market
among member countries by 2050. Building more thorough and reliable prototypes, investigating the perspectives of
Jo

the cyber-physical social scheme and the intelligent transportation system, and evaluating the system from the
respective requirements of many stakeholders are all possible directions for future studies.
Other studies [59] have suggested a decentralized identity management system based on blockchain
technology to allow patients and healthcare suppliers to verify themselves securely and transparently in various
eHealth areas. Figures 14 and 15 illustrate the proposed design, including the smart healthcare identity management
method and digital health identity. Health identifiers (healthIDs) are used to uniquely identify patients and healthcare
providers. A healthcare regulator attests to their identity attributes, which are then maintained by the identity holder
and indexed on the blockchain. The authors set up smart contracts on an Ethereum consortium blockchain and assessed
their performance in terms of gas cost, speed, and synchronization delays. According to the findings, the consortium
blockchain could achieve a throughput of more over 100 TPS, and for optimal performance, less than half of the
network's sealers would be present. Future work will involve combining the block chain with a decentralized storage
technique like IPFS and managing and storing patient health data securely using zero knowledge proofs.
Figure 14. The framework of the smart healthcare identity management technique. Figure 15. A summary of
digital health identity [59].
A thorough examination of identity management systems (IDMS) utilizing BT is provided by another study
[60]. The authors claimed that BT can address issues with security, privacy, and trust that traditional IDMS may cannot.
The authors emphasized the benefits of utilizing blockchain to create IDMS, including improved security and privacy,
user control, and interoperability. While BT has received significant interest in identity management, the context of
the user experience is still not fully understood. The use of blockchain in identity management may be hindered by
privacy issues; therefore, further research is needed to better understand BT and identity management.
Other authors [61] have suggested a blockchain-based, decentralized authentication approach for VANET to
address security and privacy concerns connected with this technology, as shown in Figure 16. The suggested method
built a distributed architecture that preserved an immutable record of data, increasing the system's integrity, using a
permissioned blockchain technology called Hyperledger Fabric. The proposed approach permitted vehicles to preserve
restricted anonymity in the network, where only authorized entities could learn their true identities. The effectiveness
of the proposed strategy was compared in the study to the traditional PKI-based approach, and the former had promise.

of
ro
-p
re
lP

Figure 16: The proposed VANET architecture [61].


na

3. Secure Data Sharing: Blockchain technology can be utilized to build secure data-sharing networks that offer
more accountability and transparency [62]. Organizations can ensure that sensitive information is shared only
ur

with authorized parties by adopting BT to store and share data.


As seen in Figures 17 and 18, a blockchain-based distributed authentication technique and network structure can
Jo

be utilized for secure, decentralized medical record storage and sharing [63]. The suggested approach, Medi-Block,
employed bilinear mapping for authentication and eliminated the requirement for third-party trust. During the
authentication phase, the system employed two-way authentication among patients and hospitals while also complying
with several security requirements. The suggested architecture offered a safe platform for sharing medical data and
ensured accuracy, safe data sharing, and cost prediction.

Figure 17. Medi-Block system model and attributes. Figure 18: A blockchain-based medical record framework
[63].
Another study [64] presented a two-tier blockchain approach that integrated permissioned and permissionless
blockchains to permit secure data sharing, as presented in Figure 19. To do this, the study explored the history of
consensus systems for every form of blockchain and evaluated their concept in two distinct system environments. The
permissioned blockchain validated more blocks than the permissionless blockchain with a single sealer and miner. In
contrast to the permission-less blockchain, the permissioned blockchain showed a decrease in block count as more
miners and sealers were needed. The blockchain concept will be further developed in the future using both methods
to build a decentralized framework that would allow anybody to submit data but limit access to specific data to
authorized users. Alternative protocols and consensus techniques will also be investigated for forwarding and
receiving information from the blockchain.

4. Supply Chain Management: BT can be utilized to develop transparent and secure supply chain management
systems [65][66]. Organizations can minimize the risk of counterfeiting and maintain the integrity of the
supply chain by tracking the flow of products and confirming their authenticity using blockchain technology.
Research [67] has examined the implications of BT on supply chain management (SCM) from the perspective of
sustainable performance in the airport industry. An Italian airport effectively implemented the Airport Collaborative

of
Decision Making (A-CDM) platform, which is one of the most important BT uses in airport manufacturing. Although
implementing blockchain technology has many advantages for enhancing operations management (OM), it may not

ro
always result in the most effectiveness, efficiency, and sustainability. According to his study, managers and
policymakers should collaborate to establish a cooperative network based on shared culture and mutual trust. The

-p
results show that strategic manufacturing, like airports, are currently understudied. More investigation is required to
determine how cultural, and social factors and involve larger participant diversity such as managers, passengers, and
policymakers in SCM, are impacted by blockchain technology.
re
Another paper [68] addressed how contemporary supply chains have become sophisticated value networks that
lP

are challenging to manage while also retaining the visibility of products and merchandise. The authors suggested using
the IoT to watch, track, and control goods and procedures inside the value chain network to address this problem.
They also recommended blockchain technology to improve transparency and boost business-to-business trust. The
na

paper provided six research questions on how blockchain can affect key IoT characteristics—scalability, security,
immutability, information flows, traceability, and interoperability, as depicted in Figure 20. The authors suggested that
integrating blockchain and IoT can improve the efficacy and efficiency of contemporary supply chains. However, the
ur

authors pointed out many limitations and obstacles involved with integrating blockchain in an IoT environment, all of
which demand immediate attention from regulators and industry stakeholders.
Jo

Figure 19: Outline of a two-tier block chain model [64]. Figure 20. The effect of BT on IoT characteristics
[68].
Another paper [69] examined the barriers to adopting BT in renewable energy supply chain management. The
authors used hybrid approaches including SWARA-Gray, EDAS-Gray, WSM-Gray, COPRAS-Gray, and TOPSIS-
Gray to rank and assess the identified difficulties. The findings showed that "high investment cost" is the biggest
obstacle to the use of blockchain in sustainable energy supply chains. Despite this, the study emphasized that, in the
long run, BT can help the renewable energy industry overcome obstacles and improve supply chain sustainability,
traceability, and transparency.
5. Cyber Threat Intelligence Sharing: BT can be used to build decentralized networks for sharing cyber threat
intelligence [70]. Organizations can collaborate more successfully, and react to new threats faster, by adopting
blockchain technology to securely share information about cyber threats.
By offering novel distributed detection and reaction approaches based on data security methods, one study [71]
suggested a solution for improving the effectiveness and efficiency of identifying and countering cyber threats. The
suggested method was based on blockchain and artificial intelligence, which may automate incident classification and
management, provide cyber situational awareness, and enable rapid adoption of appropriate safety measures to take
in the event of an attack, as illustrated in Figure 21. The work investigated the accuracy and performance of a deep
autoencoder neural network using BT as a system for classifying and managing incidents. This approach reduced
manual procedures and conserved storage space by utilizing a blockchain smart-contract mechanism to construct an
automated, trusted model for incident management workflow that enabled the automatic collection, categorization,
and enhancement of incident data. The study also demonstrated how the strategies might be used to assist security
operation centers with incident handling.
For decentralized threat intelligence sharing utilizing BT and Trusted Execution Environment (TEE)

of
technologies, another study [72] presented a unique trust improvement system called TITAN, as represented in Figure
22. Decentralized blockchain-based sharing architectures can improve sharing efficiency, but they don’t address

ro
problems with trust, privacy, negative publicity, and legal concerns. TITAN intends to address these issues by utilizing
peer-to-peer reputation systems to foster trust, as well as blockchain and TEE technologies to guarantee the system's

-p
security, integrity, and privacy. re
lP
na
ur
Jo

Figure 21. The workflow of cyber incidents [71]. Figure 22. TITAN architecture [72].
Another paper [73] offered a new blockchain network framework for the safe sharing of cyber threat
intelligence (CTI) data, focusing on the difficulties faced by computer security and incident response teams (CSIRTs)
when sharing highly sensitive information inside systems where participants occasionally have different objectives or
preferences. The model made use of the blockchain's security features to provide a framework for CTI sharing
networks that is efficient and effective, and also has the ability to address trust challenges and data privacy concerns
inherent in this domain. The STIX 2.0 protocol and Hyperledger Fabric were, and the prototype successfully showed
how TLP (Traffic Light Protocol) could be enforced while STIX 2.0 security data could be distributed inside a network
using Fabric's chaincodes. Future work will concentrate on assessing the functionality and security of the CTI BT
network and creating a useful secured application that can be used in real-world applications.

6. Resilient Supply Chain Management: Organizations can follow the movement of items and verify their
authenticity by establishing a decentralized and transparent supply chain network. This can help avoid
counterfeiting and ensure the chain's integrity [74].
Research [75] has discussed the impacts of COVID-19 on food supply systems and the significance of
resilient and sustainable food supply chain management. To boost supply chain resilience, the paper suggested
implementing reverse logistics practices and integrating blockchain technology. They employed a fuzzy synthetic
evaluation method to recognize and eliminate risks connected to adopting blockchain. They emphasized the
significance of both information management and security risks in adopting BT in food supply chains.
Another study [76] investigated the application of BT in the humanitarian sector to enhance the accountability
and transparency of disaster relief supplies, information exchanges, and money transfers. The paper suggested the
theoretical framework shown in Figure 23 to comprehend how swift-trust (ST) can affect transparency in an
operational supply chain. The framework also demonstrated how BT-enabled ST can increase supply chain resilience
(SCR) and collaboration (CO) among entities involved in disaster relief activities. The study gathered information
from global non-governmental organizations and discovered that BT significantly and positively influenced
operational supply chain transparency and ST, which positively impacts CO and SCR.

of
ro
Figure 23: Theoretical model in the humanitarian sector [76].

-p
re
The advantages and disadvantages of each blockchain solution in different areas of cybersecurity can be summarized
as follows:
lP

1. Cryptographic Key Management:


Advantages: This strategy can enhance security through decentralized key management, reducing the risk of single
points of failure. Improved authentication and access control ensure that only authorized parties can access sensitive
na

data.
Disadvantages: There is increased complexity in managing and safeguarding private keys, the potential for loss of
ur

access if keys are lost, and scalability challenges when dealing with a large number of keys.
2. Decentralized Identity Management:
Jo

Advantages: This strategy allows for secure and verifiable identity authentication, reducing identity-related risks. It
also enhances privacy control for users, as they own their identity data.
Disadvantages: Adoption challenges, as transitioning from traditional identity management systems can be complex.
Privacy concerns arise from the need to balance transparency and user data protection.
3. Secure Data Sharing:
Advantages: This method facilitates the secure sharing of sensitive data while maintaining data integrity. It eliminates
the need for intermediaries, reducing risks associated with centralized data storage.
Disadvantages: It is difficult to ensure data confidentiality while still maintaining the benefits of transparency. There
are also scalability concerns when handling a large volume of data transactions.
4. Supply Chain Management:
Advantages: This method increases transparency, traceability, and authentication in complex supply chains. It
improves accountability and reduces fraud by providing an immutable record of transactions.
Disadvantages: Adoption challenges, as integrating existing supply chain systems with blockchain can be technically
demanding. Ensuring data accuracy and trust among participants remains a concern.
5. Cyber Threat Intelligence Sharing:
Advantages: This solution enables collaborative threat detection, sharing actionable intelligence across entities. It also
strengthens collective security efforts and accelerates response times.
Disadvantages: It can be difficult to balance information sharing with concerns about privacy and competitive
advantage. Ensuring the accuracy and quality of shared threat intelligence can be challenging.
6. Resilient Supply Chain Management:
Advantages: This solution enhances supply chain resilience by improving transparency, security, and responsiveness.
It mitigates risks by providing real-time visibility into supply chain operations.
Disadvantages: This solution is dependent on the accuracy and reliability of data fed into the blockchain. There are
implementation challenges when integrating legacy systems with blockchain-based solutions.
In each case, these lessons and insights shed light on the practical implications of implementing blockchain solutions
in different areas of cybersecurity, helping organizations make informed decisions while harnessing the benefits and
addressing potential challenges.

of
III. Decentralized AI for Cybersecurity

ro
A) Overview of decentralized AI and its benefits for cybersecurity

-p
Decentralized AI refers to the usage of artificial intelligence algorithms and models that are spread across
numerous network nodes. It facilitates the use of distributed computing infrastructure in contrast to centralized AI,
re
where all data and processing take place on a single system. One study [77] gave a general overview of AI applications
and investigated the most recent AI developments in cybersecurity, especially in security analysis and the evaluation
of potential upgrades. The work emphasized the value of utilizing AI technologies to address cybersecurity issues and
lP

suggested an AI approach to provide security. The study illustrated the need for more research in this area and offered
a helpful analysis of how AI might enhance the effectiveness of protection measures.
na

Another paper [78] analyzed the difficulties of cybersecurity in industrial control systems (ICS) in the context
of Industry 4.0, and suggested the use of AI techniques to boost resilience against cyber threats. The authors examined
the distinctions between ICS and information systems and suggested that a decentralized architecture with flock
ur

behavior is superior to a centralized management architecture for controlling large-scale industrial processes. The
study emphasized the importance of determining relevant indicators to evaluate and contrast the impacts on the
controlled elements in order to measure the efficacy of the suggested framework.
Jo

Other research [79] has focused on the Internet of Medical Things (IoMT), or technology used for healthcare
services, and highlighted its vulnerability to cyberattacks, raising privacy and security concerns. To address these
issues, the study explored the combination of blockchain technology and AI within the IoMT framework. This paper
emphasized the potential of technologies such as AI and BT in decentralized healthcare applications.
By enabling more efficient threat detection, response, and prevention, decentralized AI has the potential to
revolutionize the field of cybersecurity. Decentralized AI could have a number of benefits, including:
1. Improved Threat Detection: Decentralized AI allows organizations to better identify and analyze potential
cyber threats by leveraging multiple data sources and computational resources [80].
2. Enhanced Privacy and Security: Decentralized AI can assist in preserving the security and privacy of
sensitive information by dispersing the data and processing among several nodes, minimizing the possibility
of an attack or single point of failure [81].
3. Faster Response Times: Decentralized AI may decrease response times to emerging risks by distributing AI
models across numerous nodes, permitting organizations to react more rapidly and efficiently [82].
4. Increased Resilience: By dispersing data processing and storage across numerous nodes, decentralized AI
can help to increase the resilience of cybersecurity systems by minimizing the possibility of a single point of
failure or attack [83].
5. Better Collaboration: Decentralized AI can promote greater collaboration among many organizations and
stakeholders in cybersecurity, facilitating more efficient sharing of data and intelligence [84].
Despite these potential advantages, there are difficulties in implementing decentralized AI in cybersecurity. Among
these are problems with data integrity, interoperability, and regulatory compliance. Decentralized AI, however, has the
capability to improve the security and robustness of cybersecurity systems as this technology develops.

B) Analysis of challenges and limitations of decentralized AI in cybersecurity


1. Data Quality and Integrity: For decentralized AI to successfully train and deploy models, it needs access
to high-quality and reliable data [85]. In decentralized systems, it could be challenging to ensure the quality
and integrity of the data, especially if it is generated from sources with varying degrees of reliability.
2. Interoperability: Different programming languages, frameworks, and architectures may be used to
implement decentralized AI models, which can make it challenging to share and integrate models across
various networks or organizations [86].

of
3. Scalability: Decentralized AI models may become computationally complicated, requiring significant
resources for training and deployment. This can cause scalability issues, especially if the models need to be

ro
deployed among large networks or data centers [86].

-p
4. Security Risks: Decentralized AI models may be susceptible to attacks or manipulation, especially if the
models are dispersed across a number of network nodes. Because of this, guaranteeing the security and
integrity of the models, and therefore the data they analyze, may be difficult [87].
re
5. Regulatory and Compliance Issues: Decentralized AI models could pose regulatory and compliance
lP

challenges in cybersecurity, especially if they process sensitive data or work in regulated industries [48].
6. Lack of Standardization: Due to the lack of standardization in decentralized AI models, evaluating and
comparing different models, as well as ensuring interoperability and compatibility across different networks
na

or organizations, can be challenging [88].


Despite these difficulties, decentralized AI has the potential to transform the field of cybersecurity by facilitating more
ur

efficient threat detection, response, and prevention. To enable the full potential of decentralized AI in cybersecurity, it
will be crucial to address these difficulties and constraints.
Jo

C) Review of existing decentralized AI solutions for cybersecurity


Decentralized AI has the opportunity to revolutionize cybersecurity by facilitating more effective threat detection,
response, and prevention. Following are some of the solutions that show this method’s potential for increasing the
security and resilience of cybersecurity systems, even though there are still difficulties and restrictions connected with
its deployment.
1. Federated Learning (FL): FL is a decentralized method of machine learning that allows several devices to
cooperatively train a single model without sharing the training data [89]. This system supports the privacy
and security of sensitive data while also allowing for efficient model training. Figure 24 shows how privacy
is preserved through federated learning [90].
By creating a novel system for the coordination of security monitoring and harmful behavior control, one study
[91] solved the problem of effectively decreasing malicious traffic in 6G networks. The authors suggested
using blockchain-empowered federated learning (BeFL) to guarantee the confidentiality and privacy of the distributed
network security behavior’s knowledge base. They defined this as using a knowledge graph, creating a universal
network malicious behavior knowledge-base, and analyzing its application possibilities. In a prototype system, as
depicted in Figure 25, the suggested BeFL architecture esd implemented and compared against two baseline
techniques; it former performed better in identifying users, detecting flows, and tracking the source of attacks. In
addition, the prototype was tested against different DDoS attacks and outperformed two other baseline methods in
terms of attack recognition accuracy and survivability.
Figure 24: Privacy preservation through federated learning [90]. Figure 25: Prototype deployment of BeFL
[91].

of
Other research [92] has examined using federated cybersecurity (FC) to secure and improve the effectiveness of

ro
IoT devices. By creating a federation of learned and shared models on top of diverse participants, the authors sought
to discover security vulnerabilities and avoid the spread of risks over the IoT network. FL a privacy-aware machine
learning model, which is especially beneficial in securing the susceptible IoT environment. The study examined

-p
methods for addressing FL performance issues that may influence the security and overall effectiveness of the IoT,
with a primary focus on security.
re
A blockchain-in-the-loop FL technique called FabricFL has also been suggested for trusted and decentralized
systems [93]. This strategy incorporated traditional FL, the Hyperledger Fabric blockchain, and gamification
lP

components to address security issues with FL. The framework offered a collaborative training environment for
machine learning models that was secure and auditable, while also protecting user privacy. Utilizing three different
datasets, the suggested method increased the FL process' accuracy and convergence to the best performance. The paper
na

concluded that FabricFL may offer a secure and trusted environment for FL in industrial contexts.
Another study [94] focused on enhancing the efficiency of healthcare systems by introducing the energy-efficient
ur

distributed federated learning offloading and scheduling (EDFOS) system within blockchain-based networks.
Traditional disease detection applications often overlook processing performance and data privacy, and this study
Jo

addressed that gap by proposing EDFOS, a comprehensive system that optimizes energy-efficient offloading and
scheduling while meeting quality of service (QoS) requirements for healthcare applications. Simulation results
revealed that EDFOS significantly reduced power consumption, training and testing time, resource leakage, and
deadlines, compared to existing healthcare systems. This approach provided an effective solution to the challenges of
power consumption and data privacy in healthcare applications.

2. Blockchain-Based AI: Decentralized AI models can be developed using blockchain technology and
deployed across numerous network nodes [95]. This strategy can increase the security and resiliency of AI
models while still allowing for efficient training and deployment for cybersecurity applications.
One paper [96] presented a solution for challenges in industrial Internet of things (IIoT) healthcare
applications by introducing the deep reinforcement learning-aware blockchain-based task scheduling
(DRLBTS) algorithm. This algorithm ensured secure and efficient task scheduling in the healthcare context,
addressing concerns like security, privacy, and makespan requirements. The proposed scheme divided tasks
into mobile, fog, and cloud categories and executed them based on resource requirements, validation, and
time considerations. The proposed system achieved optimal results. While effective, the DRLBTS has its
limitations, particularly its energy consumption during task execution. Future work aims to consider factors
like energy consumption, electricity cost, and mobility-enabled power efficiency. it also requires other
improvements to enhance the algorithm's performance in executing healthcare workflows, including real-
time profiling, resource optimization, and energy consumption reduction.
3. Decentralized Intrusion Detection: By utilizing distributed computing resources and AI algorithms,
decentralized intrusion detection systems can be employed to identify and respond to cyber threats [97]. By
allowing faster detection of, and response to, emerging threats, this strategy can help increase the resilience
and responsiveness of cybersecurity systems.
As presented in Figures 26 and 27, one study [98] has suggested a decentralized machine learning framework to
facilitate cooperative intrusion detection in unmanned aerial vehicles (UAVs) based on BT. The authors contended
that conventional UAVs were susceptible to cyberattacks because they depended on centralized servers for data
processing. The authors discussed decentralized predictive analytics using blockchain technology and suggested a
framework for applying and sharing machine learning models. Cooperative intrusion detection was used as a case
study for evaluating the proposed system, proving the usefulness and efficiency of the suggested strategy for UAVs
and related applications. When compared to the centralized approach, the suggested system performed better in terms
of detection accuracy and performance overhead. By reducing the demand for data sharing among the nodes, the
framework improved data privacy and security as well. Future research will examine the presented structure's
scalability and robustness in real application-specific scenarios for UAVs facing various known attacks.

of
ro
-p
re
lP

Figure 26: A blockchain-based decentralized machine learning system. Figure 27: The conceptual
model for the machine learning process [98].
na

An intrusion detection structure for smart transportation systems (STS) known as FED-IDS has also been
proposed [99]. The proposed FED-IDS framework is illustrated in Figure 28. STS is susceptible to cyber attacks as a
result of the widespread use of software and the initiation of wireless interfaces. To combat this, FED-IDS uses a
ur

context-aware transformer network to offload the learning-process via servers to distributed vehicle edge-nodes in
order to effectively detect attacks. To permit multi-edge nodes to deliver accurate, safe, and distributed training without
Jo

the requirement for centralized control, the authors suggested a blockchain-managed, federated training strategy. The
evaluations conducted on two public datasets showed that FED-IDS outperformed other techniques, demonstrating
the credibility of protecting networks of intelligent transportation systems against cyberattacks.

4. Decentralized Access Control: In a distributed environment, access to sensitive data and systems can be
controlled via decentralized access control systems [100]. By lowering the potential of a single point of failure
or attack, this strategy may enhance the security and privacy of sensitive information.
One study [101] presented a secure architecture for IIoT in smart manufacturing applications, including BT and
machine learning (ML), as shown in Figure 29. The proposed framework includes five layers, including a transport
layer that is BCT-enforced and an attack detection layer based on ML. This architecture is contrasted with comparable
ones described in the literature, and experiments demonstrated that the suggested architecture may significantly
decrease threats from DDoS, injection, brute force, and XSS attacks.
To solve security and privacy problems with the storage of medical data, another study [102] suggested a
distributed, privacy-preserving information repository for smart health called Derepo that made use of homomorphic
encryption and decentralized access control. The double-layered architecture, which combined static and dynamic
processes, guaranteed controllability, manageability, and pseudonymity while maintaining computability. Fully
homomorphic encryption (FHE) ensured confidentiality and addressed privacy concerns, while the consortium
blockchain ensured the access control system's reliability. The suggested method made use of distributed ledger
technology to offer a reliable access control system and homomorphic encryption for protecting data privacy and
computability. The design was user-centric, and the sole holder of information was managing access and decrypting
their information. The encrypted data can be processed by authorized third parties without accessing its original
contents. A Derepo prototype was evaluated for security assessments, demonstrating its feasibility. Future work will
concentrate on optimizing the performance and expanding the functionality to an industrial level.

of
ro
Figure 28: Th FED-IDS framework [99].
-p Figure 29. The suggested secured IIoT system with
re
BT and ML [101].
lP

IV. Blockchain-Enabled Decentralized AI for Cybersecurity


na

A) Introduction of the concept of blockchain-enabled decentralized AI for cybersecurity


AI and BT have both experienced incredible growth and development in recent years [103]. While AI has
enhanced its efficiency and efficacy for numerous uses, such as cybersecurity, blockchain technology is well known
ur

for its capacity to provide secure and decentralized record-keeping. One potential use for these technologies is the
creation of decentralized AI models for cybersecurity using blockchain and AI [95]. Decentralized AI models can be
Jo

distributed across several nodes by utilizing the distributed computing capabilities of blockchain networks, enhancing
the security and resiliency of AI models and cybersecurity systems. Decentralized AI is able to assist in addressing a
number of the obstacles brought on by conventional centralized AI models, such as issues with data privacy and
security. By utilizing federated learning and other decentralized methods of AI training, sensitive data can be secured
while still allowing for the efficient training of AI models.
In the context of the IIoT, one study [104] suggested a blockchain-enabled intelligent IoT framework that
used AI to facilitate efficient big data analysis, as shown in Figure 30. The proposed design sought to address issues
with centralized schemes, security, privacy, resource constraints, and the absence of training data for artificial
intelligence. A qualitative and quantitative evaluation of the design demonstrated that it exceeded current IoT
architectures in terms of accuracy, latency, security, privacy, computational complexity, and energy cost. The proposed
architecture converged blockchain and AI and enabled a scalable and accurate analysis of data in real time for IoT
applications. Although there are still challenges, including scalability, interoperability, and energy efficiency, the
authors recommended incorporating machine intelligence principles into the architecture to solve these issues.
In order to address issues with the electric vehicle (EV) charging systems, such as vulnerable charging
stations and inefficient charging schedules, another paper [105] suggested integrating blockchain with AI. The authors
reviewed the market's existing AI and BT charging systems and suggested use scenarios where both methodologies
might work together to create a safe, effective, and distributed charging system. The study explored possible trends
and executions for better-charging infrastructure for EVs as illustrated in Figure 31. The proposed framework sought
to provide a high quality of service (QoS) for end users. The authors assessed the existing state of the EV charging
ecosystem and highlighted two significant obstacles: balancing consumer satisfaction with grid operations, and
maintaining security and privacy. The potential of AI was assessed in scheduling EVs and improving the provisioning
of EV charging stations, and the impact of blockchain was evaluated in protecting the ecosystem and facilitating
trustless energy trade between EVs, private charging station owners, and power utilities. The authors provided use
scenarios emphasizing the potential advantages of combining both technologies, and they came to the conclusion that
integrating AI and Blockchain is necessary for developing an effective charging ecosystem.
In the context of 6G, another paper [106] suggested using blockchain technology for decentralized network
management. There is a rising need for fault-tolerant and censorship-resistant solutions as communication services
become more virtualized and software-defined to assure trust in the data and infrastructure. Blockchains are thought
to be a viable remedy that might automate some contractual agreements and offer a decentralized environment for
numerous parties and resources. This study examined the use of blockchain in various network functions, including
dynamic spectrum management, software-defined networking, resource management, and IoT services. Researchers
are becoming more interested in decentralized methods of network management, especially as operators look for ways
to guarantee the reliability of data, operations, and business transactions while preserving business continuity.

of
ro
-p
re
lP
na

Figure 30. The design overview of the proposed BlockIoTIntelligence Architecture [104]. Figure 31: Electric
ur

vehicle infrastructure and protocols [105].


Jo

To create a trustworthy and respectful community according to the time banking concept, research [107] has
also suggested a blockchain-enabled decentralized time banking system (BlendTBS). BlendTBS is a system that
compensates users for taking part in socially positive activities and operates on a permissioned blockchain network.
An initial BlendTBS prototype was implemented, and small-scale research has assessed the system's usefulness in a
traditional community on the island of Aneityum, Republic of Vanuatu. The authors hope that by presenting this
position paper, more people will become interested in the uses of BT in contemporary society.

B) Analysis of the benefits and difficulties of blockchain-enabled decentralized AI for cybersecurity


There are a lot of potential advantages to decentralized AI enabled by blockchain for cybersecurity, but there
are also a lot of difficulties and restrictions with this method. It is therefore vital to carefully weigh both the advantages
and the disadvantages.
The benefits of blockchain-enabled decentralized AI for cybersecurity are:
1. Improved Security: A secure and decentralized framework is provided by BT, which can be exploited to
further enhance the security of AI models [108] [109]. Deploying decentralized AI models over numerous
network nodes minimizes the probability of a single point of failure or attack.
One study [110] investigated the security flaws in smart vehicular networks (SVNs) and suggested a secure
architecture to deal with these issues utilizing blockchain and deep neural networks (DNNs). The study emphasized
that SVN properties, such as mobility, decentralization, and resource limitations, make traditional security methods
incompatible. The suggested platform uses a cluster-based manner so that every cluster's vehicles can securely interact
using blockchain; DNN is then employed to find the irregular vehicles that are attacked in each zone, using network
traffic analysis. The findings of this test suggested that the new framework enhanced throughput, including the
increasing of miners and block size, and that DNN execution for irregular vehicle detection performed with great
accuracy. The suggested framework can improve SVN's efficiency and security and make it more resistant to
cyberattacks.
A new key management protocol for industrial cyber physical systems (ICPSs) utilizing blockchain and artificial
intelligence has also been proposed [111]. The protocol enables the creation of keys between IoT-enabled smart-
devices and their corresponding gateway-nodes. Fog servers then partially construct blocks using secure information
from smart devices and deliver them to cloud servers in charge of finalizing the blocks, mining them for verification,
and adding them to the blockchain. The private blockchain architecture enables precise predictions utilizing AI
algorithms for big data analysis. The suggested method was examined in an ICPS environment for security and
demonstrated resilience to probable attacks; it also utilizied realistic testbed tests employing cryptographic libraries to
illustrate its superiority over other methods.

of
2. Increased Resilience: By facilitating more rapid and efficient threat detection and response, decentralized

ro
AI models can assist in strengthening cybersecurity systems. Decentralized AI models can identify and react
to emerging risks faster than centralized models using blockchain-distributed computing resources and AI

-p
algorithms, making the former more resilient [109].
One study [112] suggested that disaster aid networks could become more resilient by utilizing blockchain
re
technology. Getting supplies to those in need can be difficult in disaster zones because of their unpredictable and
dynamic nature. Collaboration, coordination, sovereignty, and equality in the provision of aid are essential for disaster
lP

response networks to succeed. Smart contracts enabled by blockchain technology allow for secure, real-time data
sharing and automation in a decentralized environment, making it a promising solution to this problem. As shown in
Figure 32, this paper investigated how blockchain technology can be integrated with the IoT and dynamic voltage
na

frequency scaling (DVFS) to improve disaster management resilience. The findings demonstrated that blockchain
technology can enhance disaster-aid network methods and provide insightful information for researchers and
management interested in practical implementation. Despite these promising results, the study itself has its
ur

shortcomings, such as restrictions on data collecting, reliance on a single case study, and absence of on-site verification
of simulation results. The collecting of accurate data is hampered by the confidentiality of data regarding agency
interaction and coordination during disasters. It is also challenging to validate model implementation on-site in the
Jo

absence of an actual disaster.


Another paper [113] investigated how BT and smart contracts could enhance security and resilience for smart
grids. The study analyzed energy transcations and how integrating smart contracts, AI, and blockchain can eliminate
the demand for third-party intermediaries and simplify the adoption of decentralized energy transactions and
interactions, decreasing costs and boosting security and sustainability for these systems.
Another study [114] suggested a blockchain-based smart grid that incorporated peer-to-peer energy trading and
zero-trust cybersecurity to improve resilience. The authors emphasized the necessity of reliable and sustainable
solutions as well as the vulnerability of current energy infrastructure to cyber-attacks. The suggested strategy, as
depicted in Figure 33, combined smart contracts and peer-to-peer energy trading to allow small customers and
suppliers to engage in energy markets. The findings showed that smart contracts built on blockchains improved zero-
trust cybersecurity, reducing cyberattacks and attaining resilience. Future studies will require empirical research to
test this proposed model.
Figure 32: Conceptual model [115] Figure 33: Smart contract research model [114].

3. Data Privacy: Sensitive data can be kept private when it is local to a device or node. Decentralized
approaches to AI training, such as federated learning, can assist in addressing data privacy issues highlighted
by centralized AI models while also allowing a decentralized model to train on this data securely [81].

of
One paper [116] investigated how BT and FL are used to enhance the privacy and security of information in
collaborative learning. FL is a new training approach that permits numerous scattered nodes to learn a deep learning

ro
(DL) model simultaneously without sharing information. However, the trained model may be compromised by
malicious actors using specific security flaws in present FL techniques. To combat this, the study suggested a

-p
blockchain-enabled security paradigm that can provide a better DL model without sharing information; doing so would
enhance privacy by enforcing greater data security and access rights as described in Figure 34. Data and model
poisoning attacks were studied using a blockchain-facilitated FL method constructed along the Ethereum network and
re
a conventional FL method (without blockchain). The study offered a transparent incentive structure that motivated
participating decentralized nodes for good behavior and prevented frequent problems. The study analyzed the potential
lP

of BT for improving privacy and data security in collaborative learning and offered insightful information for the FL
security literature. Future research could concentrate on analyzing how incentive based block chains affect FL methods
with asynchronous and heterogeneous training datasets. The study used Infura and Rinkeby Testnet to lower gas fees,
na

but further research is required to comprehend the full effect of an incentive-based blockchain utilizing the FL method
in practical situations including mainnet.
ur

In order to solve privacy and efficiency concerns in fog computing, another study [117] suggested a
new blockchain-enabled federated learning (FL-Block) system, as explained in Figure 35. The FL-Block architecture
enables local learning updates for end users, which are exchanged with a blockchain-based global learning scheme
Jo

validated by miners. The suggested model used a PoW consensus technique to facilitate autonomous machine learning
without a central authority. Additionally, the paper evaluated FL-Block's latency performance and determined the ideal
block generation rate, taking into account communication, consensus delays, and computing cost. Findings from the
assessment indicated that FL-Block performed better than other options in terms of protecting privacy, effectiveness,
and resilience to poisoning attacks. By maximizing the trade-off between efficiency and privacy protection, the authors
intended to expand the model to more generic scenarios in future work. Additionally, they wanted to investigate how
game theory and Markov decision processes might be used to find the ideal conditions for computing and
communication costs.

Figure 34: Collaborative learning system description [116]. Figure 35: Decentralized privacy in fog computing
based on FL-Block [117].
4. Improved Collaboration: Decentralized threat intelligence sharing and other collaborative cybersecurity
schemes can be facilitated by blockchain-enabled decentralized AI models. By utilizing the combined
knowledge and experience of various organizations and stakeholders, threats can be detected and handled
more effectively [109].
As seen in Figure 36, one study [118] proposed a blockchain-based accountability approach for digital-twin
environments that are distributed and cooperative. The approach incorporated a public or private authority that offered
complete security and privacy perseveration, with no repudiation of block chain transactions. The suggested method
was built on the "X-by-design" and "X-as-a-service" concepts and greater security, accountability, and integrity in
decentralized techniques. This study demonstrated that BT has the ability to develop various industries by introducing
novel features including smart contracts, content tokenization, the elimination of counterfeit products, supply chain
optimization, digital-twins, and end-to-end security.
An architecture for a blockchain enabled Internet of Vehicles (IoV) with cooperative positioning (CP) has also
been proposed [119] to increase the precision, resilience, and security of vehicular GPS location, as shown in Figure
37. The suggested framework includes: a self-positioning correction method based on the DNN algorithm for
increasing the positioning accuracy of intelligent vehicles; an intelligent multiple vehicle positioning error to decrease

of
GPS positioning errors for common vehicles; and a blockchain-enabled system for information sharing and security
among intelligent vehicles, CoVs, and roadside units. The suggested architecture was assessed using extensive

ro
simulation results, which revealed enhancements in vehicular positioning accuracy, information transfer, and sharing.

-p
re
lP
na
ur
Jo

Figure 36: Proposed model for digital twin environments [118]. Figure 37: IoV system
architecture [119].

The challenges of blockchain-enabled decentralized AI for cybersecurity are:


1. Scalability: Deploying and maintaining decentralized AI models enabled by blockchain can be
computationally intensive and require significant computing resources. As a result, scalability may be a
considerable difficulty [12].
2. Network Connectivity: For decentralized AI models to be effective, they need very high levels of network
connectivity and stability. In certain environments, especially in distant and/or less developed areas, this can
be difficult [120].
3. Lack of Standards: For blockchain-enabled decentralized AI, there is presently a lack of standards and best
practices. As a consequence, maintaining interoperability and security across many systems and networks
may be difficult [121].
4. Regulatory and Legal Issues: A number of regulatory and legal challenges, specifically those related to data
privacy and security, are brought up by the usage of blockchain and AI in cybersecurity. Therefore, for
enterprises looking to adopt this strategy, overcoming regulatory and legal frameworks can be a major
problem [121].
C) Review of existing blockchain-enabled decentralized AI solutions for cybersecurity
This section shows some of the existing solutions that offer insight into the future of cybersecurity and the role
that blockchain and AI will play in tackling growing threats.
1. PolySwarm: PolySwarm is a blockchain-based marketplace for threat intelligence that detects and responds
to threats using a decentralized network of security experts and AI models [122]. The platform uses BT to
facilitate secure and transparent interaction among various security experts and organizations.
2. DeepBrain Chain: DeepBrain Chain is a decentralized AI computing platform that employs blockchain
technology to provide effective and affordable AI training and inference. Due to the platform's ability to share
computational resources over a network of nodes, large-scale AI models can be trained more rapidly and cost
effectively than conventional centralized methods [123].
3. SingularityNET: Blockchain technology is used by SingularityNET, a decentralized AI marketplace, to
facilitate the cooperation and sharing of AI models and services [124]. The platform makes it possible for
developers and entrepreneurs to acquire and utilize AI models from many suppliers, fostering a more
productive and cooperative AI ecosystem.

of
4. Enigma: Enigma is a blockchain-based, decentralized privacy protocol that permits secure and private data

ro
sharing and analysis [125]. Without disclosing sensitive information to a single party, the platform uses secure
multi-party computational techniques to facilitate data analysis and AI model training.

-p
5. IOTA: Using blockchain technology, the IOTA Foundation has created a decentralized method of intrusion
detection. The system employs a distributed network of sensors and AI models to enhance the precision and
re
effectiveness of intrusion detection while also detecting cyber threats in real time [126].
6. Sovrin: A blockchain-based identity management system called Sovrin leverages decentralized AI to offer
lP

secure and accurate identity authentication [127]. By allowing individuals and entities to securely
communicate and verify identity information, a mechanism reduces the probability of fraud and identity theft
[128].
na

V. Future Research Directions


ur

This section explains the future research directions for blockchain-enabled decentralized AI in cybersecurity to further
enhance this technology. The following need to be addressed by researchers:
Jo

1. Integration of blockchain and decentralized AI: Future studies should examine more sophisticated
applications of blockchain and decentralized AI technology for enhancing cybersecurity. For instance,
researchers can look into the possibility of using blockchain as a secure and transparent framework for
training and sharing AI models. By facilitating more secure and effective information sharing, threat
detection, and response capabilities, the integration of blockchain and decentralized AI technologies has the
capability to revolutionize cybersecurity. This direction of research may result in the creation of more
advanced and reliable cybersecurity systems, which may then assist in protecting enterprises from evolving
cyberthreats.
2. Improved interoperability: The advancement of blockchain and decentralized AI solutions that are more
standardized and interoperable would greatly improve the effectiveness and efficiency of cybersecurity
processes. In order to improve collaboration and data sharing, future research should investigate strategies
for achieving interoperability across various blockchain platforms and decentralized AI models. This research
direction can address the existing fragmentation of blockchain and AI technologies, allowing for improved
collaboration and information exchange. Consequently, enhanced interoperability could lead to more rapid,
precise, and efficient cybersecurity responses.
3. Decentralized identity management: A crucial component of cybersecurity is identity management, and
future studies should explore the potential of blockchain and decentralized AI in designing more effective
and secure identity management platforms. To create more reliable and scalable identity management
solutions, researchers should look into the adoption of decentralized identity protocols and their incorporation
with BT and AI technologies. The security and privacy of user information can be significantly enhanced
through decentralized identity management, which serves an essential role in cybersecurity. This research
could lead to the development of more robust and scalable identity management technologies, which could
then better protect user data and prevent illegal access to critical information.
4. Privacy-preserving blockchain and AI: Privacy is a significant concern in cybersecurity, and future studies
could investigate the potential of using privacy-preserving blockchain and AI technologies for enhancing the
security of highly sensitive data. To create more secure and private blockchain and AI solutions, researchers
should examine the usage of advanced cryptography and privacy-enhancing technology. This research may
lead to the building of more trustworthy and privacy-preserving blockchain and AI technologies, which may
protect more effectively critical data and avoid unauthorized access.
5. Regulatory and legal considerations: These concerns need to be resolved as blockchain and decentralized
AI technologies grow and develop. Future studies can examine the opportunities and challenges for
blockchain and decentralized AI in cybersecurity law, as well as how to assure compliance with pertinent

of
regulations. This direction can encourage the adoption of blockchain and decentralized AI technologies in
cybersecurity.

ro
In conclusion, there is a wide range of future research topics for blockchain-enabled, decentralized AI in cybersecurity.
By continuing to investigate these directions, researchers can contribute to the establishment of more secure, efficient,

-p
and effective cybersecurity solutions. re
VI. Conclusion
lP

The growing demand for secure and decentralized AI in cybersecurity has prompted this investigation of blockchain
technology. The potential benefits and drawbacks of utilizing BT and decentralized AI in cybersecurity, as well as
current solutions and practical use cases, have all been examined in this paper, and the analysis has revealed that the
na

integration of BT and decentralized AI mechanisms holds enormous promise. It can revolutionize cybersecurity by
facilitating more secure and efficient information sharing, threat detection, and response. However, in order to do this
successfully, various obstacles and restrictions must be addressed, such as scalability, interoperability, and regulatory
ur

considerations. Current solutions, such as decentralized AI systems and blockchain-based cybersecurity platforms,
have shown promise in addressing these issues. Even so, there is still potential for advancement and further
Jo

investigation in developing more reliable solutions.


The practical advantages of integrating blockchain technology with decentralized AI in the context of cybersecurity
are significant. This convergence offers enhanced data integrity and transparency through blockchain's immutable
ledger, ensuring that AI-generated insights and actions are tamper-proof and auditable. Furthermore, the collaborative
environment enabled by blockchain facilitates decentralized threat detection, faster response times, and improved
accuracy, thereby fortifying cybersecurity operations against ever-evolving and sophisticated threats.
Moreover, the potential impact of future research, including the integration of blockchain and decentralized AI,
improved interoperability, decentralized identity management, privacy-preserving solutions, and regulatory and legal
considerations, can significantly advance the field of blockchain-enabled decentralized AI in cybersecurity.
The combination of blockchain technology and decentralized AI has the potential to address many of the challenges
faced in cybersecurity today. As the field continues to evolve, it is crucial that researchers and practitioners work
together to develop new solutions that can provide the highest level of security and protection against cyber threats.
References
[1] Z. Zhang et al., “Artificial intelligence in cyber security: research advances, challenges, and opportunities,” Artif. Intell. Rev., vol. 55,
no. 2, pp. 1029–1053, Feb. 2022, doi: 10.1007/S10462-021-09976-0/METRICS.
[2] J. hua Li, “Cyber security meets artificial intelligence: a survey,” Front. Inf. Technol. Electron. Eng., vol. 19, no. 12, pp. 1462–1474,
Dec. 2018, doi: 10.1631/FITEE.1800573/METRICS.
[3] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research
Directions,” SN Comput. Sci., vol. 2, no. 3, pp. 1–18, May 2021, doi: 10.1007/S42979-021-00557-0/METRICS.
[4] B. Guembe, A. Azeta, S. Misra, V. C. Osamor, L. Fernandez-Sanz, and V. Pospelova, “The Emerging Threat of Ai-driven Cyber
Attacks: A Review,” https://doi.org/10.1080/08839514.2022.2037254, vol. 36, no. 1, 2022, doi: 10.1080/08839514.2022.2037254.
[5] M. Abdullahi et al., “Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic
Literature Review,” Electron. 2022, Vol. 11, Page 198, vol. 11, no. 2, p. 198, Jan. 2022, doi: 10.3390/ELECTRONICS11020198.
[6] P. Domingos, “A few useful things to know about machine learning,” Commun. ACM, vol. 55, no. 10, pp. 78–87, Oct. 2012, doi:
10.1145/2347736.2347755.
[7] L. Zhao et al., “Artificial intelligence analysis in cyber domain: A review,” Int. J. Distrib. Sens. Networks, vol. 18, no. 4, Apr. 2022,
doi: 10.1177/15501329221084882/ASSET/IMAGES/LARGE/10.1177_15501329221084882-FIG3.JPEG.
[8] R. Kaur, D. Gabrijelčič, and T. Klobučar, “Artificial intelligence for cybersecurity: Literature review and future research directions,”
Inf. Fusion, vol. 97, p. 101804, Sep. 2023, doi: 10.1016/J.INFFUS.2023.101804.
[9] B. S. Sagar, S. Niranjan, N. Kashyap, and D. N. Sachin, “Providing cyber security using artificial intelligence - A survey,” Proc. 3rd
Int. Conf. Comput. Methodol. Commun. ICCMC 2019, pp. 717–720, Mar. 2019, doi: 10.1109/ICCMC.2019.8819719.
[10] Y. Badr, “On the Integration of Artificial Intelligence and Blockchains 3.0: Prospects and Challenges,” pp. 120–120, May 2021, doi:

of
10.1109/ICSA-C52384.2021.00031.
[11] M. Liu, W. Yeoh, F. Jiang, and K. K. R. Choo, “Blockchain for Cybersecurity: Systematic Literature Review and Classification,”
https://doi.org/10.1080/08874417.2021.1995914, vol. 62, no. 6, pp. 1182–1198, 2021, doi: 10.1080/08874417.2021.1995914.

ro
[12] A. Deshmukh, N. Sreenath, A. K. Tyagi, and U. V. E. Abhichandan, “Blockchain Enabled Cyber Security: A Comprehensive Survey,”
2022 Int. Conf. Comput. Commun. Informatics, ICCCI 2022, 2022, doi: 10.1109/ICCCI54379.2022.9740843.
[13] J. Angelis and E. Ribeiro da Silva, “Blockchain adoption: A value driver perspective,” Bus. Horiz., vol. 62, no. 3, pp. 307–314, May

-p
2019, doi: 10.1016/J.BUSHOR.2018.12.001.
[14] M. Swan, Blockchain: Blueprint for a New Economy, 1st ed. O’Reilly Media, 2015.
[15] K. Y. Yap, H. H. Chin, and J. J. Klemeš, “Blockchain technology for distributed generation: A review of current development,
re
challenges and future prospect,” Renew. Sustain. Energy Rev., vol. 175, p. 113170, Apr. 2023, doi: 10.1016/J.RSER.2023.113170.
[16] Y. Maleh, S. Lakkineni, L. Tawalbeh, and A. A. AbdEl-Latif, “Blockchain for Cyber-Physical Systems: Challenges and Applications,”
Internet of Things, pp. 11–59, 2022, doi: 10.1007/978-3-030-93646-4_2/COVER.
lP

[17] A. Ekramifard, H. Amintoosi, A. H. Seno, A. Dehghantanha, and R. M. Parizi, “A systematic literature review of integration of
blockchain and artificial intelligence,” Adv. Inf. Secur., vol. 79, pp. 147–160, 2020, doi: 10.1007/978-3-030-38181-3_8/FIGURES/3.
[18] V. Buterin, J. Illum, M. Nadler, F. Schär, and A. Soleimani, “Blockchain Privacy and Regulatory Compliance: Towards a Practical
Equilibrium,” Blockchain Res. Appl., p. 100176, Dec. 2023, doi: 10.1016/J.BCRA.2023.100176.
na

[19] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system.,” Decentralized Bus. Rev., 2008.
[20] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and G. Das, “Everything You Wanted to Know about the Blockchain: Its Promise,
Components, Processes, and Problems,” IEEE Consum. Electron. Mag., vol. 7, no. 4, pp. 6–14, Jul. 2018, doi:
10.1109/MCE.2018.2816299.
ur

[21] W. Li, M. He, and S. Haiquan, “An Overview of Blockchain Technology: Applications, Challenges and Future Trends,” ICEIEC 2021 -
Proc. 2021 IEEE 11th Int. Conf. Electron. Inf. Emerg. Commun., pp. 31–39, Jun. 2021, doi: 10.1109/ICEIEC51955.2021.9463842.
[22] W. Cai, Z. Wang, J. B. Ernst, Z. Hong, C. Feng, and V. C. M. Leung, “Decentralized Applications: The Blockchain-Empowered
Jo

Software System,” IEEE Access, vol. 6, pp. 53019–53033, Sep. 2018, doi: 10.1109/ACCESS.2018.2870644.
[23] Y. Chen and C. Bellavitis, “Decentralized Finance: Blockchain Technology and the Quest for an Open Financial System,” SSRN
Electron. J., Jul. 2019, doi: 10.2139/SSRN.3418557.
[24] A. Aderibole et al., “Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model,” IEEE Access, vol. 8, pp.
43177–43190, 2020, doi: 10.1109/ACCESS.2020.2977149.
[25] A. P. Balcerzak, E. Nica, E. Rogalska, M. Poliak, T. Klieštik, and O.-M. Sabie, “Blockchain Technology and Smart Contracts in
Decentralized Governance Systems,” Adm. Sci. 2022, Vol. 12, Page 96, vol. 12, no. 3, p. 96, Aug. 2022, doi:
10.3390/ADMSCI12030096.
[26] H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain Res. Appl., vol. 3, no. 2, p. 100067, Jun. 2022,
doi: 10.1016/J.BCRA.2022.100067.
[27] O. Popoola, M. Rodrigues, J. Marchang, A. Shenfield, A. Ikpehia, and J. Popoola, “A critical literature review of security and privacy
in smart home healthcare schemes adopting IoT & blockchain: Problems, Challenges and Solutions,” Blockchain Res. Appl., p. 100178,
Dec. 2023, doi: 10.1016/J.BCRA.2023.100178.
[28] K. Biswas and V. Muthukkumarasamy, “Securing smart cities using blockchain technology,” Proc. - 18th IEEE Int. Conf. High
Perform. Comput. Commun. 14th IEEE Int. Conf. Smart City 2nd IEEE Int. Conf. Data Sci. Syst. HPCC/SmartCity/DSS 2016, pp.
1392–1393, Jan. 2017, doi: 10.1109/HPCC-SMARTCITY-DSS.2016.0198.
[29] S. M. Idrees, M. Nowostawski, R. Jameel, and A. K. Mourya, “Security Aspects of Blockchain Technology Intended for Industrial
Applications,” Electron. 2021, Vol. 10, Page 951, vol. 10, no. 8, p. 951, Apr. 2021, doi: 10.3390/ELECTRONICS10080951.
[30] A. Ghosh, S. Gupta, A. Dua, and N. Kumar, “Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future
prospects,” J. Netw. Comput. Appl., vol. 163, p. 102635, Aug. 2020, doi: 10.1016/J.JNCA.2020.102635.
[31] M. AlShamsi, S. A. Salloum, M. Alshurideh, and S. Abdallah, “Artificial intelligence and blockchain for transparency in governance,”
Stud. Comput. Intell., vol. 912, pp. 219–230, 2021, doi: 10.1007/978-3-030-51920-9_11/COVER.
[32] M. M. Ibrahimy, A. Norta, and P. Normak, “Blockchain-Based Governance Models Supporting Corruption-Transparency: A
Systematic Literature Review,” Blockchain Res. Appl., p. 100186, Dec. 2023, doi: 10.1016/J.BCRA.2023.100186.
[33] J. Sedlmeir, J. Lautenschlager, G. Fridgen, and N. Urbach, “The transparency challenge of blockchain in organizations,” Electron.
Mark., vol. 32, no. 3, pp. 1779–1794, Sep. 2022, doi: 10.1007/S12525-022-00536-0/FIGURES/2.
[34] C. Bai and J. Sarkis, “A supply chain transparency and sustainability technology appraisal model for blockchain technology,”
https://doi.org/10.1080/00207543.2019.1708989, vol. 58, no. 7, pp. 2142–2162, Apr. 2020, doi: 10.1080/00207543.2019.1708989.
[35] V. Singh and S. K. Sharma, “Application of blockchain technology in shaping the future of food industry based on transparency and
consumer trust,” J. Food Sci. Technol., vol. 60, no. 4, pp. 1237–1254, Jan. 2022, doi: 10.1007/S13197-022-05360-0/METRICS.
[36] S. F. Papa, “Use of Blockchain Technology in Agribusiness: Transparency and Monitoring in Agricultural Trade,” pp. 38–40, Jun.
2017, doi: 10.2991/MSMI-17.2017.9.
[37] D. Ahmad, N. Lutfiani, A. D. A. R. Ahmad, U. Rahardja, and Q. Aini, “Blockchain Technology Immutability Framework Design in E-
Government,” J. Adm. Publik (Public Adm. Journal) , vol. 11, no. 1, pp. 32–41, Jun. 2021, doi: 10.31289/jap.v11i1.4310.
[38] S. Rashidibajgan and T. Hupperich, “Utilizing Blockchains in Opportunistic Networks for Integrity and Confidentiality,” Blockchain
Res. Appl., p. 100167, Nov. 2023, doi: 10.1016/J.BCRA.2023.100167.
[39] N. Emmadi and H. Narumanchi, “Reinforcing immutability of permissioned blockchains with Keyless Signatures’ Infrastructure,”
ACM Int. Conf. Proceeding Ser., Jan. 2017, doi: 10.1145/3007748.3018280.
[40] F. Hofmann, S. Wurster, E. Ron, and M. Böhmecke-Schwafert, “The immutability concept of blockchains and benefits of early
standardization,” Proc. 2017 ITU Kaleidosc. Acad. Conf. Challenges a Data-Driven Soc. ITU K 2017, vol. 2018-January, pp. 1–8, Jun.
2017, doi: 10.23919/ITU-WT.2017.8247004.
[41] H. Stančić and V. Bralić, “Digital Archives Relying on Blockchain: Overcoming the Limitations of Data Immutability,” Comput. 2021,
Vol. 10, Page 91, vol. 10, no. 8, p. 91, Jul. 2021, doi: 10.3390/COMPUTERS10080091.
[42] C. Zhang, C. Wu, and X. Wang, “Overview of blockchain consensus mechanism,” ACM Int. Conf. Proceeding Ser., pp. 7–12, May
2020, doi: 10.1145/3404512.3404522.
[43] M. Hu, T. Shen, J. Men, Z. Yu, and Y. Liu, “CRSM: An Effective Blockchain Consensus Resource Slicing Model for Real-Time
Distributed Energy Trading,” IEEE Access, vol. 8, pp. 206876–206887, 2020, doi: 10.1109/ACCESS.2020.3037694.
[44] S. Zhang and J. H. Lee, “Analysis of the main consensus protocols of blockchain,” ICT Express, vol. 6, no. 2, pp. 93–97, Jun. 2020,

of
doi: 10.1016/J.ICTE.2019.08.001.
[45] S. Maitra, V. P. Yanambaka, A. Abdelgawad, D. Puthal, and K. Yelamarthi, “Proof-of-Authentication Consensus Algorithm:

ro
Blockchain-based IoT Implementation,” IEEE World Forum Internet Things, WF-IoT 2020 - Symp. Proc., Jun. 2020, doi: 10.1109/WF-
IOT48130.2020.9221187.
[46] S. Mahmood, M. Chadhar, and S. Firmin, “Cybersecurity Challenges in Blockchain Technology: A Scoping Review,” Hum. Behav.

-p
Emerg. Technol., vol. 2022, pp. 1–11, Apr. 2022, doi: 10.1155/2022/7384000.
[47] D. Yang, C. Long, H. Xu, and S. Peng, “A Review on Scalability of Blockchain,” ACM Int. Conf. Proceeding Ser., pp. 1–6, Mar. 2020,
doi: 10.1145/3390566.3391665.
re
[48] P. Yeoh, “Regulatory issues in blockchain technology,” J. Financ. Regul. Compliance, vol. 25, no. 2, pp. 196–208, 2017, doi:
10.1108/JFRC-08-2016-0068/FULL/PDF.
[49] E. Zamani, Y. He, and M. Phillips, “On the Security Risks of the Blockchain,” https://doi.org/10.1080/08874417.2018.1538709, vol.
lP

60, no. 6, pp. 495–506, Nov. 2018, doi: 10.1080/08874417.2018.1538709.


[50] H. Chen, X. Luo, L. Shi, Y. Cao, and Y. Zhang, “Security challenges and defense approaches for blockchain-based services from a full-
stack architecture perspective,” Blockchain Res. Appl., vol. 4, no. 3, p. 100135, Sep. 2023, doi: 10.1016/J.BCRA.2023.100135.
[51] R. Belchior, A. Vasconcelos, S. Guerreiro, and M. Correia, “A Survey on Blockchain Interoperability: Past, Present, and Future
na

Trends,” ACM Comput. Surv., vol. 54, no. 8, Oct. 2021, doi: 10.1145/3471140.
[52] A. Lakhan, M. A. Mohammed, J. Nedoma, R. Martinek, P. Tiwari, and N. Kumar, “Blockchain-Enabled Cybersecurity Efficient IIOHT
Cyber-Physical System for Medical Applications,” IEEE Trans. Netw. Sci. Eng., 2022, doi: 10.1109/TNSE.2022.3213651.
[53] O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT Express, vol. 7, no. 1, pp. 76–80, Mar.
ur

2021, doi: 10.1016/J.ICTE.2019.08.002.


[54] S. S. Panda, D. Jena, B. K. Mohanta, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Authentication and Key Management
in Distributed IoT Using Blockchain Technology,” IEEE Internet Things J., vol. 8, no. 16, pp. 12947–12954, Aug. 2021, doi:
Jo

10.1109/JIOT.2021.3063806.
[55] H. Zhao, P. Bai, Y. Peng, and R. Xu, “Efficient key management scheme for health blockchain,” CAAI Trans. Intell. Technol., vol. 3,
no. 2, pp. 114–118, Jun. 2018, doi: 10.1049/TRIT.2018.0014.
[56] Z. Ma, J. Zhang, Y. Guo, Y. Liu, X. Liu, and W. He, “An Efficient Decentralized Key Management Mechanism for VANET with
Blockchain,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 5836–5849, Jun. 2020, doi: 10.1109/TVT.2020.2972923.
[57] L. Stockburger, G. Kokosioulis, A. Mukkamala, R. R. Mukkamala, and M. Avital, “Blockchain-enabled decentralized identity
management: The case of self-sovereign identity in public transportation,” Blockchain Res. Appl., vol. 2, no. 2, p. 100014, Jun. 2021,
doi: 10.1016/J.BCRA.2021.100014.
[58] Y. Liu, D. He, M. S. Obaidat, N. Kumar, M. K. Khan, and K. K. Raymond Choo, “Blockchain-based identity management systems: A
review,” J. Netw. Comput. Appl., vol. 166, p. 102731, Sep. 2020, doi: 10.1016/J.JNCA.2020.102731.
[59] I. T. Javed, F. Alharbi, B. Bellaj, T. Margaria, N. Crespi, and K. N. Qureshi, “Health-ID: A Blockchain-Based Decentralized Identity
Management for Remote Healthcare,” Healthc. 2021, Vol. 9, Page 712, vol. 9, no. 6, p. 712, Jun. 2021, doi:
10.3390/HEALTHCARE9060712.
[60] S. El Haddouti and M. D. Ech-Cherif El Kettani, “Analysis of identity management systems using blockchain technology,” Proc. -
2019 Int. Conf. Adv. Commun. Technol. Networking, CommNet 2019, Apr. 2019, doi: 10.1109/COMMNET.2019.8742375.
[61] S. A. George, A. Jaekel, and I. Saini, “Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain,”
Proc. - IEEE Symp. Comput. Commun., vol. 2020-July, Jul. 2020, doi: 10.1109/ISCC50000.2020.9219736.
[62] M. Naz et al., “A Secure Data Sharing Platform Using Blockchain and Interplanetary File System,” Sustain. 2019, Vol. 11, Page 7054,
vol. 11, no. 24, p. 7054, Dec. 2019, doi: 10.3390/SU11247054.
[63] C. Singh, D. Chauhan, S. A. Deshmukh, S. S. Vishnu, and R. Walia, “Medi-Block record: Secure data sharing using block chain
technology,” Informatics Med. Unlocked, vol. 24, p. 100624, Jan. 2021, doi: 10.1016/J.IMU.2021.100624.
[64] M. Cash and M. Bassiouni, “Two-tier permission-ed and permission-less blockchain for secure data sharing,” Proc. - 3rd IEEE Int.
Conf. Smart Cloud, SmartCloud 2018, pp. 138–144, Oct. 2018, doi: 10.1109/SMARTCLOUD.2018.00031.
[65] M. M. Queiroz, R. Telles, and S. H. Bonilla, “Blockchain and supply chain management integration: a systematic review of the
literature,” Supply Chain Manag., vol. 25, no. 2, pp. 241–254, Feb. 2020, doi: 10.1108/SCM-03-2018-0143/FULL/PDF.
[66] C. Allenbrand, “Smart contract-enabled consortium blockchains for the control of supply chain information distortion,” Blockchain
Res. Appl., vol. 4, no. 3, p. 100134, Sep. 2023, doi: 10.1016/J.BCRA.2023.100134.
[67] A. Di Vaio and L. Varriale, “Blockchain technology in supply chain management for sustainable performance: Evidence from the
airport industry,” Int. J. Inf. Manage., vol. 52, p. 102014, Jun. 2020, doi: 10.1016/J.IJINFOMGT.2019.09.010.
[68] A. Rejeb, J. G. Keogh, and H. Treiblmaier, “Leveraging the Internet of Things and Blockchain Technology in Supply Chain
Management,” Futur. Internet 2019, Vol. 11, Page 161, vol. 11, no. 7, p. 161, Jul. 2019, doi: 10.3390/FI11070161.
[69] K. Almutairi et al., “Blockchain Technology Application Challenges in Renewable Energy Supply Chain Management,” Environ. Sci.
Pollut. Res., pp. 1–18, Jan. 2022, doi: 10.1007/S11356-021-18311-7/METRICS.
[70] R. Saxena and E. Gayathri, “Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution,” Mater.
Today Proc., vol. 51, pp. 682–689, Jan. 2022, doi: 10.1016/J.MATPR.2021.06.204.
[71] R. Graf and R. King, “Neural network and blockchain based technique for cyber threat intelligence and situational awareness,” Int.
Conf. Cyber Conflict, CYCON, vol. 2018-May, pp. 409–425, Jul. 2018, doi: 10.23919/CYCON.2018.8405028.
[72] Y. Wu, Y. Qiao, Y. Ye, and B. Lee, “Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted
Computing,” 2019 6th Int. Conf. Internet Things Syst. Manag. Secur. IOTSMS 2019, pp. 474–481, Oct. 2019, doi:
10.1109/IOTSMS48152.2019.8939192.
[73] D. Homan, I. Shiel, and C. Thorpe, “A new network model for cyber threat intelligence sharing using blockchain technology,” 2019
10th IFIP Int. Conf. New Technol. Mobil. Secur. NTMS 2019 - Proc. Work., Jun. 2019, doi: 10.1109/NTMS.2019.8763853.
[74] H. Min, “Blockchain technology for enhancing supply chain resilience,” Bus. Horiz., vol. 62, no. 1, pp. 35–45, Jan. 2019, doi:
10.1016/J.BUSHOR.2018.08.012.
[75] Y. Kazancoglu, M. Ozbiltekin-Pala, M. D. Sezer, S. Luthra, and A. Kumar, “Resilient reverse logistics with blockchain technology in
sustainable food supply chain management during COVID-19,” Bus. Strateg. Environ., 2022, doi: 10.1002/BSE.3251.
[76] R. Dubey, A. Gunasekaran, D. J. Bryde, Y. K. Dwivedi, and T. Papadopoulos, “Blockchain technology for enhancing swift-trust,
collaboration and resilience within a humanitarian supply chain setting,” https://doi.org/10.1080/00207543.2020.1722860, vol. 58, no.

of
11, pp. 3381–3398, Jun. 2020, doi: 10.1080/00207543.2020.1722860.
[77] B. S. Rawat, D. Gangodkar, V. Talukdar, K. Saxena, C. Kaur, and S. P. Singh, “The Empirical Analysis of Artificial Intelligence

ro
Approaches for Enhancing the Cyber Security for Better Quality,” 2022 5th Int. Conf. Contemp. Comput. Informatics, pp. 247–250,
Dec. 2022, doi: 10.1109/IC3I56241.2022.10072877.
[78] R. Trifonov, S. Manolov, G. Tsochev, G. Pavlova, and K. Raynova, “Analytical Choice of an Effective Cyber Security Structure with

-p
Artificial Intelligence in Industrial Control Systems,” 2022 10th Int. Sci. Conf. Comput. Sci. COMSCI 2022 - Proc., 2022, doi:
10.1109/COMSCI55378.2022.9912608.
[79] A. H. Ameen, M. A. Mohammed, and A. N. Rashid, “Dimensions of artificial intelligence techniques, blockchain, and cyber security in
re
the Internet of medical things: Opportunities, challenges, and future directions,” J. Intell. Syst., vol. 32, no. 1, Jan. 2023, doi:
10.1515/JISYS-2022-0267/XML.
[80] H. Karimipour and F. Derakhshan, “Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and
lP

Challenges,” AI-Enabled Threat Detect. Secur. Anal. Ind. IoT, pp. 1–6, 2021, doi: 10.1007/978-3-030-76613-9_1.
[81] V. Wylde et al., “Cybersecurity, Data Privacy and Blockchain: A Review,” SN Comput. Sci. 2022 32, vol. 3, no. 2, pp. 1–12, Jan. 2022,
doi: 10.1007/S42979-022-01020-4.
[82] C. Cicconetti, M. Conti, and A. Passarella, “A Decentralized Framework for Serverless Edge Computing in the Internet of Things,”
na

IEEE Trans. Netw. Serv. Manag., vol. 18, no. 2, pp. 2166–2180, Jun. 2021, doi: 10.1109/TNSM.2020.3023305.
[83] X. Liang, C. Konstantinou, S. Shetty, E. Bandara, and R. Sun, “Decentralizing Cyber Physical Systems for Resilience: An Innovative
Case Study from A Cybersecurity Perspective,” Comput. Secur., vol. 124, p. 102953, Jan. 2023, doi: 10.1016/J.COSE.2022.102953.
[84] P. Trakadas et al., “An Artificial Intelligence-Based Collaboration Approach in Industrial IoT Manufacturing: Key Concepts,
ur

Architectural Extensions and Potential Applications,” Sensors 2020, Vol. 20, Page 5480, vol. 20, no. 19, p. 5480, Sep. 2020, doi:
10.3390/S20195480.
[85] A. Sundararajan, T. Khan, A. Moghadasi, and A. I. Sarwat, “Survey on synchrophasor data quality and cybersecurity challenges, and
Jo

evaluation of their interdependencies,” J. Mod. Power Syst. Clean Energy, vol. 7, no. 3, pp. 449–467, May 2019, doi: 10.1007/S40565-
018-0473-6.
[86] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha, “Blockchain for AI: Review and open research challenges,” IEEE
Access, vol. 7, pp. 10127–10149, 2019, doi: 10.1109/ACCESS.2018.2890507.
[87] H. Yuan and S. Li, “Cyber Security Risks of Net Zero Technologies,” 5th IEEE Conf. Dependable Secur. Comput. DSC 2022 SECSOC
2022 Work. PASS4IoT 2022 Work. SICSA Int. Pap. Compet. Cybersecurity, 2022, doi: 10.1109/DSC54232.2022.9888883.
[88] P. Asuquo, C. Ogah, W. Hathal, and S. Bao, “Blockchain Meets Cybersecurity: Security, Privacy, Challenges, and Opportunity,” Stud.
Big Data, vol. 60, pp. 115–127, 2020, doi: 10.1007/978-981-13-8775-3_5/COVER.
[89] L. Bhatia and S. Samet, “A decentralized data evaluation framework in federated learning,” Blockchain Res. Appl., vol. 4, no. 4, p.
100152, Dec. 2023, doi: 10.1016/J.BCRA.2023.100152.
[90] M. Alazab, S. P. Rm, M. Parimala, P. K. R. Maddikunta, T. R. Gadekallu, and Q. V. Pham, “Federated Learning for Cybersecurity:
Concepts, Challenges, and Future Directions,” IEEE Trans. Ind. Informatics, vol. 18, no. 5, pp. 3501–3509, May 2022, doi:
10.1109/TII.2021.3119038.
[91] K. Li, H. Zhou, Z. Tu, F. Liu, and H. Zhang, “Blockchain Empowered Federated Learning for Distributed Network Security Behaviour
Knowledge Base in 6G,” Secur. Commun. Networks, vol. 2022, 2022, doi: 10.1155/2022/4233238.
[92] B. Ghimire and D. B. Rawat, “Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for
Internet of Things,” IEEE Internet Things J., vol. 9, no. 11, pp. 8229–8249, Jun. 2022, doi: 10.1109/JIOT.2022.3150363.
[93] V. Mothukuri, R. M. Parizi, S. Pouriyeh, A. Dehghantanha, and K. K. R. Choo, “FabricFL: Blockchain-in-the-Loop Federated Learning
for Trusted Decentralized Systems,” IEEE Syst. J., vol. 16, no. 3, pp. 3711–3722, Sep. 2022, doi: 10.1109/JSYST.2021.3124513.
[94] M. A. Mohammed et al., “Energy-efficient distributed federated learning offloading and scheduling healthcare system in blockchain
based networks,” Internet of Things, vol. 22, p. 100815, Jul. 2023, doi: 10.1016/J.IOT.2023.100815.
[95] F. Muheidat and L. Tawalbeh, “Artificial Intelligence and Blockchain for Cybersecurity Applications,” pp. 3–29, 2021, doi:
10.1007/978-3-030-74575-2_1.
[96] A. Lakhan, M. A. Mohammed, J. Nedoma, R. Martinek, P. Tiwari, and N. Kumar, “DRLBTS: deep reinforcement learning-aware
blockchain-based healthcare system,” Sci. Reports 2023 131, vol. 13, no. 1, pp. 1–15, Mar. 2023, doi: 10.1038/s41598-023-29170-2.
[97] S. D. Roy, S. Debbarma, and A. Iqbal, “A Decentralized Intrusion Detection System for Security of Generation Control,” IEEE Internet
Things J., 2022, doi: 10.1109/JIOT.2022.3163502.
[98] A. A. Khan, M. M. Khan, K. M. Khan, J. Arshad, and F. Ahmad, “A blockchain-based decentralized machine learning framework for
collaborative intrusion detection within UAVs,” Comput. Networks, vol. 196, p. 108217, Sep. 2021, doi:
10.1016/J.COMNET.2021.108217.
[99] M. Abdel-Basset, N. Moustafa, H. Hawash, I. Razzak, K. M. Sallam, and O. M. Elkomy, “Federated Intrusion Detection in Blockchain-
Based Smart Transportation Systems,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 3, pp. 2523–2537, Mar. 2022, doi:
10.1109/TITS.2021.3119968.
[100] R. Amirta, M. S. Deepika, and R. G. Franklin, “Decentralized access control with anonymous authentication of data stored using
blockchain,” Res. J. Eng. Technol., vol. 11, no. 1, p. 10, 2020, doi: 10.5958/2321-581X.2020.00002.1.
[101] D. A. Secured et al., “A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning
for Sensor Access Control Systems in Smart Manufacturing,” Appl. Sci. 2022, Vol. 12, Page 4641, vol. 12, no. 9, p. 4641, May 2022,
doi: 10.3390/APP12094641.
[102] Y. Ding and H. Sato, “Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart
Health,” Proc. - 2020 7th IEEE Int. Conf. Cyber Secur. Cloud Comput. 2020 6th IEEE Int. Conf. Edge Comput. Scalable Cloud,
CSCloud-EdgeCom 2020, pp. 29–35, Aug. 2020, doi: 10.1109/CSCLOUD-EDGECOM49738.2020.00015.
[103] M. Javaid, A. Haleem, R. Pratap Singh, S. Khan, and R. Suman, “Blockchain technology applications for Industry 4.0: A literature-
based review,” Blockchain Res. Appl., vol. 2, no. 4, p. 100027, Dec. 2021, doi: 10.1016/J.BCRA.2021.100027.
[104] S. K. Singh, S. Rathore, and J. H. Park, “BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial
Intelligence,” Futur. Gener. Comput. Syst., vol. 110, pp. 721–743, Sep. 2020, doi: 10.1016/J.FUTURE.2019.09.002.
[105] H. ElHusseini, C. Assi, B. Moussa, R. Attallah, and A. Ghrayeb, “Blockchain, AI and Smart Grids: The Three Musketeers to a
Decentralized EV Charging Infrastructure,” IEEE Internet Things Mag., vol. 3, no. 2, pp. 24–29, Jun. 2020, doi:
10.1109/IOTM.0001.1900081.

of
[106] S. A. Wright, “Blockchain-Enabled Decentralized Network Management in 6G,” pp. 45–69, 2022, doi: 10.1007/978-981-19-2868-0_3.
[107] X. Lin, R. Xu, Y. Chen, and J. Koji Lum, “A Blockchain-Enabled Decentralized Time Banking for a New Social Value System,” 2019

ro
IEEE Conf. Commun. Netw. Secur. CNS 2019, Jun. 2019, doi: 10.1109/CNS.2019.8802734.
[108] S. Ismail, M. Nouman, D. W. Dawoud, and H. Reza, “Towards a lightweight security framework using blockchain and machine
learning,” Blockchain Res. Appl., p. 100174, Nov. 2023, doi: 10.1016/J.BCRA.2023.100174.

-p
[109] K. Kaushik, “Blockchain Enabled Artificial Intelligence for Cybersecurity Systems,” Stud. Big Data, vol. 111, pp. 165–179, 2022, doi:
10.1007/978-3-031-05752-6_11/COVER.
[110] E. Rabieinejad, A. Yazdinejad, A. Dehghantanha, R. M. Parizi, and G. Srivastava, “Secure AI and Blockchain-enabled Framework in
re
Smart Vehicular Networks,” 2021 IEEE Globecom Work. GC Wkshps 2021 - Proc., 2021, doi:
10.1109/GCWKSHPS52748.2021.9682140.
[111] A. K. Das, B. Bera, S. Saha, N. Kumar, I. You, and H. C. Chao, “AI-Envisioned Blockchain-Enabled Signature-Based Key
lP

Management Scheme for Industrial Cyber-Physical Systems,” IEEE Internet Things J., vol. 9, no. 9, pp. 6374–6388, May 2022, doi:
10.1109/JIOT.2021.3109314.
[112] F. S. A. Pour and P. N.-M. Gheorghe, “A Blockchain-Enabled Model to Enhance Disaster Aids Network Resilience,” Rom. Cyber
Secur. J., vol. 3, no. 2, Jan. 2021, Accessed: Mar. 30, 2023. [Online]. Available: https://digitalcommons.odu.edu/emse_fac_pubs/87.
na

[113] M. Mylrea and S. N. G. Gourisetti, “Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security,”
Proc. - 2017 Resil. Week, RWS 2017, pp. 18–23, Oct. 2017, doi: 10.1109/RWEEK.2017.8088642.
[114] A. Hajian and H.-C. Chang, “A Blockchain-Based Smart Grid to Build Resilience Through Zero-Trust Cybersecurity,” Handb. Smart
Energy Syst., pp. 1–19, 2022, doi: 10.1007/978-3-030-72322-4_161-1.
ur

[115] F. S. A. Pour, “Application of a Blockchain Enabled Model in Disaster Aids Supply Network Resilience - ProQuest,” Old Dominion
University, 2021.
[116] Z. Mahmood and V. Jusas, “Blockchain-Enabled: Multi-Layered Security Federated Learning Platform for Preserving Data Privacy,”
Jo

Electron. 2022, Vol. 11, Page 1624, vol. 11, no. 10, p. 1624, May 2022, doi: 10.3390/ELECTRONICS11101624.
[117] Y. Qu et al., “Decentralized privacy using blockchain-enabled federated learning in fog computing,” IEEE Internet Things J., vol. 7,
no. 6, pp. 5171–5183, Jun. 2020, doi: 10.1109/JIOT.2020.2977383.
[118] A. Kanak, N. Ugur, and S. Ergun, “A visionary model on blockchain-based accountability for secure and collaborative digital twin
environments,” Conf. Proc. - IEEE Int. Conf. Syst. Man Cybern., vol. 2019-October, pp. 3512–3517, Oct. 2019, doi:
10.1109/SMC.2019.8914304.
[119] Y. Song, Y. Fu, F. R. Yu, and L. Zhou, “Blockchain-Enabled Internet of Vehicles With Cooperative Positioning: A Deep Neural
Network Approach,” IEEE Internet Things J., vol. 7, no. 4, pp. 3485–3498, Apr. 2020, doi: 10.1109/JIOT.2020.2972337.
[120] A. Kumari, R. Gupta, S. Tanwar, and N. Kumar, “A taxonomy of blockchain-enabled softwarization for secure UAV network,”
Comput. Commun., vol. 161, pp. 304–323, Sep. 2020, doi: 10.1016/J.COMCOM.2020.07.042.
[121] R. Shinde, S. Patil, K. Kotecha, and K. Ruikar, “Blockchain for Securing AI Applications and Open Innovations,” J. Open Innov.
Technol. Mark. Complex., vol. 7, no. 3, p. 189, Sep. 2021, doi: 10.3390/JOITMC7030189.
[122] “PolySwarm - Crowdsourced threat detection.” https://polyswarm.io/ (accessed Mar. 18, 2023).
[123] I. Reshi, M. Khan, S. Shafi, S. Sholla, A. Assad, and H. Shafi, “AI-Powered Smart Contracts: The Dawn of Web 4. O,” TechRxiv, Mar.
2023, doi: 10.36227/TECHRXIV.22189438.V1.
[124] C. B. Goertzel, S. Giacomelli, D. Hanson and and M. A. Pennachin, “SingularityNET: A decentralized, open market and inter-network
for AIs,” Thoughts, Theor. Stud. Artif. Intell. Res., 2017.
[125] S. K. Rana et al., “Blockchain Technology and Artificial Intelligence Based Decentralized Access Control Model to Enable Secure
Interoperability for Healthcare,” Sustain. 2022, Vol. 14, Page 9471, vol. 14, no. 15, p. 9471, Aug. 2022, doi: 10.3390/SU14159471.
[126] “Home | IOTA.” https://www.iota.org/ (accessed Apr. 01, 2023).
[127] “Home - Sovrin.” https://sovrin.org/ (accessed Apr. 01, 2023).
[128] N. Naik and P. Jenkins, “Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on
Distributed Ledger Technology,” ISSE 2021 - 7th IEEE Int. Symp. Syst. Eng. Proc., Sep. 2021, doi: 10.1109/ISSE51541.2021.9582551.
Declaration of interests

☒ The authors declare that they have no known competing financial interests or personal relationships
that could have appeared to influence the work reported in this paper.

☐ The authors declare the following financial interests/personal relationships which may be considered
as potential competing interests:

of
ro
-p
re
lP
na
ur
Jo

You might also like