ARCHIVES

Review Article

Blockchain enabled Cybersecurity: Concepts, Applications and Future Directions

Priyanka Jaiswal1 Surjeet Kumar Yadav2
1 2 Department of Computer Application, Veer Bahadur Singh Purvanchal University, Jaunpur, Uttar Pradesh, India.

Published Online: September-December 2025

Pages: 249-252

References

[1]. European Union Agency for Cybersecurity (ENISA), ENISA Threat Landscape for Ransomware Attacks, Jul. 2022.
[2]. M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Future Generation Computer Systems, vol. 78, pp. 544–546, 2018.
[3]. B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, Apr. 2017.
[4]. M. Mettler, “Blockchain technology in healthcare: The revolution starts here,” in Proc. 2016 IEEE 18th Int. Conf. on e-Health Networking, Applications and Services (HealthCom), Munich, Germany, Sep. 2016, pp. 1–3.
[5]. K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.
[6]. E. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” in 2015 IEEE Security and Privacy Workshops (SPW), San Jose, CA, USA, May 2015, pp. 180–184.
[7]. S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008. (Foundational technical report; universally cited in SCI/IEEE blockchain research.)
[8]. G. Wood, Ethereum: A Secure Decentralised Generalised Transaction Ledger, Ethereum Yellow Paper, 2014.
[9]. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview of blockchain technology: Architecture, consensus, and future trends,” Proc. 2017 IEEE Int. Congr. Big Data, pp. 557–564, 2017.
[10]. S. King and S. Nadal, “PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake,” 2012.
[11]. M. Castro and B. Liskov, “Practical Byzantine Fault Tolerance,” OSDI ’99: USENIX Symposium on Operating Systems Design and Implementation, pp. 173–186, 1999.
[12]. I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, and W. Ni, “Blockchain for IoT Security and Privacy: The Case Study of a Smart Home,” IEEE Access, vol. 7, pp. 164–174, 2019.
[13]. M. Ali, J. Nelson, R. Shea, and M. J. Freedman, “Blockstack: A Global Naming and Storage System Secured by Blockchains,” USENIX ATC, 2016.
[14]. S. Saberi, M. Kouhizadeh, J. Sarkis, and L. Shen, “Blockchain Technology and Its Relationships to Sustainable Supply Chain Management,” International Journal of Production Research, vol. 57, no. 7, pp. 2117–2135, 2019.
[15]. T. M. Fernández-Caramés and P. Fraga-Lamas, “A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories,” IEEE Access, vol. 7, pp. 45201–45218, 2019.
[16]. A. Belchior, A. Vasconcelos, S. Guerreiro, and M. Correia, “A Survey on Blockchain Interoperability: Past, Present, and Future Trends,” ACM Computing Surveys, vol. 54, no. 8, pp. 1–41, 2021.
[17]. J. Wu, J. Liu, Y. Zhang, and K. K. R. Choo, “Fraud Detection in Blockchain Networks: A Graph-Based Machine Learning Approach,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1139–1151, 2021.
[18]. D. Aggarwal, G. Brennen, T. Lee, M. Santha, and M. Tomamichel, “Quantum Attacks on Bitcoin, and How to Protect Against Them,” Ledger, vol. 3, pp. 1–21, 2018.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250403039

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.