Strengthening Industrial IoT Security: An Analytical Review of Cryptographic Techniques and Blockchain-Based Solutions

Authors

  • Mochammad Fuad Hasan Universitas Komputer Indonesia, Indonesia

Keywords:

Blockchain, Cryptography, Internet of Thing (IoT)

Abstract

The Industrial Internet of Things (IIoT) has revolutionized traditional industrial systems by increasing connectivity, automation, and data-driven decision-making. However, this increased complexity also presents major cybersecurity-related challenges, including the threat of data breaches and operational disruptions. This study aims to provide an analytical review of cryptographic techniques and blockchain-based solutions in strengthening IIoT security. Combining bibliometric analysis and Systematic Literature Review (SLR), analyzing peer-reviewed articles published between 2016 and 2023 were analyzed. The bibliometric analysis revealed significant research growth trends, key contributions from global institutions, and emerging research themes such as lightweight cryptography, blockchain-based authentication, and secure communication models for resource-constrained IIoT devices. Meanwhile, the SLR provides an in-depth synthesis of the technical approaches, benefits, limitations, and open challenges in this field. The results show that the combination of cryptography and blockchain can offer decentralized, tamper-resistant, and efficient security solutions. The study also identified an urgent need for the development of more integrated and energy-efficient security models, as well as the validation of solutions in real industrial environments. The findings are expected to provide valuable guidance for the development of more reliable and secure IIoT systems in the future.

References

[1] Babayiğit, B., & Abubaker, M. (2023). Industrial Internet of Things: A Review of Improvements Over Traditional SCADA Systems for Industrial Automation. IEEE Systems Journal, 18(1), 120–133. https://doi.org/10.1109/jsyst.2023.3270620

[2] Τσίκνας, Κ., Taketzis, D., Demertzis, K., & Skianis, C. (2021). Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures. IoT, 2(1), 163–186. https://doi.org/10.3390/iot2010009

[3] Latif, S., Idrees, Z., Huma, Z. e, & Ahmad, J. (2021). Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions. Transactions on Emerging Telecommunications Technologies, 32(11). https://doi.org/10.1002/ett.4337

[4] Thakor, V. A., Razzaque, M. A., & Khandaker, M. R. A. (2021). Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. IEEE Access, 9, 28177–28193. https://doi.org/10.1109/access.2021.3052867

[5] Kuang, J., Guo, Y., & Li, L. (2023). IIoTBC: A Lightweight Block Cipher for Industrial IoT Security. KSII Transactions on Internet and Information Systems, 17(1). https://doi.org/10.3837/tiis.2023.01.006

[6] Zheng, Y., & Chang, C.-H. (2021). Secure Mutual Authentication and Key-Exchange Protocol between PUF-Embedded IoT Endpoints. 2022 IEEE International Symposium on Circuits and Systems (ISCAS), 1–5. https://doi.org/10.1109/iscas51556.2021.9401135

[7] Li, R., Qin, Y., Wang, C., Li, M., & Chu, X. (2022). A Blockchain-Enabled Framework for Enhancing Scalability and Security in IIoT. IEEE Transactions on Industrial Informatics, 19(6), 7389–7400. https://doi.org/10.1109/tii.2022.3210216

[8] Na, D., & Park, S. (2021). Fusion Chain: A Decentralized Lightweight Blockchain for IoT Security and Privacy. Electronics, 10(4), 391–391. https://doi.org/10.3390/electronics10040391

[9] Shen, M., Liu, H., Zhu, L., Xu, K., Yu, H., Du, X., & Guizani, M. (2020). Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT. IEEE Journal on Selected Areas in Communications, 38(5), 942–954. https://doi.org/10.1109/jsac.2020.2980916

[10] Jayalaxmi, P. L. S., Saha, R., Kumar, G., Kumar, N., & Kim, T. (2021). A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access, 9, 25344–25359. https://doi.org/10.1109/access.2021.3057766

[11] Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. M. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research, 133, 285–296. https://doi.org/10.1016/j.jbusres.2021.04.070

[12] Zubaydi, H. D., Varga, P., & Molnár, S. (2023). Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review. Sensors, 23(2), 788–788. https://doi.org/10.3390/s23020788

[13] Yu, Y., Li, Y., Tian, J., & Liu, J. (2018). Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. IEEE Wireless Communications, 25(6), 12–18. https://doi.org/10.1109/mwc.2017.1800116

[14] Yang, X., Yang, X., Yi, X., Khalil, I., Zhou, X., He, D., Huang, X., & Nepal‬, ‪Surya. (2021). Blockchain-Based Secure and Lightweight Authentication for Internet of Things. IEEE Internet of Things Journal, 9(5), 3321–3332. https://doi.org/10.1109/jiot.2021.3098007

Downloads

Published

2023-09-29

How to Cite

Strengthening Industrial IoT Security: An Analytical Review of Cryptographic Techniques and Blockchain-Based Solutions. (2023). International Journal of Research and Applied Technology (INJURATECH), 3(2), 399-405. https://ojs.unikom.ac.id/index.php/injuratech/article/view/15942