Abstract
The convergence of Artificial Intelligence and Blockchain is growing very fast in everyday applications and industry. In centralized systems and applications like healthcare, data access and processing in real-time among various information systems is a bottleneck. Blockchain’s decentralized database architecture, secure storage, authentication, and data sharing would offer a solution to this problem. Besides, Artificial Intelligence can live at the top of Blockchain and generate insights from the generated shared data used to make predictions. Blockchain is a high-level cybersecurity technology that forms chains that connect the existing blocks stored in nodes and the new block chronologically by mutual agreements between nodes. Technology convergence accelerates various industries’ growth, such as banking, insurance, cybersecurity, forecasting, medical services, cryptocurrency, etc… The more digital systems are adopted and services provided by these industries, the greater the risk of hacking these systems. Combining blockchain power and artificial intelligence can provide a strong shield against these attacks and security threats. In this chapter, we will study the convergence of AI and Blockchain in cybersecurity. We will expand on their role in securing cyber-physical systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Thames, L., Schaefer, D.: Industry 4.0: an overview of key benefits, technologies, and challenges. In: Cybersecurity for Industry 4.0, pp. 1–33. Springer, Cham (2017)
Zhao, K., Ge, L.: A survey on the Internet of Things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663–667. IEEE, December 2013
Hassani, H., Huang, X., Silva, E.: Big-crypto: big data, blockchain, and cryptocurrency. Big Data Cogn. Comput. 2(4), 34 (2018)
Maxmen, A.: Ai researchers embrace Bitcoin technology to share medical data. Nature 555, 293–294 (2018)
Baynham-Herd, Z.: Enlist blockchain to boost conservation. Nature 548(7669), 523 (2017)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Newton (2015)
Aghiath, C.: How AI and Blockchain will be the Future of Cybersecurity (2020). https://www.intelligenthq.com/how-ai-and-blockchain-will-be-the-future-of-cybersecurity/. Accessed Dec 2020
Sirui, Z.: Economics of Artificial Intelligence (2019). https://equalocean.com/analysis/2019100712033. Accessed Dec 2020
Koch, M.: Artificial intelligence is becoming natural. Cell 173(3), 531–533 (2018)
Nebula AI (NBAI): Decentralized AI blockchain whitepaper. Nebula AI Team, Montreal (2018)
Dinh, T.N., Thai, M.T.: AI and blockchain: a disruptive integration. Computer 51(9), 48–53 (2018)
Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., Wang, F.-Y.: An overview of smart contract: architecture, applications, and future trends. In: Proceedings of the IEEE Intelligent Vehicles Symposium (IV), pp. 108–113, June 2018
Panda, S., Jena, D.: Decentralizing AI using blockchain technology for secure decision making (2021). https://doi.org/10.1007/978-981-15-5243-4_65
Mohanta, B.K., Jena, D., Panda, S.S., Sobhanayak, S.: Blockchain technology: a survey on applications and security privacy challenges. Internet Things 8, 100107 (2019)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009)
Wood, G.: Ethereum: a secure decentralized generalized transaction ledger. Ethereum Project Yellow Paper, vol. 151, pp. 1–32, April 2014
Market capitalization of Bitcoin from October 2013 to 13 December 2020. https://www.statista.com/statistics/377382/bitcoin-market-capitalization/. Accessed Dec 2020
NIST (2020). https://csrc.nist.gov/glossary/term/social_engineering. Accessed Dec 2020
Department of Justice (2019). https://www.justice.gov/opa/pr/russian-national-charged-decade-long-series-hacking-and-bank-fraud-offenses-resulting-tens. Accessed Dec 2020
Al-Rushdan, H., Shurman, M., Alnabelsi, S.H., Althebyan, Q.: Zero-day attack detection and prevention in software-defined networks. In: 2019 International Arab Conference on Information Technology (ACIT), Al Ain, United Arab Emirates, pp. 278–282 (2019). https://doi.org/10.1109/ACIT47987.2019.8991124
Wikipedia (2016 Dyn cyberattack). https://en.wikipedia.org/wiki/2016_Dyn_cyberattack. Accessed Dec 2020
Michel, C.: Study: Hackers Attack Every 39 Seconds (2007). https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds. Accessed Dec 2020
Yao, M.: Your electronic medical records could be worth $1000 to hackers, Forbes (2017). https://www.Forbes.com/sites/mariyayao/2017/04/14/your-electronic-medical-records-can-be-worth-1000-to-hackers. Accessed Dec 2020
Purplesec: 2020 Cyber Secuirty Statistics the Ultimate List of Stats Data & Trends (2020). https://purplesec.us/resources/cyber-security-statistics/. Accessed Dec 2020
Singer, P.W., Friedman, A.: Cybersecurity: what everyone needs to know. OUP, USA (2014)
Parrend, P., Navarro, J., Guigou, F., Deruyver, A., Collet, P.: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection. EURASIP J. Inf. Secur. 2018(1), 4 (2018)
Raj, R.K., Anand, V., Gibson, D., Kaza, S., Phillips, A.: Cybersecurity program accreditation: benefits and challenges. In: Proceedings of the 50th ACM Technical Symposium on Computer Science Education, pp. 173–174, February 2019
De Bruijn, H., Janssen, M.: Building cybersecurity awareness: the need for evidence-based framing strategies. Gov. Inf. Q. 34(1), 1–7 (2017)
Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R., Kumar, M.: Review and insight on the behavioral aspects of cybersecurity. Cybersecurity 3, 1–18 (2020)
Patterson, I., Nutaro, J., Allgood, G., Kuruganti, T., Fugate, D.: Optimizing investments in cyber-security for critical infrastructure. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1–4, January 2013
Jones, S.L., Collins, E.I., Levordashka, A., Muir, K., Joinson, A.: What is ‘cyber security’? Differential language of cyber security across the lifespan. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1–6, May 2019
Romero-Mariona, J., Ziv, H., Richardson, D.J., Bystritsky, D.: Towards usable cyber security requirements. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1–4, April 2009
Yavanoglu, O., Aydos, M.: A review of cybersecurity datasets for machine learning algorithms. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 2186–2193. IEEE, December 2017
Yampolskiy, R.V., Spellchecker, M.S.: Artificial intelligence safety and cybersecurity: a timeline of AI failures. arXiv preprint arXiv:1610.07997 (2016)
Dilek, S., Çakır, H., Aydın, M.: Applications of artificial intelligence techniques to combating cyber crimes: a review. arXiv preprint arXiv:1502.03552 (2015)
Li, J.H.: Cybersecurity meets artificial Intelligence: a survey. Front. Inf. Technol. Electron. Eng. 19(12), 1462–1474 (2018)
O’Reilly, U.M., Toutouh, J., Pertierra, M., Sanchez, D.P., Garcia, D., Luogo, A.E., Hemberg, E.: Adversarial genetic programming for cybersecurity: a rising application domain where GP matters. Genet. Program. Evol. Mach. 21, 219–250 (2020)
Banković, Z., Stepanović, D., Bojanić, S., Nieto-Taladriz, O.: Improving network security using a genetic algorithm approach. Comput. Electr. Eng. 33(5–6), 438–451 (2007)
Willard, G.N.: Understanding the co-evolution of cyber defenses and attacks to achieve enhanced cybersecurity. J. Inf. Warfare 14(2), 16–30 (2015)
Albladi, S.M., Weir, G.R.: Predicting individuals’ vulnerability to social engineering in social networks. Cybersecurity 3(1), 1–19 (2020)
Melissa, L.: Cybersecurity: What Every CEO and CFO Should Know (2016). https://www.toptal.com/finance/finance-directors/cyber-security. Accessed Dec 2020
Wang, K., Dong, J., Wang, Y., Yin, H.: Securing data with blockchain and AI. IEEE Access 7, 77981–77989 (2019)
Michele, D.: How Does the Blockchain Work? (2016). https://onezero.medium.com/how-does-the-blockchain-work-98c8cd01d2ae. Accessed Dec 2020
Smith, S.S.: Blockchain: what you need to know. Account. Today 31(11), 42 (2017)
Mahbod, R., Hinton, D.: Blockchain: the future of the auditing and assurance profession. Armed Forces Comptrol. 64(1), 23–27 (2019)
Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Work 2017), pp. 618–623 (2017). https://doi.org/10.1109/PERCOMW.2017.7917634
Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195, 234–246 (2017). https://doi.org/10.1016/j.apenergy.2017.03.039
Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D.: Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2018 (2018). https://doi.org/10.1109/PIMRC.2017.8292361
Guo, Y., Liang, C.: Blockchain application and outlook in the banking industry. Financ. Innov. 2 (2016). https://doi.org/10.1186/s40854-016-0034-9
Gartner: Gartner Survey Shows 37 Percent of Organizations Have Implemented AI in Some Form, Gartner (2019). https://marketbusinessnews.com/ai-gartner-survey/194856/. Accessed Dec 2020
Marr, D.: Artificial intelligence-a personal view. Artif. Intell. 9(1), 37–48 (1977)
Harini, B.N., Rao, T.: An extensive review on recent emerging applications of artificial intelligence. Asia-Pacific J. Converg. Res. Interchange 5(2), 79–88 (2019)
Calderon, R.: The benefits of artificial intelligence in cybersecurity (2019)
Zeadally, S., Adi, E., Baig, Z., Khan, I.A.: Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access 8, 23817–23837 (2020). https://doi.org/10.1109/ACCESS.2020.2968045
Panarello, A., Tapas, N., Merlino, G., Longo, F., Puliafito, A.: Blockchain and IoT integration: a systematic survey. Sensors 18(8), E2575 (2018)
Salah, K., Rehman, M.H.U., Nizamuddin, N., Al-Fuqaha, A.: Blockchain for AI: review and open research challenges. IEEE Access 7, 10127–10149 (2019). https://doi.org/10.1109/ACCESS.2018.2890507
The foundation for our digital future. https://ethereum.org/en/what-is-ethereum/. Accessed Feb 2021
Mengidis, N., Tsikrika, T., Vrochidis, S., Kompatsiaris, I.: Blockchain and AI for the next generation energy grids: cybersecurity challenges and opportunities. Inf. Secur. Int. J. 43(1), 21–33 (2019). https://doi.org/10.11610/isij.4302
Kumble, G.P.: Practical Artificial Intelligence and Blockchain: A Guide to Converging Blockchain and AI to Build Smar Applications for New Economies (2020)
BlockchianInsight: Top Blockchain Technology Companies 2021 (2021). https://www.leewayhertz.com/blockchain-technology-companies-2021/. Accessed Feb 2021
Acknowledgments
This research is supported by the Texas A&M University Chancellor Research Initiative (CRI) grant awarded to Texas A&M University-San Antonio, TX, USA.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Muheidat, F., Tawalbeh, L. (2021). Artificial Intelligence and Blockchain for Cybersecurity Applications. In: Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., Romdhani, I. (eds) Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Studies in Big Data, vol 90. Springer, Cham. https://doi.org/10.1007/978-3-030-74575-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-74575-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-74574-5
Online ISBN: 978-3-030-74575-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)