Next Article in Journal
Microalga Nannochloropsis gaditana as a Sustainable Source of Bioactive Peptides: A Proteomic and In Silico Approach
Previous Article in Journal
Nutritional, Chemical, Antioxidant and Antibacterial Screening of Astragalus cicer L. and Astragalus glycyphyllos L. Different Morphological Parts
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure

1
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
2
College of Information and Communication, National University of Defense Technology, Changsha 430013, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Foods 2025, 14(2), 251; https://doi.org/10.3390/foods14020251
Submission received: 27 December 2024 / Accepted: 10 January 2025 / Published: 14 January 2025
(This article belongs to the Section Food Security and Sustainability)

Abstract

:
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability. However, the increasing digitalization and connectivity of operational technologies (OTs) in this sector expose it to significant cybersecurity risks. Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience. This study presents a comprehensive review of BT applications in OT security for food and agriculture CI, employing bibliometric and content analysis methods. A total of 124 relevant articles were identified from six databases, including the Web of Science Core Collection and MEDLINE®. Bibliometric analysis was conducted across five dimensions: publication year, literature type, journal distribution, country contributions, and keyword trends. The findings are meticulously organized through tables, charts, and graphs. The year 2018 marked a surge in research within this domain, with the IEEE Internet of Things Journal and IEEE ACESS emerging as the most prolific journals, each boasting nine publications. The United States, China, and India are at the forefront in terms of journal citation counts. Our analysis determined that a reference count of 37 serves as an appropriate threshold. Otoum Safa stands out as the author with the highest number of published articles, totaling four. Keywords such as “blockchain”, “internet of things”, “smart contract”, “security”, and “critical infrastructure” appear with significant frequency. The statistics, trends, and insights gleaned from this bibliometric analysis can guide researchers in the OTCI field to forge a coherent and logical research trajectory. Content analysis further identified six key research areas within this domain: identity authentication and data verification, secure access control, attack detection and perception, data security and protection, data backup and recovery, and attack assessment and attribution. Based on these insights, a general framework is proposed to guide future research and practical applications of BT in securing OT within food and agriculture CI. This study systematically analyzes the current research landscape, challenges, and opportunities for BT in securing the OT critical to food and agriculture CI. By bridging the gap between blockchain innovations and the operational needs of the food and agriculture sector, this work contributes to advancing strategic implementation and improving the security of CI systems.

1. Introduction

The food and agriculture sector is a critical component of global critical infrastructure (CI), underpinning food security, public health, and economic stability. This sector comprises nearly 1.9 million farms, over 700,000 restaurants, and more than 220,000 registered food manufacturing, processing, and storage facilities in the United States alone, contributing 5.6% to the national GDP and supporting 10.4% of total employment [1]. Beyond its direct economic impact, food and agriculture are intricately connected with other critical infrastructures. For instance, water and wastewater systems provide essential resources for irrigation and food processing, transportation networks facilitate the logistics of agricultural goods and livestock, energy systems power farming equipment and processing plants, and the chemical industry supplies fertilizers and pesticides crucial for crop production [2]. However, the increasing digitalization of this sector exposes it to significant cybersecurity threats. Data breaches, system manipulation, and cyberattacks jeopardize production, processing, and logistics operations. Moreover, biological threats such as pandemics and climate change further exacerbate risks to agricultural productivity and supply chain resilience [3,4].
Operational Technology (OT) refers to the use of hardware and software systems to monitor and control physical processes and equipment [5]. In the food and agriculture sector, OT plays a pivotal role in the CI network, exemplified by enabling precise environmental control in vertical farming systems, optimizing dynamic energy usage in large-scale food processing plants, implementing automated pathogen detection in real-time production lines, enhancing disease surveillance and traceability across supply chains. However, these systems face unique cybersecurity challenges. Unlike traditional IT systems, OT directly interacts with physical processes, making it susceptible to cyber–physical attacks such as advanced persistent threats (APTs) and system manipulations [5,6,7]. To protect OTCI (Operational Technology in Critical Infrastructure) network security, traditional research includes firewalls and intrusion detection systems, virtual private networks, vulnerability management and patch management, data encryption, network monitoring and log analysis, and security training and education [6]. Taking chemical industrial control systems that support the production of fertilizers and pesticides needed for crop cultivation as an example, researchers have improved OTCI network protection capabilities through formal analysis of code security, firmware security detection research, Modbus protocol research, PLC monitoring research, and industrial network architecture improvements [7]. Although the above research has increased OTCI’s network protection capabilities to a certain extent, it cannot provide a trusted environment for CI. OTCI can only defend passively, and the defense cost is high.
Blockchain technology (BT) has emerged as a transformative solution to enhance OT security in the food and agriculture sector. BT is a chain integration technology that combines asymmetric encryption, consensus mechanisms, smart contracts, point-to-point (P2P) information dissemination mechanisms, certificate systems, and distributed storage. Compared with centralized architecture, BT has the characteristics of decentralization, anonymity, non-tampering, and traceability. Customized editing of smart contracts can realize automatic verification, judgment, and decision-making, reducing personnel participation and reducing costs [8]. Through BT, a completely trusted operating environment can be provided for CI. It can provide CI with network protection capabilities, including identity authentication, attack detection, authorized access, and other network protection capabilities, and can jointly defend against attacks faced by CI in the physical world and data world [9,10]. In recent years, researchers have conducted in-depth studies on the application of blockchain in the field of CI network security. In this study, bibliometric analysis and content analysis of relevant studies were conducted, and scholars’ research was comprehensively reviewed.
Up to now, some scholars have provided relevant comments on the application of BT in the field of OTCI, as summarized in Table 1 [11,12,13,14,15]. However, several limitations remain. One major limitation is that most reviews rely solely on content analysis without integrating bibliometric analysis alongside it. Additionally, many reviews focus on a single aspect of the field, fail to offer a comprehensive analysis of OTCI as a whole, and do not incorporate the OT dimension. Furthermore, 2018 marked a significant surge in BT research within the domain of OTCI network security.
To fill this gap, a method combining bibliometric analysis and content analysis was employed to review the latest developments in BT in the field of OTCI. This approach offers several key advantages over the relevant review literature listed in Table 1. A combined approach of bibliometric analysis and content analysis was utilized. While bibliometric analysis provides quantitative data, content analysis offers qualitative insights, enabling a comprehensive understanding of the current status, trends, and correlations in the research field. Through quantitative analysis of publication years, document types, journal publications, countries, authors, and keywords, the research output and academic impact can be assessed. This analysis also assists in identifying the latest research dynamics, selecting appropriate publication channels, discovering potential collaborators, and facilitating academic cooperation and exchange. Key themes, methods, and theoretical frameworks were distilled through content analysis, offering scholars a holistic understanding of the field. Furthermore, knowledge gaps in current research and potential future research directions were analyzed, offering guidance for subsequent studies. A comprehensive review and analysis of BT in the field of CI network security were also conducted, providing researchers with a detailed understanding of existing outcomes in this domain. Given the rapid growth of this field, the analysis effectively reflects the developmental dynamics of BT in CI network security. The specific objectives of this review are to address three primary questions:
  • What is the current research status of BT in the OTCI field?
  • What are the application challenges of BT in the OTCI field?
  • What is the trend of BT in the OTCI field?
The remainder of this article is organized as follows. Section 2 provides the definition of BT in the field of OTCI. Section 3 presents the literature search and screening methods and includes bibliometric analysis. Section 4 offers a review of the application of BT in the field of OTCI and analyzes key issues in the OTCI field. In Section 5, a general framework for BT in the OTCI field is designed. In Section 6, the advantages, challenges, and development trends of BT in the OTCI field are analyzed. Section 7 presents the conclusions.

2. Defining Blockchain in Operational Technology Security of the Critical Infrastructure

Operational Technologies (OTs) is the use of hardware and software to monitor and control physical processes, equipment, and infrastructure, performing various tasks from monitoring critical infrastructure (CI) to controlling manufacturing workshop robots. As a key component, CI is an important support for social and economic development. CI refers to systems and assets that are crucial to a country. Once damaged or destroyed, it will cause serious damage to national security, economic lifeline, and the health and safety of citizens [11]. The world is entering a new stage of greater reliance on digitization. The theft of data is also rapidly increasing, providing a new carrier for various malicious behaviors to monitor, manipulate, and extort individuals. The widespread application of artificial intelligence is especially exacerbating the complexity and risks of CI. Cybersecurity refers to the protection of hardware, software, and data within network systems to prevent damage, alteration, or leakage due to accidental or malicious reasons, ensuring the continuous, reliable, and uninterrupted operation of systems and network services [11]. The next generation of interconnectivity is breaking the boundary between the digital and physical worlds. Furthermore, it is essential to note that the realm of CI cybersecurity extends beyond network systems, as network threats have now proliferated to affect physical devices. Countries worldwide have introduced policies and strategies aimed at safeguarding CI. In this context, data on how China, the U.S., Germany, the United Kingdom, and Russia define CI have been compiled, as shown in Table 2 [11], ”√” indicates that the category is included.
In 2008, Satoshi Nakamoto introduced the concept of “blockchain”, defining it as a chain-like data structure that combines data blocks in chronological order, secured through cryptography to be tamper-resistant and immutable, creating a distributed ledger [16]. Therefore, the blockchain has the characteristics of decentralization, non-tampering, irreversibility, and auditability [17]. In the field of OTCI, BT can provide network protection for the entire CI life cycle. The role of BT in OTCI is shown in Figure 1.
OTCI is divided into the application layer, process monitoring/control layer, network communication layer, and physical device layer. The application layer caters to specific scenarios such as IoT, finance, and transportation. Below lies the process monitoring layer, encompassing control servers and routers. Due to technological advancements, there is a growing prevalence of cloud-based process monitoring systems. These systems connect through the wireless communication layer, including radio and satellite, to physical devices like PLCs and RTUs in the physical device layer. Consequently, they become susceptible to remote hacking attacks, such as network attacks on remote engineering workstations. Moreover, the interconnectivity of devices like PLCs enables attackers to directly launch network attacks on underlying logic components, resulting in severe damage. BT can provide comprehensive network protection throughout the entire lifecycle of OTCI, including identity authentication, data validation, and access control in the pre-attack stage of OTCI. In the during-the-attack stage of OTCI, it can facilitate attack detection. In the post-attack stage of OTCI, it supports data recovery and attack analysis. BT can ensure the security of OTCI at the software, data, network communication, physical equipment, and other levels. OTCI has the characteristics of complex participants, strong dependence on equipment personnel, and a high degree of harm after being attacked. And OTCI lacks identity authentication, access authorization, and other mechanisms. With the increasing interconnectivity of CI, traditional methods have limited effectiveness in addressing the issues faced by OTCI, often leading to problems such as data leakage, tampering, and loss. The development of blockchain, as a significant component of digital transformation, is gaining increasing attention. BT is gradually addressing some of the existing challenges in OTCI.

3. Material and Methods

3.1. Search Method

In view of the fact that this review considered comprehensive coverage, the historical research data on blockchain in the field of OTCI used in this article were extracted and downloaded from the Web of Science (WoS) of Clarivate Analytics (www.webofscience.com, accessed on 15 September 2023). Since the selected papers only include the Web of Science Core Collection, Chinese Science Citation DatabaseSM, SciELO Citation Index, ProQuest™ Dissertations & Theses Citation Index, MEDLINE®, and KCI-Korean Journal Database, the above-mentioned database is used as the data source for this review in the article. During the search process, two search methods were designed, as shown below:
  • Web of Science was utilized as a search tool. Initially, the keyword “Operational Technology” was used to search the “topic” field (which includes title, abstract, author keywords, and keywords plus) with a publication time cutoff of September 2023, resulting in 76,871 documents. Due to the lack of peer review in preprint databases, the authenticity and reliability of such studies could not be ensured; therefore, preprint documents were excluded. Subsequently, the keyword “Critical Infrastructure” was employed, narrowing the selection to 739 documents. As a distributed ledger technology, BT plays a significant role in safeguarding data within CI. For this review, “Network Security” was used as the third keyword for a refined search, resulting in 106 documents. Finally, “Blockchain” was applied as the fourth keyword for targeted searches, identifying a total of 5 documents, which were included in the Web of Science Core Collection database, covering the period from 2018 to 2023;
  • To ensure the quality of paper retrieval, the preprint database was excluded due to the lack of peer-reviewed validation. The keyword “Critical Infrastructure” was then applied, resulting in 43,594 documents, among which 35,006 were included in the Web of Science Core Collection. Additional papers were distributed across other databases, including 704 in the Chinese Science Citation DatabaseSM, 292 in the SciELO Citation Index, 6374 in the ProQuest™ Dissertations & Theses Citation Index, 5849 in MEDLINE®, and 861 in the KCI-Korean Journal Database. The keyword “Network Security” was subsequently utilized for a refined search, narrowing the selection to 3733 documents. Finally, “Blockchain” was used for targeted searches, identifying a total of 160 documents spanning the years 2017 to 2023.
Compared with the two search methods, the first one has more screening rounds than the second one. But focusing on BT, the screening effect is not obvious. The second focuses on BT over a longer time span than the first, with a larger selection of articles but with less focus on the OT field. Considering that CI is a subset of OT in the defined scope, this paper adopts the second retrieval method as the main method and the first retrieval as the auxiliary method for literature screening, as shown in Figure 2.
During the initial screening process, three keywords—“Critical Infrastructure”, “Network Security”, and “Blockchain”—were selected to define the scope of this review. Preprints, which have not undergone peer review, and patents, which present issues consistent with the originality required for academic research, were excluded to ensure the integrity and innovativeness of the reviewed literature. A total of 160 documents were identified. Among these, 2 were duplicate papers, 12 were deemed to have low relevance to this review, and 6 were unrelated to the subject matter, necessitating further refinement. Compared to the initially designed screening method, the adopted approach lacked a precise focus on the field of Operational Technology (OT). Since Critical Infrastructure (CI) defines the research domain and OT serves as its operational mechanism, the impact of “Operational Technology” as a focus was relatively minor for research papers but more significant for review literature. To address this, the initial retrieval method was combined with the current approach, narrowing down relevant review papers within the OT domain and excluding 16 non-review papers in this field. Ultimately, 124 documents were selected, with their subject areas identified as lying at the intersection of “Operational Technology”, “Critical Infrastructure”, “Network Security”, and “Blockchain”.

3.2. Review Steps

This review study is divided into six systematic phases, as shown in Figure 3. In the first phase, a dataset was obtained through a search strategy, resulting in the selection of 124 articles. In the second phase, the selected literature was exported from the Web of Science, and the exported data were processed by removing duplicates. Using COOC software (version 6.725), keyword cleaning and synonym merging were performed. In the third phase, bibliometric analysis was conducted on the processed data, covering various aspects such as the distribution of publication years, types of literature, publishing journals, and countries of publication [18]. Subsequently, in-depth bibliometric analysis was carried out using VOSviewer software (version 1.6.20), which included constructing an author co-authorship network and a keyword co-occurrence network. In the fourth phase, content analysis was conducted, focusing on the application of blockchain in the security of OTCI. The analysis was divided into three scenarios: pre-attack, during-attack, and post-attack, with a detailed discussion of its impact on the food and agriculture sector. In the fifth phase, a comprehensive research framework was developed, providing valuable insights into the study of blockchain in the field of OTCI. Finally, the current research status and challenges of blockchain in the OTCI field, particularly in the food and agriculture sector, were evaluated, and future research trends were explored.

3.3. Bibliometric Analysis

3.3.1. Year of Publication

Figure 4 shows the publication trends of BT in the OTCI field, reflecting the growing interest and development in this area over time. To better understand these trends, it is important to consider key background factors influencing research in this field, such as technological milestones and regulatory developments.
From 2017 to 2023, the number of BT-related publications in the OTCI field can be divided into two distinct phases: the initial phase (2017–2018) and the expansion phase (2019–2023). During the initial phase, the number of publications was relatively low (2 papers in 2017, 7 papers in 2018), but the citation counts were significantly higher (375 citations in 2017, 159 citations in 2018). This early surge in citations can be attributed to the growing interest in BT as a promising technology, driven by major technological advancements, such as the widespread adoption of Ethereum supporting smart contracts, improvements in the performance of blockchain consensus mechanisms, and better computational power for OTCI applications. Additionally, during this period, regulatory bodies began exploring frameworks for the safe and ethical use of emerging technologies like BT, sparking interest and discussions within the academic community. Starting in 2019, the field entered an expansion phase, characterized by a sharp increase in the number of publications, rising from 12 papers in 2019 to 30 papers in 2023. This growth was likely driven by several factors, including further technological advancements, the increasing commercialization of BT applications, and clearer regulatory guidelines for their implementation. As regulations became more defined, particularly in areas such as data privacy, safety standards, and ethical concerns, the research field saw a greater push for innovation and application in OTCI systems. The regulatory environment played a positive role in encouraging both academic exploration and industrial adoption of BT technologies. However, despite the increased number of publications, the citation count peaked in 2021 (498 citations) and gradually declined in the following years. This could be partly because many key studies published earlier in the field have already been widely cited, and newer papers may take time to gain similar recognition. Additionally, since our data collection was limited to September 2023, the downward trend in citations compared to 2021 could be related to the timing of the studies included.
In summary, the publication trends of BT in the OTCI field, as shown in Figure 4, indicate that the technology has gained significant attention in recent years. The increasing recognition from journal publishers, experts, and reviewers reflects advancements in technology and a more stable and favorable environment for research in this field.

3.3.2. Literature Type and Publication Journal

Among the 124 papers selected, there were 119 research papers and 5 reviews. After review, in addition to 3 dissertations, a total of 83 journal papers were reviewed, accounting for 67%. There were 38 conference papers, accounting for 31%. Relevant research on the application of BT in the OTCI field is mostly presented in journals. Among the 83 journal articles, their publication sources came from four databases. They are Web of Science Core Collection, ProQuest™ Dissertation and Dissertation Citation Index Database, Chinese Science Citation DatabaseSM, and MEDLINE®. These 83 journal articles come from 53 publishing units. Among them, 40 units published 1 journal article, and 9 units published 2 papers. IEEE ACCESS and IEEE INTERNET OF THINGS JOURNAL have the largest number of publications, each publishing 9 papers. Related publications cover many fields, such as power, energy, communications, security, and civil engineering, fully demonstrating the research potential and application prospects of CI security. As shown in Figure 5, these are the units that have published more than two papers. Details of the journal publications (impact factor, h-index, WoS quartile, subject area, etc.) can be found in Appendix A. The data in Appendix A highlight that these journals span multiple disciplinary fields, including computer science, engineering, medicine, and environmental science. Notably, journals with high-impact factors and h-indices are predominantly concentrated in the domains of computer science and engineering. For instance, the IEEE Internet of Things Journal boasts a notable impact factor of 8.2 and an h-index of 47, securing its position in the Q1 category. Similarly, the IEEE Transactions on Industrial Informatics demonstrates an even higher impact factor of 11.7, underscoring its significant influence in the engineering field. Furthermore, interdisciplinary journals, such as Scientific Reports, also showcase impressive metrics, with an impact factor of 3.8 and an h-index of 149. Overall, the table provides a comprehensive overview of the academic impact of these journals across various research fields, serving as a valuable reference for researchers in selecting suitable venues for submission. In addition, it can be pointed out that although many journals have only published one paper in the relevant field, the large number of published journals indicates that the introduction of BT in OTCI is gradually being recognized by publishing houses.

3.3.3. Country

To understand the global distribution and research trends of BT in OTCI and evaluate potential international cooperation opportunities, a statistical analysis was conducted on the countries represented in 124 selected articles. Based on the locations of the authors, 49 countries or regions were identified worldwide, with the top 10 contributing countries presented in Table 3. The number of references helps assess whether scholars from a particular country or region have conducted extensive literature reviews in their scientific research. This contributes to ensuring the depth and breadth of the study, making the results more comprehensive and reliable. It is often used as an indicator to evaluate research quality. From Table 3, it can be observed that among the top 10 contributing countries, the average number of references per paper is 27.97 for the United States, 41.23 for China, 45.42 for India, 44.83 for Saudi Arabia, 48.55 for Pakistan, 51.89 for the United Kingdom, 22.11 for Canada, 32.88 for Australia, 41.43 for the United Arab Emirates, and 29 for Singapore. The average number of references per paper for the top 10 contributing countries is 37.19. This indicates that the United Kingdom, Saudi Arabia, India, the United Arab Emirates, and China extensively referred to previous research when writing their papers. Based on this, we have established that a reference count of 37 is a reasonable threshold, providing researchers with a reference point. The United States is the country with the largest number of references, with a total of 30 articles cited 347 times, of which the most cited single article is 52 times. China and India have a leading position in the citation count of the literature in this dataset, indicating that these two countries have an advantage in the completeness of the literature references. In contrast, developed Western countries such as the U.K., despite having a small number of references, also demonstrate a certain level of competitiveness in terms of citation count. For example, although the U.K. only contributed 9 articles, its total citation count exceeded 500. The low citation numbers in the Middle East and emerging countries indicate that there is room for improvement in the breadth or depth of reference sources in their research literature. It is worth noting that articles published in the IEEE IoT Journal are the most cited literature in this field, with 361 citations [8].
Regarding funding agencies, based on the institutional statistics function of the Web of Science database, a total of 108 funding agencies supported the 124 reviewed publications. The funding sources demonstrate a broad international scope and diversity, primarily concentrated among major research foundations in China, the United States, and Europe. China stands out as the primary funding source, with the “NATIONAL NATURAL SCIENCE FOUNDATION OF CHINA” supporting 11 publications, ranking first. Other Chinese funding agencies, such as the “NATIONAL KEY RESEARCH DEVELOPMENT PROGRAM OF CHINA”, “FUNDAMENTAL RESEARCH FUNDS FOR THE CENTRAL UNIVERSITIES”, and regional funds (e.g., Guangdong Province and Guizhou Province), highlight the comprehensive support provided by the Chinese government for scientific research. Among European and American institutions, the “EUROPEAN UNION (EU)” ranks second, supporting six publications, reflecting its emphasis on international research collaboration. The “UNITED STATES DEPARTMENT OF ENERGY (DOE)” and the “NATIONAL SCIENCE FOUNDATION (NSF)” funded four and three publications, respectively, further showcasing the United States’ focus on technological innovation. Additionally, the “ENGINEERING PHYSICAL SCIENCES RESEARCH COUNCIL (EPSRC)” and the “NATURAL SCIENCES AND ENGINEERING RESEARCH COUNCIL OF CANADA (NSERC)” are also listed as funding sources. Notably, funding from the Middle East and other Asian countries has gradually shown its influence. For instance, Saudi Arabia’s “KING SAUD UNIVERSITY” and South Korea’s “NATIONAL RESEARCH FOUNDATION OF KOREA (NRF)” each supported two studies. Overall, the funding sources reflect the strengthening of international research collaboration, as well as the focused investment and priorities of research institutions in various countries across different technological fields.

3.3.4. Author

Tracking the publications of relevant scholars or groups in the field of research is an important way to understand and learn about relevant trends in the field. A total of 461 authors were counted in the selected articles, and they jointly completed 124 papers. A co-authorship analysis of authors was conducted using VOSviewer software, as illustrated in Figure 6. Each circle in the figure represents an author. The different colors represent the specific years of classification of papers published. As can be seen from Figure 6, most research activities in this field are carried out by research teams, and only a few scholars carry out scientific research activities alone. It can be clearly seen that green and yellow circles occupy most of them, indicating that there has been relatively more research in this field in the past two years. Otoum Safa is the author with the highest number of publications (4 papers), but the citation count is relatively low (138 citations), and the total link strength is weak (7). The authors with the highest citation counts are Asuquo Philip, Cao Yue, Cruickshank Haitham, Lei Ao, Ogah Chibueze P. Anyigor, and Sun Zhili (all with 384 citations), but their number of publications is low (only 1 paper each), and their total link strength is also weak (all with a value of 5). Authors with a total link strength of 14 demonstrate a high frequency of collaboration, but each of them has only 1 paper and 79 citations. Khan Abdullah Ayub and Laghari Asif Ali, with relatively high citation counts (170 citations), have also published more papers (3 each), and their total link strength in the collaboration network is higher (12), indicating their greater academic influence. A total of 461 authors were grouped into 100 clusters, indicating relatively weak collaboration among scholars, which requires further strengthening. Research on the application of BT in the field of CI cyber security shows a trend of continued growth and diversification.

3.3.5. Keywords

VOSviewer software was used to conduct keyword analysis on the 124 papers selected, as shown in Figure 7. To better capture the definition of keywords, a joint analysis of the abstracts, titles, and keywords of the selected literature was conducted to broaden the scope of data analysis. Each keyword is represented by a circle. The larger the circle, the higher the frequency of occurrence. Different colors represent different years, and the arc between the circles represents the connection between the keywords. As can be seen from the figure, the circles of keywords such as “blockchain”, “internet of things”, “smart contract”, “security”, and “critical infrastructure” are relatively large. In these 124 articles, the main research focus is the use of BT to solve security problems in CI. In addition, terms such as “authentication”, “edge computing”, “deep learning”, “smart city”, “IoV”, and “industrial control system” also have a high occurrence rate, which shows that OTCI research spans fields such as the internet of things, internet of vehicles, edge computing, artificial intelligence, smart city, and related technologies. These technologies also play an important role in supply chain management, equipment certification, and data tracing in the fields of food and agriculture. Research trends show that blockchain is gradually integrating with artificial intelligence (such as deep learning and federated learning) and emerging technologies (such as “digital twins”) to optimize distributed data management, enhance privacy protection, and network security for CI. In addition, the application of IoT technology in agricultural equipment and sensors provides support for BT in precision agriculture and smart farms.

4. Blockchain of Operational Technology Security in the Critical Infrastructure Topic Analysis

Scholars have deeply explored BT’s network security protection in the OTCI field. The protective effect of blockchain is shown in Figure 8. Through cryptographic algorithms, consensus mechanisms, P2P communication mechanisms, smart contracts, certificate signature systems, and decentralized architectures, the deployment of blockchain can defend against various network attacks that CI is susceptible to, including Distributed Denial of Service (DDoS), Packet Injection Fuzzy Attack, False Data Injection Attack, Sybil Attack, Wrong Routing Attack, Backdoor Attack, and Worm-type Virus. A total of 124 research papers related to blockchain in OTCI were identified. Among these, 119 documents (excluding five review papers) were primarily analyzed, as shown in Table 4. This analysis categorizes the research according to the operational phases, which include the pre-attack, during-the-attack, and post-attack stages of OTCI. In the pre-attack stage of OTCI, it comprises two main areas of focus: identity authentication and data validation (38 papers) and secure access control (18 papers). In the during-the-attack stage of OTCI, there are two primary categories: attack detection and perception (24 papers) and data security and protection (30 papers). In the post-attack stage of OTCI, the research is divided into data backup and recovery (four papers) and attack assessment and attribution (five papers).

4.1. Pre-Attack of OTCI

4.1.1. Identity Authentication and Data Validation

Identity authentication and data verification can perform boundary defense against attacks and improve OTCI’s network security protection capabilities. Scholars have conducted the following investigations into the application of BT in OTCI identity authentication and data validation.
i.
Identity Authentication
BT, as a form of distributed ledger technology, possesses unique characteristics that can ensure the credibility of identity authentication. In the OTCI domain, researchers have explored the use of BT for identity authentication of operators, machines, and other entities to enhance the boundary defense against viruses. Research primarily focuses on OTCI sectors such as communication systems, energy systems, transportation systems, industrial control systems, social media and online communities, and healthcare system security, as shown in Table 5.
BT, as a distributed technology infrastructure, can provide decentralization, anonymity, and an immutable storage and transaction mechanism for the CI sector. It ensures the security and trustworthiness of certificate data. For instance, in blockchain-based identity authentication, a user’s identity is typically represented by a unique cryptographic key pair. When a user seeks to authenticate their identity, they can use their private key to provide a digital signature. The recipient can then use the user’s public key to verify this signature, thereby confirming the authenticity of the user. Furthermore, since the entire identity authentication process takes place within the blockchain, processes such as certificate issuance, verification, and querying are likewise tamper-proof. Compared to traditional identity authentication systems, blockchain-based identity authentication can address issues such as identity forgery, certificate loss, and complex authentication. In the field of communication system security, current research primarily focuses on two directions: the internet of things and the internet. This research is mainly aimed at reducing authentication costs, improving authentication efficiency, and enhancing security. In the context of IoT, scholars have explored the use of BT in identity registration, on-chain storage, block signature verification, and identity verification of senders and receivers within IoT infrastructure domains such as Cyber–Physical Systems (CPSs) [19], Low-Power Wide-Area Networks (LPWANs) [29]. These efforts aim to combat data packet replay and man-in-the-middle attacks, ultimately enhancing security [37]. In the context of IIoT, scholars have explored certificate systems based on BT. These systems are used to establish digital identities for connected devices within IIoT platforms, facilitating identity verification of participating entities [31,32,33]. In the context of future IoT systems, Fang et al. [36] have proposed a multidimensional adaptive solution, leveraging BT as an intelligent process to learn and track all available physical attributes. This approach aims to enhance the reliability and robustness of authentication by integrating multiple attributes. In the context of the internet, scholars’ research primarily focuses on the Domain Name System (DNS). Hu et al. [34] introduced a novel DNS data plane decentralized architecture called Blockzone. This architecture aims to enhance the efficiency of domain name resolution and verification, thereby strengthening DNS’s ability to withstand DDoS and cache poisoning attacks. In the field of energy system security, research primarily focuses on using BT to ensure system resilience, reduce penetration rates, and enhance the security of smart grid operations and management. For instance, Noble et al. [20] designed a location-based blockchain authentication protocol for intelligent grids with high penetration of Distributed Energy Resources (DERs). Singh et al. [23] implemented session key and authentication mechanisms for secure communication. Samy et al. [24] utilized blockchain for user authentication within the network to ensure system resilience and prevent attackers from manipulating relevant smart devices in the smart grid. In the field of transportation system security, scholars primarily focus on research related to the Vehicular Ad Hoc Network (VANET) or vehicle-to-vehicle communication in the context of the internet of vehicles (IoV). Due to the mobility of vehicles, scholars have investigated security aspects within VANETs. Research in this area often includes exploring concepts like secure ownership transfer between infrastructure, physical unclonable functions, and enabling rapid re-authentication of vehicles, as well as real-time sharing of identity authentication results [9,26,28]. In addition, Karim et al. [30] proposed and evaluated a Secure Data Exchange (BSDCE-IoV) scheme based on elliptic curve cryptography for secure communication. This scheme establishes authenticated key protocols between vehicles within each driving area and roadside units (RSUs). Namane et al. [25] introduced a Vehicle Detector Authentication Scheme (VDAS), which permits the computation of the number of sensor nodes for detecting vehicles and performs authentication. In the field of industrial control system (ICS) security, traditional communication protocols in Industrial Control Systems and Supervisory Control and Data Acquisition (ICS/SCADA) systems often lack sufficiently secure mechanisms for providing device authentication. Rivera et al. [22] presented an advanced decentralized SCADA system architecture that leverages the advantages of tamper-resistant ledgers for authentication purposes. Gomez et al. [27] introduced a blockchain-based SRAM PUF (Physical Unclonable Function) authentication and integrity protocol. This protocol aims to ensure continuous identity authentication of field sensors and provides robust data stream integrity verification by utilizing distributed ledgers and hardware security primitives. In the field of social media and online community security, Prodan et al. [21] introduced the ARTICONF project, which offers identity management for users participating in the network. It allows users to couple their digital identities with their real-world identities within the local environment. In the field of healthcare system security, Nyangaresi et al. [35] have developed a verifiable secure and privacy-preserving configuration protocol. This protocol facilitates mutual authentication between biometric sensor units and hospital medical servers, establishing secure communication sessions for subsequent data exchange. The above research highlights that in the context of the food and agriculture sector, cyberattacks may lead to supply chain disruptions, impacting food supply and prices while undermining consumer trust in food brands. Moreover, disruptions to the stability of energy systems can affect the operation of food processing and agricultural machinery, while delays or interruptions in logistics and distribution may result in food waste and decreased supply chain efficiency. Data tampering in industrial control systems poses threats to food safety and production efficiency, and attacks on social media can influence consumer purchasing decisions. Additionally, cyberattacks on healthcare systems may indirectly impact the health and safety of food processing workers, thereby affecting the productivity of the food and agriculture sector.
The above-mentioned research investigates the application of BT in various areas of OTCI for identity authentication. These efforts contribute to the development of secure identity authentication mechanisms, thereby enhancing the network security and resilience of CI. However, using blockchain for identity authentication can introduce challenges such as increased latency, resource consumption, and higher communication requirements compared to traditional mechanisms. In real-world application scenarios, there still exists a gap when dealing with large-scale and high real-time identity authentication demands.
ii.
Data Validation
Data validation plays a fundamental role in the cybersecurity defense of OTCI networks. It serves as a foundational layer for verification and security. Traditional data validation processes are often manual and predominantly centralized in their storage, which can lead to challenges in ensuring the authenticity of data validation. Some network viruses, such as worm viruses, trojan viruses, macro viruses, and others, have the capability to manipulate, contaminate, or delete data within CI, posing significant security risks. Indeed, BT unquestionably enables automated data validation, ensuring the security of data [51]. Research on data validation by scholars primarily focuses on OTCI areas such as communication systems, energy systems, transportation systems, industrial control systems, financial systems, and building facilities, as shown in Table 6.
In the field of communication system security, research primarily focuses on using BT to perform data validation in communications between IoT devices [48,54]. For example, Martinez et al. [46] proposed a method for Continuous Delivery/Continuous Verification (CD/CV) of IoT data streams in the context of the edge-fog-cloud using blockchain smart contracts. Regarding data auditing, Burra et al. [38] designed an efficient and secure distributed and decentralized network setup based on certificateless cryptography for shared group data auditing. This approach mitigates security issues resulting from the compromise of key generation centers. Furthermore, scholars have explored the continuous verification of identity information using BT [53]. In the field of energy system security, researchers have highlighted that blockchain can address concerns related to security, privacy, identity, and the immutability and verifiability of records. It enables end-user devices to securely share their energy resources within network environments [42,44]. In the field of transportation system security, researchers primarily investigate the use of BT for data validation, supporting identity authentication for vehicles and individuals. This research also focuses on maintaining and authenticating shared data to achieve trustworthy information sharing among vehicles [8,40,49,50]. For instance, Yi et al. [43] proposed a blockchain-based Public Key Infrastructure for secure verification of vehicular networking devices. Adja et al. [47] introduced DARVAN, which minimizes exposure of critical data while ensuring management and verification of data. Kaur et al. [45] introduced a cross-data center authentication and key exchange scheme for vehicular networks based on blockchain and elliptic curve cryptography (ECC). In the field of financial system security, Youssef et al. [41] proposed a blockchain-based infrastructure for small-scale payments that dynamically adjusts verification levels and detects user misconduct based on historical behavior and real-time data. In the field of building facility security, Halgamuge et al. [39] proposed a new platform architecture for bridge monitoring applications. This architecture implements authenticated data deletion policies to enhance the sustainability of cloud databases. The authors utilized blockchain and smart contracts to ensure the data deletion policies. In addition, researchers have also explored deploying deep learning algorithms on blockchain to jointly serve data verification processes [52]. The above research highlights the impact on the food and agriculture sector, where the design of communication system research methods enhances the security and reliability of data in agricultural decision-making processes by ensuring the verifiability of IoT data streams, which is critical for precision agriculture and food safety monitoring. Additionally, the design of research methods for energy systems, transportation systems, financial systems, and building facility security contributes to the safe sharing of energy resources in a networked environment, the maintenance and authentication of data shared between vehicles, the reduction in transaction verification complexity, and the authentication of data and human behavior. These improvements enhance the energy efficiency of agricultural mechanization and food processing, increase the efficiency and safety of agricultural product logistics, ensure the security of agricultural financial services, and safeguard food processing and storage facilities, thereby positively impacting the overall operations and efficiency of the food and agriculture sector.
Researchers employ BT’s decentralized architecture and programmable smart contracts to achieve highly automated and trustworthy data validation in the OTCI field. This approach is aimed at safeguarding CI against network attacks.

4.1.2. Security Access Control

In the OTCI field, there is a lack of data, operational, and personnel permission management, as well as access authorization control. Strengthening the security access control mechanisms in OTCI can play a significant role in defense against network attacks before they occur. Researchers have explored the use of BT for distributed access control in OTCI to enhance the reliability and security of CI. The research focus is distributed across various fields, including transportation systems, healthcare systems, communication systems, energy systems, financial systems, industrial control systems, building facility security, and food and agriculture systems, as shown in Table 7.
In the field of transportation system security, research primarily focuses on Vehicular Ad Hoc Networks (VANETs). VANETs allow real-time data exchange between vehicles, roadside units, parking lots, and city infrastructure. Therefore, strengthening the security access control of VANETs can enhance the network security defenses of CI in the transportation system [67,72]. For example, Sharma et al. [71] proposed the integration of BT into dedicated vehicular networks, allowing vehicles to use a distributed access control system for sharing. This ensures that shared network resources have a higher level of trust, reliability, and security. Awais et al. [66] introduced a secure distributed messaging framework to enhance security and reduce traffic. In the field of healthcare system security, Dubovitskaya et al. [70] developed patient access control strategies specifically aimed at enhancing the privacy and high sensitivity of electronic health records (EHRs). They proposed a blockchain-based permission system for EHR data sharing and integration. In the field of communication system security, researchers have explored the use of BT in various areas of IoT communication, including Software-Defined Networking (SDN), Wireless Sensor Networks (WSNs), Border Gateway Protocol (BGP), and 5G. They have investigated the implementation of cross-domain identity authorization for individuals [60], internet number resource permission and trust management [63,68], and lightweight stakeholder identity authentication authorization [69], all aimed at enhancing information system security. In communication systems, the sheer number of heterogeneous IoT devices poses a significant challenge. Research based on blockchain’s decentralized architecture, certificate systems, and programmable smart contracts can achieve secure access and control among IoT devices [62,64]. Furthermore, in the context of mobile data access, Xenakis et al. [65] proposed a new blockchain-supported mobile data access model in conjunction with 5G to ensure secure user access. In the field of energy system security, research primarily focuses on battery energy storage systems and smart grid applications. For example, Mhaisen et al. [61] introduced a new control method for battery energy storage systems based on distributed smart contracts to achieve their collaborative and secure operation. Suciu et al. [55] introduced a layered architecture composed of different permission entities for managing physical entities’ access to various resources in the network infrastructure. In the field of financial system security, Ivanov et al. [58] designed VolgaPay, an offline payment terminal, and VolgaGuard, an offline resource access control terminal, based on BT for self-service terminals (SSTs). This design aims to enhance the resilience of self-service terminal systems against network attacks. In the field of industrial control system security, Halgamuge et al. [57] established a comprehensive latency model for distributed CI access control using blockchain. It employs a decentralized Security Access Administrator (SAA) instead of a centralized Certificate Authority (CA) to provide distributed access control. In the field of building facilities security, two key issues when using BT for modular construction are the collection and real-time updating of data and the management of authorized data access. Kong et al. [59] proposed a permissioned blockchain architecture with an IoT oracle, utilizing blockchain networks to provide authentication and ensure authorized access to quality inspections. In the field of food and agricultural system security, Gaba et al. [56] highlighted the need to protect personal data related to agricultural land records in the agricultural system security domain. The aim is to prevent unauthorized access and eliminate corruption in land transactions. The author proposes a solution based on distributed ledger technology. In the impact of the above research on the food and agriculture sector, ensuring secure communication within vehicle networks has improved the efficiency of agricultural product logistics and reduced food waste. Meanwhile, the secure sharing of electronic health records helps safeguard the health of agricultural workers and enhances productivity. The management of precision agriculture data, the application of blockchain technology in energy and quality control, and the cybersecurity protection of financial services collectively strengthen the safety and efficiency of the food and agriculture sector.
In the realm of OTCI, BT offers decentralized solutions for identity authentication, data verification, and secure access control. When combined with technologies such as machine learning, 5G, neural networks, and others, it collectively enhances the security of data sharing. This, in turn, strengthens the boundary defense capabilities of OTCI, serving as a preventive measure before a CI comes under attack.

4.2. During-the-Attack of OTCI

4.2.1. Attack Detection and Perception

When CI is subjected to network attacks, detecting and perceiving attack viruses, methods, and pathways can provide robust defense support for CI after the attack. Scholars have explored the combined application of programmable smart contracts, blockchain signature systems, consensus mechanisms, and neural networks and machine learning algorithms to study OTCI attack detection and perception. The research is primarily focused on fields such as industrial control systems, energy systems, transportation systems, communication systems, supply chain management, financial systems, and BT, as shown in Table 8.
In the field of ICS security, Ragab et al. [73] have designed a new blockchain with deep learning-based cyberattack detection (BDLE-CAD) for CI and ICS. They have proposed a blockchain-supported integrity check scheme (BEICS) to defend against error route attacks. Demertzis et al. [78] utilized smart contracts to achieve bilateral traffic control and detect anomalies based on a Deep Autoencoder Neural Network (DANN). Kumar et al. [91] introduced a novel integrated framework of blockchain and deep learning to safeguard sensitive information and identify network threats based on network traffic analysis. In the field of energy system security, research is primarily focused on smart grids. The modernization of the grid involves increased use of “smart” energy devices that can automate, digitize, network, and integrate the physical energy supply chain within the grid. Therefore, in the environment of the energy IoT, relevant infrastructure is highly susceptible to network attacks. Mylrea et al. [77] explored how BT can enhance the compliance of the North American Electric Reliability Corporation (NERC) CIP by using immutable cryptographic signatures and distributed ledgers, thereby increasing the security of the bulk power system supply chain. Sai et al. [74] introduced the Hybrid AI Blockchain-Supported Protection Framework (HABPF). It utilizes Recurrent Neural Networks (RNNs) and a Convolutional Neural Network (CNN) based on LeNet5 to protect the communication infrastructure of the smart grid. Furthermore, researchers have explored the use of custom consensus mechanisms, traceability, and anonymity to provide a trusted environment and necessary conditions for attack detection, thus aiding in attack perception [79,85,87]. In the field of transportation system security, researchers have explored the use of novel distributed detection and response methods to perform network situational awareness and attack detection in transportation systems. Graf et al. [76] utilized smart contract technology to provide an automated and trusted system for event management throughout its lifecycle. This system allows for the automatic acquisition, classification, use, archiving, and disposal of events. Finogeev et al. [81] employed BT to validate network nodes and store sensor data in a distributed ledger. It introduces a network data packet clustering method based on fuzzy neural networks, which can be used to detect data packets that may contain malicious content. Vargas et al. [80] established a comprehensive security mechanism for device networks in the IoT. It focuses on identifying threats while considering the computational capabilities suitable for industrial IoT. In the field of communication system security, scholars have conducted research on leveraging BT in conjunction with fog computing, deep learning, signature mechanisms, and decentralized frameworks. These technologies are used for monitoring devices and smart contracts [92,93,94,95], detecting Distributed Denial of Service (DDoS) attacks [89], and identifying malicious activities such as intrusions [90] and zombie networks [75]. Furthermore, in practical applications, Bernieri et al. [88] introduced ALISI, a lightweight identification system designed specifically for IoT and IIoT systems. In the field of financial systems, Zhang et al. [84] have proposed a threshold estimation framework based on blockchain and deep learning for exchanges. This framework can be utilized to estimate the optimal threshold for hot wallets within complex and dynamic exchange environments, assisting in attack detection. With the expansion of BT application scenarios and its ongoing development, blockchain is gradually evolving into a new form of CI. In the research related to blockchain’s own attack perception and detection, Eisenbarth et al. [82] have proposed an architecture to detect suspicious nodes and revoke them in order to mitigate future Sybil attacks. Zhang et al. [83] introduced SVScanner, which utilizes heterogeneous feature patterns to detect vulnerabilities in smart contracts within the blockchain. Alangot et al. [86,96] proposed two methods for Bitcoin clients to detect if eclipse attacks are being conducted against them. In the impact of the above research on the food and agriculture sector, the anomaly detection technology in industrial control systems protects critical data in agricultural automation, ensuring the continuity and safety of food production. At the same time, attack detection in energy and transportation systems enhances the stability of agricultural energy supply and logistics, reducing food waste. Security measures in communication and finance sectors improve the transparency of the supply chain and the safety of funds, while the application of blockchain technology enhances the efficiency and transparency of the agricultural supply chain.
The above-mentioned research has explored the role of BT in attack perception and protection in OTCI networks. Blockchain can provide a trustworthy environment for detection, and through highly automated smart contracts, signature mechanisms, and consensus mechanisms, it can introduce innovative distributed detection methods into traditional approaches. Combining BT with traditional attack detection algorithms yields significant advantages in safeguarding OTCI networks. However, BT, as a CI, also faces certain network security risks. Currently, there is a lack of research on how to integrate BT’s own threat perception and detection with OTCI.

4.2.2. Data Security and Protection

With the interconnection of CI control systems, data interactions occur over the internet using protocols such as IP/TCP. Compared to traditional infrastructure control and data exchange, the speed and breadth of data sharing have significantly improved. However, this increased data flow has also led to a rise in network attacks due to the decentralized and immutable nature of BT, where all nodes collectively maintain the security of data on the chain. For example, in a blockchain network, each node participates in the consensus of the network, and every request undergoes a voting and validation process by all nodes on the chain. Researchers have explored the use of blockchain for data security and protection in CI. The research primarily focuses on two aspects: data transit protection and data storage protection.
i.
Data Transit Protection
To protect the data transit process in the OTCI field, researchers have primarily explored the use of blockchain’s distributed framework, smart contracts, consensus mechanisms, encryption methods, and more to safeguard data transit processes. The research is primarily focused on the fields of communication systems, financial systems, energy systems, healthcare systems, electronic voting, transportation systems, cloud computing, and BT itself, as shown in Table 9.
In the field of communication system security, the research includes using BT for data integrity checks [10], data flow monitoring [111], and data traceability in communication systems [116]. Mena et al. [99] incorporated real-time transaction mechanisms into smart contracts to ensure that negotiated contract commitments are fulfilled. Moges et al. [103] stored changes in network states on an immutable ledger to provide reliable traceability. Wang et al. [105] presented a secure spectrum optimization solution for satellite IoT, introducing BT to deter malicious users from participating in spectrum sharing. Sunny et al. [108] have developed a lightweight framework based on blockchain, utilizing its layered nature to protect CI. In the field of financial system security, Zhang et al. [97] leveraged a combination of public key encryption schemes, digital signature schemes, and smart contracts to facilitate four tasks in intelligent auctions: data submission, data requests, auctions and queries, and payment and delivery. In the field of energy system security, researchers explore the use of encryption algorithms (blind signature [98]) and distributed architectures [109] to achieve secure energy transactions and remote monitoring. In the field of healthcare system security, the research combines blockchain with post-quantum encryption algorithms [100], digital twin technology [115], neural network algorithms [106], and more to perform real-time data processing, avoid single points of failure, and ensure the secure sharing of sensitive medical data (such as medical records). This approach aims to enable trusted data sharing and precision healthcare. In the field of electronic voting system security, researchers primarily investigate the use of blockchain to ensure the integrity of voting data, thus safeguarding the security of data flow [101]. In the field of transportation system security, dealing with a mobile network composed of vehicles, roadside units, and other infrastructure, researchers primarily explore the use of blockchain along with modular architecture [112], certificate authentication mechanisms [102], and smart contracts [107] to ensure trusted data circulation while securing data interactions between vehicles. Comprehensive data protection is applied to data circulation in scenarios such as road congestion control [104], carbon emissions trading, and others, with the aim of improving road safety and traffic control. In the field of cloud computing, Khan et al. [110] presented a blockchain-based distributed infrastructure that leverages fundamental blockchain attributes to achieve immutable and trustworthy service level monitoring within cloud services. In the field of food and agriculture safety systems, scholars have primarily focused on providing a transparent, decentralized blockchain-tracking solution for agricultural production. They proposed a rice supply chain refinement supervision model MBRRSM (Multi Blockchain Rice Refinement Supervision Model) based on multi-layer blockchain from the information level, which is used to increase transparency and reduce the circulation of problematic rice [114]. In the domain of BT itself, to ensure the confidentiality of sensitive data, scholars have employed encryption methods to secure data collection, data search, and data processing [113,117,118]. In the impact of the above research on the food and agriculture sector, enhanced communication network security protects the transmission of food and agricultural data, ensuring the security of the supply chain. BT improves the transparency of energy management, reduces costs, while also improving the quality of healthcare services, safeguarding agricultural product logistics efficiency, enhancing the reliability of cloud services, and increasing the overall trustworthiness of the agricultural supply chain.
The above-mentioned research leverages the decentralization, tamper-proof, and anonymity features of blockchain to monitor and protect the integrity of data throughout its lifecycle. Furthermore, through the customization of smart contracts and the design of encryption mechanisms, human involvement is minimized, facilitating end-to-end on-chain operations for data transmission, processing, and decision-making. In the OTCI security domain, ensuring the security of data flow has significant advantages compared to traditional centralized data flow protection methods in terms of security, trustworthiness, and cost control. However, existing research only guarantees the trustworthy flow of data on the blockchain, and there are still risks in the data flow from collection to storage.
ii.
Data Storage Protection
In the field of CI, data storage security forms the foundation of network defense. BT can provide a trusted environment for data storage in CI. Researchers have primarily focused on the use of BT in the field of network security for CI, with a particular emphasis on industrial control systems, communication systems, and cloud storage, as indicated in Table 10.
In the field of industrial control system security, researchers primarily utilize BT to protect data during the training and testing phases of machine learning models [119] and maintain data throughout the data storage of the entire industrial control system [123]. This approach enables defense against four types of attacks: random label flipping, target label flipping, fast gradient sign method, and Jacobian saliency map attacks. In the field of communication system security, researchers have created a distributed environment based on BT to prevent data forgery or loss during the communication phase of information–physical systems [120,125]. Furthermore, Otoum et al. [121] designed a blockchain-federated learning model. This model decentralizes the learning process and utilizes blockchain to securely protect the transmission of intermediate parameters, ensuring the privacy and security of critical IoT infrastructure systems. In the field of cloud storage, researchers have proposed a security data source framework for cloud-centric IoT networks. They have achieved this by leveraging blockchain smart contracts in conjunction with the immutability, determinism, and public nature of traditional cloud infrastructure. This framework is designed for securely recording data operations occurring in cloud environments. In the impact of the above research on the food and agriculture sector, the design of industrial control system research methods protects the accuracy and reliability of production data, which is critical for the food and agriculture sectors. The design of communication systems prevents data falsification or loss, enhancing the security of food traceability and supply chain management. The design of cloud storage frameworks improves the efficiency and security of cloud-based processing of agricultural data, including crop monitoring and market data analysis.
Scholars leverage BT to provide a trustworthy data storage environment. Through smart contracts, data are comprehensively recorded, and their security is maintained through collaborative efforts from network nodes. This research offers higher security compared to traditional centralized storage methods. However, it is worth noting that scholars have not extensively delved into the study of storage costs. BT poses challenges in terms of storage performance and costs when applied to large-scale storage processes.

4.3. Post-Attack of OTCI

After a cyberattack on CI and the removal of the attack’s malware, the recovery, assessment, and attribution of relevant data play a vital role in rapidly restoring the CI to normalcy and providing targeted protection against future network attacks. Scholars mainly explore the use of BT in the recovery, assessment, and attribution of CI after cyberattacks.

4.3.1. Data Backup and Recovery

To the data redundancy mechanism on the BT, where all nodes collectively maintain and store the entire data or relevant data hashes, BT ensures data integrity and prevents data loss. It also enables rapid, secure, and trustworthy data recovery. Scholars primarily focus on the fields of the IoT, healthcare systems, and ICS, as shown in Table 11.
In the field of IoT security, Alfandi et al. [127] constructed a blockchain-based architecture for the IoT to provide distributed storage functionality. Through the Byzantine Fault Tolerance (BFT) mechanism, CI can continue functioning even when one or more of its components fail. In the field of healthcare system security, to ensure real-time tracking and monitoring of patient health, scholars have eliminated single points of failure by distributing data and interaction records on a blockchain network. This ensures the trustworthy recovery of the electronic healthcare system [128]. In the field of industrial control systems, network attacks on log devices can jeopardize any forensic analysis, whether it is used for maintenance or discovering traces of attacks. Researchers use blockchain to protect factory operational data stored in historical databases and data exchanges in the network. They support efficient replication mechanisms to recover data after attacks [126,129]. In the impact of the above research on the food and agriculture sector, the blockchain architecture for the internet of things enhances the security of agricultural data and the traceability of the food supply chain. At the same time, the blockchain distribution of medical data improves the security of agricultural workers’ health information and strengthens trust in healthcare services for agricultural communities. The data recovery mechanism of industrial control systems ensures the rapid recovery of agricultural production after a cyberattack, reducing the impact on the food supply chain.
The above-mentioned studies primarily leverage BT for comprehensive data tracking and distributed redundant storage to achieve data backup and recovery. This facilitates rapid, secure, and cost-effective data recovery in the event of network attacks on OTCI. However, in the CI sector, not only is the rapid recovery of data after an attack essential, but also enhancing the resilience of CI operations when faced with network attacks is equally important.

4.3.2. Attack Assessment and Accountability

In the OTCI domain, assessing attacks and attributing attack incidents play a significant role in implementing effective network protection measures for designated CI. BT can indeed provide a means to trace and track data operations. Research primarily focuses on the field of communication systems, where accountability is achieved through mechanisms such as signature schemes [133], decentralized architectures [131], and incentive structures. These approaches promote automatic assessment, encourage user participation in audits, and penalize unintentional or malicious activities [134]. For example, Faisal et al. [130] introduced the BEAT (Blockchain-Enabled Accountability and Transparency) infrastructure sharing framework, which enables device-level accountability. Suhail et al. [132] envisioned a blockchain-based digital twin framework, serving as a trusted twin for protecting Trusted Things and Systems in Cyber–Physical Systems (TTS-CPSs). It can track the responsible entities for adding or updating security and safety rules and ensure the trustworthiness of data sources through ICM.
The mentioned research in CI network security indeed provides higher security and automation compared to traditional centralized management models. However, the existing research is primarily focused on attack assessment and accountability. The future research direction may involve the automatic learning of attacks and the deployment of subsequent defense mechanisms.

5. Design of a General Framework for the Blockchain of Operational Technology Security in the Critical Infrastructure

Based on bibliometric analysis and content analysis of CI network security in the OT field, a general framework for blockchain security research in OTCI is proposed in this article, as shown in Figure 9. The general framework is divided into four steps: scenario selection, network attack analysis, blockchain-based network defense model design and deployment, and attack test analysis.
CI areas are divided into 16 major areas by the U.S. Department of Homeland Security, including environmental system security, government facility security, education system security, scientific research system security, industrial control system security, building facility security, digital media system security, social media, and online community security. There are certain differences in data flow methods, infrastructure, stakeholders, life cycles, etc., in each field. Therefore, the first step is to analyze the application field, including traditional network protection methods, scenario characteristics, and related network background requirements.
Secondly, upon confirming the background, our first task is to analyze the types of network attacks suffered in this field, as illustrated in Table 12. Subsequently, the methods employed for each attack are examined, and their distinctive characteristics and commonly used defense measures are identified. It is crucial to pinpoint the occurrence locations of network attacks in CI, which typically encompass external networks, internal networks, various stages of the supply chain, internal logical programs of instrumentation devices, network communications, and data monitoring, among others.
Third, after analyzing the above attacks, automation, decentralization, low score, high efficiency, immutability, and a wide range of blockchain smart contracts are used to solve or optimize problems that cannot be solved by traditional models or technologies in the field of CI network security. The following intelligent protection models are presented, corresponding to OTCI before, during, and after network attacks, as shown in Table 13. After the model design, in order to realize the design function of the model, the related internal mechanisms of the BT are designed, including the customized design of the smart contract, the optimization of the consensus mechanism, the improvement of the storage mechanism, and the design of the encryption algorithm. Then, the development platform, contract development language, deployment mode, etc., are selected. Common development platforms include Ethereum, Hyperledger, Chang’an Chain, Corda, Polkadot, Ergo, etc. Contract development languages include C++, Golang, Java, Solidity, Python, JavaScript, etc. Deployment modes include public chain deployment, private chain deployment, alliance chain deployment, and hybrid chain deployment. Finally, the actual development and deployment are carried out.
Fourth, testing and simulation of network attacks are conducted. Through testing and simulation, the robustness, performance, and weaknesses of the blockchain-based intelligent protection model are tested and fed back to the model design step to optimize the model. Common network attack simulation platforms include Metasploit, CORE Impact, Cobalt Strike, Nessus, CANVAS, etc. At last, the actual scenario is implemented to enhance the network defense capability of CI.
A general framework for OTCI network security research based on BT has been designed, reflecting the steps and methods of BT research in the industry. This framework provides support for subsequent BT research in the field of OTCI network security.

6. Discussion

As the world is moving toward the “Internet of everything”, the networking of OTCI has increased the difficulty of network security, and the risk of cyberattacks on the software layer, hardware layer, communication layer, and application layer of OTCI is increasing. OTCI needs to introduce new technologies to improve network protection capabilities in new environments and contexts. This study presents a comprehensive review of emerging BT research in the field of OTCI cyber security through bibliometric analysis and content analysis. The following section discusses the benefits, challenges, and future research trends for the application of BT in the field of OTCI network security, as illustrated in Figure 10.

6.1. Advantage Analysis

Traditional defenses for CI networks include firewalls, intrusion detection and prevention systems, virtual private networks, intrusion prevention systems, antivirus software, access control lists, and security information and event management. However, these measures are plagued by single points of failure, limited real-time capabilities, complex management, inadequacy against advanced threats, lack of transparency, and reliance on signatures and rules. To enhance network security, research and adoption of emerging technologies like blockchain are advocated to address these shortcomings. Blockchain provides decentralized, transparent, and tamper-resistant security mechanisms to counter the growing complexities of network threats. Based on content analysis, six topics for the application of BT in the OTCI field were identified. In previous research, scholars have conducted certain research in the directions of identity authentication and data verification, secure access control, attack detection and perception, data security and protection, data backup and recovery, and attack assessment and attribution. It can be seen from the analysis that the research focuses on the CI network security technology research.
Without a doubt, BT can bring revolutionary changes to traditional OTCI network protection, especially in the food and agriculture sector. Due to its support for secure and immutable records, blockchain can improve the transparency, traceability, and efficiency of the food industry supply chain. This provides beneficial support for reducing food fraud, improving food safety, and adding new logistics channels for agriculture and food distribution. The application of BT to the OTCI field is considered capable of providing full network protection from the data layer to the physical layer, offering the following advantages.

6.1.1. Enhancing Transparency and Traceability in Food and Agriculture Sector

BT offers transformative advantages for enhancing the transparency and traceability of Operational Technology in food and agriculture CI. By leveraging immutable records and decentralized ledgers, blockchain ensures that every step of the supply chain—from origin to processing and distribution—is securely tracked. This minimizes food fraud and improves food safety by allowing rapid identification of contamination sources. For instance, blockchain-based systems can automate recall processes, reducing response times and improving the accuracy of safety interventions. Furthermore, blockchain-powered smart contracts optimize logistics and inventory management in agricultural operations, streamlining food production and distribution while reducing waste.

6.1.2. Data Validation and Trusted Access Control

The use of BT’s decentralized architecture, anonymity, signature mechanism, consensus mechanism, and customizable, programmable smart contracts can provide trusted identity management for OTCI and increase the credibility and efficiency of OTCI supervision. BT can provide a trusted data environment for CI through the irreversibility of hash signatures. It can prevent the tampering of the identity information of operators, operating equipment, etc. In addition, the data on the BT are jointly maintained by all nodes, and the data are left with marks throughout the process, reducing the risk of data loss and damage. And it can provide multi-source and comprehensive data sources for identity authentication and carrying out multi-attribute verification. Second, smart contracts can operate credibly according to preset functions and automate data analysis and verification. This method reduces personnel participation and operating costs, including time, labor, equipment, materials, etc. At the same time, the credibility of the process is improved. In terms of trusted control, the use of BT can bring fair and secure permission distribution to CI. And it can automatically judge the behavior of personnel and equipment through contracts and then automate the control of permissions to achieve trusted data access.

6.1.3. Increase Security

In the OTCI field, the use of BT provides a higher level of security than traditional means of network protection. In attack detection and perception, first, the consensus mechanism of the BT is designed so that every operation and request requires full-chain node authentication. Therefore, it can provide more refined detection means for attack detection of operation requests. Second, BT provides a trusted execution environment for relevant detection algorithms, and the contract-based detection algorithm is more credible. Third, BT’s data storage model provides a trusted basis for the detection and perception of attacks. In terms of the trusted flow and storage of data, BT adopts asymmetric encryption algorithms, which can greatly increase the flow of data and communication security. This is because each request requires consensus voting from all nodes in the chain. In addition, the distributed, full-node storage mode makes the attackers carry out a comprehensive attack on the data of more than 51% of the nodes of the whole chain before the attack can be successful, increasing the anti-attack of CI.

6.1.4. Attack Traceability

After CI is attacked, the traceability of the BT can be used to locate the location of the attack, which can provide credible evidence for the analysis of the attack. The storage mode of the whole trace can realize the reliable responsibility of the attack and reduce the cost of the responsibility.

6.2. Challenge Analysis

In the field of OTCI, malicious cyber activities have evolved from deliberate destruction to espionage and intellectual property theft, destructive attacks on CI, and ransomware attacks. The use of BT provides a more secure, efficient, and diverse means of attack protection throughout the entire lifecycle than traditional network security protection. However, BT also brings significant challenges that must be addressed to ensure its wider adoption and sustainability. Especially in the CI sector of the food and agriculture sector, adopting BT will also result in significant electricity consumption. This is due to the highly dependent level of computing power based on the proof-of-work mechanism, which leads to the blockchain network consuming a large amount of electricity. This type of electricity consumption not only brings some carbon emissions but also indirectly affects the entire food cycle by increasing competition for resources such as land and water (now converted into energy production). In this situation, the energy structure required for mining activities may conflict with agricultural demand, thereby exacerbating food insecurity in areas already facing resource scarcity pressures.
Blockchain’s energy-intensive nature exacerbates resource competition, particularly in regions reliant on energy-intensive proof-of-work (PoW) mechanisms. The high electricity consumption associated with blockchain operations not only leads to increased carbon emissions but also indirectly impacts critical resources like land and water, which are often diverted to energy production. This competition can significantly affect agricultural productivity and food security in resource-constrained regions.
Additionally, the transformation of traditional CI network security systems poses technical challenges, including the complexity of integrating blockchain with existing OT, training personnel, updating equipment, and building trust in decentralized systems. Secondly, while blockchain’s consensus mechanisms, encryption algorithms, and signature systems are designed for effective real-time detection during network attacks, they are less effective in identifying dormant threats, such as silent network viruses or physically implanted malware. A comprehensive approach combining blockchain with traditional detection methods is necessary to enhance its effectiveness.
Furthermore, performance and efficiency issues remain significant obstacles. As data volume, node numbers, and operational demands increase, blockchain systems may face concurrency and operational delays, limiting their scalability in OTCI environments. Legal and regulatory challenges also hinder blockchain adoption, as compliance with existing regulations and the development of legally sound smart contracts remain complex tasks.
Finally, in the context of sustainability, the resource-intensive nature of blockchain operations must be addressed. Alternative consensus mechanisms, such as proof-of-stake (PoS), directed acyclic graphs (DAGs), and other low-energy architectures, offer promising solutions. Simultaneously, integrating renewable energy sources into blockchain operations can alleviate resource pressures while ensuring environmental sustainability.

6.3. Trend Analysis

Considering the advanced persistent threats faced by OTCI, trend development research and evaluation have been conducted on the application and technical aspects of BT. Key areas of focus include the integration of BT with IoT technology, deep learning, and machine learning algorithms to enhance functionality; the coupling of BT with traditional network protection mechanisms such as firewalls, intrusion detection and prevention systems (IDS/IPS), network intrusion prevention systems (NIDS/IPS), and packet filters; and the advancement of network security research on BT as a new generation of CI, including anti-quantum encryption algorithms, lightweight blockchain, directed acyclic graphs, and more efficient and secure architectural systems [17]. Additionally, challenges such as the insufficient talent pool for blockchain smart contract technology in OTCI are highlighted, necessitating the establishment of specialized training mechanisms, dedicated BT management positions, and improved contract management frameworks. Research on BT-based detection of dormant network viruses within physical devices in OTCI environments is also emphasized. As the results of this study are dynamic and subject to change, the inclusion of new publications, adhering to the September 2023 deadline, is recommended, and periodic updates of this review in future years are suggested.

7. Conclusions

As food and agriculture infrastructure becomes increasingly interconnected and digitalized, blockchain technology (BT) emerges as a transformative tool to address the critical challenges of network security, traceability, and resilience in this domain. This study conducts a comprehensive review by employing bibliometric analysis and content analysis of previous research articles. It aims to reveal the current state of research on BT in OTCI, the challenges it faces, and future development trends. The bibliometric analysis concludes that the main research areas are computer science, engineering, medicine, and environmental science. Regarding development, since 2018, there has been a significant increase in publications on this topic, which has continued in a steady manner until the end of the analysis period. This trend provides a clear understanding of the importance of BT in OTCI research and allows for predictions of growth in the coming years. The leading countries and institutions in this field are the United States, China, and India. Among the most influential authors, Otoum Safa has published the most papers and has the highest work efficiency. Asuquo Philip, Cao Yue, Cruickshank Haitham, Lei Ao, Ogah Chibueze P. Anyigor, and Sun Zhili have the highest citation counts (all with 384 citations) and the highest recognition for their work. On the other hand, the various bibliometric tools used enable the establishment of key research paths, providing useful information for researchers interested in BT in OTCI. The results of the bibliometric analysis contribute to the development of new research, facilitate international collaboration, and provide researchers with the latest opportunities and research gaps in the BT field within OTCI. As food and agricultural infrastructure is a key component of OTCI, the bibliometric analysis helps promote the secure development of food and agricultural infrastructure. In terms of content analysis, six key topics have been outlined, including identity authentication and data validation, secure access control, attack detection and perception, data security and protection, data backup and recovery, and attack assessment and attribution. These findings provide a valuable foundation for exploring the specific applications of BT in food and agriculture systems, a vital subset of CI. Moreover, a general framework for research on BT in OTCI was designed. This study serves to identify the influential areas and publication channels of BT research in OTCI. It provides valuable insights for scholars to gain a comprehensive understanding of recent hot topics and technological trends. Finally, the proposed general framework serves as a guide for integrating BT into food and agriculture operations, from ensuring trusted traceability across supply chains to securing OT in smart farming and food processing. This review can foster the advancement of BT in OTCI, with a specific emphasis on strengthening the security, resilience, and efficiency of networks within food and agriculture systems.
This review has contributed, to some extent, to the development of BT in OTCI, offering valuable insights. However, this study also comes with certain limitations:
  • The research on BT in OTCI has been reviewed; however, there is a limitation in conducting an in-depth analysis of BT research from a computer science perspective;
  • Research on BT in the OTCI is a dynamically evolving field. It is important to note that this study focuses on literature up until September 2023, which means it may not cover the most recent developments in this area;
  • This review primarily provides an overview of BT research within OTCI. The defined six topics have a limited scope, and there is a possibility that some relevant and significant topics may not have been included in the analysis.

Author Contributions

Conceptualization, C.Z., X.P., and X.C.; methodology, C.Z., X.P., X.C., J.L., and Z.W.; software, T.M., L.C., L.D., and L.W.; validation, X.P., X.C., Z.W., and T.M.; formal analysis, L.D., L.W., and Z.S.; investigation, X.P., C.Z., J.L., and Z.W.; data curation, X.C., Z.W., and T.M.; writing—original draft preparation, X.P., C.Z., J.L., and Z.W.; writing—review and editing, C.Z., X.P., X.C., T.M., L.C., and L.D.; supervision, X.C. and Z.S.; project administration, L.C., L.D., and L.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by Key R&D projects in Hubei Province under Grant No. 2022BAA041; 131 plc security research project.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The authors declare that the data supporting the findings of this study are available from the authors.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Appendix A

No.Journal NameTPIFHWQSubject Area
1IEEE INTERNET OF THINGS JOURNAL98.247Q1COMPUTER SCIENCE
2IEEE ACCESS93.456Q2COMPUTER SCIENCE
3ELECTRONICS42.621Q2ENGINEERING
4CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS33.635Q1COMPUTER SCIENCE
5WIRELESS PERSONAL COMMUNICATIONS21.948Q3COMPUTER SCIENCE
6SUSTAINABLE CITIES AND SOCIETY210.525Q1ENGINEERING
7SUSTAINABILITY23.653Q2ENVIRONMENTAL SCIENCES
8SCIENTIFIC REPORTS23.8149Q1MULTIDISCIPLINARY SCIENCES
9JOURNAL OF SYSTEMS ARCHITECTURE23.742Q1COMPUTER SCIENCE
10IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS27.9112Q1ENGINEERING
11IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS211.7100Q1ENGINEERING
12COMPUTERS & SECURITY24.877Q1COMPUTER SCIENCE
13CMC-COMPUTERS MATERIALS & CONTINUA2227Q3COMPUTER SCIENCE
14WORLD ELECTRIC VEHICLE JOURNAL12.6NoneQ2ENGINEERING
15TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES12.518Q3TELECOMMUNICATIONS
16SYMMETRY-BASEL12.224Q2MATHEMATICS
17SENSORS13.4132Q2MULTIDISCIPLINARY SCIENCES
18PERVASIVE AND MOBILE COMPUTING1353Q2COMPUTER SCIENCE
19NEURAL COMPUTING & APPLICATIONS14.557Q2COMPUTER SCIENCE
20KUWAIT JOURNAL OF SCIENCE11.29Q3MULTIDISCIPLINARY SCIENCES
21JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATION11.4NoneQ3ECONOMICS
22JOURNAL OF SUPERCOMPUTING12.549Q2COMPUTER SCIENCE
23JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT14.130Q1COMPUTER SCIENCE
24JOURNAL OF MEDICAL INTERNET RESEARCH15.8116Q1MEDICAL
25JOURNAL OF INTELLIGENT & FUZZY SYSTEMS11.746Q3COMPUTER SCIENCE
26JOURNAL OF INFORMATION SECURITY AND APPLICATIONS13.8NoneQ2COMPUTER SCIENCE
27JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT17.4NoneQ1MANAGEMENT
28Journal of Applied Sciences1NoneNoneNoneCOMPUTER SCIENCE
29INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS11.938Q3COMPUTER SCIENCE
30INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS10.7NoneQ3COMPUTER SCIENCE, THEORY & METHODS
31INTELLIGENT COMPUTING1NoneNoneNoneCOMPUTER SCIENCE
32INFORMATION PROCESSING & MANAGEMENT17.488Q1MANAGEMENT, COMPUTER SCIENCE
33INFORMATION12.4NoneQ3COMPUTER SCIENCE, INFORMATION SYSTEMS
34IEEE WIRELESS COMMUNICATIONS110.9139Q1COMPUTER SCIENCE
35IEEE TRANSACTIONS ON SERVICES COMPUTING15.556Q1COMPUTER SCIENCE
36IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT14.731Q1COMPUTER SCIENCE
37IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING15.131Q1COMPUTER SCIENCE
38IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING1759Q1COMPUTER SCIENCE
39IEEE NETWORK16.8111Q1COMPUTER SCIENCE
40IEEE COMMUNICATIONS MAGAZINE18.3213Q1COMPUTER SCIENCE
41FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE16.293Q1COMPUTER SCIENCE
42DRONES14.4NoneQ1REMOTE SENSING
43DIAGNOSTICS13NoneQ1MEDICINE
44CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE11.560Q2COMPUTER SCIENCE
45COMPUTERS IN INDUSTRY18.287Q1COMPUTER SCIENCE
46COMPUTERS & ELECTRICAL ENGINEERING1449Q1COMPUTER SCIENCE
47COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING18.568Q1CONSTRUCTION & BUILDING TECHNOLOGY
48COMPUTER NETWORKS14.4119Q1COMPUTER SCIENCE
49COMPUTER COMMUNICATIONS14.591Q1COMPUTER SCIENCE
50COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE1None42NoneMATHEMATICAL & COMPUTATIONAL BIOLOGY-NEUROSCIENCES
51APPLIED ARTIFICIAL INTELLIGENCE12.952Q2COMPUTER SCIENCE
52ALEXANDRIA ENGINEERING JOURNAL16.2NoneQ1ENGINEERING, MULTIDISCIPLINARY
53AD HOC NETWORKS14.479Q1COMPUTER SCIENCE
TP = total publications; H = h-index; IF = impact factor; WQ = WoS quartile.

References

  1. CISA Food and Agriculture Sector. Available online: https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/food-and-agriculture-sector (accessed on 28 November 2024).
  2. Zahedi, R.; Yousefi, H.; Aslani, A.; Ahmadi, R. Water, energy, food and environment nexus (WEFEN): Sustainable transition, gaps and Covering approaches. Energy Strategy Rev. 2024, 54, 101496. [Google Scholar] [CrossRef]
  3. Beckman, J.; Countryman, A.M. The importance of agriculture in the economy: Impacts from COVID-19. Am. J. Agric. Econ. 2021, 103, 1595–1611. [Google Scholar] [CrossRef] [PubMed]
  4. Ghadge, A.; Wurtmann, H.; Seuring, S. Managing climate change risks in global supply chains: A review and research agenda. Int. J. Prod. Res. 2020, 58, 44–64. [Google Scholar] [CrossRef]
  5. Sung, T.K. Industry 4.0: A Korea perspective. Technol. Forecast. Soc. Change 2018, 132, 40–45. [Google Scholar] [CrossRef]
  6. Firoozjaei, M.D.; Mahmoudyar, N.; Baseri, Y.; Ghorbani, A.A. An evaluation framework for industrial control system cyber incidents. Int. J. Crit. Infrastruct. Prot. 2022, 36, 100487. [Google Scholar] [CrossRef]
  7. Hajda, J.; Jakuszewski, R.; Ogonowski, S. Security challenges in industry 4.0 plc systems. Appl. Sci. 2021, 11, 9785. [Google Scholar] [CrossRef]
  8. Lei, A.; Cruickshank, H.; Cao, Y.; Asuquo, P.; Ogah, C.P.A.; Sun, Z. Blockchain-based dynamic key management for heter-ogeneous intelligent transportation systems. IEEE Internet Things J. 2017, 4, 1832–1843. [Google Scholar] [CrossRef]
  9. Wang, C.; Shen, J.; Lai, J.-F.; Liu, J. B-TSCA: Blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs. IEEE Trans. Emerg. Top. Comput. 2020, 9, 1386–1396. [Google Scholar] [CrossRef]
  10. Reilly, E.; Maloney, M.; Siegel, M.; Falco, G. An iot integrity-first communication protocol via an ethereum blockchain light client. In Proceedings of the 2019 IEEE/ACM 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT), Montreal, QC, Canada, 27 May 2019; pp. 53–56. [Google Scholar]
  11. Wu, Y.; Dai, H.-N.; Wang, H. Convergence of blockchain and edge computing for secure and scalable IIoT critical infra-structures in industry 4.0. IEEE Internet Things J. 2020, 8, 2300–2317. [Google Scholar] [CrossRef]
  12. Kendzierskyj, S.; Jahankhani, H. The role of blockchain in supporting critical national infrastructure. In Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK, 16–18 January 2019; pp. 208–212. [Google Scholar]
  13. Kumar, A.; Sharma, S.; Singh, A.; Alwadain, A.; Choi, B.-J.; Manual-Brenosa, J.; Ortega-Mansilla, A.; Goyal, N. Revolutionary strategies analysis and proposed system for future infrastructure in internet of things. Sustainability 2021, 14, 71. [Google Scholar] [CrossRef]
  14. Abir, S.A.A.; Anwar, A.; Choi, J.; Kayes, A. Iot-enabled smart energy grid: Applications and challenges. IEEE Access 2021, 9, 50961–50981. [Google Scholar] [CrossRef]
  15. Alfandi, O.; Khanji, S.; Ahmad, L.; Khattak, A. A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues. Clust. Comput. 2021, 24, 37–55. [Google Scholar] [CrossRef]
  16. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://assets.pubpub.org/d8wct41f/31611263538139.pdf (accessed on 9 January 2025).
  17. Peng, X.; Zhang, X.; Wang, X.; Li, H.; Xu, J.; Zhao, Z.; Wang, Y. Research on the cross-chain model of rice supply chain su-pervision based on parallel blockchain and smart contracts. Foods 2022, 11, 1269. [Google Scholar] [CrossRef] [PubMed]
  18. Puente, L.; Char, C.; Patel, D.; Thilakarathna, M.S.; Roopesh, M. Research Trends and Development Patterns in Microgreens Publications: A Bibliometric Study from 2004 to 2023. Sustainability 2024, 16, 6645. [Google Scholar] [CrossRef]
  19. Singh, S.K.; Jeong, Y.-S.; Park, J.H. A deep learning-based IoT-oriented infrastructure for secure smart city. Sustain. Cities Soc. 2020, 60, 102252. [Google Scholar] [CrossRef]
  20. Noble, M.; Wang, Z. Securing critical infrastructures with location based authentication blockchain. In Proceedings of the Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems, Denver, CO, USA, 27 March 2019; pp. 217–224. [Google Scholar]
  21. Prodan, R.; Saurabh, N.; Zhao, Z.; Orton-Johnson, K.; Chakravorty, A.; Karadimce, A.; Ulisses, A. ARTICONF: Towards a smart social media ecosystem in a blockchain federated environment. In Proceedings of the European Conference on Parallel Processing, Göttingen, Germany, 26–30 August 2019; pp. 417–428. [Google Scholar]
  22. Rivera, A.O.G.; Tosh, D.K. Towards security and privacy of SCADA systems through decentralized architecture. In Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7 December 2019; pp. 1224–1229. [Google Scholar]
  23. Singh, P.; Masud, M.; Hossain, M.S.; Kaur, A.; Muhammad, G.; Ghoneim, A. Privacy-preserving serverless computing using federated learning for smart grids. IEEE Trans. Ind. Inform. 2021, 18, 7843–7852. [Google Scholar] [CrossRef]
  24. Samy, S.; Azab, M.; Rizk, M. Towards a secured blockchain-based smart grid. In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Virtual, 27–30 January 2021; pp. 1066–1069. [Google Scholar]
  25. Namane, S.; Ahmim, M.; Kondoro, A.; Dhaou, I.B. Blockchain-based authentication scheme for collaborative traffic light systems using fog computing. Electronics 2023, 12, 431. [Google Scholar] [CrossRef]
  26. Aman, M.N.; Javaid, U.; Sikdar, B. A privacy-preserving and scalable authentication protocol for the internet of vehicles. IEEE Internet Things J. 2020, 8, 1123–1139. [Google Scholar] [CrossRef]
  27. Gomez Rivera, A.O.; Tosh, D.K.; Ghosh, U. Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain. Clust. Comput. 2022, 25, 1869–1883. [Google Scholar] [CrossRef]
  28. Stephen, S.M.; Jaekel, A. Blockchain based vehicle authentication scheme for vehicular ad-hoc networks. In Proceedings of the 2021 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops), Nagoya, Japan, 11–17 July 2021; pp. 1–6. [Google Scholar]
  29. Reyneke, M.; Mullins, B.; Reith, M. LoRaWAN & The Helium Blockchain: A Study on Military IoT Deployment. In Proceedings of the International Conference on Cyber Warfare and Security, Baltimore, MD, USA, 9–10 March 2023; pp. 327–337. [Google Scholar]
  30. Karim, S.M.; Habbal, A.; Chaudhry, S.A.; Irshad, A. BSDCE-IoV: Blockchain-based secure data collection and exchange scheme for IoV in 5G environment. IEEE Access 2023, 11, 36158–36175. [Google Scholar] [CrossRef]
  31. Sukumaran, R.P.; Benedict, S. Survey on blockchain enabled authentication for industrial Internet of Things. In Proceedings of the 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 11–13 November 2021; pp. 1510–1516. [Google Scholar]
  32. Fu, X.; Wang, H.; Shi, P.; Zhang, X. Teegraph: A Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT. J. Syst. Archit. 2022, 122, 102344. [Google Scholar] [CrossRef]
  33. Yeasmin, S.; Baig, A. Permissioned blockchain: Securing industrial IoT environments. Int. J. Adv. Com-Puter Sci. Appl. 2021, 12, 715–725. [Google Scholar] [CrossRef]
  34. Hu, N.; Yin, S.; Su, S.; Jia, X.; Xiang, Q.; Liu, H. Blockzone: A decentralized and trustworthy data plane for DNS. Comput. Mater. Contin. 2020, 65, 1531–1557. [Google Scholar] [CrossRef]
  35. Nyangaresi, V.O.; Abduljabbar, Z.A.; Ma, J.; Al Sibahee, M.A. Verifiable security and privacy provisioning protocol for high reliability in smart healthcare communication environment. In Proceedings of the 2022 4th Global Power, Energy and Communication Conference (GPECOM), Nevsehir, Turkey, 14–17 June 2022; pp. 569–574. [Google Scholar]
  36. Fang, H. Intelligent Security Provisioning and Trust Management for Future Wireless Communications. Ph.D. Thesis, The University of Western Ontario, London, ON, Canada, August 2020. [Google Scholar]
  37. Adja, Y.C.E.; Hammi, B.; Serhrouchni, A.; Zeadally, S. A blockchain-based certificate revocation management and status verification system. Comput. Secur. 2021, 104, 102209. [Google Scholar] [CrossRef]
  38. Burra, M.S.; Maity, S. A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks. IEEE Access 2023, 11, 42595–42618. [Google Scholar] [CrossRef]
  39. Elia, N.; Barchi, F.; Parisi, E.; Pompianu, L.; Carta, S.; Bartolini, A.; Acquaviva, A. Smart contracts for certified and sustainable safety-critical continuous monitoring applications. In Proceedings of the European Conference on Advances in Databases and Information Systems, Turin, Italy, 5–8 September 2022; pp. 377–391. [Google Scholar]
  40. Aldweesh, A. A Blockchain-Based Data Authentication Algorithm for Secure Information Sharing in Internet of Vehicles. World Electr. Veh. J. 2023, 14, 223. [Google Scholar] [CrossRef]
  41. Youssef, S.B.H.; Boudriga, N. A resilient micro-payment infrastructure: An approach based on blockchain technology. Kuwait J. Sci. 2022, 49, 1–27. [Google Scholar] [CrossRef]
  42. Vashistha, M.; Barbhuiya, F.A. Blockchain in Smart Power Grid Infrastructure. In Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, Auckland, New Zealand, 8 July 2019; pp. 89–96. [Google Scholar]
  43. Yi, H. A secure blockchain system for Internet of Vehicles based on 6G-enabled Network in Box. Comput. Commun. 2022, 186, 45–50. [Google Scholar] [CrossRef]
  44. Otoum, S.; Al Ridhawi, I.; Mouftah, H. A federated learning and blockchain-enabled sustainable energy trade at the edge: A framework for industry 4.0. IEEE Internet Things J. 2022, 10, 3018–3026. [Google Scholar] [CrossRef]
  45. Kaur, K.; Garg, S.; Kaddoum, G.; Gagnon, F.; Ahmed, S.H. Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  46. Rendon, C.M.; González-Compeán, J.; Sánchez-Gallegos, D.D.; Carretero, J. Blockchain-based schemes for continuous verifiability and traceability of IoT data. In Proceedings of the 2023 31st Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Naples, Italy, 1–3 March 2023; pp. 169–172. [Google Scholar]
  47. Monfared, S.K.; Shokrollahi, S. DARVAN: A fully decentralized anonymous and reliable routing for VANets. Comput. Netw. 2023, 223, 109561. [Google Scholar] [CrossRef]
  48. Kamalov, F.; Gheisari, M.; Liu, Y.; Feylizadeh, M.R.; Moussa, S. Critical controlling for the network security and privacy based on blockchain technology: A fuzzy dematel approach. Sustainability 2023, 15, 10068. [Google Scholar] [CrossRef]
  49. Su, L.; Cheng, Y.; Meng, H.; Thing, V.; Wang, Z.; Kong, L.; Cheng, L. Securing Intelligent Transportation System: A Block-chain-Based Approach with Attack Mitigation. In Proceedings of the Smart Blockchain: Second International Conference, SmartBlock 2019, Birmingham, UK, 11–13 October 2019; pp. 109–119. [Google Scholar]
  50. George, S.A.; Stephen, S.M.; Jaekel, A. Blockchain-based pseudonym management scheme for vehicular communication. Electronics 2021, 10, 1584. [Google Scholar] [CrossRef]
  51. Jain, G.; Singh, H.; Chaturvedi, K.R.; Rakesh, S. Blockchain in logistics industry: In fizz customer trust or not. J. En-Terprise Inf. Manag. 2020, 33, 541–558. [Google Scholar] [CrossRef]
  52. Li, X.; Zeng, J.; Chen, C.; Chi, H.L.; Shen, G.Q. Smart work package learning for decentralized fatigue monitoring through facial images. Comput. -Aided Civ. Infrastruct. Eng. 2023, 38, 799–817. [Google Scholar] [CrossRef]
  53. Putra, G.D.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Toward blockchain-based trust and reputation management for trust-worthy 6G networks. IEEE Netw. 2022, 36, 112–119. [Google Scholar] [CrossRef]
  54. Lalouani, W. AI Cyber Threat in Cyber Physical Systems. Ph.D. Thesis, University of Maryland, Baltimore, MD, USA, 2022. [Google Scholar]
  55. Suciu, G.; Farao, A.; Bernardinetti, G.; Palamà, I.; Sachian, M.-A.; Vulpe, A.; Vochin, M.-C.; Muresan, P.; Bampatsikos, M.; Muñoz, A. SAMGRID: Security authorization and monitoring module based on SealedGRID platform. Sensors 2022, 22, 6527. [Google Scholar] [CrossRef] [PubMed]
  56. Gaba, S.; Khan, H.; Almalki, K.J.; Jabbari, A.; Budhiraja, I.; Kumar, V.; Singh, A.; Singh, K.K.; Askar, S.S.; Abouhawwash, M. Holochain: An agent-centric distributed hash table security in smart IoT applications. IEEE Access 2023, 11, 81205–81223. [Google Scholar] [CrossRef]
  57. Halgamuge, M.N. Latency estimation of blockchain-based distributed access control for cyber infrastructure in the IoT environment. In Proceedings of the 2021 IEEE 16th Conference on Industrial Electronics and Applications (ICIEA), Chengdu, China, 1–4 August 2021; pp. 510–515. [Google Scholar]
  58. Ivanov, N.; Yan, Q. AutoThing: A Secure Transaction Framework for Self-Service Things. IEEE Trans. Serv. Com-Puting 2022, 16, 983–995. [Google Scholar] [CrossRef]
  59. Kong, L.; Chen, C.; Zhao, R.; Chen, Z.; Wu, L.; Yang, Z.; Li, X.; Lu, W.; Xue, F. When permissioned blockchain meets IoT oracles: An on-chain quality assurance system for off-shore modular construction manufacture. In Proceedings of the 2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain), Irvine, CA, USA, 7–11 November 2022; pp. 1–6. [Google Scholar]
  60. Lei, K.; Huang, S.; Huang, J.; Liu, H.; Liu, J. Intelligent eco networking (ien) ii: A knowledge-driven future internet infrastructure for value-oriented ecosystem. In Proceedings of the 2019 2nd International Conference on Hot Information-Centric Networking (HotICN), Chongqing, China, 13–15 December 2019; pp. 31–36. [Google Scholar]
  61. Mhaisen, N.; Fetais, N.; Massoud, A. Secure smart contract-enabled control of battery energy storage systems against cyber-attacks. Alex. Eng. J. 2019, 58, 1291–1300. [Google Scholar] [CrossRef]
  62. Won, J.; Singla, A.; Bertino, E.; Bollella, G. Decentralized public key infrastructure for internet-of-things. In Proceedings of the MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 907–913. [Google Scholar]
  63. Xing, Q.; Wang, B.; Wang, X. Bgpcoin: Blockchain-based internet number resource authority and bgp security solution. Symmetry 2018, 10, 408. [Google Scholar] [CrossRef]
  64. Lazrag, H.; Chehri, A.; Saadane, R.; Rahmani, M.D. Efficient and secure routing protocol based on Blockchain approach for wireless sensor networks. Concurr. Comput. Pract. Exp. 2021, 33, e6144. [Google Scholar] [CrossRef]
  65. Xenakis, D.; Tsiota, A.; Koulis, C.-T.; Xenakis, C.; Passas, N. Contract-less mobile data access beyond 5G: Fully-decentralized, high-throughput and anonymous asset trading over the blockchain. IEEE Access 2021, 9, 73963–74016. [Google Scholar] [CrossRef]
  66. Awais Hassan, M.; Habiba, U.; Ghani, U.; Shoaib, M. A secure message-passing framework for inter-vehicular communication using blockchain. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719829677. [Google Scholar] [CrossRef]
  67. Haddaji, A.; Ayed, S.; Chaari, L. Federated learning with blockchain approach for trust management in IoV. In Proceedings of the International Conference on Advanced Information Networking and Applications, Sydney, NSW, Australia, 13–15 April 2022; pp. 411–423. [Google Scholar]
  68. Hassan, M.; Gregory, M.; Li, S. Blockchain enhanced BGP4 Security for an SDN based Federation. In Proceedings of the 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), Wellington, New Zealand, 30 November–2 December 2022; pp. 1–7. [Google Scholar]
  69. Khan, A.A.; Laghari, A.A.; Li, P.; Dootio, M.A.; Karim, S. The collaborative role of blockchain, artificial intelligence, and industrial internet of things in digitalization of small and medium-size enterprises. Sci. Rep. 2023, 13, 1656. [Google Scholar] [CrossRef]
  70. Dubovitskaya, A.; Baig, F.; Xu, Z.; Shukla, R.; Zambani, P.S.; Swaminathan, A.; Jahangir, M.M.; Chowdhry, K.; Lachhani, R.; Idnani, N. ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care. J. Med. Internet Res. 2020, 22, e13598. [Google Scholar] [CrossRef]
  71. Sharma, S.; Ghanshala, K.K.; Mohan, S. Blockchain-based internet of vehicles (IoV): An efficient secure ad hoc vehicular networking architecture. In Proceedings of the 2019 IEEE 2nd 5G World Forum (5GWF), Dresden, Germany, 30 September–2 October 2019; pp. 452–457. [Google Scholar]
  72. Cheema, M.A.; Shehzad, M.K.; Qureshi, H.K.; Hassan, S.A.; Jung, H. A drone-aided blockchain-based smart vehicular network. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4160–4170. [Google Scholar] [CrossRef]
  73. Ragab, M.; Altalbe, A. A Blockchain-based architecture for enabling cybersecurity in the internet-of-critical infrastructures. Comput. Mater. Contin. 2022, 72, 1579–1592. [Google Scholar] [CrossRef]
  74. Sai Ganesh, S.; Surya Siddharthan, S.; Rajakumar, B.R.; Neelavathy Pari, S.; Padmanabhan, J.; Priya, V. Hybrid-AI blockchain supported protection framework for smart grids. In Proceedings of the Science and Information Conference, London, UK, 14–15 July 2022; pp. 646–659. [Google Scholar]
  75. Nasir, M.H.; Arshad, J.; Khan, M.M. Collaborative device-level botnet detection for internet of things. Comput. Secur. 2023, 129, 103172. [Google Scholar] [CrossRef]
  76. Graf, R.; King, R. Neural network and blockchain based technique for cyber threat intelligence and situational awareness. In Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 29 May–1 June 2018; pp. 409–426. [Google Scholar]
  77. Mylrea, M.; Gourisetti, S.N.G. Blockchain for supply chain cybersecurity, optimization and compliance. In Proceedings of the 2018 resilience week (RWS), Denver, CO, USA, 20–23 August 2018; pp. 70–76. [Google Scholar]
  78. Demertzis, K.; Iliadis, L.; Tziritas, N.; Kikiras, P. Anomaly detection via blockchained deep learning smart contracts in in-dustry 4.0. Neural Comput. Appl. 2020, 32, 17361–17378. [Google Scholar] [CrossRef]
  79. Liang, X.; Konstantinou, C.; Shetty, S.; Bandara, E.; Sun, R. Decentralizing cyber physical systems for resilience: An innovative case study from a cybersecurity perspective. Comput. Secur. 2023, 124, 102953. [Google Scholar] [CrossRef]
  80. Vargas, H.; Lozano-Garzon, C.; Montoya, G.A.; Donoso, Y. Detection of security attacks in industrial IoT networks: A blockchain and machine learning approach. Electronics 2021, 10, 2662. [Google Scholar] [CrossRef]
  81. Finogeev, A.; Deev, M.; Parygin, D.; Finogeev, A. Intelligent SDN Architecture with Fuzzy Neural Network and Blockchain for Monitoring Critical Events. Appl. Artif. Intell. 2022, 36, 2145634. [Google Scholar] [CrossRef]
  82. Eisenbarth, J.-P.; Cholez, T.; Perrin, O. Ethereum’s peer-to-peer network monitoring and sybil attack prevention. J. Netw. Syst. Manag. 2022, 30, 65. [Google Scholar] [CrossRef]
  83. Zhang, H.; Zhang, W.; Feng, Y.; Liu, Y. SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction. J. Inf. Secur. Appl. 2023, 75, 103484. [Google Scholar] [CrossRef]
  84. Zhang, X.; Zhu, H.; Zhou, J. Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms. In Proceedings of the AAAI Conference on Artificial Intelligence, New York, NY, USA, 7–12 February 2020; pp. 1194–1201. [Google Scholar]
  85. Awan, S.M.; Azad, M.A.; Arshad, J.; Waheed, U.; Sharif, T. A blockchain-inspired attribute-based zero-trust access control model for IoT. Information 2023, 14, 129. [Google Scholar] [CrossRef]
  86. Alangot, B.; Reijsbergen, D.; Venugopalan, S.; Szalachowski, P.; Yeo, K.S. Decentralized and lightweight approach to detect eclipse attacks on proof of work blockchains. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1659–1672. [Google Scholar] [CrossRef]
  87. Alsulami, F.N. A Comprehensive Analysis of the Environmental Impact on ROPUFs employed in Hardware Security, and Techniques for Trojan Detection. Ph.D. Thesis, The University of Toledo, Toledo, OH, USA, December 2022. [Google Scholar]
  88. Bernieri, G.; Conti, M.; Sovilla, M.; Turrin, F. ALISI: A lightweight identification system based on Iroha. In Proceedings of the 35th Annual ACM Symposium on Applied Computing, Brno, Czech Republic, 30 March–3 April 2020; pp. 271–273. [Google Scholar]
  89. Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R. A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Trans. Emerg. Telecommun. Technol. 2021, 32, e4112. [Google Scholar] [CrossRef]
  90. He, S.; Ren, W.; Zhu, T.; Choo, K.-K.R. BoSMoS: A blockchain-based status monitoring system for defending against unau-thorized software updating in industrial Internet of Things. IEEE Internet Things J. 2019, 7, 948–959. [Google Scholar] [CrossRef]
  91. Kumar, R.; Kumar, P.; Kumar, A.; Franklin, A.A.; Jolfaei, A. Blockchain and deep learning for cyber threat-hunting in soft-ware-defined industrial IoT. In Proceedings of the 2022 IEEE International Conference on Communications Workshops (ICC Workshops), Seoul, Republic of Korea, 16 May–20 May 2022; pp. 776–781. [Google Scholar]
  92. Kravitz, D.W. Transaction immutability and reputation traceability: Blockchain as a platform for access controlled IoT and human interactivity. In Proceedings of the 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, Canada, 28–30 August 2017; pp. 3–309. [Google Scholar]
  93. Mansour, R.F. Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci. Rep. 2022, 12, 12937. [Google Scholar] [CrossRef] [PubMed]
  94. Chauhdary, S.H.; Alkatheiri, M.S.; Alqarni, M.A.; Saleem, S. An efficient evolutionary deep learning-based attack prediction in supply chain management systems. Comput. Electr. Eng. 2023, 109, 108768. [Google Scholar] [CrossRef]
  95. Shaikh, J.A.; Wang, C.; Khan, M.A.; Mohsan, S.A.H.; Ullah, S.; Chelloug, S.A.; Muthanna, M.S.A.; Muthanna, A. A uav-assisted stackelberg game model for securing lomt healthcare networks. Drones 2023, 7, 415. [Google Scholar] [CrossRef]
  96. Alangot, B.; Reijsbergen, D.; Venugopalan, S.; Szalachowski, P. Decentralized lightweight detection of eclipse attacks on bitcoin clients. In Proceedings of the 2020 IEEE international Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020; pp. 337–342. [Google Scholar]
  97. Zhang, M.; Liu, J.; Feng, K.; Beltran, F.; Zhang, Z. SmartAuction: A blockchain-based secure implementation of private data queries. Future Gener. Comput. Syst. 2023, 138, 198–211. [Google Scholar] [CrossRef]
  98. Shin, J.S.; Lee, S.; Choi, S.; Jo, M.; Lee, S.-H. A new distributed, decentralized privacy-preserving ID registration system. IEEE Commun. Mag. 2021, 59, 138–144. [Google Scholar] [CrossRef]
  99. Mena, D.M.M. Blockchain-Based Security Framework for the Internet of Things and Home Networks. Ph.D. Thesis, Purdue University, West Lafayette, IN, USA, May 2021. [Google Scholar]
  100. Campbell, R. Transitioning to a hyperledger fabric quantum-resistant classical hybrid public key infrastructure. J. Br. Blockchain Assoc. 2019, 2, 11. [Google Scholar] [CrossRef]
  101. Apeh, A.J.; Ayo, C.K.; Adebiyi, A. A Scalable Blockchain Implementation Model for Nation-Wide Electronic Voting System. In Proceedings of the Computational Science and Its Applications–ICCSA 2021: 21st International Conference, Cagliari, Italy, 13–16 September 2021; pp. 84–100. [Google Scholar]
  102. George, S.A.; Jaekel, A.; Saini, I. Secure identity management framework for vehicular ad-hoc network using blockchain. In Proceedings of the 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, 7–10 July 2020; pp. 1–6. [Google Scholar]
  103. Moges, E.; Han, T. DecOp: Decentralized Network Operations in Software Defined Networking using Blockchain. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, Canada, 6–9 July 2020; pp. 225–230. [Google Scholar]
  104. Shukla, P.; Patel, R.; Varma, S. A novel of congestion control architecture using edge computing and trustworthy blockchain system. J. Intell. Fuzzy Syst. 2023, 44, 6303–6326. [Google Scholar] [CrossRef]
  105. Wang, L.; Zheng, Y.; Zhang, Y.; Li, F. Secure spectrum sharing for satellite internet-of-things based on blockchain. Wirel. Pers. Commun. 2023, 131, 357–369. [Google Scholar] [CrossRef]
  106. Moztarzadeh, O.; Jamshidi, M.; Sargolzaei, S.; Keikhaee, F.; Jamshidi, A.; Shadroo, S.; Hauer, L. Metaverse and medical di-agnosis: A blockchain-based digital twinning approach based on MobileNetV2 algorithm for cervical vertebral maturation. Diagnostics 2023, 13, 1485. [Google Scholar] [CrossRef] [PubMed]
  107. Anglés-Tafalla, C.; Viejo, A.; Castellà-Roca, J.; Mut-Puigserver, M.; Payeras-Capellà, M.M. Security and privacy in a block-chain-powered access control system for low emission zones. IEEE Trans. Intell. Transp. Syst. 2022, 24, 580–595. [Google Scholar] [CrossRef]
  108. Sunny, J.; Sankaran, S.; Saraswat, V. Towards a lightweight blockchain platform for critical infrastructure protection. In Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), Singapore, 29 November–1 December 2020; pp. 1287–1292. [Google Scholar]
  109. Otoum, S.; Mouftah, H.T. Enabling trustworthiness in sustainable energy infrastructure through blockchain and AI-assisted solutions. IEEE Wirel. Commun. 2021, 28, 19–25. [Google Scholar] [CrossRef]
  110. Khan, K.M.; Arshad, J.; Iqbal, W.; Abdullah, S.; Zaib, H. Blockchain-enabled real-time SLA monitoring for cloud-hosted services. Clust. Comput. 2022, 25, 537–559. [Google Scholar] [CrossRef]
  111. Dimogerontakis, E.; Navarro, L.; Selimi, M.; Mosquera, S.; Freitag, F. Contract networking for crowdsourced connectivity. In Proceedings of the 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Oxford, UK, 3–6 August 2020; pp. 126–132. [Google Scholar]
  112. Laghari, A.A.; Khan, A.A.; Alkanhel, R.; Elmannai, H.; Bourouis, S. Lightweight-biov: Blockchain distributed ledger tech-nology (bdlt) for internet of vehicles (iovs). Electronics 2023, 12, 677. [Google Scholar] [CrossRef]
  113. Pothumani, S.; Arunachalam, A. Effective security mechanisms for big data using block chain technology. In Proceedings of the 2021 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 27–29 January 2021; pp. 1–6. [Google Scholar]
  114. Peng, X.; Zhang, X.; Wang, X.; Xu, J.; Li, H.; Zhao, Z.; Qi, Z. A refined supervision model of rice supply chain based on multi-blockchain. Foods 2022, 11, 2785. [Google Scholar] [CrossRef]
  115. Mayer, A.H.; Rodrigues, V.F.; da Costa, C.A.; da Rosa Righi, R.; Roehrs, A.; Antunes, R.S. Fogchain: A fog computing ar-chitecture integrating blockchain and internet of things for personal health records. IEEE Access 2021, 9, 122723–122737. [Google Scholar] [CrossRef]
  116. Singh, A.; Kumar, D.; Hötzel, J. IoT Based information and communication system for enhancing underground mines safety and productivity: Genesis, taxonomy and open issues. Ad Hoc Netw. 2018, 78, 115–129. [Google Scholar] [CrossRef]
  117. Ebrahimpour, G.; Haghighi, M.S.; Alazab, M. Can blockchain be trusted in industry 4.0? study of a novel misleading attack on bitcoin. IEEE Trans. Ind. Inform. 2022, 18, 8307–8315. [Google Scholar] [CrossRef]
  118. Wang, D.; Zhu, Y.; Zhang, Y.; Liu, G. Security assessment of blockchain in Chinese classified protection of cybersecurity. IEEE Access 2020, 8, 203440–203456. [Google Scholar] [CrossRef]
  119. Moradpoor, N.; Barati, M.; Robles-Durazno, A.; Abah, E.; McWhinnie, J. Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science, Wales, UK, 20–21 June 2022; pp. 437–451. [Google Scholar]
  120. Raj, J.M.; Ranjani, S.S. A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer. Internet Things 2023, 22, 100823. [Google Scholar]
  121. Otoum, S.; Al Ridhawi, I.; Mouftah, H. Securing critical IoT infrastructures with blockchain-supported federated learning. IEEE Internet Things J. 2021, 9, 2592–2601. [Google Scholar] [CrossRef]
  122. Ali, S.; Wang, G.; Bhuiyan, M.Z.A.; Jiang, H. Secure data provenance in cloud-centric internet of things via blockchain smart contracts. In Proceedings of the 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (Smart-World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Guangzhou, China, 8–12 October 2018; pp. 991–998. [Google Scholar]
  123. Rahman, Z.; Khalil, I.; Yi, X.; Atiquzzaman, M. Blockchain-based security framework for a critical industry 4.0 cyber-physical system. IEEE Commun. Mag. 2021, 59, 128–134. [Google Scholar] [CrossRef]
  124. Tosh, D.; Shetty, S.; Foytik, P.; Kamhoua, C.; Njilla, L. CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud. In Proceedings of the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 2–7 July 2018; pp. 302–309. [Google Scholar]
  125. Hou, L.; Zheng, K.; Liu, Z.; Xu, X.; Wu, T. Design and prototype implementation of a blockchain-enabled LoRa system with edge computing. IEEE Internet Things J. 2020, 8, 2419–2430. [Google Scholar] [CrossRef]
  126. Maw, A.; Adepu, S.; Mathur, A. ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 2019, 59, 101048. [Google Scholar] [CrossRef]
  127. Alfandi, O.; Otoum, S.; Jararweh, Y. Blockchain solution for IoT-based critical infrastructures: Byzantine fault tolerance. In Proceedings of the NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–4. [Google Scholar]
  128. Ahmad, I.; Abdullah, S.; Ahmed, A. IoT-fog-based healthcare 4.0 system using blockchain technology. J. Super-Comput. 2023, 79, 3999–4020. [Google Scholar] [CrossRef] [PubMed]
  129. Colelli, R.; Foglietta, C.; Fusacchia, R.; Panzieri, S.; Pascucci, F. Blockchain application in simulated environment for Cyber-Physical Systems Security. In Proceedings of the 2021 IEEE 19th International Conference on Industrial Informatics (INDIN), Palma de Mallorca, Spain, 21–23 July 2021; pp. 1–7. [Google Scholar]
  130. Faisal, T.; Dohler, M.; Mangiante, S.; Lopez, D.R. BEAT: Blockchain-Enabled Accountable and Transparent Infrastructure Sharing in 6G and Beyond. IEEE Access 2022, 10, 48660–48672. [Google Scholar] [CrossRef]
  131. Wu, T.; Wang, W.; Zhang, C.; Zhang, W.; Zhu, L.; Gai, K.; Wang, H. Blockchain-based anonymous data sharing with ac-countability for Internet of Things. IEEE Internet Things J. 2022, 10, 5461–5475. [Google Scholar] [CrossRef]
  132. Suhail, S.; Malik, S.U.R.; Jurdak, R.; Hussain, R.; Matulevičius, R.; Svetinovic, D. Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins. Comput. Ind. 2022, 141, 103699. [Google Scholar] [CrossRef]
  133. Fan, Q.; Chen, J.; Deborah, L.J.; Luo, M. A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain. J. Syst. Archit. 2021, 117, 102112. [Google Scholar] [CrossRef]
  134. Xu, R.; Li, C.; Joshi, J. Blockchain-based transparency framework for privacy preserving third-party services. IEEE Trans. Dependable Secur. Comput. 2022, 20, 2302–2313. [Google Scholar] [CrossRef]
Figure 1. Blockchain diagram in OTCI.
Figure 1. Blockchain diagram in OTCI.
Foods 14 00251 g001
Figure 2. Literature retrieval and selection strategies.
Figure 2. Literature retrieval and selection strategies.
Foods 14 00251 g002
Figure 3. Review steps.
Figure 3. Review steps.
Foods 14 00251 g003
Figure 4. Year of publication.
Figure 4. Year of publication.
Foods 14 00251 g004
Figure 5. Statistical chart of published journals.
Figure 5. Statistical chart of published journals.
Foods 14 00251 g005
Figure 6. Author co-authorship network diagram.
Figure 6. Author co-authorship network diagram.
Foods 14 00251 g006
Figure 7. Keyword co-occurrence network diagram.
Figure 7. Keyword co-occurrence network diagram.
Foods 14 00251 g007
Figure 8. Schematic diagram of BT protection function in OTCI.
Figure 8. Schematic diagram of BT protection function in OTCI.
Foods 14 00251 g008
Figure 9. Schematic diagram of the general framework of OTCI research based on BT.
Figure 9. Schematic diagram of the general framework of OTCI research based on BT.
Foods 14 00251 g009
Figure 10. The advantages, challenges, and trends of OTCI network security based on BT.
Figure 10. The advantages, challenges, and trends of OTCI network security based on BT.
Foods 14 00251 g010
Table 1. Analysis table of review articles.
Table 1. Analysis table of review articles.
JournalYearFieldAnalytical MethodCensorship Content
[11] 2020Internet of thingsContent analysisIoT/IIoT CI security review in Industry 4.0
[12]2019Healthcare, Cyber–Physical SystemsContent analysisAn introduction to critical national infrastructure cybersecurity
[13]2022Internet of thingsContent analysisThe current state of the art of different IoT architectures, as well as current technologies, applications, challenges, IoT protocols, and opportunities
[14]2021Energy systemContent analysisArchitecture and functionality of IoT-enabled smart energy grid systems
[15]2021Internet of thingsContent analysisSecurity and privacy challenges related to IoT
Table 2. Definition of CI sectors [11].
Table 2. Definition of CI sectors [11].
SectorChinaU.S.GermanyRussia
Chemical Sector
Commercial Facilities Sector
Communications Sector
Critical Manufacturing Sector
Dams Sector
Defense Industrial Base Sector
Emergency Services Sector
Energy Sector
Financial Services Sector
Food and Agriculture Sector
Government Facilities Sector
Healthcare and Public Health Sector
Information Technology Sector
Nuclear Reactors
Materials and Waste Sector
Transportation Systems Sector
Water and Wastewater Sector
Technology/Research Sector
Education Sector
Social Security Sector
Important Internet Applications Sector
Judicial Sector
Media and Culture Sector
Table 3. Country distribution table.
Table 3. Country distribution table.
No.CountryNumber of DocumentsNumber of ReferencesTotal Citations
1USA30839347
2China23946236
3India21954200
4Saudi Arabia1253831
5Pakistan11534108
6United Kingdom9467507
7Canada9199103
8Australia826392
9United Arab Emirates729087
10Singapore617197
Table 4. Analysis of research topics.
Table 4. Analysis of research topics.
Pre-Attack Stage of OTCI Identity Authentication and Data ValidationIdentity Authentication[9,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37]
Data Validation[8,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54]
Security Access Control[55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72]
During-the-Attack Stageof OTCIAttack Detection and Perception[73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96]
Data Security and ProtectionData Transit Protection[10,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118]
Data Storage Protection[119,120,121,122,123,124,125]
Post-Attack Stage of OTCIData Backup and Recovery[126,127,128,129]
Attack Assessment and Attribution[130,131,132,133,134]
Table 5. OTCI identity authentication.
Table 5. OTCI identity authentication.
LiteratureFieldTypes of AttacksEffectImpact on the Food and Agriculture Sector
[19,29,31,32,33,36,37]Communication SystemsInternet of ThingsReplay Attacks, Man-in-the-Middle Attacks, DNS Cache Poisoning, Distributed Denial of Service (DDoS) AttacksReducing authentication costs, enhancing authentication efficiency, and bolstering securityLeading to supply chain disruptions, affecting food supply and prices, as well as consumer trust in food brands
[34]Internet
[20,23,24]Energy SystemsData InjectionEnsuring system resilience, reducing penetration rates, and enhancing the security of smart grid operational managementAffecting the stability of energy systems, thereby impacting the operation of food processing and agricultural machinery
[9,25,26,28,30] Transportation SystemsPhysical, Side-Channel, and Clone AttacksReducing authentication overhead and improving authentication efficiencyImpacting the logistics and distribution of food and agricultural products, leading to supply chain delays or disruptions
[22,27]Industrial Control SystemsDenial of Service Attacks, Data and Identity Deception, and Data PoisoningBy ensuring the integrity and authenticating the identities of underlying sensor data, the reliability of ICS/SCADA ecosystems is enhancedResulting in the tampering of sensor data in industrial control systems, affecting food safety and production efficiency
[21]Social Media and Online CommunitiesIdentity Spoofing, Password Guessing and Cracking, and so onEnsure the trustworthiness of user identities on proprietary social media platformsAttacks on social media affect consumer trust in food brands and influence purchasing decisions
[35]Healthcare SystemAttacks, Side-Channel Attacks, Impersonation Threats, Man-in-the-Middle Attacks, and othersPerform mutual authentication between biometric sensor units and hospital medical serversAttacks on healthcare systems indirectly impact the food and agriculture sector, as they may affect the health and safety of food processing workers
Table 6. OTCI data validation.
Table 6. OTCI data validation.
LiteratureFieldResearch MethodEffectImpact on the Food and Agriculture Sector
[38,46,48,53,54]Communication SystemMethod DesignProvides data auditing to ensure that IoT data streams offer the organization verifiable information, enabling the secure execution of critical decision-making processesBy ensuring IoT data streams provide verifiable information, the security and reliability of data in agricultural decision-making processes are enhanced, contributing to precision agriculture and food safety monitoring
[42,44]Energy SystemSystem/Framework DevelopmentSecure sharing of energy resources among users and devices in a networked environmentSecure sharing of energy resources in a networked environment can improve the energy efficiency of agricultural mechanization and food processing, reducing costs
[8,40,43,45,47,49,50]Transportation SystemMethod DesignMaintains and authenticates shared data to achieve trustworthy information sharing among vehiclesEnsuring the maintenance and authentication of data shared between vehicles enhances the efficiency and safety of agricultural product logistics, minimizing losses during transportation
[41]Financial SystemMethod DesignReduces the complexity of transaction verification, minimizes losses, and prevents various network attacksReducing the complexity of transaction verification, minimizing losses, and preventing cyberattacks contribute to the security and efficiency of agricultural financial services, safeguarding the funds of farmers and agricultural enterprises
[39,52]Building Facility SecurityArchitecture/Method DesignAuthenticates data and human behavior to ensure the security of building facility-related dataAuthenticating data and human behavior to ensure the security of building-related data is critical for the safety of food processing and storage facilities, helping to maintain food safety
Table 7. OTCI security access control.
Table 7. OTCI security access control.
LiteratureFieldResearch MethodEffectImpact on the Food and Agriculture Sector
[66,67,71,72]Transportation SystemsMethod DesignFacilitates secure communication between users in the connected vehicle networkEnsuring secure communication between users in vehicle networks improves the efficiency and safety of agricultural product logistics, reducing losses during transportation and minimizing food waste
[70]Healthcare SystemsCase StudyEnsures secure sharing of electronic health recordsSecuring the sharing of electronic health records helps monitor the health of agricultural workers, thereby enhancing agricultural productivity and food safety
[60,62,63,64,65,68,69]Communication SystemsMethod DesignAchieves personnel and IoT device access management and trusted authorization, ensuring trusted data sharingImplementing access management and trusted authorization for personnel and IoT devices ensures the trusted sharing of agricultural data, improving the decision-making quality and efficiency of precision agriculture
[55,61]Energy SystemsMethod DesignImplements access control for data and other resources using blockchain and smart contractsUsing blockchain and smart contracts to enforce access control for data and other resources enhances the transparency and efficiency of agricultural energy use, reducing costs
[58]Financial SystemsMethod DesignReplaces permissive API with multi-signature transaction tokens, enhancing network defense resilience in self-service terminal systemsReplacing APIs with multi-signature transaction tokens strengthens the cybersecurity of self-service terminal systems, safeguarding agricultural financial services
[57]Industrial Control SystemsMethod DesignEnables distributed access control through authentication and authorizationAchieving distributed access control through authentication and authorization improves the security and efficiency of agricultural automation systems
[59]Building FacilitiesMethod DesignUtilizes a blockchain network to provide authentication functions, ensuring authorized access to channels related to quality inspectionsLeveraging blockchain networks to provide authentication functionality ensures authorized access to quality inspection-related channels, enhancing the safety of food processing facilities and product quality
[56]Food and Agriculture SystemsCase StudyProtects personal data related to agricultural land records and prevents unauthorized accessProtecting personal data related to agricultural land records prevents unauthorized access, ensuring the security of agricultural production data and safeguarding farmers’ rights
Table 8. OTCI attack detection and perception.
Table 8. OTCI attack detection and perception.
LiteratureFieldAttack Detection/Perception CategoriesEffectImpact on the Food and Agriculture Sector
[73,78,91]Industrial Control SystemsFalse Routing AttacksDetect anomalies in relevant infrastructure operational parameters while ensuring anonymity and confidentiality of industrial informationDetecting abnormal operating parameters in industrial control systems protects the anonymity and confidentiality of industrial information, which is crucial for agricultural automation and food processing, preventing the tampering of critical production data
[74,77,79,85,87]Energy SystemsFalse Data Injection Attacks (FDIAs), Distributed Denial of Service (DDoS) AttacksDetect/perceive attacks involving data, users, and services within smart grids, energy transmission systems, and bulk power systems to enhance detection resilienceDetecting data, user, and service attacks in smart grids, energy transmission systems, and large power systems enhances detection resilience, which is vital for ensuring the energy supply for agriculture and the energy demands of food processing
[76,80,81]Transportation SystemsPacket Injection (Fuzzing) and Denial of Service (DoS) AttacksPerform real-time and automated network situational awareness and attack detection in transportation systemsReal-time and automated network situational awareness and attack detection are crucial for ensuring the security and efficiency of agricultural product logistics and distribution systems, reducing transportation disruptions and food waste
[75,88,89,90,92,93,94,95]Communication SystemsBotnet Attacks, DDoS Attacks, Intrusion AttacksCreate a trusted environment and signature-based detection schemes for effective detection of known attacksCreating trusted environments and signature-based detection schemes to effectively detect known attacks is essential for protecting agricultural communication networks and food safety communications
[84]Financial SystemsTheft AttacksAssist in attack detection through threshold estimation of hot walletsAssisting attack detection through threshold estimation of hot wallets is crucial for safeguarding agricultural financial services and farmers’ funds
[82,83,86,96]BTSybil Attacks, Eclipse AttacksDetecting attacks on blockchain nodes, smart contracts, and moreDetecting attacks on blockchain nodes, smart contracts, and other components is critical for protecting agricultural supply chains and blockchain applications related to food safety
Table 9. OTCI data transit protection.
Table 9. OTCI data transit protection.
LiteratureFieldResearch MethodEffectImpact on the Food and Agriculture Sector
[10,99,103,105,108,111,116]Communication SystemsMethod DesignEnhancing network communication security based on optimal resource allocationHelps ensure the secure transmission of sensitive data in the food and agriculture sectors, safeguarding the security of agricultural supply chains and market information exchange
[97]Financial SystemsMethod DesignEnsuring the security and fairness of trading network infrastructureProtects the interests of farmers and agricultural businesses in financial transactions
[98,109]Energy SystemsMethod/Scheme DesignUsing BT in smart grids to provide integrity and anonymityEnhances the transparency of energy usage in the food and agriculture sectors, reduces energy costs, and strengthens energy management
[100,106,115]Healthcare SystemsCase Studies/Method DesignMaintaining the security and privacy of collected healthcare-sensitive dataHelps protect the health information of food and agriculture workers, improving the quality of healthcare services in agricultural communities
[101]Electronic VotingMethod DesignProtecting the integrity of voting dataContributes to the fairness and transparency of the voting process in food and agriculture policy decision-making
[102,104,107,112]Transportation SystemsMethod DesignEnsuring integrity, availability, reliable information exchange, and source trustworthiness of vehicle-related dataImproves the logistics efficiency and security of food and agricultural products
[110]Cloud Computing Method DesignEnabling accurate execution of service level agreements (SLAs) by all stakeholders through publicly maintained immutable ledgers in a blockchain network, without inaccuracies or delaysIncreases the efficiency and reliability of cloud services in the food and agriculture sector
[114]Food and Agriculture SystemsScheme DesignImproving security, privacy, transparency, and trust among all stakeholders in agricultural supply chainsEnhances the security, privacy, transparency, and trustworthiness of all stakeholders in the agricultural supply chain
[113,117,118]BTScheme DesignSecurity of data collection, data retrieval, and data processingProtects the integrity of agricultural data, contributing to the accuracy of agricultural decision-making
Table 10. OTCI data storage protection.
Table 10. OTCI data storage protection.
LiteratureFieldResearch MethodEffectImpact on the Food and Agriculture Sector
[119,123]Industrial Control SystemsMethod DesignProtecting and maintaining data in industrial control systems to provide a trustworthy data sourceProviding trustworthy data sources for the food and agriculture sectors, ensuring the accuracy and reliability of data during the production process
[120,121,125]Communication SystemsScheme/Model DesignPreventing data forgery or loss during the communication phaseProtecting data in the supply chain from tampering, ensuring the transparency and security of food traceability and supply chain management
[122,124]Cloud StorageFramework DesignSafely recording data operations that occur in the cloud environmentAchieving the secure storage and management of vast agricultural data, such as crop monitoring, soil analysis, and market data, in the cloud, improving the efficiency and security of data processing
Table 11. OTCI data backup and recovery.
Table 11. OTCI data backup and recovery.
LiteratureFieldResearch MethodEffectImpact on the Food and Agriculture Sector
[127]Internet of Things Method DesignBT-based IoT architecture enabling distributed storageProtecting agricultural data from tampering, enhancing the transparency and traceability of the food supply chain
[128]Healthcare SystemsMethod DesignData and interaction records distributed on blockchain for trusted recovery of electronic healthcare systemsEnsuring the security of agricultural workers’ health records helps increase trust in the healthcare services provided to agricultural communities
[126,129]Industrial Control SystemsMethod DesignSupporting data recovery after attacks through efficient replication mechanismsHelping agricultural control systems quickly recover critical data after a cyberattack reduces the potential impact on agricultural production and the food supply chain
Table 12. Common types of cyberattacks in OTCI.
Table 12. Common types of cyberattacks in OTCI.
Attack CategoryDescription
Distributed denial of service attackAttackers send a large number of requests to the target system, occupying its resources, causing the system to fail to run properly and thus interrupting services.
Ransomware attackAttackers encrypt critical systems or data with malware and then blackmail the injured party into paying a ransom to unlock them.
Supply chain attackBy planting malware or tampering with hardware at key points in the supply chain, attackers can exploit vulnerabilities to attack targeted systems when products or services are delivered to end users.
Malware attackAttackers can gain improper access or steal sensitive information by introducing malware, such as viruses, trojans, or spyware, into a target system.
Insider attackRefers to the abuse of access rights by individuals within a business or organization to attack CI or intentionally disclose sensitive information.
Zero-day attackExploit undisclosed vulnerabilities in software or systems. These vulnerabilities are often unpatched and can be used by an attacker to break into a system before the attacker is aware of them.
Identity fraudAttackers use forged identities to impersonate legitimate users and gain access to CI.
Social engineering attackAttackers gain access to systems or sensitive information by communicating with people or spoofing them, such as phishing emails, phone scams, etc.
Table 13. Intelligent protection model based on BT.
Table 13. Intelligent protection model based on BT.
PhaseModelProblem Solving
Pre-Attack stage of OTCIBlockchain-based data recording modelIdentity authentication and verification of equipment, personnel and data, permission distribution and access control, and data recording and leaving marks throughout the process
Blockchain-based identity authentication model
Blockchain-based data verification model
Blockchain-based permission distribution model
Blockchain-based access control model
During-the-attack stage of OTCIBlockchain-based attack detection modelDetection and defense of network attack models
Blockchain-based data protection model
Post-attack stage of OTCIBlockchain-based attack assessment modelCyberattack analysis, data recovery, and location and accountability
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, C.; Peng, X.; Wang, Z.; Ma, T.; Lu, J.; Chen, L.; Dong, L.; Wang, L.; Cui, X.; Shen, Z. A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure. Foods 2025, 14, 251. https://doi.org/10.3390/foods14020251

AMA Style

Zheng C, Peng X, Wang Z, Ma T, Lu J, Chen L, Dong L, Wang L, Cui X, Shen Z. A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure. Foods. 2025; 14(2):251. https://doi.org/10.3390/foods14020251

Chicago/Turabian Style

Zheng, Chengliang, Xiangzhen Peng, Ziyue Wang, Tianyu Ma, Jiajia Lu, Leiyang Chen, Liang Dong, Long Wang, Xiaohui Cui, and Zhidong Shen. 2025. "A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure" Foods 14, no. 2: 251. https://doi.org/10.3390/foods14020251

APA Style

Zheng, C., Peng, X., Wang, Z., Ma, T., Lu, J., Chen, L., Dong, L., Wang, L., Cui, X., & Shen, Z. (2025). A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure. Foods, 14(2), 251. https://doi.org/10.3390/foods14020251

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop