14Security in Blockchain‐Based Smart Cyber‐Physical Applications Relying on Wireless Sensor and Actuators Networks

Maria A. de Jesus1, Asif A. Laghari2, Abdullah A. Khan3, Awais Khan Jumani4, Mohammad Shabaz5, Anand Deshpande6, R. Jenice Aroma7, Kumudha Raimond8, and Asiya Khan9

1Department of Telecommunications, Federal Fluminense University (UFF), Niterói, RJ, Brazil

2Sindh Madresstul Islam University, Karachi, Sindh, Pakistan

3Research Lab of Artificial Intelligence and Information Security, Faculty of Computing, Science and Information Technology, Benazir Bhutto Shaheed University, Karachi, Sindh, Pakistan

4Department of Computer Science, Sindh Madressa‐tul‐Islam University, Karachi, Sindh, Pakistan

5Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India

6Electronics and Communication Engineering, Angadi Institute of Technology and Management, Belagavi, India

7Department of CSE, Karunya Institute of Technology and Sciences, Karunya University, Coimbatore, India

8Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India

9School of Engineering, Computing and Mathematics (Faculty of Science and Engineering), University of Plymouth, Plymouth, UK

14.1 Introduction

A “business sector” can be any potential application field, such as banking, agribusiness, disaster relief, etc. Nowadays, the “cyber‐physical system” (CPS) rationale [14], i.e., a framework placing together computation ...

Get Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.