A Comprehensive Study on Blockchain Based Cryptographic Key Management and Secure Communication Protocols for Large Scale Cyber Physical Systems in Industrial Environments

Authors

  • Rudolf Sinaga Universitas Dinamika Bangsa
  • Lely Priska D Tampubolon Perbanas Institute

Keywords:

Blockchain technology, CPS Environments, Cryptographic Security, Key Management, Smart Contracts

Abstract

The increasing integration of Cyber physical Systems (CPS) into industrial environments has highlighted the need for secure, scalable, and efficient cryptographic key management systems. Traditional centralized key management protocols are often limited by vulnerabilities such as single points of failure, scalability issues, and significant overhead. Blockchain technology presents a promising solution to these challenges by leveraging decentralization, immutability, and transparency to enhance security and efficiency in CPS. This study investigates the use of blockchain based cryptographic key management systems, focusing on smart contracts for automated key distribution and rotation. Experimental results demonstrate that blockchain based systems significantly improve system integrity, auditability, and resilience, offering enhanced protection against cyber-attacks and reducing the risks associated with centralized systems. Blockchain’s decentralized architecture eliminates the need for a central authority, making it more resistant to tampering and operational failures. Additionally, smart contracts automate the key management process, improving efficiency while maintaining a high level of security. The study also evaluates the impact of blockchain on communication performance, finding that it reduces latency and overhead by automating processes and eliminating the need for centralized control. Despite these advantages, challenges such as scalability, latency, and integration with legacy systems remain. The study concludes by suggesting future research directions, including the development of lightweight blockchain protocols tailored for industrial applications and the integration of blockchain with emerging technologies like Artificial Intelligence (AI) to further enhance key management in CPS. Blockchain based solutions have the potential to transform the security landscape of industrial environments, offering greater robustness, reliability, and trust.

References

[1] Y. Yang, J. Lu, K.-K. R. Choo, and J. K. Liu, “On lightweight security enforcement in cyber-physical systems,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9542, pp. 97 – 112, 2016, doi: 10.1007/978-3-319-29078-2_6.

[2] A. Gallais and Y. Imine, Cybersecurity of industrial cyber-physical systems. 2022. doi: 10.1002/9781119987420.ch6.

[3] S. Dolev, E. Gudes, and D. Shlomo, “Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3,” Lect. Notes Comput. Sci., vol. 15722 LNCS, pp. 233 – 250, 2025, doi: 10.1007/978-3-031-96590-6_13.

[4] E. B. M. Bashier, M. A. Hassouna, and T. Ben Jabeur, “Towards certficateless public key infrastructure: A practical alternative of the traditional pki,” J. Theor. Appl. Inf. Technol., vol. 98, no. 1, pp. 136 – 150, 2020.

[5] M. Yildiz and S. Bahtiyar, “A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems,” in 2024 17th International Conference on Security of Information and Networks, SIN 2024, 2024. doi: 10.1109/SIN63213.2024.10871880.

[6] P. Herbke, T. Cory, and M. Migliardi, “Decentralized Credential Status Management: A Paradigm Shift in Digital Trust,” in 2024 6th Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2024, 2024. doi: 10.1109/BRAINS63024.2024.10732832.

[7] B. N. Eddine, A. Ouaddah, and A. Mezrioui, “Blockchain-Based Self Sovereign Identity Systems: High-Level Processing and a Challenges-Based Comparative Analysis,” Lect. Notes Networks Syst., vol. 637 LNNS, pp. 489–500, 2023, doi: 10.1007/978-3-031-26384-2_42.

[8] G. Sowmya, R. Sridevi, K. S. S. Rao, and S. G. Shiramshetty, “The role of blockchain in cyber physical systems,” 2024. doi: 10.4018/979-8-3693-5728-6.ch001.

[9] M. I. Hussain, M. K. I. Bhuiyan, S. A. Sumon, S. Akter, M. I. Hossain, and A. Akther, “Enhancing Data Integrity and Traceability in Industry Cyber Physical Systems (ICPS) through Blockchain Technology: A Comprehensive Approach,” Adv. Artif. Intell. Mach. Learn., vol. 4, no. 4, pp. 2883 – 2907, 2024, doi: 10.54364/AAIML.2024.44168.

[10] A. K. Das, B. Bera, S. Saha, N. Kumar, I. You, and H.-C. Chao, “AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems,” IEEE Internet Things J., vol. 9, no. 9, pp. 6374 – 6388, 2022, doi: 10.1109/JIOT.2021.3109314.

[11] B. V Kiran, S. D. Shetty, V. V. Shetty, P. P. Shetty, and V. ShivaKumar, “Fortifying IoT Networks: A Blockchain-Based Communication Security Paradigm,” in Proceedings - 2024 IEEE 16th International Conference on Communication Systems and Network Technologies, CICN 2024, 2024, pp. 629 – 635. doi: 10.1109/CICN63059.2024.10847439.

[12] N. R. R. Paul, P. P. Shekhar, C. Singh, and P. R. Kumar, “SAIF-Cnet: Self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol,” Wirel. Networks, vol. 30, no. 5, pp. 3211–3228, 2024, doi: 10.1007/s11276-024-03728-y.

[13] A. A. Yaseen, K. Patel, A. J. Y. Aldarwish, and A. A. Yassin, “Decentralized EHR Exchange in Healthcare: Enhancing Privacy and Security with Blockchain and Cryptographic Techniques,” Commun. Comput. Inf. Sci., vol. 2428 CCIS, pp. 235 – 246, 2025, doi: 10.1007/978-3-031-86302-8_15.

[14] K. N. B. S. Lakshmi and B. N. Keshavamurthy, “Blockchain-Driven Key Management for Secure IoT,” in 2024 IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024, 2024. doi: 10.1109/ICBDS61829.2024.10837010.

[15] V. Sujatha, A. P. Joy, R. N. Kumar, R. Preethi, and R. Rashmika, “Blockchain-Enhanced Zero-Trust Architecture for Secure Key Management in Wireless Sensor Networks,” in Proceedings - 4th International Conference on Smart Technologies, Communication and Robotics 2025 (STCR 2025), 2025. doi: 10.1109/STCR62650.2025.11019336.

[16] J. Hou, C. Peng, and H. Li, “A Lightweight Blockchain-Based Group Key Management Scheme for IoT Networks,” IEEE Trans. Dependable Secur. Comput., 2025, doi: 10.1109/TDSC.2025.3647156.

[17] S. S. Chaeikar, M. Alizadeh, M. H. Tadayon, and A. Jolfaei, “An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems,” Int. J. Intell. Syst., vol. 37, no. 12, pp. 10158 – 10171, 2022, doi: 10.1002/int.22435.

[18] G. Singh, A. Rajesh, S. Saraswat, A. Middha, and V. Patil, “Blockchain Technology the Leading Area over the World and Navigating the Blockchain Landscape,” in International Conference on Intelligent and Innovative Practices in Engineering and Management 2024, IIPEM 2024, 2024. doi: 10.1109/IIPEM62726.2024.10925654.

[19] S. Khan, P. A. F. L. Martins, B. Sousa, and V. Pereira, “A Comprehensive Review on Lightweight Cryptographic Mechanisms for Industrial Internet of Things Systems,” ACM Comput. Surv., vol. 58, no. 1, 2025, doi: 10.1145/3757734.

[20] C. Lipps, S. D. Antón, and H. D. Schotten, “Enabling trust in IIoT: An physec based approach,” in 14th International Conference on Cyber Warfare and Security, ICCWS 2019, 2019, pp. 663 – 672.

[21] A. K. Tyagi, Blockchain technology: values, challenges, and possible applications from an industry perspective. 2025. doi: 10.1016/B978-0-443-33498-6.00027-3.

[22] G. Ra, S.-H. Kim, and I. Lee, “Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things,” IEICE Trans. Inf. Syst., vol. E105D, no. 11, pp. 1857 – 1871, 2022, doi: 10.1587/transinf.2022NGP0003.

[23] A. K. Pal, A. K. Raikwar, and M. Singh, “Securing Smart Contracts against Re-entrancy Attacks,” in Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2023, 2023, pp. 67 – 70. doi: 10.1109/IC3I59117.2023.10397631.

[24] S. Aghili, Leveraging Blockchain Technology: Governance, Risk, Compliance, Security, and Benevolent Use Cases. 2024. doi: 10.1201/9781003462033.

[25] M. S and Poongodi, Challenges and Opportunities of Blockchain. 2025. doi: 10.1002/9781394238033.ch2.

[26] S. Subrahmanyam, Blockchain technology for enhancing data integrity and security. 2025. doi: 10.4018/979-8-3373-1370-2.ch002.

[27] F. Anwar, B. U. I. Khan, M. L. B. M. Kiah, N. A. Abdullah, and K. W. Goh, “Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations,” Int. J. Adv. Comput. Sci. Appl., vol. 13, no. 11, pp. 878 – 907, 2022, doi: 10.14569/IJACSA.2022.01311101.

[28] S. Ramya, M. Doraipandian, and R. Amirtharajan, “SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework,” Peer-to-Peer Netw. Appl., vol. 17, no. 5, pp. 2675 – 2691, 2024, doi: 10.1007/s12083-024-01719-6.

[29] Y. O. Kareem, A. A. Sogbesan, and H. Quadri, Addressing security and privacy issues in cyber-physical systems. 2025.

[30] S. Yin, J. Bao, Y. Zhang, and X. Huang, “M2M security technology of CPS based on blockchains,” Symmetry (Basel)., vol. 9, no. 9, 2017, doi: 10.3390/sym9090193.

[31] K. Gumber and M. Ghosh, “A Survey on Blockchain-Based Key Management Protocols,” Lect. Notes Networks Syst., vol. 731 LNNS, pp. 471 – 481, 2024, doi: 10.1007/978-981-99-4071-4_37.

[32] R. Vatambeti, N. S. Divya, H. R. Jalla, and M. V. Gopalachari, “Attack Detection Using a Lightweight Blockchain Based Elliptic Curve Digital Signature Algorithm in Cyber Systems,” Int. J. Saf. Secur. Eng., vol. 12, no. 6, pp. 745 – 753, 2022, doi: 10.18280/ijsse.120611.

[33] A. Dwivedi, R. Agarwal, M. Yahya, N. Alduaiji, and P. K. Shukla, “A blockchain-enabled encrypted neural network framework for trust-aware key management and node authentication in Industrial Internet of Things,” J. Supercomput., vol. 81, no. 9, 2025, doi: 10.1007/s11227-025-07566-3.

[34] D. Danang, H. Haryani, Q. Aini, F. A. Ramahdan, and J. Edwards, “Empowering digital literacy through blockchain based alphasign for secure and sustainable e-governance,” 2025.

[35] D. Danang, T. Wahyono, I. Sembiring, T. Wellem, and N. H. Dzulkefly, “An Adaptive Framework Integrating ML Blockchain and TEE for Cloud Security,” in 2025 4th International Conference on Creative Communication and Innovative Technology (ICCIT), IEEE, 2025, pp. 1–7.

Downloads

Published

2026-01-19