{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:55:18Z","timestamp":1771613718215,"version":"3.50.1"},"reference-count":55,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Currently, in the digital era, critical infrastructure is increasingly exposed to cyber threats to their operation and security. This study explores the use of blockchain technology to address these challenges, highlighting its immutability, decentralization, and transparency as keys to strengthening the resilience of these vital structures. Through a methodology encompassing literature review, use-case analysis, and the development and evaluation of prototypes, the effective implementation of the blockchain in the protection of critical infrastructure is investigated. The experimental results reveal the positive impact of the blockchain on security and resilience, presenting a solid defense against cyber-attacks due to its immutable and decentralized structure, with a 40% reduction in security incidents. Despite the observed benefits, blockchain integration faces significant challenges in scalability, interoperability, and regulations. This work demonstrates the potential of the blockchain to strengthen critical infrastructure. It marks progress towards the blockchain\u2019s practical adoption, offering a clear direction for future research and development in this evolving field.<\/jats:p>","DOI":"10.3390\/computers13050122","type":"journal-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T03:35:55Z","timestamp":1715744155000},"page":"122","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience"],"prefix":"10.3390","volume":"13","author":[{"given":"Jaime","family":"Govea","sequence":"first","affiliation":[{"name":"Escuela de Ingenier\u00eda en Ciberseguridad, Facultad de Ingenier\u00edas y Ciencias Aplicadas, Universidad de Las Am\u00e9ricas, Quito 170125, Ecuador"}]},{"given":"Walter","family":"Gaibor-Naranjo","sequence":"additional","affiliation":[{"name":"Carrera de Ciencias de la Computaci\u00f3n, Universidad Polit\u00e9cnica Salesiana, Quito 170105, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5421-7710","authenticated-orcid":false,"given":"William","family":"Villegas-Ch","sequence":"additional","affiliation":[{"name":"Escuela de Ingenier\u00eda en Ciberseguridad, Facultad de Ingenier\u00edas y Ciencias Aplicadas, Universidad de Las Am\u00e9ricas, Quito 170125, Ecuador"}]}],"member":"1968","published-online":{"date-parts":[[2024,5,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Florez, L., and Correal, D. (2023, January 13\u201317). Securing a National Driver and Vehicle Registration System with Blockchain. Proceedings of the IEEE 20th International Conference on Software Architecture Companion, ICSA-C 2023, L\u2019Aquila, Italy.","DOI":"10.1109\/ICSA-C57050.2023.00058"},{"key":"ref_2","unstructured":"Mahbub, M. (2021). EAI\/Springer Innovations in Communication and Computing, Springer."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Mahammad, A.B., and Kumar, R. (2023, January 28\u201330). Scalable and Security Framework to Secure and Maintain Healthcare Data Using Blockchain Technology. Proceedings of the International Conference on Computational Intelligence and Sustainable Engineering Solution, CISES 2023, Greater Noida, India.","DOI":"10.1109\/CISES58720.2023.10183494"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3469821","article-title":"Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens","volume":"24","author":"Maqsood","year":"2021","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"055","DOI":"10.22161\/ijaers.105.8","article-title":"Enhancing Cybersecurity: The Power of Artificial Intelligence in Threat Detection and Prevention","volume":"10","author":"Rizvi","year":"2023","journal-title":"Int. J. Adv. Eng. Res. Sci."},{"key":"ref_6","first-page":"715","article-title":"Permissioned Blockchain: Securing Industrial IoT Environments","volume":"12","author":"Yeasmin","year":"2021","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tariq, N., Asim, M., Al-Obeidat, F., Farooqi, M.Z., Baker, T., Hammoudeh, M., and Ghafir, I. (2019). The Security of Big Data in Fog-Enabled Iot Applications Including Blockchain: A Survey. Sensors, 19.","DOI":"10.3390\/s19081788"},{"key":"ref_8","first-page":"1","article-title":"Blockchain Technology in Supply Chain Management: An Organizational Theoretic Overview and Research Agenda","volume":"335","author":"Manzoor","year":"2022","journal-title":"Ann. Oper. Res."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Setyowati, M.S., Utami, N.D., Saragih, A.H., and Hendrawan, A. (2020). Blockchain Technology Application for Value-Added Tax Systems. J. Open Innov. Technol. Mark. Complex., 6.","DOI":"10.3390\/joitmc6040156"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"12730","DOI":"10.1109\/ACCESS.2021.3050241","article-title":"A Comparative Study: Blockchain Technology Utilization Benefits, Challenges and Functionalities","volume":"9","author":"Ali","year":"2021","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","article-title":"Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems","volume":"4","author":"Lei","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rahman, Z., Yi, X., Tanzir Mehedi, S., Islam, R., and Kelarev, A. (2022). Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. Electronics, 11.","DOI":"10.3390\/electronics11091416"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ameyaw, P.D., and de Vries, W.T. (2021). Toward Smart Land Management: Land Acquisition and the Associated Challenges in Ghana. a Look into a Blockchain Digital Land Registry for Prospects. Land, 10.","DOI":"10.3390\/land10030239"},{"key":"ref_14","first-page":"3693","article-title":"Land Registration: Use-Case of e-Governance Using Blockchain Technology","volume":"14","author":"Veeramani","year":"2020","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.future.2019.09.002","article-title":"BlockIoTIntelligence: A Blockchain-Enabled Intelligent IoT Architecture with Artificial Intelligence","volume":"110","author":"Singh","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"122679","DOI":"10.1109\/ACCESS.2022.3223370","article-title":"Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review","volume":"10","author":"Laghari","year":"2022","journal-title":"IEEE Access"},{"key":"ref_17","first-page":"410","article-title":"Enhancing Supply Chain through Implementation of Key IIoT Technologies","volume":"63","author":"Safa","year":"2023","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_18","first-page":"1579","article-title":"A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures","volume":"72","author":"Ragab","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.future.2023.06.004","article-title":"Blockchain-Enabled Device Command Operation Security for Industrial Internet of Things","volume":"148","author":"Fu","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_20","first-page":"199","article-title":"The Design of an Anti-Counterfeiting System Based on Blockchain","volume":"4","author":"An","year":"2017","journal-title":"J. Cryptologic Res."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"157959","DOI":"10.1109\/ACCESS.2020.3019829","article-title":"Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records","volume":"8","author":"Zarour","year":"2020","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Wang, D., Wang, Z., and Lian, X. (2022). Research on Distributed Energy Consensus Mechanism Based on Blockchain in Virtual Power Plant. Sensors, 22.","DOI":"10.3390\/s22051783"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3253","DOI":"10.1109\/TII.2020.3007657","article-title":"Compensation for Power Loss by a Proof-of-Stake Consortium Blockchain Microgrid","volume":"17","author":"Yang","year":"2021","journal-title":"IEEE Trans. Industr. Inform."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"909606","DOI":"10.3389\/fenvs.2022.909606","article-title":"A Framework of Blockchain Technology in Intelligent Water Management","volume":"10","author":"Xia","year":"2022","journal-title":"Front. Environ. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Jovi\u0107, M., Tijan, E., \u017dgalji\u0107, D., and Aksentijevi\u0107, S. (2020). Improving Maritime Transport Sustainability Using Blockchain-Based Information Exchange. Sustainability, 12.","DOI":"10.3390\/su12218866"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"120879","DOI":"10.1016\/j.techfore.2021.120879","article-title":"Digital Transformation in the Maritime Transport Sector","volume":"170","author":"Tijan","year":"2021","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.procs.2020.06.093","article-title":"Secure Electronic Medical Records Storage and Sharing Using Blockchain Technology","volume":"174","author":"Usman","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"33644","DOI":"10.1109\/ACCESS.2020.2972606","article-title":"A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology","volume":"8","author":"Zeng","year":"2020","journal-title":"IEEE Access"},{"key":"ref_29","first-page":"947","article-title":"Secured Different Disciplinaries in Electronic Medical Record Based on Watermarking and Consortium Blockchain Technology","volume":"16","author":"Mohananthini","year":"2022","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Serra, P., Fancello, G., Tonelli, R., and Marchesi, L. (2022). Application Prospects of Blockchain Technology to Support the Development of Interport Communities. Computers, 11.","DOI":"10.3390\/computers11050060"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"848686","DOI":"10.3389\/frwa.2022.848686","article-title":"Application of Distributed Ledger Platforms in Smart Water Systems\u2014A Literature Review","volume":"4","author":"Asgari","year":"2022","journal-title":"Front. Water"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.3390\/jtaer17030058","article-title":"Blockchain Technology as an Ecosystem: Trends and Perspectives in Accounting and Management","volume":"17","author":"Kitsantas","year":"2022","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Danalakshmi, D., Gopi, R., Hariharasudan, A., Otola, I., and Bilan, Y. (2020). Reactive Power Optimization and Price Management in Microgrid Enabled with Blockchain. Energies, 13.","DOI":"10.3390\/en13236179"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"e709","DOI":"10.7717\/peerj-cs.709","article-title":"Research on Digital Copyright Protection Based on the Hyperledger Fabric Blockchain Network Technology","volume":"7","author":"Liu","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"102468","DOI":"10.1016\/j.ipm.2020.102468","article-title":"Blockchain-Based Authentication and Authorization for Smart City Applications","volume":"58","author":"Esposito","year":"2021","journal-title":"Inf. Process Manag."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Li, X., and Zeng, X. (2020). Expected Income of New Currency in Blockchain Based on Data-Mining Technology. Electronics, 9.","DOI":"10.3390\/electronics9010160"},{"key":"ref_37","first-page":"30","article-title":"Blockchain Empowered Disaster Recovery Framework","volume":"12","author":"Pour","year":"2022","journal-title":"Int. J. Syst. Syst. Eng."},{"key":"ref_38","first-page":"1032","article-title":"Cybersecurity of Cyber Ranges: Threats and Mitigations","volume":"12","author":"Noponen","year":"2022","journal-title":"Int. J. Inf. Secur. Res."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3567582","article-title":"Connect API with Blockchain: A Survey on Blockchain Oracle Implementation","volume":"55","author":"Pasdar","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_40","first-page":"1","article-title":"A Next-Generation Smart Contract and Decentralized Application Platform","volume":"3","author":"Buterin","year":"2014","journal-title":"Etherum"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Garcia-Alfaro, J., Navarro-Arribas, G., and Dragoni, N. (2017). Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer International Publishing.","DOI":"10.1007\/978-3-319-67816-0"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018, January 23\u201326). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"38","DOI":"10.4236\/jcc.2021.99003","article-title":"Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric","volume":"9","author":"Koussema","year":"2021","journal-title":"J. Comput. Commun."},{"key":"ref_44","first-page":"61","article-title":"Driving for Big Data? Privacy Concerns in Vehicular Networking","volume":"15","author":"Eckhoff","year":"2017","journal-title":"IEEE Secur. Priv."},{"key":"ref_45","unstructured":"(2024, March 25). Chainalysis The 2023 Global Crypto Adoption Index. Available online: https:\/\/www.chainalysis.com\/blog\/2023-global-crypto-adoption-index\/."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"101431","DOI":"10.1016\/j.tele.2020.101431","article-title":"(Sophia) Data Privacy against Innovation or against Discrimination?: The Case of the California Consumer Privacy Act (CCPA)","volume":"52","author":"Baik","year":"2020","journal-title":"Telemat. Inform."},{"key":"ref_47","unstructured":"Samper, M.B. (2024, March 25). Reglamento (UE) 2016\/679 del Parlamento Europeo y del Consejo de 27 de Abril de 2016, Relativo a la Protecci\u00f3n de las Personas F\u00edsicas en Lo que Respecta al Tratamiento de Datos Personales y a la Libre Circulaci\u00f3n de Estos Datos y por el que se Deroga la Directiva 95\/46\/CE (Reglamento General de Protecci\u00f3n de Datos) (RGPD). Available online: https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"ref_48","unstructured":"Coffee, J.C., Lowenstein, L., and Rose-Ackerman, S. (2021). Knights, Raiders, and Targets\u2014The Impact of the Hostile Takeover, Oxford University Press."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"499","DOI":"10.3233\/JCS-210040","article-title":"WARChain: Consensus-Based Trust in Web Archives via Proof-of-Stake Blockchain Technology","volume":"30","author":"Indig","year":"2022","journal-title":"J. Comput. Secur."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"80931","DOI":"10.1109\/ACCESS.2021.3085187","article-title":"MBCP: Performance Analysis of Large Scale Mainstream Blockchain Consensus Protocols","volume":"9","author":"Kaur","year":"2021","journal-title":"IEEE Access"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, J., and Kim, D. (2020). Implementation of a Blood Cold Chain System Using Blockchain Technology. Appl. Sci., 10.","DOI":"10.3390\/app10093330"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s42400-019-0022-2","article-title":"The Privacy Protection Mechanism of Hyperledger Fabric and Its Application in Supply Chain Finance","volume":"2","author":"Ma","year":"2019","journal-title":"Cybersecurity"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"118541","DOI":"10.1109\/ACCESS.2019.2935149","article-title":"Delegated Proof of Stake with Downgrade: A Secure and Efficient Blockchain Consensus Algorithm with Downgrade Mechanism","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Akbar, N.A., Muneer, A., Elhakim, N., and Fati, S.M. (2021). Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses. Future Internet, 13.","DOI":"10.3390\/fi13110285"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"61048","DOI":"10.1109\/ACCESS.2021.3072849","article-title":"A Survey on Blockchain Technology: Evolution, Architecture and Security","volume":"9","author":"Bhutta","year":"2021","journal-title":"IEEE Access"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/13\/5\/122\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:42:32Z","timestamp":1760107352000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/13\/5\/122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,15]]},"references-count":55,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["computers13050122"],"URL":"https:\/\/doi.org\/10.3390\/computers13050122","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,15]]}}}