{"id":"https://openalex.org/W7150900357","doi":"https://doi.org/10.1109/access.2026.3681234","title":"A Blockchain-Based Approach to Enhancing Cybersecurity in Operational Technology Systems in the Oil and Gas Industry","display_name":"A Blockchain-Based Approach to Enhancing Cybersecurity in Operational Technology Systems in the Oil and Gas Industry","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7150900357","doi":"https://doi.org/10.1109/access.2026.3681234"},"language":"en","primary_location":{"id":"doi:10.1109/access.2026.3681234","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3681234","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3681234","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125548252","display_name":"Abimbola Ogunlade","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Abimbola A. Ogunlade","raw_affiliation_strings":["Engineering Institute of Technology, Perth, WA, Australia"],"raw_orcid":"https://orcid.org/0009-0009-2112-6132","affiliations":[{"raw_affiliation_string":"Engineering Institute of Technology, Perth, WA, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085763328","display_name":"Kalum Priyanath Udagepola","orcid":"https://orcid.org/0000-0001-5168-7111"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kalum P. Udagepola","raw_affiliation_strings":["Engineering Institute of Technology, Perth, WA, Australia"],"raw_orcid":"https://orcid.org/0000-0001-5168-7111","affiliations":[{"raw_affiliation_string":"Engineering Institute of Technology, Perth, WA, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070372145","display_name":"Akhlaqur Rahman","orcid":"https://orcid.org/0000-0002-5491-4436"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akhlaqur Rahman","raw_affiliation_strings":["Engineering Institute of Technology, Perth, WA, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Engineering Institute of Technology, Perth, WA, Australia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5125548252"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74533008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"53425","last_page":"53441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.0940999984741211,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.0940999984741211,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.0737999975681305,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.06859999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/petroleum-industry","display_name":"Petroleum industry","score":0.6453999876976013},{"id":"https://openalex.org/keywords/gas-industry","display_name":"Gas industry","score":0.41280001401901245},{"id":"https://openalex.org/keywords/defense-industry","display_name":"Defense industry","score":0.3465000092983246},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.33799999952316284},{"id":"https://openalex.org/keywords/fossil-fuel","display_name":"Fossil fuel","score":0.3167000114917755},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.30790001153945923}],"concepts":[{"id":"https://openalex.org/C526740375","wikidata":"https://www.wikidata.org/wiki/Q862571","display_name":"Petroleum industry","level":2,"score":0.6453999876976013},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4747999906539917},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.41760000586509705},{"id":"https://openalex.org/C2989510637","wikidata":"https://www.wikidata.org/wiki/Q862571","display_name":"Gas industry","level":3,"score":0.41280001401901245},{"id":"https://openalex.org/C2987301392","wikidata":"https://www.wikidata.org/wiki/Q392933","display_name":"Defense industry","level":2,"score":0.3465000092983246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3393000066280365},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C117671659","wikidata":"https://www.wikidata.org/wiki/Q11049265","display_name":"Manufacturing engineering","level":1,"score":0.3257000148296356},{"id":"https://openalex.org/C68189081","wikidata":"https://www.wikidata.org/wiki/Q12748","display_name":"Fossil fuel","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.30790001153945923},{"id":"https://openalex.org/C161657586","wikidata":"https://www.wikidata.org/wiki/Q1203326","display_name":"Technology forecasting","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C2988724468","wikidata":"https://www.wikidata.org/wiki/Q392933","display_name":"Defence industry","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C548895740","wikidata":"https://www.wikidata.org/wiki/Q22656","display_name":"Petroleum","level":2,"score":0.2896000146865845},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2782000005245209},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C541019422","wikidata":"https://www.wikidata.org/wiki/Q329864","display_name":"Military technology","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2026.3681234","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3681234","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:665f7bd356ce4c74adce134a3284094e","is_oa":true,"landing_page_url":"https://doaj.org/article/665f7bd356ce4c74adce134a3284094e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 14, Pp 53425-53441 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3681234","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3681234","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recently,":[0],"the":[1,24,57,89,96,119,123,145,149,153,158,162,168,181,184,226,237,242],"global":[2],"oil":[3],"and":[4,39,72,81,107,134,142,274],"gas":[5],"industry":[6],"has":[7],"experienced":[8],"a":[9,74,175,258],"sharp":[10],"increase":[11],"in":[12,23,48,157],"cybersecurity-related":[13],"incidents":[14,99],"targeting":[15,95],"critical":[16,68],"operational":[17,49,117],"technology":[18,43,50],"(OT)":[19],"infrastructure,":[20,93],"with":[21,88],"attacks":[22],"last":[25],"five":[26],"years":[27],"demonstrating":[28],"increased":[29],"sophistication,":[30],"causing":[31],"significant":[32],"production":[33],"losses,":[34],"financial":[35,278],"damage,":[36],"equipment":[37],"destruction,":[38],"fatalities.":[40],"Traditional":[41],"information":[42],"security":[44],"solutions":[45],"are":[46],"inadequate":[47],"environments,":[51],"often":[52],"exacerbating":[53],"vulnerabilities":[54],"by":[55,70,241],"expanding":[56],"attack":[58],"surface":[59],"instead":[60],"of":[61,98,109,148,171,262,280,290],"mitigating":[62],"threats.":[63],"This":[64,265],"study":[65],"addresses":[66],"this":[67],"gap":[69],"designing":[71],"implementing":[73],"hybrid":[75],"blockchain":[76,83],"framework":[77,182,246],"that":[78,220,230],"integrates":[79],"public":[80],"private":[82],"characteristics":[84],"for":[85,137,270],"seamless":[86],"integration":[87],"existing":[90],"OT":[91],"cybersecurity":[92],"specifically":[94],"prevention":[97],"leading":[100],"to":[101,167,192,253,283],"plant":[102],"upsets,":[103],"costly":[104],"shutdowns,":[105],"explosions,":[106],"loss":[108],"life.":[110],"Through":[111],"rigorous":[112],"experimental":[113],"validation":[114],"across":[115,225],"four":[116,227],"scenarios,":[118,228],"developed":[120],"prototype":[121],"utilizing":[122],"Quorum":[124],"Byzantine":[125],"Fault":[126],"Tolerance":[127],"(QBFT)":[128],"consensus":[129],"mechanism":[130],"achieved":[131,247],"92%":[132],"precision":[133],"86%":[135],"recall":[136,143],"malicious":[138],"event":[139],"classification.":[140],"Precision":[141],"quantify":[144],"classification":[146],"accuracy":[147],"evaluated":[150],"events,":[151],"whereas":[152],"detection":[154,163,185,221,231],"rate":[155],"reported":[156],"scenario":[159,238],"analysis":[160],"represents":[161],"coverage":[164,186],"(detection":[165],"relative":[166],"total":[169],"number":[170],"write":[172],"attempts).":[173],"Under":[174],"sustained":[176],"adversarial":[177],"load":[178],"(Scenario":[179,190],"4),":[180],"improved":[183],"from":[187,251],"27.35%":[188],"baseline":[189],"1)":[191],"57.33%.":[193],"A":[194],"chi-square":[195],"test":[196],"(<italic":[197],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[198,200,205,210,215],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">x</i><sup":[199],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[201],"=":[202,207,212],"4709.69,":[203],"<italic":[204,209,214],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">df</i>":[206],"3,":[208],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N</i>":[211],"38,231,":[213],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">p</i>":[216],"<":[217],"0.001)":[218],"showed":[219],"outcomes":[222],"differed":[223],"significantly":[224],"indicating":[229],"performance":[232],"was":[233],"strongly":[234],"dependent":[235],"on":[236,287],"configurations":[239],"defined":[240],"proposed":[243],"framework.":[244],"The":[245],"process-control-compatible":[248],"latencies":[249],"ranging":[250],"24":[252],"368":[254],"ms":[255],"while":[256],"using":[257],"minimal":[259],"network":[260],"bandwidth":[261],"8.15":[263],"KB/s.":[264],"demonstrates":[266],"its":[267],"practical":[268],"applicability":[269],"real-time":[271],"industrial":[272],"use":[273],"suggests":[275],"potential":[276],"annual":[277],"savings":[279],"$0.973":[281],"billion":[282],"$1.99":[284],"billion,":[285],"based":[286],"recent":[288],"analyses":[289],"ransomware":[291],"incidents.":[292]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-04-07T00:00:00"}
