{"id":"https://openalex.org/W2980811640","doi":"https://doi.org/10.1109/etfa.2019.8869163","title":"Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems","display_name":"Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2980811640","doi":"https://doi.org/10.1109/etfa.2019.8869163","mag":"2980811640"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2019.8869163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2019.8869163","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001738405","display_name":"Nicholas Stifter","orcid":null},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Nicholas Stifter","raw_affiliation_strings":["Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052991565","display_name":"Matthias Eckhart","orcid":"https://orcid.org/0000-0001-5125-4391"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Matthias Eckhart","raw_affiliation_strings":["Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089436265","display_name":"Bernhard Brenner","orcid":"https://orcid.org/0000-0001-9549-467X"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Bernhard Brenner","raw_affiliation_strings":["Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083435816","display_name":"Edgar Weippl","orcid":"https://orcid.org/0000-0003-0665-6126"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Edgar Weippl","raw_affiliation_strings":["Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle, TU Wien, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001738405"],"corresponding_institution_ids":["https://openalex.org/I145847075"],"apc_list":null,"apc_paid":null,"fwci":1.3566,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86503719,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"99","issue":null,"first_page":"1623","last_page":"1626"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9132999777793884,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8845914602279663},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.7497063875198364},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7136012315750122},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6616508960723877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6606445908546448},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.6122021079063416},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.5538804531097412},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5268620252609253},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5023336410522461},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4926348328590393},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4760817587375641},{"id":"https://openalex.org/keywords/emerging-technologies","display_name":"Emerging technologies","score":0.457304984331131},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4559623897075653},{"id":"https://openalex.org/keywords/proof-of-work-system","display_name":"Proof-of-work system","score":0.44845718145370483},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4357272982597351},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4143935441970825},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.35604795813560486},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.20657029747962952},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1948748528957367},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15712296962738037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08988118171691895}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8845914602279663},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.7497063875198364},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7136012315750122},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6616508960723877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6606445908546448},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.6122021079063416},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.5538804531097412},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5268620252609253},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5023336410522461},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4926348328590393},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4760817587375641},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.457304984331131},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4559623897075653},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.44845718145370483},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4357272982597351},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4143935441970825},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.35604795813560486},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.20657029747962952},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1948748528957367},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15712296962738037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08988118171691895},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2019.8869163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2019.8869163","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W851575271","https://openalex.org/W1523833175","https://openalex.org/W1907293129","https://openalex.org/W2060479059","https://openalex.org/W2126087831","https://openalex.org/W2413522668","https://openalex.org/W2486460265","https://openalex.org/W2536325433","https://openalex.org/W2611050176","https://openalex.org/W2620904645","https://openalex.org/W2726001757","https://openalex.org/W2752726215","https://openalex.org/W2773013279","https://openalex.org/W2775266287","https://openalex.org/W2794925686","https://openalex.org/W2810052072","https://openalex.org/W2886706106","https://openalex.org/W2887844426","https://openalex.org/W2891000728","https://openalex.org/W2892312352","https://openalex.org/W2901526801","https://openalex.org/W2914876238","https://openalex.org/W2918047150","https://openalex.org/W2945225242","https://openalex.org/W2963499972","https://openalex.org/W2964160067","https://openalex.org/W2974835633","https://openalex.org/W3013882848","https://openalex.org/W3104395320","https://openalex.org/W4248175462","https://openalex.org/W4288562465","https://openalex.org/W4295720133","https://openalex.org/W6678832241","https://openalex.org/W6740384779","https://openalex.org/W6752824471","https://openalex.org/W6753751735","https://openalex.org/W6754159809","https://openalex.org/W6756701151","https://openalex.org/W6762856148","https://openalex.org/W6764315805"],"related_works":["https://openalex.org/W3184106935","https://openalex.org/W4360604748","https://openalex.org/W4249344736","https://openalex.org/W3103461600","https://openalex.org/W4389821209","https://openalex.org/W2952527827","https://openalex.org/W3111746508","https://openalex.org/W2952716475","https://openalex.org/W2987300744","https://openalex.org/W4283579034"],"abstract_inverted_index":{"Blockchain":[0],"has":[1],"been":[2,53,76],"hailed":[3],"as":[4,30,90,123],"an":[5,23,142],"emerging":[6],"technology":[7],"with":[8],"the":[9,35,59,70,79,165],"potential":[10],"to":[11,57,65,154],"cause":[12],"significant":[13],"impact":[14],"in":[15,25,112,164],"a":[16,31,113,117,132],"variety":[17],"of":[18,38,69,81,120,144,160,167],"fields.":[19],"One":[20],"domain":[21],"is":[22,125],"application":[24,119],"cyber-physical":[26],"systems":[27],"(CPSs),":[28],"e.g.,":[29],"building":[32],"block":[33],"for":[34,85],"(Industrial)":[36],"Internet":[37],"Things":[39],"(IIoT)":[40],"and":[41,50,95,110,130,157],"Industry":[42],"4.0.":[43],"In":[44],"this":[45],"regard,":[46],"various":[47],"use":[48],"cases":[49],"designs":[51,150],"have":[52,74],"proposed":[54],"that":[55,151,169],"seek":[56],"leverage":[58],"desirable":[60],"properties":[61],"blockchain":[62,73,134,145],"technologies":[63],"seem":[64],"offer.":[66],"While":[67],"many":[68],"principles":[71],"behind":[72],"actually":[75,136],"studied":[77],"under":[78],"veil":[80],"Byzantine":[82],"fault":[83],"tolerance":[84],"decades,":[86],"some":[87],"approaches,":[88],"such":[89,121,171],"relying":[91],"on":[92],"game-theoretic":[93],"incentives":[94],"proof-of-work":[96],"(PoW),":[97],"are":[98,152],"not":[99],"yet":[100],"fully":[101],"understood.":[102],"This":[103,138],"knowledge":[104],"gap":[105],"can":[106],"leave":[107],"both":[108],"practitioners":[109],"researchers":[111],"difficult":[114],"position":[115],"regarding":[116],"possible":[118],"technologies,":[122],"it":[124],"often":[126],"unclear":[127],"what":[128],"guarantees":[129],"characteristics":[131],"particular":[133],"design":[135],"achieves.":[137],"work-in-progress":[139],"paper":[140],"provides":[141,158],"overview":[143],"security":[146],"research,":[147],"outlines":[148],"system":[149],"likely":[153],"exhibit":[155],"vulnerabilities,":[156],"examples":[159],"potentially":[161],"insecure":[162],"proposals":[163],"field":[166],"CPSs":[168],"employ":[170],"designs.":[172]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
