Final Version
Final Version
net/publication/380574808
CITATIONS READS
9 1,215
2 authors:
All content following this page was uploaded by Mishall Al-Zubaidie on 15 May 2024.
Research Article
Transaction Security and Management of Blockchain-Based Smart Contracts in
E-Banking-Employing Microsegmentation and Yellow Saddle Goatfish
Wid Alaa Jebbar ,1 , Mishall Al-Zubaidie ,1 *,
1
Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Nasiriyah 64001, Iraq
A RT ICL E INFO AB STRACT
Article History
Received 08 Feb 2024 The process security of money transactions is considered an important issue in e-banking. Additionally,
Accepted 30 Apr 2024
it is an enormous problem if never controlled. particular, security should be a combination of fast and
Published 09 May 2024
sturdy characteristics, which is the subject of previous studies suffered from. Our research attempts to
Keywords improve the system in which banks deal with the security of financial transactions. This research
Authentication leverages the idea of microsegmenting the entire system into designated zones to concentrate on security,
Blockchain Transaction; where each zone has its own rules and limitations. These rules are managed by a smart contract, which
E-banking
decides whether they have been observed to verify the legitimacy of the customer. First, the two-phase
commit algorithm (2PC) was used to specify the type of e-banking request. After this, the
Microsegmentation
microsegmentation principle was applied to isolate each type of e-transaction process alone in a separate
Smart contracts
segment. Then, the yellow saddle goatfish algorithm (YSGA) was used to determine whether the smart
contract conditions were optimized. Finally, if the customer is authorized, then the entire transaction
process is saved in the blockchain's main ledger and secured by a unique hash. The blockchain application
makes our system capable of dealing with large numbers of users in a decentralized manner. In addition,
using a hash with each block prevents fraudulent transactions by adversaries. Our system has been
examined against several recent well-known assaults/attacks, such as falsification, advanced persistent
threat, bribery, spoofing, double spending, chosen text, race, and transaction replay attacks, and has
proven to overcome them. In terms of the performance evaluation, we obtained an execution time of
approximately 0.0056 nanoseconds, 3.75% complexity, and 1500 KB of memory and disk drive, which
is considered low compared to that of state-of-the-art research. Thus, our proposed system is highly
acceptable for banking sector applications.
1. INTRODUCTION
Currently, the goal of financial institutions and banks is to automate their information, data, and money transactions [1].
Moreover, this goal is facing many challenges because automation means many dangerous assaults and hacking as long as
the information is available on the internet or through e-banking. Thus, trust and security are extremely important between
customers and stakeholders. Banks and different financial organizations are constantly under pressure to strike a balance
between system security, costs, and the ability to complete procedures in real time [2], which is a major challenge because
cyber threats are increasingly developing and taking new forms continuously, resulting in breakthroughs, endangering data
accessibility and putting banks' reputations on the edge [3, 4]. This section, which includes Subsection 1.1, will summarize
the cyber threats that have been highly prevalent in the financial industry. Subsection 1.2 explains the motivation for using
blockchain technology in e-banks, and Subsection 1.3 explains our main contributions.
quarter of 2022, spoofing assaults mimicking corporate social networking websites accounted for more than half (52%) of
all assaults worldwide, based on the cyber security vendor's 2022 Q1 brand spoofing report. Additionally, according to
2022 reports, 9 out of 10 (91%) email phishing/spoofing assaults were successful in removing UK firms [8]. Furthermore,
there is a possibility of race assault when two transactions are made simultaneously with the same funds, which is
considered highly dangerous and is the most common assault affecting the financial sector, where the most affected are
American, Argentinean, Brazilian, and Chinese banks. By the end of 2022, 566 breaches had occurred worldwide in the
finance and insurance sectors, resulting in more than 254 million records being exposed. Moreover, assaults such as double
spending, chosen text, and transaction replays were being used by assaulters/hackers in an attempt to steal $1 billion from
the central bank of Bangladesh in February 2016; even with the majority of transactions banned, $101 million vanished.
Figure 1 shows security assaults in various sectors [9], as financial institutions suffer from the largest percentage of security
breaches.
Assaults percentage
Financial institution
Other industries
Healthcare
Education
sector
Manufacturing
Business services
Software and technology
Retail trade
Utilities
0% 4% 8% 12% 16% 20% 24%
The content of this paper is as follows: in the introduction, we discuss e-banking and security risks in Section 1. In Section
2, we summarize the related works e-banking. Section 3 provides a preliminary overview of the methods used in our
proposed system. Section 4 describes the design of our proposed security system in detail. Section 5 describes the security
analysis against several well-known assaults, Scyther analysis, and performance evaluation. Section 6 addresses the
limitations of the study. Our conclusions are presented in Section 7. Finally, future work will be described in Section 8.
Riad et al. [11] presented a hierarchy for controlling access to open banks. When an honest customer requests access to
cloud-hosted financial data, first, a unique customer identifier (CID) is assigned to the customer by the bank web server.
After that, the authentication servers will either authenticate the CID or not based on the branch policy, fraud detection
entities, username, password, or any other credentials provided by the customer. Next, the BCT contract's functions are
initialized for the authenticated customer identified by CID. A block that has been mined will be included in the
synchronized blockchain. Subsequently, the customer will use the synchronized peer network to obtain authorization.
Finally, the data kept in the cloud are accessible only to approved customers. However, this process was considered along
with the absence of high-level detection algorithms that affect the performance and cause a delay in execution, but this
module presented a secure and safe method. Gamal and Aref [12] addressed BCT as a fundamental technology for providing
security to the financial sector and banks, where researchers compared traditional processes and BCT-based banking
processes and found that BCT was faster, more efficient, and more secure. At the same level, [22] categorized the
importance of BCT through different applications, such as e-banking, e-healthcare, e-aircraft, e-car sharing, and e-voting.
Additionally, this study focused on Ethereum as the most commonly used tool in building applications. However, it is not
a suggested model as much as it is a study of BCT characteristics. Additionally, Jena [23] recommended a study that would
aid decision-makers, government officials, and technologists in improving banking guidelines to utilize BCT. Their
research proposed an expanded version of the unified theory of acceptance and use of technology (UTAUT) model. It is a
theoretical model that shows analytics about the importance of BCT. However, this study is not practical because it only
shows the importance of the blockchain. Chaudhry and Hydros [13] presented a security model based on the principle of
zero-trust, which means that no one should trust either the user or the employees of the system itself. Hence, they combined
zero-trust security side by side with the BCT algorithm to maintain a secure system. However, this principle is considered
old compared to the modern attacks and threats that financial organizations deal with every day, which means that the
system here does not have a high level of security. Although [24], [25], [26], and [27] investigated the security risks in e-
banks and how to address them, they neglected important attacks such as falsification and spoofing.
Jebbar et al, Mesopotamian Journal of Cybersecurity Vol.4 No.2 , 71–89
74
Garg et al. [1] demonstrated the potential benefits that an organization could receive from BCT. These benefits include
increased efficiency through quick response to transactions, faster transactions due to automated record keeping, reduced
transaction time and operational costs, prompt settlements and payments without the need for third parties, enhanced third-
party trust through the use of cryptography, and real-time information leading to transparency on both sides. Rjoub et al.
[28] suggested a k-nearest neighbor algorithm based on an adaptive neuro-fuzzy approach. It is a way to select the best
node (customer) during the transaction process or to classify the nodes according to the similarity depending on the amount
of the variable k, which is accomplished by calculating the distance between two points. Then, the square root and diction
are calculated after the classification. BCT is used to detect security risks. Nonetheless, this method analysis showed that
it is excellent in terms of cost reduction, time, and safety, but the analysis was limited and did not show any improvement.
Moreover, there is no verification phase before the classification; thus, the principle of knowing the customer is not
detected. Ullah et al. [29] presented a model centered on the adoption of BCT for financial organization use in developing
nations, utilizing the manner of technological acceptance as a basis. There are five multi-item components in their suggested
model: saving money, intention, perceived ease of use (PEU), perceived usefulness (PU), and trust. These parameters were
never considered as parameters for measuring the performance or security of financial systems.
Farah et al. [30] aimed to investigate the mechanism by which customers' perceived financial well-being is determined by
blockchain-enabled banking. The researchers performed their investigation by surveying 283 people who had bank
accounts. The study revealed that Pakistani banks can use BCT to increase security and transparency while also reducing
costs and time consumption. However, the problem of this study is that it is a theoretical study that has never presented any
enhancement of the base blockchain systems. Zook and Grote [31] proposed a framework that systematizes the analysis of
BCT adoption in financial sectors using the concepts of space, agency, and scale. They concluded that, based on the limited
information they gathered, it is inaccurate to characterize BCT as complex. Instead, BCT is a technology that can disrupt
traditional business models by offering lower-cost alternatives and quickly overtaking incumbent _rms. Meanwhile, they
did not provide any details about how they reduced the cost of their proposed system, nor did they provide detailed results
about the extent to which their system carries out banking transactions on time, which never provided any temptations to
customers to use their system. Agrawal et al. Garg et al. [32] provided a summary of blockchain capacity to foster
organizational trust and guarantee transaction transparency. This study advances BCT's application in the banking sector
from both a theoretical and practical standpoint. The main findings are as follows: First, before choosing to integrate BCT
into the banking system, managers, decision-makers, and experts would particularly benefit from having a foundational
view to measure business benefits. Second, the study is technically and socially relevant due to its combination of
professional and theoretical use. Furthermore, BCT may be adapted to a banking ecosystem's requirements, which will
assist in minimizing launch costs even further, but here, they never focused on security as a major issue in financial systems.
Furthermore, BCT can be divided into the following main types [33].
Public blockchain is nonrestrictive, and with this type of BCT, there is no need for permission to access; thus,
anyone who has internet access can access this type of BCT. Therefore, the main advantage of this type of
cryptocurrency is that it is completely independent, and most cryptocurrencies run on public BCT.
A private blockchain is a restrictive type that needs permission to enter and is under the control of a single entity;
only authentic users can access this type of BCT.
Hybrid blockchain is a mix of public and private BCT where permission is needed, and it is a permissionless
system of this type. Some parts are managed by one organization, but others are public.
A consortium block is a creative approach in which some parts are public and others are private, but it can be
moderated by more than one organization.
In our proposed method, private BCT is used because it offers enhanced privacy control and scalability compared to other
types of blockchain. In finance, privacy is considered a very sensitive issue due to the sensitive data it deals with, which is
why the private blockchain offers permissioned access that limits who can access the network and who can make a
transaction. Additionally, a private blockchain allows faster transactions to meet the specific needs and requirements of a
financial institution.
Overall, smart contracts offer several advantages over traditional methods, including automation, transparency, security,
cost-effectiveness, flexibility, and speed of execution.
3.4 Microsegmentation
Microsegmentation (MS) is a security technique that refers to the principle of dividing a network into a definable zone;
each zone has its own rules and conditions, as shown in Figure 3. This approach is completely different from network-MS,
which needs hardware, unlike software-based MS. Thus, the main purpose of obtaining a secure system in this technique
is to isolate each zone by itself so that if the assaulter (A) can reach a zone, the other zones will remain safe and secure. As
depicted in Figure 3, in the process of breaking up the whole system into zones where these zones are completely
independent, let us suppose that A makes access to green zone 1; then, the assault is trapped in that zone, and the other
zones are never affected. Comparing MS to more established methods, which are created and intended for environments
with reinforced perimeters, reveals significant technical advantages:
Enhance security and management to prevent As from moving across the network.
Rapid deployment, maintenance, and adaptation of policies integrated with the MS.
Since MS keeps policies tied to workloads rather than segments of a network, potential gaps in security
coverage that can create vulnerabilities are closed.
Jebbar et al, Mesopotamian Journal of Cybersecurity Vol.4 No.2 , 71–89
77
The detection process is controlled by obtaining the best value of the YSGA, which is completed by initializing the
population in each zone: P = [p1, p2, p3 … pm], where m is the number of the population.
Then, our system calculates the fitness value of each population in the zones to identify the chaser fish. The latter will lead
the search process Фc: Фc = X to identify whether the rules are detected or not and to identify the blocker fishes Фb: Фb =
Y. Then, this process compares the fitness values, which is the best value for detecting the rule, and the value of the search
of the Фc. If they are identical, then go to the next step of BCT hashing and complete the action; if not identical, then
terminate and reject the action. Figure 7 depicts the whole operation of our proposed system from the CS request to the
termination of the operation.
Algorithm 2 YSGA
Input: The goatfish population P ← p1, p2, p3, … pm
Output: The best search value (Фbest)
1: Calculating the fitness value of each particle (p)
2: Identifying the global best Фbest
3: Partition the population p into k zone Z1, Z2, Z3, … Zk
4: Identifying the chaser Фc and the blocker Фb fish for each zone
5: For each zone Zi
6: Executing of hunting routine for chaser fish
7: Executing of blocking routine for blocker fish
8: Calculating the fitness value for each goatfish
9: If the calculated Фg has better fitness than the Фi
10: Exchanging the Фi
11: If the calculated Фi has better fitness than the Фbest
12: Updating Фbest
13: If the fitness value of Фi has improved
14: q ← q + 1
15: Executing routine for changing zone
16: q ← 0
17: Output the _best which carry the identification decision
Spoofing: This assault is the act of disguising a communication or identity to give the impression that it is coming
from a trustworthy and authorized source. Spoofing assaults come in a variety of forms, from the more common
email spoofing assaults used in phishing operations to caller ID spoofing assaults, which are regularly used to
commit fraud. In such a case, the proposed system will stop because of the use of the 2PC algorithm, which has
two phases to detect the type of process and the isolation of each CR in a segment.
Chosen text: This is a situation where A can select plaintexts Pi and see cipher texts Ci, which correspond to those
encryptions. A selected plaintext differential assault can be transformed into a known-plaintext assault by using
m pairs of texts for an n-bit block cipher. This will require 26n/2√2𝑚. This phenomenon does not exist in the
procedure of our proposed module because we have no text. Our system has conditions controlled by the SCs and
the YSGA.
Race: This assault refers to the action of two events racing to obtain the same prize. In brief, it is two operations
that occur at the same time, and they are racing to which one will execute first. For the following scenario, one
CR with $2000 writes two checks: check A with $1000 and check B with $1500. The deposit starts here the racing
assault could run at the same time leaving the bank account with -500$ at someone's CR bank account. Fortunately,
our proposed module dealt with such a manner with the principle of MS, where each process has its own segment
and its own time to run cannot conflict with the time of other processes.
Transaction replay: To understand such assault, CR wishes to show SR who he/she truly is. CR obediently gives
her/his password to SR when he/she asks for identification, possibly after hashing or even salting it. Meanwhile,
A is listening in on the conversation and retains the password (or hash). Following their conversation, A-posing
as a CR connects with SR. When the SR requests identification, A provides him/her CR's password (or hash) from
their last session, which he/she accepts, giving A access. Such an assault can be stopped by the principle of giving
each user or CR a unique ID, and this principle is embedded in the proposed system, the KYC principle. Table II
provides a brief comparison between our system and recent transaction systems in terms of preventing assaults.
We note from the table that our proposed system repels all attacks in the field of research, while some existing
systems do not repel well-known modern attacks.
TABLE II. COMPARISON OF ASSAULT PREVENTION BETWEEN THE PROPOSED SYSTEM AND THE RELATED SYSTEMS
Assault [3] [11] [24] [25] [26] [27] Proposed system
Falsification ✔ ✔
APT ✔ ✔
Bribery ✔ ✔
Double-Spending ✔ ✔ ✔
Spoofing ✔ ✔ ✔
Chosen text ✔ ✔
Race ✔ ✔ ✔
Transaction replay ✔ ✔ ✔ ✔
designed a system that is resistant to assaults in our study area. Additionally, we completed a summary of characterizing
roles of our proposed system, the results of which are shown in Figure 9, and the results of the respective paradigms are
shown in Figures 9 and 10.
TransactionwithPCSCYSGABC CR TransactionwithPCSCYSGABC, CR2 Reachable ok verified At least 1 trace pattern. 1 trace pattern
SR TransactionwithPCSCYSGABC, SR2 Reachable ok verified At least 1 trace pattern. 1 trace pattern
Done.
Fig. 11. Execution time average for YSGA and the microsegmentation
Fig. 12. Execution time average for 2PC and the smart contract
Fig. 13. Execution time average for 2PC plus the YSGA with the smart contract
Jebbar et al, Mesopotamian Journal of Cybersecurity Vol.4 No.2 , 71–89
85
TABLE III. COMPMARISON BETWEEN CURRENT SYSTEMS AND THE PROPOSED SYSTEM ACCORDING TO EXECUTION TIME
BCT-based system Execution time
BCT-based hybrid platform [3] 60 s
BCT-based-revocation Access control [11] 49.67 ms
Ethereum BCT of _financial transactions [37] 15 s
Proposed system 0.0056 ns
Complexity: A system or a model is supposed to exhibit complex behavior when its constituent parts interact in
many ways and adhere to local laws, resulting in nonlinearity, unpredictability, collective dynamics, hierarchy,
and emergence. When anything has numerous components that interact with one another in different ways to form
a higher order of emergence that is more than the sum of its parts, the phrase is usually used to describe it. The
analysis of these complicated interactions at many scales is the main goal of complex systems theory. Our
proposed system has many layers. Figure 6 starts with the division of the whole e-banking process into separate
segments using the principle of MS and the 2PC algorithm combined. Then, the next layer of the detection of the
CR identity using the SCs and the YSGA combined, and the final layer of creating the blocks and hashing in the
BCT. Thus, we have a complex system with many layers combined but with a smooth flow of the procedure that
makes the e-transaction process easy, fast, authentic, and complete. As shown in Figure 14, the overall percentage
of complexity is considered significantly lower than that in the research on the same topic, where the 2PC
algorithm scored the highest complexity because it is an algorithm of two phases, while the other algorithms had
a very small percentage of complexity. In general, after calculating the overall complexity percentage,
15000/4=3.75%, which is considered very low. This means that the system is easy to manipulate and update.
Additionally, compared to the complexity rates extracted from previous systems, we found that our research has
a much lower complexity rate than previous research, as summarized in Table IV. Our proposed system has a
complexity of approximately 15 × 103, which is lower than that of existing modern systems [15] and [38].
TABLE IV. COMPARISON BETWEEN CURRENT SYSTEMS AND THE PROPOSED SYSTEM ACCORDING TO COMPLEXITY
BCT-based system Complexity rate
Holochain blocks for distributed security in IoT [15] 106
Secure BCT-Driven Audit Trails [38] 5 × 107
Proposed system 15 × 103
Storage: The allocation and management of memory resources to store data and code utilized by a specific module
or system components is referred to as system or module storage. In computer/network systems, storage can be
classified into two main types: primary storage and secondary storage. Primary storage, also known as main
memory or RAM, is the temporary storage space used by the system or module to hold data and instructions during
execution. It provides fast access to data and is directly accessible by the processor. Conversely, long-term storage
systems such as network-attached storage (NAS), solid-state drives (SSDs), and hard disk drives (HDDs) are
referred to as secondary storage. BCT relies on the principle of a distributed ledger. Specifically, this distributed
ledger works as a database to store all CRs' information related to the banking operations conducted on their
accounts, which are interconnected with chains in the form of blocks; thus, the process of storing and protecting
those blocks is considered extremely important, meaning that the less load the system has on memory, the more
Jebbar et al, Mesopotamian Journal of Cybersecurity Vol.4 No.2 , 71–89
86
data are protected from errors that affect the system as a result of excessive load on memory, which causes it to
stop electronic banking systems. In the case of our proposed system, we estimated the overall storage, as shown
in Figure 15. When we have a tremendous amount of system resources, the RAM and disk drive usage never skips
1030 KB, while executing the system 100 times showed that the system's resource usage rate was between 500
KB and 1000 KB; as a summation, it never crossed 1500 KB, guaranteeing fast, reliable and balanced usage of
system resources. Figure 16 shows the storage sizes consumed by all our algorithms (MS, 2PC, YSGA, and SC)
in the KB for ten implementations. This figure shows that our algorithms use low storage space. Table V
summarizes a comparison of storage consumption between our suggested system and other recent systems on the
same topic. This indicates that our system needs to consume 1500 KB of memory storage, which is small compared
to the existing search results [16], [17] and [18].
TABLE V. COMPARISON BETWEEN CURRENT SYSTEMS AND THE PROPOSED SYSTEM ACCORDING
TO RAM AND DISK DRIVE USE
BCT-based system System resources use
Analysis of BCT based storage systems [16] 512 MB
Development and evaluation of BCT based secure application [17] 470 MB
Flexible BCT with memory-optimized [18] 12000 KB
Proposed system 1500 KB
Table VI shows a complete general comparison between existing systems and the proposed system with the parameters of
speed, security, efficiency, and control. This indicates that our system shows better efficiency than previous research
systems.
Jebbar et al, Mesopotamian Journal of Cybersecurity Vol.4 No.2 , 71–89
87
6. LIMITATIONS
Our proposed system provides a new, fast, and secure method for data transactions. On the other hand, any study and
suggestion to develop e-banking systems using BCT are considered quite challenging issues. The first reason is that BCT
technology itself is considered a modern technology, and the second reason, as long as there is CR information we are
dealing with, is that it is sensitive and has so many risks. Thus, the limitations of this study include the difficulty of updating
the BCT information because, after creating the blocks in the BCT and hashing process, it is impossible to update the
information. Moreover, another limitation is the issue of big, which requires many separate segments and, consequently, a
large amount of space memory. Finally, the use of default hashes in BCT could be a reason for the relative decrease in
performance, in addition to the possibility of attacks that are not covered within the scope of this research.
7. CONCLUSIONS
As time runs fast toward technology and there is new technology appearing daily, the banking sector will be affected, and
the traditional procedure in banking organizations will be electronic and available to be completed online, which is known
as e-banking. However, everything online is threatened by the As and assaults, and the result is data loss. Therefore, we
propose a security e-transaction system that combines both safe and fast procedures for money transactions in e-banking.
Our proposed module has the following characteristics and advantages.
Fast: Because of the use of modern, easy, and accurate algorithms such as the YSGA and the 2PC, our proposed
system guarantees that the e-banking procedure will be performed in real time.
Safe and authentic: The proposed module is controlled by the SC conditions in which both the CR and the SR
agree on and do not agree, the e-transaction procedure cannot be performed, and our proposed module can be
considered safe and secure.
Additionally, because of the usage of the principle of isolation for each process alone in a separate segment, the
danger that threatens a specific segment will remain bounded by that segment, and the other segments will work
normally.
Integrating: The final layer of our proposed module is the hashing and creating blocks for each procedure. Each
block has complete information about the whole transaction process plus the number of previous blocks. This
approach provided our proposed module with an advantage in terms of integrity.
Speed: Our proposed system is fast due to the speed of the algorithms used. Additionally, after the full analysis
shown above, the time required to complete a full transaction is not more than 0.0056 nanoseconds, which is
considered fast compared to other similar methods.
Based on our analysis in terms of security and performance, we conclude that our proposed system has efficient
performance and is capable of repelling attacks within the scope of this study. Every single system, module, or scheme can
be changeable and can developed because of the fast and challenging walking forward technology, and this study also
needs to improve some aspects of our system. In future works, some machine learning algorithms can be applied to make
some changes to the saved blocks of BCT, and data compression algorithms can be used to reduce the size of the segments
or cloud storage can be used.
Conflicts of interest
The paper states that there are no personal, financial, or professional conflicts of interest.
Funding
The acknowledgments section of the paper does not mention any financial support from institutions or sponsors.
Acknowledgements
The author acknowledges the assistance and guidance received from the institution in various aspects of this study.
Jebbar et al, Mesopotamian Journal of Cybersecurity Vol.4 No.2 , 71–89
88
References
[1] P. Garg, B. Gupta, K. N. Kapil, U. Sivarajah, and S. Gupta, "Examining the relationship between blockchain
capabilities and organizational performance in the Indian banking sector," Annals of Operations Research, pp. 1-34,
2023.
[2] M. Javaid, A. Haleem, R. P. Singh, R. Suman, and S. Khan, "A review of blockchain technology applications for
financial services," BenchCouncil Transactions on Benchmarks, Standards and Evaluations, p. 100073, 2022.
[3] A. I. Taloba, A. Elhadad, A. Rayan, R. M. Abd El-Aziz, M. Salem, A. A. Alzahrani, F. S. Alharithi, and C. Park, "A
blockchain-based hybrid platform for multimedia data processing in IoT-healthcare," Alexandria Engineering Journal,
vol. 65, pp. 263-274, 2023.
[4] M. Al-Zubaidie and G. S. Shyaa, "Applying detection leakage on hybrid cryptography to secure transaction
information in e-commerce apps," Future Internet, vol. 15, no. 8, p. 262, 2023.
[5] S. A. Yousiff, R. A. Muhajjar, and M. H. Al-Zubaidie, "Designing a blockchain approach to secure firefighting
stations based Internet of things," Informatica, vol. 47, no. 10, pp. 09-26, 2023.
[6] M. Al-Zubaidie, "Implication of lightweight and robust hash function to support key exchange in health sensor
networks," Symmetry, vol. 15, no. 1, p. 152, 2023.
[7] M. Al-Zubaidie, Z. Zhang, and J. Zhang, "REISCH: Incorporating lightweight and reliable algorithms into healthcare
applications of WSNs," Applied Sciences, vol. 10, no. 6, p. 2007, 2020.
[8] P. Rawat, "How do phishing and spoofing attacks impact businesses?" 2023,
https://www.infosectrain.com/blog/howdo-phishing-and-spoofing-attacks-impact-businesses/ (accessed on January
02, 2024).
[9] S. Bhanda and A. Taylor, "Fundamentals of cybersecurity in banks," 2023, https://www.qentelli.com/thought-
leadership/insights/fundamentals-cybersecurity-banks (accessed on December 03, 2023).
[10] A. Thommandru and B. Chakka, "Recalibrating the banking sector with blockchain technology for effective anti-
money laundering compliances by banks," Sustainable Futures, vol. 5, p. 100107, 2023.
[11] K. Riad, M. Elhoseny et al., "A blockchain-based key-revocation access control for open banking," Wireless
Communications and Mobile Computing, vol. 2022, 2022.
[12] S. Gamal and M. M. Aref, "Challenges and opportunities of blockchain integration in the Egyptian banks: A
qualitative analysis," Digital Economy, Business Analytics, and Big Data Analytics Applications, pp. 469-485, 2022.
[13] U. B. Chaudhry and A. K. Hydros, "Zero-trust-based security model against data breaches in the banking sector: A
blockchain consensus algorithm," IET blockchain, vol. 3, no. 2, pp. 98-115, 2023.
[14] B. D. S. Sai, R. Nikhil, S. Prasad, and N. S. Naik, "A decentralised KYC based approach for microfinance using
blockchain technology," Cyber Security and Applications, vol. 1, p. 100009, 2023.
[15] S. Zaman, M. R. Khandaker, R. T. Khan, F. Tariq, and K.-K. Wong, "Thinking out of the blocks: Holochain for
distributed security in IoT healthcare," IEEE Access, vol. 10, pp. 37064-37081, 2022.
[16] P. S. Austria, "Analysis of blockchain-based storage systems," Ph.D. dissertation, University of Nevada, Las Vegas,
2020.
[17] E. Leka and B. Selimi, "Development and evaluation of blockchain based secure application for verification and
validation of academic certificates," Annals of Emerging Technologies in Computing (AETiC), vol. 5, no. 2, pp. 22-
36, 2021.
[18] A. Dorri, S. S. Kanhere, and R. Jurdak, "MOF-BC: A memory optimized and flexible blockchain for large scale
networks," Future Generation Computer Systems, vol. 92, pp. 357-373, 2019.
[19] M. K. Ojha, C. P. Sharma, R. Farswan, and N. Prakash, "E-banking: Banking solution in modern era," Ilkogretim
Online, vol. 20, no. 2, pp. 2510-2519, 2021.
[20] B. Lv, P. Cheng, C. Zhang, H. Ye, X. Meng, and X. Wang, "Research on modeling of e-banking fraud account
identification based on federated learning," in 2021 IEEE Intl Conf on Dependable, Autonomic and Secure
Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl
Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). IEEE, 2021, pp. 611-
618.
[21] F. Li, H. Lu, M. Hou, K. Cui, and M. Darbandi, "Customer satisfaction with bank services: The role of cloud services,
security, e-learning and service quality," Technology in Society, vol. 64, p. 101487, 2021.
[22] K. Agrawal, M. Aggarwal, S. Tanwar, G. Sharma, P. N. Bokoro, and R. Sharma, "An extensive blockchain based
applications survey: Tools, frameworks, opportunities, challenges and solutions," IEEE Access, 2022.
[23] R. K. Jena, "Examining the factors affecting the adoption of blockchain technology in the banking sector: An extended
UTAUT model," International Journal of Financial Studies, vol. 10, no. 4, p. 90, 2022.
Jebbar et al, Mesopotamian Journal of Cybersecurity Vol.4 No.2 , 71–89
89
[24] T. N. Thakur and N. Yoshiura, "AntiPhiMBS: A new anti-phishing model to mitigate phishing attacks in mobile
banking system at application level," in Intelligent Information and Database Systems: 13 th Asian Conference,
ACIIDS 2021, Phuket, Thailand, April 7-10, 2021, Proceedings 13. Springer, 2021, pp. 399-412.
[25] K. Lee and K. Yim, "Study on the transaction linkage technique combined with the designated terminal for 5G enabled
IoT," Digital Communications and Networks, vol. 8, no. 2, pp. 124-131, 2022.
[26] S. Mollajafari and K. Bechkoum, "blockchain technology and related security risks: Towards a seven-layer
perspective and taxonomy," Sustainability, vol. 15, no. 18, p. 13401, 2023.
[27] B. Saha, M. M. Hasan, N. Anjum, S. Tahora, A. Siddika, and H. Shahriar, "Protecting the decentralized future: An
exploration of common blockchain attacks and their countermeasures," arXiv preprintarXiv:2306.11884, 2023.
[28] H. Rjoub, T. S. Adebayo, and D. Kirikkaleli, "blockchain technology-based FinTech banking sector involvement
using adaptive neuro-fuzzy-based K-nearest neighbors algorithm," Financial Innovation, vol. 9, no. 1, p. 65, 2023.
[29] N. Ullah, W. M. Al-Rahmi, O. Alfarraj, N. Alalwan, A. I. Alzahrani, T. Ramayah, and V. Kumar, "Hybridizing cost
saving with trust for blockchain technology adoption by financial institutions," Telematics and Informatics Reports,
vol. 6, p. 100008, 2022.
[30] M. F. Farah, M. Naveed, and S. Ali, "Blockchain-enabled banking services and customers' perceived financial
wellbeing: A structural nexus," in National Brand and Private Label Marketing Conference. Springer, 2023, pp. 41-
49.
[31] M. Zook and M. H. Grote, "Blockchain financial geographies: Disrupting space, agency and scale," Geoforum, 2022.
[32] P. Garg, B. Gupta, A. K. Chauhan, U. Sivarajah, S. Gupta, and S. Modgil, "Measuring the perceived benefits of
implementing blockchain technology in the banking sector," Technological forecasting and social change, vol. 163,
p. 120407, 2021.
[33] M. K. Shrivas and T. Yeboah, "The disruptive blockchain: Types, platforms and applications," Texila International
Journal of Academic Research, vol. 3, pp. 17-39, 2019.
[34] D. Kashyap, B. Singh, and M. Kaur, "Chaotic approach for improving global optimization in yellow saddle Goatfish,"
Engineering Reports, vol. 3, no. 9, p. e12381, 2021.
[35] D. Zaldivar, B. Morales, A. Rodriguez, A. Valdivia-G, E. Cuevas, and M. Perez-Cisneros, "A novel bio-inspired
optimization model based on yellow saddle Goatfish behavior," Biosystems, vol. 174, pp. 1-21, 2018.
[36] A. Hassan, I. Ishaq, and J. Minilla, "Automated verification tools for cryptographic protocols," in 2021 International
Conference on Promising Electronic Technologies (ICPET). IEEE, 2021, pp. 58-65.
[37] P. S. Maharjan, "Performance analysis of blockchain platforms," Ph.D. dissertation, University of Nevada, Las Vegas,
2018.
[38] A. Ashar, S. Muhammad, A. G. Mohammed, and M. David, "Blocktrail: A service for secure and transparent
blockchain-driven audit trails," IEEE Systems Journal, vol. 16, pp. 1367-1378, 2022.