Utilizing Blockchain Technology for Oil and Gas Industry

Authors

  • Raad Mohammed State Company for Gas Filling and Services, Ministry of Oil, Iraq

DOI:

https://doi.org/10.52716/jprs.v13i2.580

Keywords:

cyber-attack, oil, cyber security, infrastructure, technology, upstream, downstream, mid-stream.

Abstract

During the last two decades, all fields, including the oil sector, depended mainly on technological progress to keep pace with the developments in this field. This technological progress was accompanied by an increase in hacking attempts. Cyber-attacks are defined as the hacking of a computer by a person or group of people over the Internet, causing a lot of damage, especially to devices and equipment that depend on the Internet; This leads to substantial financial losses. Therefore, it is very important to understand these attacks and try to overcome them.  In the oil sector, cyber-attacks can be scanned in three areas (upstream, midstream, and downstream).  This paper discusses how to secure cyber security for the oil sector by making plans for Internal and external cybersecurity by creating and securing separate loops by using blockchain technology and creating a smart contract for each loop to protect it information. As well as using the simulation and control system to increase the effectiveness of cyber security, and after this survey process. This paper aims to classify the cyber-attacks that affect the oil and gas sectors. Create a strong system against any type of cyber-attack, and thus provide higher protection for oil and gas companies and equipment through the work of special programs to protect systems and equipment from hacking.

 

References

G. Stergiopoulos, D. A. Gritzalis, and E. Limnaios, “Cyber-Attacks on the Oil Gas Sector: A Survey on Incident Assessment and Attack Patterns,” IEEE Access, vol. 8, pp. 128440–128475, 2020, doi: 10.1109/ACCESS.2020.3007960.

F. Hacquebord and C. Pernet, “Drilling Deep A Look at Cyberattacks on the Oil and Gas Industry,” Drilling Deep: A Look at Cyberattacks on the Oil and Gas Industry, pp. 1–35, 2019.

I. H. Mackay, “Oil and Gas.,” CIM Bulletin, vol. 69, no. 769, pp. 73–82, 1976.

K. Rick and K. Iyer, “Countering the threat of Cyberattacks in oil and gas,” Bcg, 2016.

C. G. Xarhoulacos, A. Anagnostopoulou, G. Stergiopoulos, and D. Gritzalis, “Misinformation vs. Situational awareness: The art of deception and the need for cross-domain detection,” Sensors, vol. 21, no. 16, 2021, doi: 10.3390/s21165496.

A. S. Azman, M. Y. Lee, S. K. Subramaniam, and F. S. Feroz, “Mesh WSN in midstream and downstream of oil and gas industry,” Lecture Notes in Mechanical Engineering, no. August 2021, pp. 456–465, 2020, doi: 10.1007/978-981-13-9539-0_44.

S. Angraal, H. M. Krumholz, and W. L. Schulz, “Blockchain Technology: Applications in Health care,” Circ Cardiovasc Qual Outcomes, vol. 10, no. 9, pp. 1–3, 2017, doi: 10.1161/CIRCOUTCOMES.117.003800.

R. U. I. Guo, H. Shi, Q. Zhao, and D. Zheng, “Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems,” IEEE Access, vol. 6, pp. 1--11, 2018.

W. Ahmad, K. Salah, R. Jayaraman, I. Yaqoob, and M. Omar, “Blockchain in Oil and Gas Industry: Applications, Challenges, Blockchain in Oil and Gas Industry: Applications, Challenges, and Future Trends and Future Trends Blockchain in Oil and Gas Industry: Applications, Challenges, and Future Trends,” 2021, doi: 10.36227/techrxiv.16825696.v1.

I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez, “A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services,” IEEE, vol. 20, pp. 3453–3495, 2018, doi: 10.1109/COMST.2018.2855563.

D. Bundi and M. J. Maranga, “EFFECTS OF CYBERCRIME ON OIL AND GAS INDUSTRY,” vol. 8, no. 6, pp. 322–331, 2020.

C. A. S. Zeadally, “Critical Control System Protection in the 21st Century,” IEEE, vol. 46, pp. 74–83, 2013, doi: 10.1109/MC.2013.69.

Jason Holcomb, “Definitive Guide to Cybersecurity for the Oil & Gas Industry,” pp. 1–28, 2019.

D. P. Oyinloye, J. Sen Teh, N. Jamil, and M. Alawida, “Blockchain consensus: An overview of alternative protocols,” Symmetry (Basel), vol. 13, no. 8, pp. 1–35, 2021, doi: 10.3390/sym13081363.

X. Ling, J. Wang, Y. Le, Z. Ding, and X. Gao, “Blockchain Radio Access Network beyond 5G,” IEEE Wirel Commun, vol. 27, no. 6, pp. 160–168, 2020, doi: 10.1109/MWC.001.2000172.

Y. Xu, X. Li, X. Zeng, J. Cao, and W. Jiang, “Application of blockchain technology in food safety control:current trends and future prospects,” Crit Rev Food Sci Nutr, vol. 0, no. 0, pp. 1–20, 2020, doi: 10.1080/10408398.2020.1858752.

P. Zhang and M. Zhou, “Security and Trust in Blockchains: Architecture, Key Technologies, and Open Issues,” IEEE Trans Comput Soc Syst, vol. 7, no. 3, pp. 790–801, 2020, doi: 10.1109/TCSS.2020.2990103.

S. S. Sarmah, “Understanding Blockchain Technology,” Computer Science and Engineering, vol. 8, no. 2, pp. 23–29, 2018, doi: 10.5923/j.computer.20180802.02.

S. Seang and D. Torre, “Proof of Work and Proof of Stake Consensus Protocols: a Blockchain Application for Local Complementary Currencies,” France: Universite Cote d’Azur-GREDEG-CNRS. Str 3.4, pp. 1–21, 2018.

C. Ganesh, C. Orlandi, and D. Tschudi, “Proof-of-Stake Protocols for Privacy-Aware Blockchains,” vol. 00169, no. 669255, pp. 1–21, 2020.

W. Li, “Securing Proof-of-Stake Blockchain Protocols,” Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, Cham, 2017, pp. 297–315, 2017, doi: 10.1007/978-3-319-67816-0.

S. De Angelis, L. Aniello, and R. Baldoni, “PBFT vs Proof-of-Authority : Applying the CAP Theorem to Permissioned Blockchain,” university of southampton, pp. 1--12, 2017.

P. Ekparinya and G. Jourjon, “The Attack of the Clones Against Proof-of-Authority,” arXiv preprint, pp. 1--14, 2020.

S. Luck, “Design and Implementation of a Smart Contract Creator Framework for IoT Devices,” University of Zurich, 2017.

E. M. Hreinsson and S. P. Blondal, “The Future of Blockchain Technology and Cryptocurrencies,” PhD Thesis, pp. 1--63, 2018.

J. Earls, M. Smith, and R. Smith, “Smart Contracts: Is the Law Ready?,” CHAMBER OF DIGITAL COMMERCE, pp. 1--62, 2018.

K. Delmolino, M. Arnett, A. Kosba, A. Miller, and E. Shi, “Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab,” International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, 2016. pp. 79–94, 2015.

M. N. O. Sadiku, K. G. Eze, S. M. Musa, R. G. Perry, P. V. A, and P. View, “Smart Contracts: A Primer,” Journal of Scientific and Engineering Research, pp. 1--5, 2018.

Downloads

Published

2023-06-15

How to Cite

(1)
Mohammed, R. Utilizing Blockchain Technology for Oil and Gas Industry. Journal of Petroleum Research and Studies 2023, 13, 100-118.