
@Article{cmc.2025.071124,
AUTHOR = {Gowrishankar Jayaraman, Ashok Kumar Munnangi, Ramesh Sekaran, Arunkumar Gopu, Manikandan Ramachandran},
TITLE = {Blockchain and Smart Contracts with Barzilai-Borwein Intelligence for Industrial Cyber-Physical System},
JOURNAL = {Computers, Materials \& Continua},
VOLUME = {86},
YEAR = {2026},
NUMBER = {3},
PAGES = {--},
URL = {http://www.techscience.com/cmc/v86n3/65427},
ISSN = {1546-2226},
ABSTRACT = {Industrial Cyber-Physical Systems (ICPSs) play a vital role in modern industries by providing an intellectual foundation for automated operations. With the increasing integration of information-driven processes, ensuring the security of Industrial Control Production Systems (ICPSs) has become a critical challenge. These systems are highly vulnerable to attacks such as denial-of-service (DoS), eclipse, and Sybil attacks, which can significantly disrupt industrial operations. This work proposes an effective protection strategy using an Artificial Intelligence (AI)-enabled Smart Contract (SC) framework combined with the Heterogeneous Barzilai–Borwein Support Vector (HBBSV) method for industrial-based CPS environments. The approach reduces run time and minimizes the probability of attacks. Initially, secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain (BC) integrated within a BC network. The SC executes the HBBSV strategy to verify the security consensus. The Barzilai–Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions. When a component remains within these conditions, no security breach occurs. Conversely, if a component does not satisfy the condition boundaries, a security lapse is detected, and those components are isolated. The HBBSV method thus strengthens protection against DoS, eclipse, and Sybil attacks. Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques.},
DOI = {10.32604/cmc.2025.071124}
}



