4.7 Article

6G technology and taxonomy of attacks on blockchain technology

Related references

Note: Only part of the references are listed.
Review Computer Science, Information Systems

A survey of Blockchain consensus algorithms: mechanism, design and applications

Xiang Fu et al.

Summary: This paper introduces the development and research status of Blockchain consensus algorithms, proposes a unified consensus algorithm process model, analyzes the design and classification of various mainstream consensus algorithms, discusses the evaluation framework and security design principles, and provides recommendations for selecting consensus algorithms in different application scenarios.

SCIENCE CHINA-INFORMATION SCIENCES (2021)

Article Computer Science, Artificial Intelligence

A taxonomy of blockchain consensus protocols: A survey and classification framework

Sarah Bouraga

Summary: This paper presents the current state of consensus protocols research in blockchain, proposing a four category classification framework: Origin, Design, Performance, and Security, applied to 28 new consensus protocols. It aims to reflect the latest state-of-the-art in consensus protocols and introduce a comprehensive classification framework, integrating knowledge from various works in the literature. The work highlights the differences between multiple consensus protocols and suggests that future researchers and practitioners pay attention to all dimensions presented in the classification framework.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

Hardware Impaired Ambient Backscatter NOMA Systems: Reliability and Security

Xingwang Li et al.

Summary: This paper investigates the physical layer security of ambient backscatter NOMA systems in the presence of a malicious eavesdropper, proposing an artificial noise scheme to enhance security. Analytical expressions and asymptotic analysis show high diversity orders for OP in the high SNR regime and explore the asymptotic behaviors of IP in the high MER region.

IEEE TRANSACTIONS ON COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

Mitigations on Sybil-Based Double-Spend Attacks in Bitcoin

Shijie Zhang et al.

Summary: Double-spending is a potential flaw in cryptocurrencies and has caused severe economic damage to many Bitcoin consumers in recent years, attracting widespread attention. This article introduces a new form of combined attack involving double-spending with a Sybil attack in the Bitcoin network, proposing mitigations such as charging an identity fee and setting a deadline, and evaluating their effectiveness through economic analysis.

IEEE CONSUMER ELECTRONICS MAGAZINE (2021)

Article Computer Science, Information Systems

Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network

Saurabh Singh et al.

Summary: This paper discusses the application of blockchain technology in IoT systems, addressing relevant concepts and security attacks, and proposing solutions.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Blockchain-Empowered Secure Spectrum Sharing for 5G Heterogeneous Networks

Zhenyu Zhou et al.

IEEE NETWORK (2020)

Review Computer Science, Hardware & Architecture

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

Jayasree Sengupta et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

Muhammad Saad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Telecommunications

Energy-Efficient Resource Allocation for Energy Harvesting-Based Cognitive Machine-to-Machine Communications

Zhenyu Zhou et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2019)

Article Green & Sustainable Science & Technology

Quantification of energy and carbon costs for mining cryptocurrencies

Max J. Krause et al.

NATURE SUSTAINABILITY (2018)

Proceedings Paper Computer Science, Information Systems

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin

Yujin Kwon et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Theory & Methods

The Miner's Dilemma

Ittay Eyal

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)

Proceedings Paper Computer Science, Hardware & Architecture

Exploring Miner Evolution in Bitcoin Network

Luqin Wang et al.

PASSIVE AND ACTIVE MEASUREMENT (PAM 2015) (2015)

Proceedings Paper Computer Science, Hardware & Architecture

Information Propagation in the Bitcoin Network

Christian Decker et al.

13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P) (2013)

Article Computer Science, Information Systems

Structure and Anonymity of the Bitcoin Transaction Graph

Micha Ober et al.

FUTURE INTERNET (2013)