A comprehensive survey of blockchain: From theory to IoT applications and beyond

M Wu, K Wang, X Cai, S Guo, M Guo… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
As an innovated and revolutionized technology, blockchain has been applied in many fields,
such as cryptocurrency, food traceability, identity management, or even market prediction …

[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

Blockchain security attacks, challenges, and solutions for the future distributed iot network

S Singh, ASMS Hosen, B Yoon - Ieee Access, 2021 - ieeexplore.ieee.org
Blockchain technology is becoming increasingly attractive to the next generation, as it is
uniquely suited to the information era. Blockchain technology can also be applied to the …

[HTML][HTML] Bgpcoin: Blockchain-based internet number resource authority and bgp security solution

Q Xing, B Wang, X Wang - Symmetry, 2018 - mdpi.com
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to
prefix/subprefix hijacks and other attacks. Though many BGP security approaches have …

[PDF][PDF] 基于区块链的网络安全体系结构与关键技术研究进展

徐恪, 凌思通, 李琦, 吴波, 沈蒙, 张智超, 姚苏, 刘昕… - 计算机学报, 2021 - cjc.ict.ac.cn
摘要随着互联网技术的不断演进与用户数量的“爆炸式” 增长, 网络作为一项基础设施渗透于人们
生存, 生活的各个方面, 其安全问题也逐渐成为人们日益关注的重点. 然而, 随着网络规模的扩大 …

[PDF][PDF] Improving blockchain security for the internet of things: challenges and solutions

M Al-Shabi, A Al-Qarafi - International Journal of Electrical and …, 2022 - academia.edu
Due to its uniquely suited to the knowledge era, the blockchain technology has currently
become highly appealing to the next generation. In addition, such technology has been …

[PDF][PDF] 互联网内生安全体系结构研究进展

徐恪, 付松涛, 李琦, 刘冰洋, 江伟玉, 吴波, 冯学伟 - 计算机学报, 2021 - 159.226.43.17
摘要随着互联网不断发展, 网络功能逐步走向万物互联下自动交互与控制, 大数据, 云计算,
边缘计算等技术不断深入应用, 传统网络面临的源地址欺骗, DDoS 攻击, 路由劫持等安全问题 …

Blockchain‐Based DNS Root Zone Management Decentralization for Internet of Things

Y Zhang, W Liu, Z Xia, Z Wang, L Liu… - Wireless …, 2021 - Wiley Online Library
Domain Name System (DNS) is a widely used infrastructure for remote control and batch
management of IoT devices. As a critical Internet infrastructure, DNS is structured as a tree …

Smart contract-based secure model for miner registration and block validation

S Zhang, JH Lee - IEEE Access, 2019 - ieeexplore.ieee.org
Rewriting-history attacks can erase all valid records of blockchain-based systems, which is
extremely devastating. To deter such attacks, we design a new smart contract-based secure …

[HTML][HTML] BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections

Q Xing, X Wang, X Xu, J Lin, F Wang, C Li, B Wang - Sensors, 2023 - mdpi.com
Log-based public key infrastructure (PKI) refers to a robust class of CA-attack-resilient PKI
that enhance transparency and accountability in the certificate revocation and issuance …