A survey on consensus protocols and attacks on blockchain technology

A Guru, BK Mohanta, H Mohapatra, F Al-Turjman… - Applied Sciences, 2023 - mdpi.com
In the current era, blockchain has approximately 30 consensus algorithms. This
architecturally distributed database stores data in an encrypted form with multiple checks …

A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges

R Chaganti, RV Boppana, V Ravi, K Munir… - IEEE …, 2022 - ieeexplore.ieee.org
With the proliferation of the blockchain technology ecosystems such as mining pools, crypto
exchanges, full Bitcoin nodes, wallets, and pool protocol servers in recent years, the denial …

Blockchain-based cloud-enabled security monitoring using internet of things in smart agriculture

R Chaganti, V Varadarajan, VS Gorantla, TR Gadekallu… - Future Internet, 2022 - mdpi.com
The Internet of Things (IoT) has rapidly progressed in recent years and immensely
influenced many industries in how they operate. Consequently, IoT technology has …

Distributed blockchain-SDN secure IoT system based on ANN to mitigate DDoS attacks

R Jmal, W Ghabri, R Guesmi, BM Alshammari… - Applied Sciences, 2023 - mdpi.com
By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new
dimensions of innovative services and processing power for contemporary living standards …

Blockchain-Based Smart Farm Security Framework for the Internet of Things

AA Aliyu, J Liu - Sensors, 2023 - mdpi.com
Smart farming, as a branch of the Internet of Things (IoT), combines the recognition of
agricultural economic competencies and the progress of data and information collected from …

OrderlessChain: A CRDT-based BFT Coordination-free Blockchain Without Global Order of Transactions

P Nasirifard, R Mayer, HA Jacobsen - Proceedings of the 24th …, 2023 - dl.acm.org
Existing permissioned blockchains often rely on coordination-based consensus protocols to
ensure the safe execution of applications in a Byzantine environment. Furthermore, the …

APP innovation to control projects risks management during crises

RA Waheeb - EAI Endorsed Transactions on Internet of Things, 2022 - eudl.eu
The goal of this study is to build an application that can be used in difficult cases and sudden
circumstances during the pandemic and post-disaster state, which can be the development …

A survey of DDoS attack detection techniques for IoT systems using Blockchain technology

ZA Khan, AS Namin - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without
human intervention. However, the network may suffer from problems such as the low battery …

An implementation of trust chain framework with hierarchical content identifier mechanism by using blockchain technology

HC Chen, B Irawan, PY Hsu, JS Su, CW Lin, Prayitno… - Sensors, 2022 - mdpi.com
Advances in information technology (IT) and operation technology (OT) accelerate the
development of manufacturing systems (MS) consisting of integrated circuits (ICs), modules …

DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges

JK Chahal, A Bhandari, S Behal - Computer Science Review, 2024 - Elsevier
Software-defined Networking (SDN) is a transformative approach for addressing the
limitations of legacy networks due to decoupling of control planes from data planes. It offers …