Exploring the attack surface of blockchain: A comprehensive survey

M Saad, J Spaulding, L Njilla… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

Blockchain-empowered data-driven networks: A survey and outlook

X Li, Z Wang, VCM Leung, H Ji, Y Liu… - ACM Computing Surveys …, 2021 - dl.acm.org
The paths leading to future networks are pointing towards a data-driven paradigm to better
cater to the explosive growth of mobile services as well as the increasing heterogeneity of …

e-PoS: Making Proof-of-Stake Decentralized and Fair

M Saad, Z Qin, K Ren, DH Nyang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Blockchain applications that rely on the Proof-of-Work (PoW) have increasingly become
energy inefficient with a staggering carbon footprint. In contrast, energy efficient alternative …

A survey on blockchain and artificial intelligence technologies for enhancing security and privacy in smart environments

O Fadi, Z Karim, B Mohammed - IEEE Access, 2022 - ieeexplore.ieee.org
Smart environments consist of a collection of sensors, actuators, and numerous computing
units that improve human life. With the booming of smart environments, data generation has …

Blockchain technology and related security risks: Towards a seven-layer perspective and taxonomy

S Mollajafari, K Bechkoum - Sustainability, 2023 - mdpi.com
Blockchain technology can be a useful tool to address issues related to sustainability. From
its initial foundation based on cryptocurrency to the development of smart contracts …

A security analysis of blockchain-based did services

BG Kim, YS Cho, SH Kim, H Kim, SS Woo - IEEE Access, 2021 - ieeexplore.ieee.org
Decentralized identifiers (DID) has shown great potential for sharing user identities across
different domains and services without compromising user privacy. DID is designed to …

Secure and transparent audit logs with BlockAudit

A Ahmad, M Saad, A Mohaisen - Journal of network and computer …, 2019 - Elsevier
Audit logs serve as a critical component in enterprise business systems and are used for
auditing, storing, and tracking changes made to the data. However, audit logs are vulnerable …

Blockchain-enhanced cross-ISP spectrum assignment framework in SDONs: SpectrumChain

E Guler, M Karakus, S Uludag - Computer Networks, 2023 - Elsevier
Huge potentials of optical networks provide an excellent choice in meeting the exponential
growth in bandwidth demand. In particular, Elastic Optical Networks (EONs), with its …

Reputation based Routing in MANET using Blockchain

MAA Careem, A Dutta - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
One of the core issues in routing packets within Mobile Ad hoc Networks (MANETs) is the
lack of trust and reputation of the participating nodes, which often leads to unreliable packet …

Adaptive and robust routing with Lyapunov-based deep RL in MEC networks enabled by blockchains

Z Zhuang, J Wang, Q Qi, J Liao… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The most recent development of the Internet of Things brings massive timely sensitive and
bursty data flows. Also, joint optimization on storage, computation, and communication is in …