Hieraledger: towards malicious gateways in appendable-block blockchain constructions for IoT

ASV Koe, S Ai, Q Chen, J Tang, K Chen, S Zhang… - Information Sciences, 2023 - Elsevier
Appendable-block blockchain was established in an effort to standardize a blockchain
architecture for heterogeneous Internet of Things devices. In current constructions, the main …

[HTML][HTML] Energy Consumption by Cryptocurrency: A Bibliometric Analysis Revealing Research Trends and Insights

V Anandhabalaji, M Babu, R Brintha - Energy Nexus, 2024 - Elsevier
Cryptocurrency is rapidly emerging as a prominent player in the global financial system,
characterized by its decentralized nature and the absence of centralized government …

A Detection Method Against Selfish Mining-Like Attacks Based On Ensemble Deep Learning in IoT

Y Wang, C Li, Y Zhang, T Li, J Ning… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Cryptojacking is a new type of Internet of Things (IoT) attack, where an attacker hijacks the
computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or …

Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis

H Zhu, X Chang, J Mišić, VB Mišić, L Han… - arXiv preprint arXiv …, 2023 - arxiv.org
GHOST, like the longest-chain protocol, is a chain selection protocol and its capability in
resisting selfish mining attack has been validated in imperfect blockchains of Bitcoin and its …

Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey

SC Avik, S Biswas, MAR Ahad, Z Latif… - arXiv preprint arXiv …, 2023 - arxiv.org
The Internet of Things (IoT) is increasingly influencing and transforming various aspects of
our daily lives. Contrary to popular belief, it raises security and privacy issues as it is used to …

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network

H Zhu, X Chang, J Mišić, VB Mišić… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Bitcoin is the largest Proof-of-Work (PoW) public blockchain but is vulnerable to various
attacks like stubborn mining attack, which greatly downgrades both system throughput and …

[HTML][HTML] 区块链系统L-顽固策略的安全问题研究

黄超, 刘亚, 唐伟明, 任艳丽 - Modeling and Simulation, 2024 - hanspub.org
随着数字货币的诞生, 区块链技术被广泛的运用在金融, 物联网等各个领域. 但同时也暴露出各种
安全性问题, 如数据层的碰撞攻击, 网络层的日蚀攻击, 共识层的贿赂攻击, 应用层的顽固攻击等 …

Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption

M Liu, M Zhang, G Li, Y Hu, T Li, Y Wang… - … Conference on Information …, 2023 - Springer
Payment channel path information includes node identity and balance. With this public
information, an attacker can initiate a recurring transaction against the victim node, resulting …