Sybil in the haystack: A comprehensive review of blockchain consensus mechanisms in search of strong Sybil attack resistance

M Platt, P McBurney - Algorithms, 2023 - mdpi.com
Consensus algorithms are applied in the context of distributed computer systems to improve
their fault tolerance. The explosive development of distributed ledger technology following …

[PDF][PDF] On the security of LEO satellite communication systems: Vulnerabilities, countermeasures, and future trends

P Yue, J An, J Zhang, G Pan, S Wang, P Xiao… - Authorea …, 2023 - techrxiv.org
On the Security of LEO Satellite Communication Systems: Vulnerabilities, Countermeasures,
and Future Trends Page 1 P osted on 11 Jan 2020 — CC-BY-NC-SA 4 — h ttps://doi.org/10.36227/techrx …

Decentralized and lightweight approach to detect eclipse attacks on proof of work blockchains

B Alangot, D Reijsbergen… - … on Network and …, 2021 - ieeexplore.ieee.org
Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to-
peer network to send and receive transactions. It is critical that a client is connected to at …

NetChain: A blockchain-enabled privacy-preserving multi-domain network slice orchestration architecture

G He, W Su, S Gao, N Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Multi-domain networking slice orchestration is an essential technology for the programmable
and cloud-native 5G network. However, existing research solutions are either based on the …

[HTML][HTML] Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures

M Kowalski, W Mazurczyk - Computer Networks, 2023 - Elsevier
Background: The inter-domain routing security is often based on trust, which, as seen in
practice, is an insufficient approach. Due to the deficit of native security controls in the …

Secure inter-domain routing based on blockchain: A comprehensive survey

L Mastilak, P Helebrandt, M Galinski, I Kotuliak - Sensors, 2022 - mdpi.com
The whole Internet consists of thousands of autonomous systems that transfer data with one
another. The BGP plays a significant role in routing, but its behaviour is essentially naive …

GATE-BC: Genetic Algorithm-Powered QoS-Aware Cross-Network Traffic Engineering in Blockchain-Enabled SDN

M Karakus - IEEE Access, 2024 - ieeexplore.ieee.org
As a result of the ubiquitous network applications and services, exacerbated by the
overarching digital revolution the need and demand for efficient and dependable …

Quantitative comparison of two chain-selection protocols under selfish mining attack

R Yang, X Chang, J Mišić, VB Mišić… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The longest-chain and Greedy Heaviest Observed Subtree (GHOST) protocols are the two
most famous chain-selection protocols to address forking in Proof-of-Work (PoW) blockchain …

SDBGPChain: A decentralized low complexity framework to detect and prevent the BGPattacks using SDN with smart contract based Dendrimer tree blockchain

TL Kayathri, N Kumaresan, R Vijayabhasker - Computer Networks, 2023 - Elsevier
Abstract The Border Gateway Protocol (BGP) helps to exchange the information over the
internet. However, BGP is susceptible to malicious attacks and misconfigurations meanwhile …

Inter-domain prefix and route validation using fast and scalable DAG based distributed ledger for secure BGP routing

P Podili, SR Cherupally, S Boga, K Kataoka - Journal of Network and …, 2022 - Springer
Abstract Border Gateway Protocol (BGP), the default inter-domain routing protocol on the
Internet, lacks inherent mechanisms to validate the prefix ownership and integrity of inter …