2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) 2022
DOI: 10.1109/iciem54221.2022.9853189
|View full text |Cite
|
Sign up to set email alerts
|

Bitcoin-Blockchain Technology: Security Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Node capture-This attack aims to compromise the IoT nodes; an adversary can easily control the network-connected nodes. Control over these nodes not only gives access to the cryptographic keys but also the protocol limitations, resulting in compromising the security of the whole network [4]. Replay attack-This is an attack in which valid data are intercepted and transmitted by the adversary several times without having authorization.…”
Section: Physical Layermentioning
confidence: 99%
“…Node capture-This attack aims to compromise the IoT nodes; an adversary can easily control the network-connected nodes. Control over these nodes not only gives access to the cryptographic keys but also the protocol limitations, resulting in compromising the security of the whole network [4]. Replay attack-This is an attack in which valid data are intercepted and transmitted by the adversary several times without having authorization.…”
Section: Physical Layermentioning
confidence: 99%