2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) 2019
DOI: 10.1109/icicict46008.2019.8993144
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Technology-Future Of IoT: Including Structure, Limitations And Various Possible Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…The island interface can be used to manually or automatically restore normal service to neighboring clients. [33]. Reactive power control, which moves the system into transient states during automation, can also be used to detect fires.…”
Section: Protectionmentioning
confidence: 99%
“…The island interface can be used to manually or automatically restore normal service to neighboring clients. [33]. Reactive power control, which moves the system into transient states during automation, can also be used to detect fires.…”
Section: Protectionmentioning
confidence: 99%
“…Rushing attack [25] Malicious node receives route request packet, and immediately forwards it to its neighbors without processing the packet Jellyfish attack [26] Malicious node increases throughput by using alternative route for data packets…”
Section: Layermentioning
confidence: 99%
“…In alternative history attack, a transaction is sent to the merchant by the attacker [135,136]. In addition, a double spending transaction is included by the attacker in an alternative blockchain fork [137,138]. The merchant sends the product after n blocks confirmation.…”
Section: Alternative History Attacksmentioning
confidence: 99%