Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic ApproachShow simple item record
dc.creator | Nicolas, Kervins | |
dc.creator | Wang, Yi | |
dc.creator | Giakos, George C. | |
dc.creator | Wei, Bingyang | |
dc.creator | Shen, Hongda | |
dc.date.accessioned | 2021-03-04T19:21:54Z | |
dc.date.available | 2021-03-04T19:21:54Z | |
dc.date.issued | 2020-12-25 | |
dc.identifier.uri | https://doi.org/10.1109/access.2020.3047365 | |
dc.identifier.uri | https://repository.tcu.edu/handle/116099117/43806 | |
dc.identifier.uri | https://ieeexplore.ieee.org/document/9308934 | |
dc.description.abstract | Blockchain is a technology that ensures data security by verifying database of records established in a decentralized and distributed network. Blockchain-based approaches have been applied to secure data in the fields of the Internet of Things, software engineering, healthcare systems, financial services, and smart power grids. However, the security of the blockchain system is still a major concern. We took the initiative to present a systematic study which sheds light on what defensive strategies are used to secure the blockchain system effectively. Specifically, we focus on blockchain data security that aims to mitigate the two data consistency attacks: double-spend attack and selfish mining attack. We employed the systematic approach to analyze a total of 40 selected studies using the proposed taxonomy of defensive strategies: monitoring, alert forwarding, alert broadcasting, inform, detection, and conceptual research design. It presents a comparison framework for existing and future research on blockchain security. Finally, some recommendations are proposed for blockchain researchers and developers. | |
dc.language.iso | en | en_US |
dc.publisher | IEEE | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.source | IEEE Access | |
dc.subject | Blockchain | |
dc.subject | Security | |
dc.subject | Systematics | |
dc.subject | Data privacy | |
dc.subject | Medical services | |
dc.subject | Taxonomy | |
dc.subject | Privacy | |
dc.title | Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach | |
dc.type | Article | |
dc.rights.holder | Nicolas et al | |
dc.rights.license | CC BY 4.0 | |
local.college | College of Science and Engineering | |
local.department | Computer Science | |
local.persons | Wei (COSC) |
Files in this item
This item appears in the following Collection(s)
-
Research Publications [1008]