典型文献
Security in Edge Blockchains: Attacks and Countermeasures
文献摘要:
Edge blockchains, the blockchains running on edge computing infrastructures, have attracted a lot of attention in recent years. Thanks to data privacy, scalable computing resources, and distributed topology nature of edge computing, edge blockchains are considered promising solutions to facilitating future blockchain applications. However, edge blockchains face unique security issues caused by the de?ployment of vulnerable edge devices and networks, including supply chain attacks and insecure consensus offloading, which are mostly not well studied in previous literature. This paper is the first survey that discusses the attacks and countermeasures of edge blockchains. We first summarize the three-layer architecture of edge blockchains: blockchain management, blockchain consensus, and blockchain lightweight cli?ent. We then describe seven specific attacks on edge blockchain components and discuss the countermeasures. At last, we provide future re?search directions on securing edge blockchains. This survey will act as a guideline for researchers and developers to design and implement se?cure edge blockchains.
文献关键词:
中图分类号:
作者姓名:
CAO Yinfeng;CAO Jiannong;WANG Yuqin;WANG Kaile;LIU Xun
作者机构:
Department of Computing,The Hong Kong Polytechnic University,Hong Kong SAR 852,China
文献出处:
引用格式:
[1]CAO Yinfeng;CAO Jiannong;WANG Yuqin;WANG Kaile;LIU Xun-.Security in Edge Blockchains: Attacks and Countermeasures)[J].中兴通讯技术(英文版),2022(04):3-14
A类:
Blockchains,blockchains
B类:
Security,Edge,Attacks,Countermeasures,running,edge,computing,infrastructures,have,attracted,lot,attention,recent,years,Thanks,data,privacy,scalable,resources,distributed,topology,nature,are,considered,promising,solutions,facilitating,future,applications,However,face,unique,security,issues,caused,by,ployment,vulnerable,devices,networks,including,supply,attacks,insecure,consensus,offloading,which,mostly,not,well,studied,previous,literature,This,paper,first,survey,that,discusses,countermeasures,We,summarize,three,layer,architecture,management,lightweight,cli,then,describe,seven,specific,components,last,provide,directions,securing,will,guideline,researchers,developers,design,implement
AB值:
0.545533
相似文献
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。