Advances, Systems and Applications
Reference | Target & contribution | Improvement in Blockchain | Solution to attack |
---|---|---|---|
[65] | A graph theory model to build a trust network for authentication, and an open distributed ledgers to secure TM systems [65] | A graph theoretic model for consensus | Stealthy target attack, double registration attack, stale information attack, DoS attack, censorship attack |
[66] | A blockchain-based trust model to help CSPs to autonomously manage trust [66] | the combination of proof-of-eligibility and proof-of-stake | / |
[67] | Decentralized authentication and trust management for WSN | / | / |
[68] | Identity management system based on blockchain | voting mechanism and reputation task, Incentive task (RpCoin reward and punishment) | / |
[64] | Use blockchain to manage accounts in the datacenters of clouds [64] | Saranyu Manager, Tenant contract, Delegation contract | / |
[69] | A blockchain based reputation system for data credibility in vehicle networks [69] | / | Fake messaging |