A Blockchain Construct for Energy Trading against Sybil Attacks
Citations
53 citations
Cites background from "A Blockchain Construct for Energy T..."
...Further, this work was extended in [28], where the authors considered the energy trading process in presence of Sybil attack and highlighted the effectiveness of blockchain framework defense mechanism against Sybil attack....
[...]
21 citations
21 citations
18 citations
Cites background or methods from "A Blockchain Construct for Energy T..."
...[15] focused on the security of transactional data and safety against critical attacks....
[...]
...[15] Blockchain technology to resist sybil attack Proof-of-Work (PoW) consensus mechanism Secure communication scheme; Privacy preserving Secure communication scheme; Privacy preserving Sybil attack mitigation method...
[...]
18 citations
References
[...]
4,816 citations
"A Blockchain Construct for Energy T..." refers background in this paper
...in Sybil identities and try to gain the control of the network by polluting the network with the fake identities [2], [3]....
[...]
4,407 citations
"A Blockchain Construct for Energy T..." refers background in this paper
...The first blockchain was conceptualized by a person (or a group of people) known as Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the cryptocurrency bitcoin [5]....
[...]
613 citations
"A Blockchain Construct for Energy T..." refers background in this paper
...If an attack is detected then it is possible to change the control commands to increase the resiliency of the system [8]....
[...]
416 citations
"A Blockchain Construct for Energy T..." refers background in this paper
...This great opportunity, unfortunately, is matched by even greater challenges [1]....
[...]
...Any attack on safety-critical CPSs may significantly hamper the economy and cause infrastructure damage which may may lead to the loss of human lives [1]....
[...]
305 citations
"A Blockchain Construct for Energy T..." refers background or methods in this paper
...block number (b), data content (d), time instant (t) plus nonce (N) which is nothing but a random value and lastly previous nonce value (hp) [9]....
[...]
...The MD1 and MD2 is compared and if they are analogous then the information received is verified otherwise concluded to be false [9]....
[...]
...The MD encryption using a private key forms a digital signature which is decrypted using public key of the same node [9]....
[...]