Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Suhyeon | - |
dc.contributor.author | Kim, Seungjoo | - |
dc.date.accessioned | 2022-03-14T21:42:08Z | - |
dc.date.available | 2022-03-14T21:42:08Z | - |
dc.date.created | 2022-03-14 | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/138993 | - |
dc.description.abstract | Targets of cyber crime are not exclusive to the private sector. Successful cyber attacks on nation-states have proved that cyber threats can jeopardize significant national interests. In response, nation-states have begun to handle cyber threats at the national defense level, which is titled 'cyber defense.' The cyber defense sector is related to national security, therefore requires robust security technology. Contrary to normal systems, blockchain provides strong security properties without a centralized control entity, and as such its application in the cyber defense field is under the spotlight. In this paper, we present opportunities blockchain provides for cyber defense, research and national projects, and limitations. We constructed a survey of government documents, interviews, related news, technical reports, and research papers from 2016 to 2021. As a result, our research contributes to reducing the gap in blockchain for cyber defense by systematically conducting research and analysis. In our research, we found that not only research but also government-led plans are actively promoting blockchain, which demonstrates that blockchain will play a remarkable role in cyber defense. This paper concludes with suggestions for future research in aspects of the blockchain technology, evaluation, and survey. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | SECURITY | - |
dc.title | Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Seungjoo | - |
dc.identifier.doi | 10.1109/ACCESS.2021.3136328 | - |
dc.identifier.scopusid | 2-s2.0-85121801848 | - |
dc.identifier.wosid | 000739986600001 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.10, pp.2602 - 2618 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 10 | - |
dc.citation.startPage | 2602 | - |
dc.citation.endPage | 2618 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Blockchains | - |
dc.subject.keywordAuthor | Bitcoin | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Computer crime | - |
dc.subject.keywordAuthor | Smart contracts | - |
dc.subject.keywordAuthor | Licenses | - |
dc.subject.keywordAuthor | Data structures | - |
dc.subject.keywordAuthor | Blockchain | - |
dc.subject.keywordAuthor | cyber security | - |
dc.subject.keywordAuthor | cyber defense | - |
dc.subject.keywordAuthor | military | - |
dc.subject.keywordAuthor | survey | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.