A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hasanova, Huru | - |
dc.contributor.author | Baek, Ui-jun | - |
dc.contributor.author | Shin, Mu-gon | - |
dc.contributor.author | Cho, Kyunghee | - |
dc.contributor.author | Kim, Myung-Sup | - |
dc.date.accessioned | 2021-09-01T17:58:28Z | - |
dc.date.available | 2021-09-01T17:58:28Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2019-03 | - |
dc.identifier.issn | 1055-7148 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/67070 | - |
dc.description.abstract | Blockchain technology has attracted considerable attention owing to its wide range of potential applications. It first appeared as a cryptocurrency, called Bitcoin, but has since been used in many other business and nonbusiness applications. Unlike most existing systems that are based on centralized frameworks, this new technology utilizes peer-to-peer networks and distributed systems which includes blockchain registers to store transactions. Its structure is designed as a digital log file and stored as a series of linked groups, called blocks. Each individual block is locked cryptographically with the previous block. Once a block has been added, it cannot be altered. Many security experts speculate that the inherent cryptographic nature of the blockchain system is sufficient to withstand constant hacking and security threats. However, previous studies on the security and privacy of blockchain technology have shown that many applications have fallen victim to successful cyberattacks. Owing to the increasing demand for cryptocurrency and its current security challenges, previous studies have not focused on blockchain technology cybersecurity vulnerabilities extensively. Here, our study extends upon the previous studies on vulnerabilities and investigates the types of potential attacks. Our study then provides further direction to highlight possible countermeasures against blockchain technology vulnerability to cybersecurity. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY | - |
dc.subject | IMPACT | - |
dc.title | A survey on blockchain cybersecurity vulnerabilities and possible countermeasures | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Myung-Sup | - |
dc.identifier.doi | 10.1002/nem.2060 | - |
dc.identifier.scopusid | 2-s2.0-85059686580 | - |
dc.identifier.wosid | 000460948400004 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, v.29, no.2 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT | - |
dc.citation.title | INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT | - |
dc.citation.volume | 29 | - |
dc.citation.number | 2 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | IMPACT | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.