Skip to main content
. 2024 Sep 27;24(19):6273. doi: 10.3390/s24196273

Table 8.

Blockchain and smart contract methodologies against threats/attacks.

Ref Βrute Force Hijacking Alteration Attack Jamming DDoS Man-in-the-Middle 51% Attack Resilience Unlinkability Intrusion Detection Identity Authentication User Account Management Tracking Attack Sybil Attack Location Privacy Threats Collusion Attack Eavesdropping Attack
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[42]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[43]