Skip to main content
. 2022 Feb 5;81(6):8719–8743. doi: 10.1007/s11042-022-12164-z

Table 3.

Qualitative comparison of the proposed method and the centralized method

Indicator Proposed method Centralized method
Distributability Distributable Not distributable
Security 100% Small and central system dependent
Energy consumption High energy consumption Low energy consumption
Impact against attacks Theoretically impossible vulnerable
Effective against DDoS attacks Theoretically impossible Extremely vulnerable
Scalability Very much Medium
Integrity Very much Low
Memory consumption As the number of blocks increases Medium
Authentication time As the number of blocks increases Medium
Reliability 100% Medium