Table 3.
Indicator | Proposed method | Centralized method |
---|---|---|
Distributability | Distributable | Not distributable |
Security | 100% | Small and central system dependent |
Energy consumption | High energy consumption | Low energy consumption |
Impact against attacks | Theoretically impossible | vulnerable |
Effective against DDoS attacks | Theoretically impossible | Extremely vulnerable |
Scalability | Very much | Medium |
Integrity | Very much | Low |
Memory consumption | As the number of blocks increases | Medium |
Authentication time | As the number of blocks increases | Medium |
Reliability | 100% | Medium |