Research Article
Fast Policy Interpretation and Dynamic Conflict Resolution for Blockchain-Based IoT System
Table 1
Common BC-IoT security attacks and the countermeasures based on log-based policy.
| Security threats | Mode | Condition | Action |
| Node capture attack | Single | | | Sleep deprivation | Single | | | Flooding attack | Loop | | | Blackhole attack | Iteration | | | Malicious injection | Single | | | Homing attack | Loop | | | Eavesdropping | Iteration | | | Password attack | Loop | | | Hardware bugs | Single | | |
|
|