Research Article

Fast Policy Interpretation and Dynamic Conflict Resolution for Blockchain-Based IoT System

Table 1

Common BC-IoT security attacks and the countermeasures based on log-based policy.

Security threatsModeConditionAction

Node capture attackSingle
Sleep deprivationSingle
Flooding attackLoop
Blackhole attackIteration
Malicious injectionSingle
Homing attackLoop
EavesdroppingIteration
Password attackLoop
Hardware bugsSingle