Research Article
Fast Policy Interpretation and Dynamic Conflict Resolution for Blockchain-Based IoT System
Table 1
Common BC-IoT security attacks and the countermeasures based on log-based policy.
| | Security threats | Mode | Condition | Action |
| | Node capture attack | Single | | | | Sleep deprivation | Single | | | | Flooding attack | Loop | | | | Blackhole attack | Iteration | | | | Malicious injection | Single | | | | Homing attack | Loop | | | | Eavesdropping | Iteration | | | | Password attack | Loop | | | | Hardware bugs | Single | | |
|
|