<tt id="ukqso"></tt>
<acronym id="ukqso"><wbr id="ukqso"></wbr></acronym>
<object id="ukqso"><tr id="ukqso"></tr></object><object id="ukqso"><noscript id="ukqso"></noscript></object>
Paul J. Taylor,Tooska Dargahi,Ali Dehghantanha,Reza M. Parizi,Kim-Kwang Raymond Choo.[J].重慶郵電大學新辦英文刊,2020,(2):147-156
下載全文  View/Add Comment  Download reader
A systematic literature review of blockchain cyber security
Received: June 19, 2018  Revised: January 13, 2019
英文關鍵詞: Blockchain;Smart contracts;Cyber security;Distributed ledger technology;IoT;Cryptocurrency;Bitcoin
Paul J. Taylor School of Computing, Science & Engineering, University of Salford, Manchester, UK Paul.Taylor_Titan@titan.police.uk 
Tooska Dargahi School of Computing, Science & Engineering, University of Salford, Manchester, UK T.Dargahi@Salford.ac.uk 
Ali Dehghantanha Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada Ali@cybersciencelab.org 
Reza M. Parizi Department of Software Engineering and Game Development, Kennesaw State University, Marietta, GA, 30060, USA rparizi1@kennesaw.edu 
Kim-Kwang Raymond Choo Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, 78249, USA raymond.choo@fulbrightmail.org 
Hits: 76
Download times: 109
      Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public-key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security.