Advertisement

Blockchain Technology

  • Ramjee PrasadEmail author
  • Vandana Rohokale
Chapter
Part of the Springer Series in Wireless Technology book series (SSWT)

Abstract

More than hundred countries have experienced WannaCry Ransomware cyber-attack in 2017. This attack demanded around $300 of Bitcoin cryptocurrency from users to retrieve their data. There onwards, Blockchain technology and cryptocurrency are catching the attention of everyone. Blockchain is a growing digital record keeping register in the distributed form which cannot be altered. In case of Blockchain, no central authority is needed. Modification of the data or assets stored on Blockchain is highly difficult or nearly impossible. All the data available on Blockchain can be publicly seen by everyone. It cuts down the excessive costs required in the conventional manual record keeping registers. Blockchain technology has lot of bonus points including integrity, write access, reduced cost, trust, etc. With Blockchain technology, various tokens are available such as currency tokens, asset tokens, utility tokens, and equity tokens.

References

  1. Garner B (2018) What’s a sybil attack & how do Blockchains mitigate them? COINCENTRAL Blogs. https://coincentral.com/sybil-attack-blockchain/
  2. Houben R, Snyers A (2018) Cryptocurrencies and Blockchain—legal context and implications for financial crime, money laundering and tax evasion. In: European Parliament Study Requested by TAX3 committeeGoogle Scholar
  3. IoTeX in HackerNoon.com Blog (2018) Eclipse attacks on Blockchains’ peer-to-peer network. https://hackernoon.com/eclipse-attacks-on-blockchains-peer-to-peer-network-26a62f85f11
  4. Jesus EF, Chicarino VRL, de Albuquerque CVN, Rocha AADA (2018) A survey of how to use Blockchain to secure internet of things and the stalker attack. Hindawi J Secur Commun Netw 2018:1–28. Article ID 9675050CrossRefGoogle Scholar
  5. Kumar NM, Mallick PK (2018) Blockchain technology for security issues and challenges in IoT. In: Proceedings of Elsevier science direct international conference on computational intelligence and data science (ICCIDS), pp 1815–1823CrossRefGoogle Scholar
  6. Mire S (2018) Disruptor daily blog on, “Blockchain in cybersecurity: 10 possible use cases. https://www.disruptordaily.com/blockchain-use-cases-cyber-security/
  7. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Bitcoin White PaperGoogle Scholar
  8. Natoli C, Gramoli V (2016) The balance attack against proof-of-work Blockchains: the R3 testbed as an example. ArXiv J 1612Google Scholar
  9. Nayak K, Kumar S, Miller A, Shi E (2016) Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: IEEE European symposium on security and privacy (EuroS&P)Google Scholar
  10. Priyadarshini I (2019) Introduction to Blockchain technology. In: Le D-N et al (eds) Cyber security in parallel and distributed computing, pp 93–262CrossRefGoogle Scholar
  11. Pro Blockchain Media Blog (2018) The emergence of Blockchain 5.0. https://pro-blockchain.com/en/the-emergence-of-blockchain-5-0
  12. Unibright Blog (2017) Blockchain evolution: from 1.0 to 4.0. https://medium.com/@UnibrightIO/blockchain-evolution-from-1-0-to-4-0-3fbdbccfc666
  13. Williams S (2018) The motley fool blog on “20 real-world uses for Blockchain technology”. https://www.fool.com/investing/2018/04/11/20-real-world-uses-for-blockchain-technology.aspx
  14. Yafimava D (2019) Openledger insights blog on “What are consortium Blockchains, and what purpose do they serve?”. https://openledger.info/insights/consortium-blockchains/

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Business Development and Technology, CTIF Global CapsuleAarhus UniversityHerningDenmark
  2. 2.Department of Electronics and TelecommunicationSinhgad Institute of Technology and SciencePuneIndia

Personalised recommendations