55
Security Issues in Blockchained IoT
What is a Udp Flood Ddos Attack Glossary. (n.d.). Retrieved July 20, 2020, from https://www
.incapsula.com/ddos/attack-glossary/udp-flood.html
Xiao, Q., Boulet, C., & Gibbons, T. (2007). RFID security issues in military supply chains. In
The Second International Conference on Availability, Reliability and Security Vienna,
Austria (ARES’07) (pp. 599–605).
Xiaohui, X. (2013). Study on security problems and key technologies of the internet of things.
In 2013 International Conference on Computational and Information Sciences, China
(pp. 407–410).
Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats:
Defenses against wireless denial of service. In Proceedings of the 3rd ACM Workshop
on Wireless Security (pp. 80–89).
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting
jamming attacks in wireless networks. In Proceedings of the 6th ACM International
Symposium on Mobile Ad Hoc Networking and Computing (pp. 46–57).
Yang, Z., Zheng, K., Yang, K., & Leung, V.C.M. (2017). A Blockchain-based reputation sys
tem for data credibility assessment in vehicular networks. In 2017 IEEE 28th Annual
International Symposium on Personal, Indoor, and Mobile Radio Communications,
QC, Canada(PIMRC) (pp. 1–5).
Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil attacks and their defenses in the inter
net of things. IEEE Internet of Things Journal, 1(5), 372–383.
Zhang, L., & Wang, Z. (2006). Integration of RFID into wireless sensor networks:
Architectures, opportunities and challenging problems. In 2006 Fifth International
Conference on Grid and Cooperative Computing Workshops, Hunan, China (pp.
463–469).
Zyskind, G., Nathan, O., & Pentland, A. (2015). Enigma: Decentralized computation platform
with guaranteed privacy. ArXiv:1506.03471.