55

Security Issues in Blockchained IoT

What is a Udp Flood Ddos Attack Glossary. (n.d.). Retrieved July 20, 2020, from https://www​

.incapsula​.com​/ddos​/attack​-glossary​/udp​-flood​.html

Xiao, Q., Boulet, C., & Gibbons, T. (2007). RFID security issues in military supply chains. In

The Second International Conference on Availability, Reliability and Security Vienna,

Austria (ARES’07) (pp. 599–605).

Xiaohui, X. (2013). Study on security problems and key technologies of the internet of things.

In 2013 International Conference on Computational and Information Sciences, China

(pp. 407–410).

Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats:

Defenses against wireless denial of service. In Proceedings of the 3rd ACM Workshop

on Wireless Security (pp. 80–89).

Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting

jamming attacks in wireless networks. In Proceedings of the 6th ACM International

Symposium on Mobile Ad Hoc Networking and Computing (pp. 46–57).

Yang, Z., Zheng, K., Yang, K., & Leung, V.C.M. (2017). A Blockchain-based reputation sys­

tem for data credibility assessment in vehicular networks. In 2017 IEEE 28th Annual

International Symposium on Personal, Indoor, and Mobile Radio Communications,

QC, Canada(PIMRC) (pp. 1–5).

Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil attacks and their defenses in the inter­

net of things. IEEE Internet of Things Journal, 1(5), 372–383.

Zhang, L., & Wang, Z. (2006). Integration of RFID into wireless sensor networks:

Architectures, opportunities and challenging problems. In 2006 Fifth International

Conference on Grid and Cooperative Computing Workshops, Hunan, China (pp.

463–469).

Zyskind, G., Nathan, O., & Pentland, A. (2015). Enigma: Decentralized computation platform

with guaranteed privacy. ArXiv:1506.03471.