Skip to main content
Top

2021 | OriginalPaper | Chapter

Modified Transaction Against Double-Spending Attack Using Blockchain to Secure Smart Cities

Authors : J. Ramkumar, M. Baskar, A. Suresh, Arulananth T. S., B. Amutha

Published in: Data-Driven Mining, Learning and Analytics for Secured Smart Cities

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Blockchain paves the way to fill the research gaps in terms of security, database process, cryptography, data center, etc. in the research fields like networking, big data and cloud computing in recent days. Generally, blockchain contains blocks of chain where each block is referring to the previous blocks and difficulty in the recreation of a chain. It provides a set of bitcoins, which is nothing but the digital currency utilized for cryptocurrency to manage several transactions based on a fully distributed environment. As bitcoins decentralizes for the mining process, mining processes are performed for the creation of bitcoin too. While considering the security, the bitcoin transaction has several attackers shows while making transactions. The most severe attack that we have found here is the double-spending attacks to modify and manipulate the transaction performed. Based on the blockchain framework existence, all the transactions stores into the transaction part of each block. Transactions perform a hash function which hashes each transaction and repeat it for pairing again and again based on the Merkle tree. Merkle tree is the block header that stores the hash of the previous block header. These chaining process helps the transaction to ensure no modifications done without changing the earlier blocks in the chain network. The transaction in blockchain denotes the bitcoin wallet, which tells the information about bitcoin's movement. Each spend transaction of bitcoin has the previous bitcoin transaction. Double spending attack occurs when a single transaction creates multiple output transaction while sending to several destination addresses. In the blockchain, each output transaction is provided based on one input. If any attempt of the same bitcoin uses for two or more times for a transaction, the double-spending attack is possible. Based on the existing survey related to the double-spending attack ratio, there is a possibility of a double-spending attack in the blockchain. Based on the double-spending attack problem, the modified bitcoin transaction chaining technique proposes with integrated the electronic codebook based on cryptography. As to provide more security, modes of electronic code operations are considered. Based on the block cipher of block length and in the case of multiple blocks of information are processed, security attacks are possible as block chaining added up into the transaction between the sender and receiver, which ensures authentication and confidentiality. The initial constant provides integrated with the transaction to provide maximum security and protect against unauthorized changes. To provide additional security constant number is considered as the random number which gets varied for each transaction based on output feedback mode operation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li X, Jiang P, Chen T, Xiapu Lu, Wen Q (2020) A survey on the security of blockchain systems. In: Future generation computer systems. Elsevier Publications 107:841–853 Li X, Jiang P, Chen T, Xiapu Lu, Wen Q (2020) A survey on the security of blockchain systems. In: Future generation computer systems. Elsevier Publications 107:841–853
2.
go back to reference Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv. IndersciencePub 14(4):352–375 Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv. IndersciencePub 14(4):352–375
3.
go back to reference Nguyen G-T, Kim K (2018) A survey about consensus algorithms used in blockchain. J Inf Proc Syst 14(1):101–128 Nguyen G-T, Kim K (2018) A survey about consensus algorithms used in blockchain. J Inf Proc Syst 14(1):101–128
4.
go back to reference Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in blockchain system. J Net Comp Appl 126:45–58 Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in blockchain system. J Net Comp Appl 126:45–58
5.
go back to reference Sharma PK, Park JH (2018) Blockchain based hybrid network architecture for the smart city. Future Gener Comput Syst. Elsevier Publications 86:650–655 Sharma PK, Park JH (2018) Blockchain based hybrid network architecture for the smart city. Future Gener Comput Syst. Elsevier Publications 86:650–655
6.
go back to reference Zhang R, Xue R, Liu L (2018) Security and privacy on blockchain. ACM Comput Surv 1(1):1–25CrossRef Zhang R, Xue R, Liu L (2018) Security and privacy on blockchain. ACM Comput Surv 1(1):1–25CrossRef
7.
go back to reference Jo S, Lee J, Han J, Ghose S (2020) P2P computing for intelligence of things. Peer-To-Peer Netw Appl. Spinger Publications 13:575–578CrossRef Jo S, Lee J, Han J, Ghose S (2020) P2P computing for intelligence of things. Peer-To-Peer Netw Appl. Spinger Publications 13:575–578CrossRef
8.
go back to reference Merlinda A, Robu V, Flynn D, Abram S, Geach D, Jenkins D, McCallum P, Peacock A (2019) Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew Sustain Energy Rev 100:143–174 Merlinda A, Robu V, Flynn D, Abram S, Geach D, Jenkins D, McCallum P, Peacock A (2019) Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew Sustain Energy Rev 100:143–174
9.
go back to reference Taherdoost H, Chaeikar S, Jafari M, Shojae Chaei Kar N (2012) Definitions and criteria of CIA security triangle in electronic voting system international. J Adv Comput Sci Inf Technol (IJACSIT) 1(1):14–24 Taherdoost H, Chaeikar S, Jafari M, Shojae Chaei Kar N (2012) Definitions and criteria of CIA security triangle in electronic voting system international. J Adv Comput Sci Inf Technol (IJACSIT) 1(1):14–24
10.
go back to reference Milutinovic M, He W, Wu H, Kanwal MS (2016) Proof of luck: an efficient blockchain consensus protocol. In: Proceedings of 1st workshop on system software for trusted execution, SysTEX ‘16, vol 2, pp 1–6 Milutinovic M, He W, Wu H, Kanwal MS (2016) Proof of luck: an efficient blockchain consensus protocol. In: Proceedings of 1st workshop on system software for trusted execution, SysTEX ‘16, vol 2, pp 1–6
11.
go back to reference Zhen Y, Yue M, Zhong-y C, Chang-bing T, Xin C (2017) Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus. In Proceedings of 36th Chinese control conference (CCC) Zhen Y, Yue M, Zhong-y C, Chang-bing T, Xin C (2017) Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus. In Proceedings of 36th Chinese control conference (CCC)
12.
go back to reference Shoker A (2017) Sustainable blockchain through proof of exercise. In: Proceedings of IEEE 16th international symposium on network computing and applications (NCA), Cambridge, MA, USA Shoker A (2017) Sustainable blockchain through proof of exercise. In: Proceedings of IEEE 16th international symposium on network computing and applications (NCA), Cambridge, MA, USA
13.
go back to reference Pérez-Solà C, Delgado-Segura S, Navarro-Arribas G, Herrera-Joancomartí J (2018) Double-spending prevention for Bitcoin zero-confirmation transactions. Int J Inf Secur. Springer Publications 18:451–463CrossRef Pérez-Solà C, Delgado-Segura S, Navarro-Arribas G, Herrera-Joancomartí J (2018) Double-spending prevention for Bitcoin zero-confirmation transactions. Int J Inf Secur. Springer Publications 18:451–463CrossRef
14.
go back to reference Bonneau J (2019) Hostile blockchain takeovers. In: Proceedings of international conference on financial cryptography and data security. Springer LNCS, pp 92–100 Bonneau J (2019) Hostile blockchain takeovers. In: Proceedings of international conference on financial cryptography and data security. Springer LNCS, pp 92–100
15.
go back to reference Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W, Qijun C (2017) A review on consensus algorithm of blockchain. In Proceedings of IEEE international conference on systems, man, and cybernetics (SMC), Banff, AB, Canada Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W, Qijun C (2017) A review on consensus algorithm of blockchain. In Proceedings of IEEE international conference on systems, man, and cybernetics (SMC), Banff, AB, Canada
16.
go back to reference Joshi A, Wazid M, Goudar RH (2015) An efficient cryptographic scheme for text message protection against brute force and cryptanalytic attacks. In: Proceedings of international conference on intelligent computing, communication & convergence (ICCC-2014), Odisha, India, vol 48, pp 360–366 Joshi A, Wazid M, Goudar RH (2015) An efficient cryptographic scheme for text message protection against brute force and cryptanalytic attacks. In: Proceedings of international conference on intelligent computing, communication & convergence (ICCC-2014), Odisha, India, vol 48, pp 360–366
17.
go back to reference Stoyanov B, Nedzhibov G (2020) Symmetric key encryption based on rotation-translation equation. J Symmetry 12(1):1–12 Stoyanov B, Nedzhibov G (2020) Symmetric key encryption based on rotation-translation equation. J Symmetry 12(1):1–12
18.
go back to reference Páez R, Pérez M, Ramírez G, Montes J, Bouvarel L (2020) An architecture for biometric electronic identification document system based on blockchain. J Future Internet, MDPI 12(1):1–19 Páez R, Pérez M, Ramírez G, Montes J, Bouvarel L (2020) An architecture for biometric electronic identification document system based on blockchain. J Future Internet, MDPI 12(1):1–19
19.
go back to reference Apostol K (2012) Brute-force attack. ACM Digital Library Apostol K (2012) Brute-force attack. ACM Digital Library
20.
go back to reference Halpin H, Piekarska M (2017) Introduction to security and privacy on the blockchain. In: Proceedings of ieee european symposium on security and privacy workshops (EuroS&PW), Paris, France Halpin H, Piekarska M (2017) Introduction to security and privacy on the blockchain. In: Proceedings of ieee european symposium on security and privacy workshops (EuroS&PW), Paris, France
21.
go back to reference Eyal I, Gencer AE, Sirer EG, van Renesse R (2016) Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of 13th USENIX symposium on networked systems design and implementation, CA, United States Eyal I, Gencer AE, Sirer EG, van Renesse R (2016) Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of 13th USENIX symposium on networked systems design and implementation, CA, United States
22.
go back to reference Gramoli V (2020) From blockchain consensus back to Byzantine consensus. Future generation computer systems. Elsevier Publications 107:760–769 Gramoli V (2020) From blockchain consensus back to Byzantine consensus. Future generation computer systems. Elsevier Publications 107:760–769
23.
go back to reference Bach LM, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus lgorithms. In: Proceedings of 41st international convention on information and communication technology, electronics and microelectronics (MIPRO), Opatija, Croatia Bach LM, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus lgorithms. In: Proceedings of 41st international convention on information and communication technology, electronics and microelectronics (MIPRO), Opatija, Croatia
24.
go back to reference Li W, Andreina S, Bohl J-M, Karame G (2017) Securing proof-of-stake blockchain protocols. In: Proceedings of international workshop on data privacy management cryptocurrencies and blockchain technology, LNCS. Springer, pp 297–315 Li W, Andreina S, Bohl J-M, Karame G (2017) Securing proof-of-stake blockchain protocols. In: Proceedings of international workshop on data privacy management cryptocurrencies and blockchain technology, LNCS. Springer, pp 297–315
25.
go back to reference Keenan TP (2017) Alice in blockchains: surprising security pitfalls in PoW and PoS Blockchain systems. In: Proceedings of 15th annual conference on privacy, security and trust (PST), Calgary, AB, Canada Keenan TP (2017) Alice in blockchains: surprising security pitfalls in PoW and PoS Blockchain systems. In: Proceedings of 15th annual conference on privacy, security and trust (PST), Calgary, AB, Canada
26.
go back to reference Xu X, Weber I, Staples M, Zhu L, Bosch J, Bass L, Pautasso C, Rimba P (2017) A taxonomy of blockchain-based systems for architecture design. In: Proceedings of IEEE international conference on software architecture (ICSA), Gothenburg, Sweden Xu X, Weber I, Staples M, Zhu L, Bosch J, Bass L, Pautasso C, Rimba P (2017) A taxonomy of blockchain-based systems for architecture design. In: Proceedings of IEEE international conference on software architecture (ICSA), Gothenburg, Sweden
27.
go back to reference Mainelli M, Milne A (2016) The impact and potential of blockchain on the securities transaction lifecycle. In: SWIFT institute working paper No. 2015–007 Mainelli M, Milne A (2016) The impact and potential of blockchain on the securities transaction lifecycle. In: SWIFT institute working paper No. 2015–007
28.
go back to reference Morris D (2001) Recommendation for block cipher modes of operation. Methods Tech. Defense Technical Information Center Morris D (2001) Recommendation for block cipher modes of operation. Methods Tech. Defense Technical Information Center
29.
go back to reference Chakraborty D, Sarkar P (2006) A general construction of tweakable block ciphers and different modes of operations. Lecture notes on computer Science. Springer publications, pp 88–102 Chakraborty D, Sarkar P (2006) A general construction of tweakable block ciphers and different modes of operations. Lecture notes on computer Science. Springer publications, pp 88–102
30.
go back to reference Jutla CS (2001) Encryption modes with almost free message integrity. Lecture notes on computer science. Springer publications, pp 529–544 Jutla CS (2001) Encryption modes with almost free message integrity. Lecture notes on computer science. Springer publications, pp 529–544
31.
go back to reference Sahi A, Lai D, Li Y (2018) An efficient hash based parallel block cipher mode of operation. In: Proceedings of 3rd international conference on computer and communication systems (ICCCS), Nagoya, Japan Sahi A, Lai D, Li Y (2018) An efficient hash based parallel block cipher mode of operation. In: Proceedings of 3rd international conference on computer and communication systems (ICCCS), Nagoya, Japan
32.
go back to reference Thoms G, Muresan R, Al-Dweik A (2019) Design of chaotic block cipher operation mode for intelligent transportation systems. In Proceedings of IEEE international conference on consumer electronics (ICCE), Las Vegas, NV, USA Thoms G, Muresan R, Al-Dweik A (2019) Design of chaotic block cipher operation mode for intelligent transportation systems. In Proceedings of IEEE international conference on consumer electronics (ICCE), Las Vegas, NV, USA
33.
go back to reference Oh S, Park S, Kim H (2008) Patterned cipher block for low-latency secure communication. IEEE Access 8:44632–44642 Oh S, Park S, Kim H (2008) Patterned cipher block for low-latency secure communication. IEEE Access 8:44632–44642
34.
go back to reference Breier J, Ja D, Hou X, Bhasin S (2019) On side channel vulnerabilities of bit permutations in cryptographic algorithms. IEEE Trans Inf Forensics Secur 15:1072–1085CrossRef Breier J, Ja D, Hou X, Bhasin S (2019) On side channel vulnerabilities of bit permutations in cryptographic algorithms. IEEE Trans Inf Forensics Secur 15:1072–1085CrossRef
35.
go back to reference Soomro S, Belgaum MR, Alansari Z, Jain R (2019) Review and open issues of cryptographic algorithms in cyber security. In: Proceedings of international conference on computing, electronics & communications engineering (iCCECE), London, United Kingdom Soomro S, Belgaum MR, Alansari Z, Jain R (2019) Review and open issues of cryptographic algorithms in cyber security. In: Proceedings of international conference on computing, electronics & communications engineering (iCCECE), London, United Kingdom
36.
go back to reference Chaudhari K, Prajapatim P (2020) Parallel DES with modified mode of operation. In: Intelligent communication, control and devices, advances in intelligent systems and computing, vol 989 Chaudhari K, Prajapatim P (2020) Parallel DES with modified mode of operation. In: Intelligent communication, control and devices, advances in intelligent systems and computing, vol 989
37.
go back to reference Sultan I, Mir BJ, Tariq Banday M (2020) Analysis and optimization of advanced encryption standard for the internet of things. In Proceedings of 7th international conference on signal processing and integrated networks (SPIN), Noida, India Sultan I, Mir BJ, Tariq Banday M (2020) Analysis and optimization of advanced encryption standard for the internet of things. In Proceedings of 7th international conference on signal processing and integrated networks (SPIN), Noida, India
38.
go back to reference Hui H, Zhou C, Shenggang Xu, Lin F (2020) A novel secure data transmission scheme in industrial internet of things. China Commun 17(1):73–88CrossRef Hui H, Zhou C, Shenggang Xu, Lin F (2020) A novel secure data transmission scheme in industrial internet of things. China Commun 17(1):73–88CrossRef
39.
go back to reference Ma C, Li J, Ding M, Yang HH, Shu F, Quek TQS, Vincent Poor H (2020) On safeguarding privacy and security in the framework of federated learning. IEEE Netw 1–7 Ma C, Li J, Ding M, Yang HH, Shu F, Quek TQS, Vincent Poor H (2020) On safeguarding privacy and security in the framework of federated learning. IEEE Netw 1–7
40.
go back to reference Ghalaii M, Ottaviani C, Kumar R, Pirandola S, Razavi M (2020) Long-distance continuous-variable quantum key distribution with quantum scissors. IEEE J Sel Topics Quantum Electron 26(3) Ghalaii M, Ottaviani C, Kumar R, Pirandola S, Razavi M (2020) Long-distance continuous-variable quantum key distribution with quantum scissors. IEEE J Sel Topics Quantum Electron 26(3)
41.
go back to reference Kim K, Choi S, Kwon H, Liu Z, Seo H (2020) FACE–LIGHT: Fast AES–CTR mode encryption for low-end microcontrollers. In: Information security and cryptology—ICISC. Lecture notes in computer science, vol 11975. Springer, Cham Kim K, Choi S, Kwon H, Liu Z, Seo H (2020) FACE–LIGHT: Fast AES–CTR mode encryption for low-end microcontrollers. In: Information security and cryptology—ICISC. Lecture notes in computer science, vol 11975. Springer, Cham
42.
go back to reference Das D, Danial J, Golder A, Modak N, Maity S, Chatterje B, Seo D, Chang M, Varna A, Krishnamurthy H, Mathew S, Ghosh S, Raychowdhury A, Sen S (2020) 27.3 EM and power SCA-resilient AES-256 in 65 nm CMOS through >350× current-domain signature attenuation. In: Proceedings of IEEE international solid- state circuits conference—(ISSCC), San Francisco, CA, USA Das D, Danial J, Golder A, Modak N, Maity S, Chatterje B, Seo D, Chang M, Varna A, Krishnamurthy H, Mathew S, Ghosh S, Raychowdhury A, Sen S (2020) 27.3 EM and power SCA-resilient AES-256 in 65 nm CMOS through >350× current-domain signature attenuation. In: Proceedings of IEEE international solid- state circuits conference—(ISSCC), San Francisco, CA, USA
43.
go back to reference Kiryakina MA, Kuzmicheva SA, Ivanov MA (2020) Encrypted PRNG by logic encryption. In: Proceedings of IEEE conference of Russian young researchers in electrical and electronic engineering (EIConRus), St. Petersburg and Moscow, Russia Kiryakina MA, Kuzmicheva SA, Ivanov MA (2020) Encrypted PRNG by logic encryption. In: Proceedings of IEEE conference of Russian young researchers in electrical and electronic engineering (EIConRus), St. Petersburg and Moscow, Russia
44.
go back to reference Chugunkov IV, Kliuchnikova BV, Ivanov MA, Salikov EA, Zubtsov AO (2020) New class of pseudorandom number generators for logic encryption realization. In: IEEE conference of Russian young researchers in electrical and electronic engineering (EIConRus). St. Petersburg and Moscow, RussiaCrossRef Chugunkov IV, Kliuchnikova BV, Ivanov MA, Salikov EA, Zubtsov AO (2020) New class of pseudorandom number generators for logic encryption realization. In: IEEE conference of Russian young researchers in electrical and electronic engineering (EIConRus). St. Petersburg and Moscow, RussiaCrossRef
45.
go back to reference Zhang L, Ma M (2020) Secure and efficient scheme for fast initial link setup against key reinstallation attacks in IEEE 802.11 ah networks. Int J Commun Syst 33(2):e4192 Zhang L, Ma M (2020) Secure and efficient scheme for fast initial link setup against key reinstallation attacks in IEEE 802.11 ah networks. Int J Commun Syst 33(2):e4192
46.
go back to reference Song X-H, Wang H-Q, Venegas-Andraca SE, Abd El-Latif AA (2020) Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Phys A: Stat Mech Appl 537:1–18 Song X-H, Wang H-Q, Venegas-Andraca SE, Abd El-Latif AA (2020) Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Phys A: Stat Mech Appl 537:1–18
47.
go back to reference Roayat Ismail Abdelfatah (2020) A new fast double-chaotic based Image encryption scheme. Multimed Tools Appl. Springer Publications 79:1241–1259CrossRef Roayat Ismail Abdelfatah (2020) A new fast double-chaotic based Image encryption scheme. Multimed Tools Appl. Springer Publications 79:1241–1259CrossRef
48.
go back to reference Mason Dambrot S (2018) ReGene: blockchain backup of genome data and restoration of pre-engineered expressed phenotype. In: Proceedings of 9th IEEE annual ubiquitous computing, electronics & mobile communication conference (UEMCON), New York City, NY, USA Mason Dambrot S (2018) ReGene: blockchain backup of genome data and restoration of pre-engineered expressed phenotype. In: Proceedings of 9th IEEE annual ubiquitous computing, electronics & mobile communication conference (UEMCON), New York City, NY, USA
49.
go back to reference Zheng Y, Zhao X, Sato T, Cao Y. Chang C-H (2020) Ed-PUF: event-driven physical unclonable function for camera authentication in reactive monitoring system. IEEE Trans Inf Forensics Secur 15:2824–2839 Zheng Y, Zhao X, Sato T, Cao Y. Chang C-H (2020) Ed-PUF: event-driven physical unclonable function for camera authentication in reactive monitoring system. IEEE Trans Inf Forensics Secur 15:2824–2839
50.
go back to reference Dimitriou T, Mohammed A (2020) Fair and privacy-respecting Bitcoin payments for smart grid data. IEEE Internet Things J 1–1 Dimitriou T, Mohammed A (2020) Fair and privacy-respecting Bitcoin payments for smart grid data. IEEE Internet Things J 1–1
51.
go back to reference Zhou F, Liu F, Yang R, Liu H (2020) Method for estimating harmonic parameters based on measurement data without phase angle. Energies, MDPI 13(4) Zhou F, Liu F, Yang R, Liu H (2020) Method for estimating harmonic parameters based on measurement data without phase angle. Energies, MDPI 13(4)
Metadata
Title
Modified Transaction Against Double-Spending Attack Using Blockchain to Secure Smart Cities
Authors
J. Ramkumar
M. Baskar
A. Suresh
Arulananth T. S.
B. Amutha
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-72139-8_8

Premium Partner