Research Article
Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms
Table 1
Summary of attacks on HANs.
| Attack name | Effect | Defended by |
| Malicious block (cite) | Attackers produce a malicious block | Authentication algorithm and smart contract | Denial-of-service (cite) | Data unavailability | Access authority and management | Access control impersonation (cite) | Fraudulent behavior | Consensus algorithm | Double-spending (cite) | Same transaction multiple times | Consensus algorithm | Side-channel (cite) | Authentication process | Authentication algorithm |
|
|