Research Article

Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms

Table 1

Summary of attacks on HANs.

Attack nameEffectDefended by

Malicious block (cite)Attackers produce a malicious blockAuthentication algorithm and smart contract
Denial-of-service (cite)Data unavailabilityAccess authority and management
Access control impersonation (cite)Fraudulent behaviorConsensus algorithm
Double-spending (cite)Same transaction multiple timesConsensus algorithm
Side-channel (cite)Authentication processAuthentication algorithm