Skip to main navigation Skip to search Skip to main content

Algorithms and security concern in blockchain technology: a brief review

  • Rejwan Bin Sulaiman
  • , Amer Kareem
  • , Muhammad Umer Farooq

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Citations (Scopus)

Abstract

In this chapter, we will research the number of technical aspects of blockchain technology, the pace at which this technology is booming, and, most importantly, its implementation on the Bitcoin cryptocurrency, which has revolutionized the financial infrastructure of the world. We will also consider a number of security concerns, challenges, and other technical vulnerabilities associated with the Bitcoin technology. The decentralized mechanism, distributed mechanism, scripted mechanism, and the password related to blockchain have opened a new view on the rapidly developing Internet technology. There is no need for participants or any third party to know each other. The responsibility is included in the recording, transmission, and activities regarding storage by distributed technology. That is how the assurance is guaranteed by keeping these aloof from tampering and forging. With the assistance of an asymmetric cryptographic algorithm, every participant can reach a consensus on the blockchain's information. Blockchain technology can play a key role in the case of information security technology. Hence, in this chapter, we will also cover the impact of blockchain to expand the sphere of information security.
Original languageEnglish
Title of host publicationSecurity Engineering for Embedded and Cyber-Physical Systems
EditorsSaad Motahhir, Yassine Maleh
PublisherCRC Press
Pages3-24
Number of pages22
ISBN (Electronic)9781000644180
ISBN (Print)9781032576473
DOIs
Publication statusPublished - 31 Aug 2022

Keywords

  • blockchain

ASJC Scopus subject areas

  • General Computer Science
  • General Engineering

Fingerprint

Dive into the research topics of 'Algorithms and security concern in blockchain technology: a brief review'. Together they form a unique fingerprint.

Cite this