Borgohain, T., Kumar, U., and Sanyal, S. (2015). Survey of
security and privacy issues of internet of things. arXiv
preprint arXiv:1501.02211.
Brewer, R. (2016). Ransomware attacks: detection, preven-
tion and cure. Network Security, (9):5–9.
Brody, P. and Pureswaran, V. (2014). Device democracy:
Saving the future of the internet of things. Avail-
able at https://www-935.ibm.com/services/
multimedia/GBE03620USEN.pdf, Viewed 14
December 2017.
Buterin, V. et al. (2014). A next-generation smart contract
and decentralized application platform. Whitepaper.
Cachin, C. (2016). Architecture of the hyperledger
blockchain fabric. In Workshop on Distributed Cryp-
tocurrencies and Consensus Ledgers.
Cam-Winget, N., Sadeghi, A. R., and Jin, Y. (2016). Can
IoT be secured: Emerging challenges in connect-
ing the unconnected. In Design Automation Confer-
ence (DAC), 2016 53nd ACM/EDAC/IEEE, pages 1–6.
IEEE.
Castro, M. and Liskov, B. (2002). Practical byzantine fault
tolerance and proactive recovery. ACM Transactions
on Computer Systems (TOCS), 20(4):398–461.
Decker, C. and Wattenhofer, R. (2013). Information prop-
agation in the bitcoin network. In Thirteenth Interna-
tional Conference on Peer-to-Peer Computing (P2P),
pages 1–10. IEEE.
Ducklin, P. (2016). Mirai “Internet of Things” malware
from krebs ddos attack goes open source. Naked
Security. Available at https://nakedsecurity.
sophos.com/2016/10/05/mirai/, Viewed 12
February 2018.
EconoTimes (2017). Blockchain project antshares explains
reasons for choosing dbft over pow and pos. Available
at http://www.econotimes.com/Blockchain-
project-Antshares-explains-reasons-for-
choosing-dBFT-over-PoW-and-PoS-659275,
Viewed 18 December 2017.
Etherscan (2018). Ethereum transaction chart 2018. Avail-
able at https://etherscan.io/chart/tx, Viewed
5 February 2018.
Evans, D. (2011). The Internet of Things: How the
next evolution of the internet is changing everything.
CISCO Whitepaper, 1(2011):1–11.
FSecure-Labs (2014). Havex Hunts For ICS/SCADA Sys-
tems. Available at https://www.f-secure.com/
weblog/archives/00002718.html, Viewed 9 De-
cember 2017.
Greenberg, A. (2015). Hackers remotely kill a jeep on the
highway—with me in it. Wired, 7:21.
Hyperledger (2016). Hyperledger whitepaper. Avail-
able at https://github.com/hyperledger/
hyperledger/wiki/Whitepaper-WG, Viewed 19
February 2018.
Hyperledger-Docs (2018). Introduction to hyperledger fab-
ric. Available at https://hyperledger-fabric.
readthedocs.io/en/latest/blockchain.html,
Viewed 13 February 2018.
Hyperledger-Fabric (2018). Hyperledger-fabric
documentation. Available at https:
//media.readthedocs.org/pdf/hyperledger-
fabric/latest/hyperledger-fabric.pdf,
Viewed 18 February 2018.
Hyperledger-Gas (2016). Gas with hyperledger fab-
ric? Available at https://stackoverflow.com/
questions/38635778/gas-with-hyperledger-
fabric, Viewed 15 February 2018.
IBM-ADEPT (2015). An internet of things practi-
tioner perspective. Technical report, IBM. Avail-
able at https://archive.org/details/pdfy-
esMcC00dKmdo53-_, Viewed 21 March 2018.
IOTA (2017). What is iota? Available at https://iota.
readme.io/v1.2.0/docs, Viewed 24 March 2018.
IOTA-Support (2017). An introduction to iota. Available
at http://www.iotasupport.com/whatisiota.
shtml, Viewed 27 March 2018.
James, R. (2018a). Ethereum/wiki - mining. Available
at https://github.com/ethereum/wiki/wiki/
Mining, Viewed 5 February 2018.
James, R. (2018b). On sharding blockchains. Available
at https://github.com/ethereum/wiki/wiki/
Sharding-FAQs, Viewed 27 April 2018.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., and Qiu, D.
(2014). Security of the internet of things: perspectives
and challenges. Wireless Networks, 20(8):2481–2501.
Junqueira, F. P., Reed, B. C., and Serafini, M. (2011).
Zab: High-performance broadcast for primary-backup
systems. In 41st International Conference on De-
pendable Systems & Networks (DSN), pages 245–256.
IEEE.
Kaspersky-Lab (2017). Trojans exploit WAP sub-
scriptions to steal money 2017. Available
at https://www.kaspersky.com/blog/wap-
billing-trojans/18080/, Viewed 15 February
2018.
Kastelein, R. (2016). Intel jumps into blockchain
technology storm with ‘sawtooth lake’ distributed
ledger. Available at http://www.the-blockchain.
com/2016/04/09/, Viewed 21 March 2018.
Konstantinos, K., Angelos, S., Irena, B., Jeff, V., and
Grance, T. (2016). Leveraging blockchain-based pro-
tocols in iot systems. NIST-Computer Security Re-
source Center.
Kumar, S. A., Vealey, T., and Srivastava, H. (2016). Secu-
rity in internet of things: Challenges, solutions and fu-
ture directions. In 49th Hawaii International Confer-
ence on System Sciences (HICSS), pages 5772–5781.
IEEE.
Lamport, L. (1998). The part-time parliament. ACM Trans.
Comput. Syst., 16(2):133–169.
Langner, R. (2013). To kill a centrifuge: A technical analy-
sis of what stuxnet’s creators tried to achieve. Avail-
able at https://www.langner.com/wp-content/
uploads/2017/03/to-kill-a-centrifuge.pdf,
Viewed 11 December 2017.
Lund, D., MacGillivray, C., Turner, V., and Morales, M.
(2014). Worldwide and regional Internet of Things
(IoT) 2014–2020 forecast: A virtuous circle of proven
value and demand. International Data Corporation
(IDC), Tech. Rep.
SECRYPT 2018 - International Conference on Security and Cryptography
438