Block, A. (2018). Mitigating 51% attacks with llmq-based
chainlocks. https://blog.dash.org/mitigating-51-
attacks-with-llmq-based-chainlocks-7266aa648ec9.
Accessed: 2021-04-08.
ChainZilla (2019). Blockchain security and how to
mitigate. https://medium.com/chainzilla/solutions-to-
51-attacks-and-double-spending-71526be4bb86. Ac-
cessed: 2021-04-08.
Eismann, S., Bezemer, C.-P., Shang, W., Okanovi
´
c, D.,
and van Hoorn, A. (2020). Microservices: A perfor-
mance tester’s dream or nightmare? In Proceedings
of the ACM/SPEC International Conference on Per-
formance Engineering, ICPE ’20, page 138–149, New
York, NY, USA. Association for Computing Machin-
ery.
Garoffolo, A., Stabilini, P., Viglione, R., and Stav, U.
(2018). A penalty system for delayed block sub-
mission. https://www.horizen.global/assets/files/A-
Penalty-System-for-Delayed-Block-Submission-by-
Horizen.pdf. Accessed: 2021-04-08.
Goodin, D. (2020). A patient dies after a ransomware
attack hits a hospital. https://www.wired.com/story/a-
patient-dies-after-a-ransomware-attack-hits-a-
hospital/. Accessed: 2021-02-22.
Jamil, F., Ahmad, S., Iqbal, N., and Kim, D.-H. (2020). To-
wards a remote monitoring of patient vital signs based
on IoT-based blockchain integrity management plat-
forms in smart hospitals. Sensors, 20(8).
Judmayer, A., Stifter, N., Krombholz, K., and Weippl, E.
(2017). Blocks and chains: introduction to bitcoin,
cryptocurrencies, and their consensus mechanisms.
Synthesis Lectures on Information Security, Privacy,
& Trust, 9(1):1–123.
Khan, P. W. and Byun, Y. (2020). A blockchain-based se-
cure image encryption scheme for the industrial inter-
net of things. Entropy, 22(2).
Khan, P. W., Byun, Y.-C., and Park, N. (2020). A data ver-
ification system for cctv surveillance cameras using
blockchain technology in smart cities. Electronics,
9(3).
Koschel, A., Astrova, I., and D
¨
otterl, J. (2017). Making the
move to microservice architecture. In 2017 Interna-
tional Conference on Information Society (i-Society),
pages 74–79.
Lu, D., Huang, D., Walenstein, A., and Medhi, D. (2017). A
secure microservice framework for IoT. In 2017 IEEE
Symposium on Service-Oriented System Engineering
(SOSE), pages 9–18.
Minchev, R. (2018). Pirlguard — innovative solution
against 51% attacks. https://medium.com/pirl/
pirlguard-innovative-solution-against-51-attacks-87d
d45aa1109. Accessed: 2021-04-08.
Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic
cash system. Technical report, Manubot.
Nartey, C., Tchao, E. T., Gadze, J. D., Keelson, E., Kl-
ogo, G. S., Kommey, B., and Diawuo, K. (2021).
On blockchain and IoT integration platforms: Cur-
rent implementation challenges and future perspec-
tives. Wireless Communications and Mobile Comput-
ing, 2021.
Nicolas, K., Wang, Y., and Giakos, G. C. (2019). Com-
prehensive overview of selfish mining and double
spending attack countermeasures. In 2019 IEEE 40th
Sarnoff Symposium, pages 1–6. IEEE.
Reyna, A., Mart
´
ın, C., Chen, J., Soler, E., and D
´
ıaz,
M. (2018). On blockchain and its integration with
IoT. challenges and opportunities. Future Generation
Computer Systems, 88:173–190.
Sayeed, S. and Marco-Gisbert, H. (2019). Assess-
ing blockchain consensus and security mechanisms
against the 51Applied Sciences, 9(9).
Sharma, A. (2018). Understanding proof of stake
through it’s flaws. part 3— ‘long range attacks.
https://medium.com/@abhisharm/understanding-
proof-of-stake-through-its-flaws-part-3-long-range-
attacks-672a3d413501. Accessed: 2021-04-08.
Sousa, P. S. d., Nogueira, N. P., Santos, R. C. d., Maia, P.
H. M., and Souza, J. T. d. (2020). Building a prototype
based on microservices and blockchain technologies
for notary’s office: An academic experience report. In
2020 IEEE International Conference on Software Ar-
chitecture Companion (ICSA-C), pages 122–129.
Sun, H., Ruan, N., and Su, C. (2020). How to model the
bribery attack: A practical quantification method in
blockchain. In European Symposium on Research in
Computer Security, pages 569–589. Springer.
Wang, K. (2017). Cryptoeconomics: Paving
the future of blockchain technology.
https://hackernoon.com/cryptoeconomics-paving-
the-future-of-blockchain-technology-13b04dab971.
Accessed: 2021-04-08.
Zhang, J., Lu, C., Cheng, G., Guo, T., Kang, J., Zhang,
X., Yuan, X., and Yan, X. (2021). A blockchain-based
trusted edge platform in edge computing environment.
Sensors (Basel, Switzerland), 21(6):2126.
Zhang, S. and Lee, J.-H. (2019). Double-spending
with a sybil attack in the bitcoin decentralized net-
work. IEEE transactions on Industrial Informatics,
15(10):5715–5722.
WINSYS 2022 - 19th International Conference on Wireless Networks and Mobile Systems
60