دورية أكاديمية

Blockchain Security Research Progress and Hotspots.

التفاصيل البيبلوغرافية
العنوان: Blockchain Security Research Progress and Hotspots.
المؤلفون: Ke Yuan, Yingjie Yan, Lin Shen, Qian Tang, Chunfu Jia
المصدر: IAENG International Journal of Computer Science; Jun2022, Vol. 49 Issue 2, p433-444, 12p
مصطلحات موضوعية: BLOCKCHAINS, INVESTMENT analysis, CYBERTERRORISM, CRYPTOCURRENCIES, INTERNET of things, RISK assessment
مصطلحات جغرافية: CHINA
مستخلص: Blockchain is poised to advance the cause of product innovation and technology evolution as a novel decentralized infrastructure and distributed computing model. However, there are serious security risks in the blockchain itself, which will restrict the development of blockchain and related applications. To better grasp the current status of blockchain security research and explore the research hotspots and frontier, this study used Citespace as a bibliometric analysis tool to collect 3993 research papers between 2014 and 2020 from the WoS Core Collection as a data sample. We conduct a comprehensive overview of blockchain security research in terms of authors, research institutions, publications, countries, citations and keywords in a visual graph. This paper shows that the literature record continues to be refreshed, and it peaked in 2019. China and the USA are the main regions for collaborative research. They have established partnerships with many countries whose research institutions and authors play an important role in the collaborative network. Blockchain security research hotspots are mainly related to "cryptocurrency", "supply chain", "smart contract", "healthcare", "consensus mechanism", "fog computing", "cyber attack" and "Internet of Thing (IoT)". The lineage of blockchain development has evolved from an early focus on cryptocurrency and blockchain security risk analysis to securing other areas, such as financial systems, the IoT and healthcare through blockchain. In the future, blockchain security research will be combined with much newer technologies to form diverse developments. [ABSTRACT FROM AUTHOR]
Copyright of IAENG International Journal of Computer Science is the property of Newswood Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Supplemental Index