Table 45 Vulnerabilities and Mitigation strategies in blockchain-based reporting.
From: A hybrid deep learning model for detection and mitigation of DDoS attacks in VANETs
Vulnerability | Risk Level (1–10) | Impact Severity (1–10) | Mitigation Strategy | Effectiveness (%) | Resource Overhead (%) | Notes |
|---|---|---|---|---|---|---|
Sybil attack | 8 | 9 | Delegate node reputation & identity verification | 85 | 12 | Limits fake identities via voting |
Excessive resource consumption | 7 | 8 | Adaptive consensus mechanism & pruning | 80 | 15 | Reduces energy & storage costs |
51% attack | 6 | 10 | Distributed delegate selection & multi-layer consensus | 90 | 18 | Prevents single group takeover |
Transaction flooding (DoS) | 7 | 7 | Rate limiting & transaction fees | 75 | 10 | Controls spam transactions |
Data Privacy Leakage | 5 | 6 | Encryption & permissioned access | 70 | 8 | Protects sensitive vehicular data |
Smart contract vulnerabilities | 6 | 8 | Formal verification & runtime monitoring | 80 | 10 | Prevents exploit of automated logi |