**Author details**

Oscar Lage\*, Santiago de Diego, Borja Urkizu, Eneko Gómez and Iván Gutiérrez TECNALIA, Parque Científico y Tecnológico de Bizkaia, Derio, Spain

\*Address all correspondence to: oscar.lage@tecnalia.com

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**85**

html

*Blockchain Applications in Cybersecurity DOI: http://dx.doi.org/10.5772/intechopen.90061*

[1] Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available from: http://bitcoin.org/bitcoin.pdf

IBM SecurityIntelligence December 9, 2015. Available from: https:// securityintelligence.com/eight-crazyhacks-the-worst-and-weirdest-databreaches-of-2015/ [Accessed: 05 March

[10] "Stonefly: First Blockchain

[11] Lee B, Lee JH. Blockchainbased secure firmware update for embedded devices in an internet of things environment. The Journal of Supercomputing. 2017;**73**(3):1152-1167

[12] Boudguiga A, Bouzerna N,

Roger A, et al. Towards better availability and accountability for iot updates by means of a blockchain. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 50-58). IEEE; 2017

Granboulan L, Olivereau A, Quesnel F,

[13] Benet J. "Ipfs-content addressed, versioned, p2p file system". 2014. arXiv

[14] Lamport L, Shostak R, Pease M. The byzantine generals problem. ACM Transactions on Programming Languages and Systems. 1982;**4**(3): 382-401. DOI: 10.1145/357172.357176. Archived from the original on 13 June

[15] Castro M, Liskov B. Practical

[16] Domenico T, Trunfio P. Toward a synergy between p2p and grids. IEEE Internet Computing. 2003;**7**(4):96-95

robustness in BitTorrent. In: Workshop

[17] Cohenv B. Incentives build

byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems.

2002;**20**(4):398-461

preprint arXiv:1407.3561

2018

blockchain-backup

Technology Backup" [Commercial tool]. Available from: https://stonefly.com/

2019]

[2] Innerbichler J, Damjanovic-Behrendt V. Federated Byzantine Agreement to Ensure Trustworthiness

Platforms. 2018. pp. 111-116. DOI:

Blockchain-Based Internet of Things Systems. 2018. pp. 482-484. DOI:

technologies and related services [Tech. Rep.]. 2015. Available from: http:// www.meti.go.jp/english/press/2016/

[5] Zheng Z, Xie S, Dai H, Chen X, Wang H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. 2017. DOI: 10.1109/

[6] "Webcam Maker Takes FTC's Heat for Internet-of-Things Security Failure" [Internet]. 2013. Available from: https:// www.technewsworld.com/story/78891.

[7] Hilton S. "Dyn Analysis Summary Of Friday October 21 Attack." 2016. In: Oracle Dyn Company News. Oct 26. Available from: https://dyn.com/ blog/dyn-analysis-summary-of-friday-

[8] Chacos B. Major DDoS attack on Dyn DNS knocks Spotify, Twitter, Github, PayPal, and more offline. 2016. In: PCWorld [Accessed: 22 October 2016]

[9] Bonderud D. Eight Crazy Hacks: The Worst and Weirdest Data Breaches of 2015 [Internet]. 2015.

of Digital Manufacturing

10.1145/3211933.3211953

10.1145/3286978.3287023

BigDataCongress.2017.85

october-21-attack/

pdf/0531\_01f.pdf

[4] NRI. Survey on blockchain

[3] Fan X, Chai Q. Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable

**References**

*Blockchain Applications in Cybersecurity DOI: http://dx.doi.org/10.5772/intechopen.90061*
