2023
DOI: 10.3390/app13042604
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Consensus Protocols and Attacks on Blockchain Technology

Abstract: In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(10 citation statements)
references
References 80 publications
0
10
0
Order By: Relevance
“…They covered various PKIX and certificate revocation proposals, including their modern implementation on blockchain and ledger technologies. Guru et al [ 20 ] investigated the current landscape of blockchain consensus algorithms, focusing on their security features and vulnerabilities to various attacks such as ARP, DDoS, and sharding in permissionless blockchains.…”
Section: Related Workmentioning
confidence: 99%
“…They covered various PKIX and certificate revocation proposals, including their modern implementation on blockchain and ledger technologies. Guru et al [ 20 ] investigated the current landscape of blockchain consensus algorithms, focusing on their security features and vulnerabilities to various attacks such as ARP, DDoS, and sharding in permissionless blockchains.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of DSM, this is a highly plausible threat, considering the processing capability available with wealthy mobile network operators. Address Resolution Protocol (ARP) attacks, though they are quite conventional, can pose a threat to novel blockchain applications [176]. ARP threats divert the traffic destined for one or more hosts on a local blockchain network and can expose access to the network.…”
Section: New Security and Privacy Issues Related To Blockchain 1) Int...mentioning
confidence: 99%
“…DDoS attacks on blockchain networks mainly refer to malicious mining nodes controlling multiple nodes through the network to attack other honest mining nodes to obtain illegal mining rewards [9]. In the PoW algorithm based on the mining process, malicious miners usually initiate excessive network requests to honest miners [7,10]. Therefore, it is necessary to implement effective models and algorithms in the blockchain network environment based on the PoW algorithm to resist or reduce the loss caused by malicious miners launching DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Academics have proposed many methods to solve the DDoS attack problem in the blockchain network layer. At present, these methods can be mainly divided into the following categories: DDoS defense methods combined with blockchain technology, DDoS combination attacks combined with other blockchain attacks, and static game strategies based on the blockchain mining pool [10][11][12][13][14][15][16][17]. Among these existing studies, the use of a static game approach to mitigate DDoS attacks is the most effective [18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%