2018 5th International Conference on Dependable Systems and Their Applications (DSA) 2018
DOI: 10.1109/dsa.2018.00015
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 99 publications
(31 citation statements)
references
References 9 publications
0
31
0
Order By: Relevance
“…The incentive layer represents the attractiveness of the blockchain network, as far as the more rewarding incentive is for the miners, the more nodes are attracted to join the network and contribute to the general pool. Also, diversification of the miners allows for a more secure blockchain, thus, reducing the possibility for a 51% attack [40], where more than 50% of the miners are malicious and can perform consensus faster than honest miners. This allows malicious miners to control the blockchain network and to double-spend the cryptocurrency.…”
Section: B Blockchain Infrastructure Modelmentioning
confidence: 99%
“…The incentive layer represents the attractiveness of the blockchain network, as far as the more rewarding incentive is for the miners, the more nodes are attracted to join the network and contribute to the general pool. Also, diversification of the miners allows for a more secure blockchain, thus, reducing the possibility for a 51% attack [40], where more than 50% of the miners are malicious and can perform consensus faster than honest miners. This allows malicious miners to control the blockchain network and to double-spend the cryptocurrency.…”
Section: B Blockchain Infrastructure Modelmentioning
confidence: 99%
“…The foundations of a double-spend attack require a malicious adversary to control 51% or more of the network's hashing power [19]. This is an advancement to the Sybil attack, which decentralized peer-to-peer networks are vulnerable to.…”
Section: % Attackmentioning
confidence: 99%
“…can be chosen. Although, blockchain based solutions are widely accepted for a variety of applications, they are still struggling to ensure security despite their promising characteristics [24]. Blockchain systems can be found vulnerable and there is a trade-off between scalability and security.…”
Section: Image Chain (Ichain) To Prevent False Image Injection Attacksmentioning
confidence: 99%