2020
DOI: 10.1109/access.2020.3000571
|View full text |Cite
|
Sign up to set email alerts
|

Defending Blockchain Forking Attack by Delaying MTC Confirmation

Abstract: In terms of security, blockchain technology faces the potential risks of enormous attacks, among which forking attack is the most common one. Because of the decentralized structure of a blockchain, the trust degree directly relies on the length of the blockchain, which makes the longest chain on the current network the most trusted chain (MTC). The forking attack is the kind of hazard behavior that aims to replace the MTC by launching an alternative chain to gain benefits. Blockchain plays a vital role in mult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 23 publications
(28 reference statements)
0
1
0
Order By: Relevance
“…Forking attack [29] and delay attack [30] refer to a type of attack launched by the leader node in a consensus protocol, which can result in the appearance of invalid blocks, which will increase the delay of consensus and reduce the throughput of the consensus protocol. Figure 4a shows an illustration of a forking attack in the HotStuff protocol.…”
Section: Leader Selection Algorithm Based On Vague Sets and Multi-att...mentioning
confidence: 99%
“…Forking attack [29] and delay attack [30] refer to a type of attack launched by the leader node in a consensus protocol, which can result in the appearance of invalid blocks, which will increase the delay of consensus and reduce the throughput of the consensus protocol. Figure 4a shows an illustration of a forking attack in the HotStuff protocol.…”
Section: Leader Selection Algorithm Based On Vague Sets and Multi-att...mentioning
confidence: 99%
“…e literature [23] proposed a most trusted chain confirmation mechanism to defend against fork attacks and thus enhance blockchain security. However, this mechanism does not sufficiently consider the network link situation.…”
Section: Related Workmentioning
confidence: 99%