2020 4th Conference on Cloud and Internet of Things (CIoT) 2020
DOI: 10.1109/ciot50422.2020.9244295
|View full text |Cite
|
Sign up to set email alerts
|

On the Security and Performance of Proof-based Consensus Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
2

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 26 publications
0
10
0
2
Order By: Relevance
“…Such attacks occur due to the confusion that some nodes may experience after a hard fork and often within insecure cryptocurrencybased protocols. Various blockchain platforms, such as the Exonum [199], Bitcoin [165], Ethereum [194], Elastico [121] and Parity [148] are vulnerable to security attacks that might fork the blockchain [158]. Currently, Monero does not provide any security mechanism against the replay attack [114].…”
Section: Identity-based Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Such attacks occur due to the confusion that some nodes may experience after a hard fork and often within insecure cryptocurrencybased protocols. Various blockchain platforms, such as the Exonum [199], Bitcoin [165], Ethereum [194], Elastico [121] and Parity [148] are vulnerable to security attacks that might fork the blockchain [158]. Currently, Monero does not provide any security mechanism against the replay attack [114].…”
Section: Identity-based Attacksmentioning
confidence: 99%
“…IOTA [89] is also prone to sybil attacks, since the malicious nodes can create random transactions to select a tip and thus, process invalid transactions. In Ripple, Stellar and Quorum the authorised participants must be authenticated to avoid a Sybil attack [158]. In blockchain platforms that implement a PoW-based consensus protocol, such as Litecoin [116], Monero and Ethereum [194] the malicious node, who wants to create a fake identity should divide its mining power to the corresponding number of sibyls and therefore, reduce its possibility to find the next block.…”
Section: Identity-based Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper is an extended version of a previous conference publication [75]. In this article, we present detailed information about each consensus protocol operation.…”
Section: Introductionmentioning
confidence: 99%
“…Os protocolos de consenso de correntes de blocos (blockchain) mais utilizados atualmente apresentam problemas significativos de latência e gasto de energia que impedem a adoção de criptomoedas na vida cotidiana[Rebello et al 2020. Publicar uma transação no Bitcoin leva aproximadamente uma hora, incorre em mais de 100 reais de taxas e gasta uma quantidade de energia suficiente para manter uma residência brasileira média por três meses[Blockchain.com 2021, MME 2017.…”
unclassified