“…The main difference between the simulators is the level of detail (and the corresponding simulation methodology) that has been chosen for modelling the system to be represented. For example, in [27], some of the authors of this paper have proposed an agent-based simulation to investigate some well-known network attacks on blockchains and distributed ledgers. In [1], the authors present Block-Sim which is a discrete-event simulator of blockchain systems (implemented in Python) that specifically considers the modeling and simulation of block creation through the proof-of-work consensus algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…While state-of-the art works regarding the simulation of Distributed Ledger Technology (DLT) focus on Bitcoin-like protocols, with only one blockchain collecting the incoming data [27], we are interested in modeling a DLT where multiple partial blockchains (i.e. subnets) work asynchronously in parallel, exchanging information when necessary.…”
Section: Modelling and Simulation Of The Icp Architecturementioning
The Internet Computer Protocol is described as a thirdgeneration blockchain system that aims to provide secure and scalable distributed systems through blockchains and smart contracts. In this position paper, this innovative architecture is introduced and then discussed in view of its modeling and simulation aspects. In fact, a properly defined digital twin of the Internet Computer Protocol could help its design, development, and evaluation in terms of performance and resilience to specific security attacks. To this extent, we propose a multi-level simulation model that follows an agent-based paradigm. The main issues of the modeling and simulation, and the main expected outcomes, are described and discussed.
“…The main difference between the simulators is the level of detail (and the corresponding simulation methodology) that has been chosen for modelling the system to be represented. For example, in [27], some of the authors of this paper have proposed an agent-based simulation to investigate some well-known network attacks on blockchains and distributed ledgers. In [1], the authors present Block-Sim which is a discrete-event simulator of blockchain systems (implemented in Python) that specifically considers the modeling and simulation of block creation through the proof-of-work consensus algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…While state-of-the art works regarding the simulation of Distributed Ledger Technology (DLT) focus on Bitcoin-like protocols, with only one blockchain collecting the incoming data [27], we are interested in modeling a DLT where multiple partial blockchains (i.e. subnets) work asynchronously in parallel, exchanging information when necessary.…”
Section: Modelling and Simulation Of The Icp Architecturementioning
The Internet Computer Protocol is described as a thirdgeneration blockchain system that aims to provide secure and scalable distributed systems through blockchains and smart contracts. In this position paper, this innovative architecture is introduced and then discussed in view of its modeling and simulation aspects. In fact, a properly defined digital twin of the Internet Computer Protocol could help its design, development, and evaluation in terms of performance and resilience to specific security attacks. To this extent, we propose a multi-level simulation model that follows an agent-based paradigm. The main issues of the modeling and simulation, and the main expected outcomes, are described and discussed.
“…2) Distributed ledgers have become increasingly popular over these years due to their suitability to be used in many distributed application scenarios [24]. The convergence of security in a DLT still presents many challenges that need to be addressed to take full advantage of the benefits offered by DLTs [25].…”
Section: Research Approach a Research Objectivementioning
Distributed ledger technologies have gained significant attention and adoption in recent years. Despite various security features distributed ledger technology provides, they are vulnerable to different and new malicious attacks, such as selfish mining and Sybil attacks. While such vulnerabilities have been investigated, detecting and discovering appropriate countermeasures still need to be reported. Cybersecurity knowledge is limited and fragmented in this domain, while distributed ledger technology usage grows daily. Thus, research focusing on overcoming potential attacks on distributed ledgers is required. This study aims to raise awareness of the cybersecurity of distributed ledger technology by designing a security risk assessment method for distributed ledger technology applications. We have developed a database with possible security threats and known attacks on distributed ledger technologies to accompany the method, including sets of countermeasures. We employed a semisystematic literature review combined with method engineering to develop a method that organizations can use to assess their cybersecurity risk for distributed ledger applications. The method has subsequently been evaluated in three case studies, which show that the method helps to effectively conduct security risk assessments for distributed ledger applications in these organizations.
“…For example, agent-based simulation is used in [7]. In this paper, some of the authors of this paper have modeled a generic blockchain (loosely based on the main Bitcoin characteristics) to study the likelihood and the effects of some typical network attacks to blockchains.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.