A survey on blockchain architecture and consensus mechanism: design vulnerability and security analysis

被引:0
作者
Sharma, Shashikant [1 ]
Kushwaha, Dharmender Singh [1 ]
机构
[1] Department of Computer Science and Engineering, Motilal Nehru National Institute of Technology, Prayagraj, Allahabad
关键词
blockchain; byzantine fault-tolerance; consensus mechanism; decentralisation; distributed ledger technology; security;
D O I
10.1504/IJCC.2024.142206
中图分类号
学科分类号
摘要
Today for an organisation, data security is the most crucial topic. An organisation needs to protect its information against cyberattacks. Cryptography, DLT, and blockchain technology provide higher security for data storage and prevent any cyberattack. The most prominent reasons for using this technology are its specific properties, such as decentralisation, transparency, autonomy (without human interaction), and robustness. This paper discusses the performance and limitations of the existing blockchain architecture, consensus mechanism, and the security aspect of the consensus mechanism in an organised way. This survey presents systematic reviews of blockchain architectures, consensus mechanisms, the performance analysis of the current blockchain consensus mechanisms, and the vulnerabilities and types of attacks. The aim is to provide a comprehensive state-of-the-art platform where a beginner can swiftly move on to research aspects. Copyright © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:485 / 547
页数:62
相关论文
共 190 条
[1]  
Abadi M., Burrows M., Manasse M., Wobber T., Moderately hard, memory-bound functions, ACM Transactions on Internet Technology (TOIT), 5, 2, pp. 299-327, (2005)
[2]  
Abliz M., Znati T., A guided tour puzzle for denial of service prevention, 2009 Annual Computer Security Applications Conference, pp. 279-288, (2009)
[3]  
Akcora C.G., Gel Y.R., Kantarcioglu M., Blockchain networks: data structures of bitcoin, monero, zcash, ethereum, ripple, and iota, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 12, 1, (2022)
[4]  
Al-Bassam M., SCPKI: A smart contract-based PKI and identity system, Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 35-40, (2017)
[5]  
Altarawneh A., Herschberg T., Medury S., Kandah F., Skjellum A., Buterin’s scalability trilemma viewed through a state-change-based classification for common consensus algorithms, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0727-0736, (2020)
[6]  
Alturki M.A., Chen J., Luchangco V., Moore B., Palmskog K., Pena L., Rosu G., Towards a verified model of the Algorand consensus protocol in Coq, Formal Methods. FM 2019 International Workshops, pp. 362-367, (2019)
[7]  
Androulaki E., Barger A., Bortnikov V., Cachin C., Christidis K., De Caro A., Enyeart D., Et al., Hyperledger fabric: a distributed operating system for permissioned blockchains, Proceedings of the Thirteenth EuroSys conference, pp. 1-15, (2018)
[8]  
Arroyo-Figueroa J.A., MiftyCoin (MFT): a cryptocurrency mined with proof of human work, (2022)
[9]  
Azaria A., Ekblaw A., Vieira T., Lippman A., Medrec: using blockchain for medical data access and permission management, 2016 2nd International Conference on Open and Big Data (OBD), pp. 25-30, (2016)
[10]  
Azouvi S., Danezis G., Nikolaenko V., Winkle: foiling long-range attacks in proof-of-stake systems, Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, pp. 189-201, (2020)