A Survey on Consensus Protocols and Attacks on Blockchain Technology

被引:38
作者
Guru, Abhishek [1 ]
Mohanta, Bhabendu Kumar [2 ]
Mohapatra, Hitesh [3 ]
Al-Turjman, Fadi [4 ,5 ]
Altrjman, Chadi [6 ]
Yadav, Arvind [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522302, Andhra Pradesh, India
[2] Gandhi Inst Technol & Management, Dept CSE, Visakhapatnam 530045, Andhra Pradesh, India
[3] KIIT Deemed be Univ, Sch Comp Engn, Bhubaneswar 751024, OD, India
[4] Near East Univ, AI & Robot Inst, Artificial Intelligence Engn Dept, TR-99138 Mersin, Turkiye
[5] Univ Kyrenia, Fac Engn, Res Ctr AI & IoT, TR-99320 Kyrenia, Turkiye
[6] Waterloo Univ, Dept Chem Engn, Waterloo, ON N2L 3G1, Canada
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 04期
关键词
consensus protocols; ARP spoofing attack; DDoS; sharding attack; ECDSA; SECURITY; FUTURE; CHALLENGES; HARDWARE; SYSTEMS;
D O I
10.3390/app13042604
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algorithms have recently been attacked by address resolution protocols (ARP), distributed denial of service attacks (DDoS), and sharding attacks in a permission-less blockchain. The existence of a byzantine adversary is perilous, and is involved in these ongoing attacks. Considering the above issues, we conducted an informative survey based on the consensus protocol attack on blockchain through the latest published article from IEEE, Springer, Elsevier, ACM, Willy, Hindawi, and other publishers. We incorporate various methods involved in blockchain. Our main intention is to gain clarity from earlier published articles to elaborate numerous key methods in terms of a survey article.
引用
收藏
页数:21
相关论文
共 109 条
[1]  
Abdelsalam AM, 2014, INT J ADV COMPUT SC, V5, P105
[2]  
Ajayi O., 2021, 2021 INT S NETWORKS, P1, DOI [10.1109/ISNCC52172.2021.9615799, DOI 10.1109/ISNCC52172.2021.9615799]
[3]  
Al Sukkar G., 2016, COMMUN NETW, V8, P118, DOI [10.4236/cn.2016.83012, DOI 10.4236/CN.2016.83012]
[4]  
Alizadeh M., 2020, J. Internet Serv. and Inf. Secur. (JISIS), V10, P47
[5]   A Survey of Consensus Algorithms for Blockchain Technology [J].
Alsunaidi, Shikah J. ;
Alhaidari, Fahd A. .
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, :384-389
[6]  
[Anonymous], Proof of Burn
[7]  
[Anonymous], CRYPT INT OF THINGS
[8]  
[Anonymous], 2018, HACKERNOON
[9]  
[Anonymous], 2017, IOTA DEV HUB
[10]   The 51% Attack on Blockchains: A Mining Behavior Study [J].
Aponte-Novoa, Fredy Andres ;
Orozco, Ana Lucila Sandoval ;
Villanueva-Polanco, Ricardo ;
Wightman, Pedro .
IEEE ACCESS, 2021, 9 :140549-140564