Abstract

Blockchain is a technology that ensures data security by verifying database of records established in a decentralized and distributed network. Blockchain-based approaches have been applied to secure data in the fields of the Internet of Things, software engineering, healthcare systems, financial services, and smart power grids. However, the security of the blockchain system is still a major concern. We took the initiative to present a systematic study which sheds light on what defensive strategies are used to secure the blockchain system effectively. Specifically, we focus on blockchain data security that aims to mitigate the two data consistency attacks: double-spend attack and selfish mining attack. We employed the systematic approach to analyze a total of 40 selected studies using the proposed taxonomy of defensive strategies: monitoring, alert forwarding, alert broadcasting, inform, detection, and conceptual research design. It presents a comparison framework for existing and future research on blockchain security. Finally, some recommendations are proposed for blockchain researchers and developers.

Highlights

  • Blockchain has emerged as an innovative technology to address the privacy risks and security vulnerabilities in a decentralized and distributed network, which have achieved huge success in various domains, such as Internet of Things (IoT), unmanned aerial vehicles (UAVs), healthcare, power systems, and financial services [1]–[9]

  • BACKGROUND we present the background information of blockchain, and security of blockchain with respect to two integrity attacks: double-spend attack and selfish mining attack

  • The results show that: 1) the highest height of fork under Bitcoin network without attack is equal to 1; 2) if the attacker’s hash power increases, the average height of the fork grows; 3) if the mean height of the fork is higher than 2, the blockchain system is under selfish mining attack

Read more

Summary

INTRODUCTION

The applications were classified into nine domains: IoT, public key infrastructure, data storage, virtual network management, malware, data privacy, web applications, networking, Wifi Both failed to analyze and discuss the security mitigation strategies with respect to the blockchain protocol itself. C. OVERVIEW Unlike the aforementioned reviews, this work presents the first in-depth evaluation of the blockchain’s security countermeasures in terms of two data consistency attacks of blockchain: double-spend attack and selfish mining attack. 2) Propose a taxonomy of defensive strategies for double-spend and selfish mining attacks based on design parameters and proposed security solutions. They are monitoring, alert forwarding, alert broadcasting, inform, detection, and conceptual research design.

BACKGROUND
SELFISH MINING ATTACK DEFENSIVE STRATEGIES
SUMMARIZATON OF CURRENT RESEARCH
Findings
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call