186 Hits in 4.5 sec

Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks

Sushil Kumar Singh, Mikail Mohammed Salim, Minjeong Cho, Jeonghun Cha, Yi Pan, Jong Hyuk Park
2019 Symmetry  
To prevent pool hopping attacks, a smart contract-based pool hopping attack prevention model is proposed.  ...  Pool hopping attack is the result of miners leaving the pool when it offers fewer financial rewards and joining back when the rewards of mining yield higher rewards in blockchain networks.  ...  In Section 3, the proposed framework and methodology for smart contract-based pool hopping attack prevention is introduced for blockchain networks.  ... 
doi:10.3390/sym11070941 fatcat:2fvimsnbfvgrbaigvg4722zrvm

A Survey of Secure Internet of Things in Relation to Blockchain

Morteza Alizadeh, Karl Andersson, Olov Schelén
2020 Journal of Internet Services and Information Security  
The Internet of Things (IoT) is one of the application domains in which security based on blockchain is discussed.  ...  We, therefore, survey the most common attacks to blockchain systems and the solutions to mitigate them, with the objective of assessing how malicious these attacks are in the IoT context.  ...  The probability of the pool-hopping attack is high. A smart contract-based pool-hopping attack prevention model is one solution to prevent pool-hopping attacks.  ... 
doi:10.22667/jisis.2020.08.31.047 dblp:journals/jisis/AlizadehAS20 fatcat:vb67qvzjgrgytcdbduyadzs2o4

Blockchain-enabled wireless communications: a new paradigm towards 6G

Jiaheng Wang, Xintong Ling, Yuwei Le, Yongming Huang, Xiaohu You
2021 National Science Review  
The critical elements of B-RAN, such as consensus mechanisms, smart contract, trustworthy access, mathematical modeling, cross-network sharing, data tracking and auditing and intelligent networking, are  ...  Importantly, we further propose a unified framework of the blockchain radio access network (B-RAN) as a trustworthy and secure paradigm for 6G networking by utilizing blockchain technologies with enhanced  ...  Smart contract The digital actions in blockchain are taken by smart contracts, the scripts in blockchain allowing for the automation of multistep processes.  ... 
doi:10.1093/nsr/nwab069 pmid:34691739 pmcid:PMC8433085 fatcat:pz44xzyetnee7beegpy3vkkcua

Blockchain-Empowered Mobile Edge Intelligence, Machine Learning and Secure Data Sharing [chapter]

Yao Du, Shuxiao Miao, Zitian Tong, Victoria Lemieux, Zehua Wang
2021 Blockchain Potential in AI [Working Title]  
To handle these problems, blockchain has been considered as a promising solution. As a distributed smart ledger, blockchain is renowned for high scalability, privacy-preserving, and decentralization.  ...  In this chapter, we provide an overview of the current state-of-the-art in these cutting-edge technologies by summarizing the available literature in the research field of blockchain-based MEC, machine  ...  Blockchains and smart contracts have shown great potential to solve those challenges. Blockchain for data security Blockchain is known for keeping data secure and safe.  ... 
doi:10.5772/intechopen.96618 fatcat:tjon4elghrcq5e5lfsfmyx2srm

Blockchain: properties and misconceptions

Daniel Conte de Leon, Antonius Q. Stalick, Ananth A. Jillepalli, Michael A. Haney, Frederick T. Sheldon
2017 Asia Pacific Journal of Innovation and Entrepreneurship  
Purpose -The purpose of this article is to clarify current and widespread misconceptions about the properties of blockchain technologies and to describe challenges and avenues for correct and trustworthy  ...  Further research and development for trustworthy DLS design and implementation is needed, both practical and theoretical.  ...  blockchain and smart contracts.  ... 
doi:10.1108/apjie-12-2017-034 fatcat:dhyylomp65dnlipeekli3witxq

On Blockchain-Enhanced Secure Data Storage and Sharing in Vehicular Edge Computing Networks

Muhammad Firdaus, Kyung-Hyune Rhee
2021 Applied Sciences  
We propose consortium blockchain and smart contracts to ensure a trustworthy environment for secure data storage and sharing in the system to address these challenges.  ...  Practical byzantine fault tolerance (PBFT) is utilized because it is suitable for consortium blockchain to audit publicly, store data sharing, and records the whole consensus process.  ...  For this reason, we propose the decentralized incentive mechanism based on blockchain and smart contracts to achieve trustworthy environments.  ... 
doi:10.3390/app11010414 fatcat:3cljx3btjze2rio22if6bwarte

Enhancing Border Gateway Protocol Security Using Public Blockchain

Lukas Mastilak, Marek Galinski, Pavol Helebrandt, Ivan Kotuliak, Michal Ries
2020 Sensors  
In this paper, we improve on these by modifying an existing architecture for the management of network devices. The original architecture adopted a private blockchain implementation of HyperLedger.  ...  All of the techniques based on blockchain concentrate on inspecting incoming BGP updates only.  ...  Towards blockchain-based security in BGP Xing et al. [9] proposed BGPcoin, a BGP framework that is created by a set of smart contracts in the network Ethereum.  ... 
doi:10.3390/s20164482 pmid:32796562 fatcat:z5nwpyqkljhexd45zzyngcnjlq

An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation

Jasvant Mandloi, Pratosh Bansal
2020 International Journal of Computer Networks And Applications  
In this paper, a detailed review is done on more than 100 latest published documents based on the Blockchain Smart contract and applications.  ...  REVIEW ARTICLE contract before deploying. Also, for identifying bugs in the programming language used to develop smart contracts is available for very few platforms and programming languages.  ...  Attacks on the Blockchain Smart contracts are also possible through the network level. [49] .  ... 
doi:10.22247/ijcna/2020/195718 fatcat:uzerxbq5lzgalgo6oihvo3sygi

Ethereum: State of Knowledge and Research Perspectives [chapter]

Sergei Tikhomirov
2018 Lecture Notes in Computer Science  
Ethereum is a major blockchain-based platform for smart contracts -Turing complete programs that are executed in a decentralized network and usually manipulate digital units of value.  ...  We also mention alternative smart contract blockchains. Ethereum is not the only smart contract blockchain system [BP17].  ...  The trustless nature of smart contracts might be used for benign (managing mining pools [LVTS17] ) as well as for malicious (providing automatic rewards for attacking mining pools [VTL17] ) purposes.  ... 
doi:10.1007/978-3-319-75650-9_14 fatcat:hypwhlvpzndmbllfqxytk4bj4y

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
If the HIDS detects a malicious activity from an individual host or VM, the source IP is defined as access to the whole network to prevent user-to-root attacks from VM hopping and gaining access to another  ...  Collaborative NIDSs for cloud-based blockchain applications are also explained to demonstrate how blockchain can address challenges related to data privacy and trust management.  ...  It includes, security threats and their attack vectors on blockchain-based networks, transaction verification mechanisms (TVM), user wallet, mining pools and smart contract-based systems.  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  We propose the security reference architecture (SRA) for blockchains, which adopts a stacked model (similar to the ISO/OSI) describing the nature and hierarchy of various security and privacy aspects.  ...  For a detailed analysis of rewarding schemes in pools, we refer the reader to [91] . In the following, we describe several types of pool-specific attacks. a) Pool Hopping.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

A Novel Location Privacy-Preserving Approach Based on Blockchain

Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
2020 Sensors  
Finally, we implement our approach in the Remix blockchain to show the efficiency, which further indicates the potential application prospect for the distributed network environment.  ...  blockchain.  ...  In a blockchain network, the smart contract will automatically pay the user in encrypted currency through the user's public key.  ... 
doi:10.3390/s20123519 pmid:32575917 fatcat:mkltxsjcnnb2lbwi7hot5zciwq

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
2020 IEEE Communications Surveys and Tutorials  
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  the security reference architecture (SRA) for blockchains, which adopts a stacked model (similar to the ISO/OSI) describing the nature and hierarchy of various security and privacy aspects.  ...  ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback.  ... 
doi:10.1109/comst.2020.3033665 fatcat:hcrsvvkb2ffmbdlspshy66wg2y

Blockchain-Based Application Security Risks: A Systematic Literature Review [chapter]

Mubashar Iqbal, Raimundas Matulevičius
2019 Lecture Notes in Business Information Processing  
In this paper, we present a literature review on the security risks that can be mitigated by introducing the blockchain technology, and on the security risks that are identified in the blockchain-based  ...  The results of this study could be seen as a preliminary checklist of security risks when implementing blockchain-based applications.  ...  Other se-curity risks which are appeared once or twice in the studies are: Eclipse attack, BWH attack, 25% attack, Stake grinding attack, Block Discarding attack, Difficulty Raising attack, Pool-hopping  ... 
doi:10.1007/978-3-030-20948-3_16 fatcat:5xrorc7vmjg2raw36jbvhz4fam

Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey

Ramasamy Lakshmana Kumar, Firoz Khan, Agbotiname Lucky Imoize, Joshua O. Ogbebor, Seifedine Kadry, SeungMin Rho
2021 IEEE Access  
The edge cloud resource pool is associated with each IoT device account and resource usage, and smart contracts are employed to organize resource access based on priority and past behaviour of the nodes  ...  The authors offer a comprehensive policy for blockchain contribution to preventing the Sybil attack [132] . Al Breiki et al.  ... 
doi:10.1109/access.2021.3111923 fatcat:4whrxb53cfe6lk7wbykmno2moa
« Previous Showing results 1 — 15 out of 186 results