Full text

Turn on search term navigation

© 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Since the blockchain policy complies with the longest chain rule [11], if attackers are able to get 51% of the hashing power or more, they will be in a position to drive the longest chain by persuading the network nodes to follow their chain. The Ethereum protocol and private blockchains are vulnerable to the balance attack [22,30]. [...]the DDoS attack and BGP hijacking can also be used to interrupt the regular stream of this consensus mechanism [23]. According to Rosenfeld, in any occasion, when an adversary owns 51% of the network hash, they will always succeed regardless of the enforced delay [12]. [...]the possibility to perform the 51% attack when this security mechanism is in place is very big, especially when targeting coins that have very low network hashing power. Another drawback is that if two low hashing crypto-coins are merged, then they can still be exploited as long as the attacker achieves the required hashing power. [...]merged mining is just a process to increase the attacking cost by merging hashing power, and it does not provide an effective solution.

Details

Title
Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack
Author
Sarwar Sayeed; Marco-Gisbert, Hector
Publication year
2019
Publication date
Jan 2019
Publisher
MDPI AG
e-ISSN
20763417
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2321882164
Copyright
© 2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.