Research on PoW Protocol Security under Optimized Long Delay Attack
نویسندگان
چکیده
In the blockchain network, communication delay between different nodes is a great threat to distributed ledger consistency of each miner. Blockchain core technology Bitcoin. At present, some research has proven security PoW protocol when number rounds small, but in complex asynchronous networks, insufficient on large. This paper improves proposed main chain record model under and then proposes TOD model, which makes more close actual situation reduces errors caused by establishment analysis process. By comparing differences original it verified that improved higher success rate attack probability mining delayable block increases. Then, long balance this paper, adversary control part computing power within certain limit.
منابع مشابه
Attack-preserving Security Protocol Transformations
The rigorous incremental development of security protocols has so far received much less attention than protocol verification techniques. In this work, we study security protocol transformations. These can serve both for simplifying protocols before verification and, in the other direction, for developing protocols by stepwise refinement of simple abstract protocols into complex concrete ones. ...
متن کاملSecurity Evaluation of Pattern Classifiers under Attack
Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities,whose exploit...
متن کاملOSRWQOS: Optimized Secure Routing Protocol with QoS against Byzantine Attack
Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and commercial applications. Secure ad hoc networks are expected to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. Routing Algorithm that integrates security and performance requirements ar...
متن کاملPrivacy-Enhancing Security Protocol in LTE Initial Attack
Long-Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile...
متن کاملResearch on Security Evaluation of XML Communication Protocol
According to the problem in communication protocol security assessments, a new protocol security comprehensive evaluation method based on the threedimensional sphere model is presented. In this method, a three-dimensional security evaluation index system was built through positions of index on the external of spherical shell. Evaluation index weights of the top two levels were obtained through ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography
سال: 2023
ISSN: ['2410-387X']
DOI: https://doi.org/10.3390/cryptography7020032