Research on PoW Protocol Security under Optimized Long Delay Attack

نویسندگان

چکیده

In the blockchain network, communication delay between different nodes is a great threat to distributed ledger consistency of each miner. Blockchain core technology Bitcoin. At present, some research has proven security PoW protocol when number rounds small, but in complex asynchronous networks, insufficient on large. This paper improves proposed main chain record model under and then proposes TOD model, which makes more close actual situation reduces errors caused by establishment analysis process. By comparing differences original it verified that improved higher success rate attack probability mining delayable block increases. Then, long balance this paper, adversary control part computing power within certain limit.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack-preserving Security Protocol Transformations

The rigorous incremental development of security protocols has so far received much less attention than protocol verification techniques. In this work, we study security protocol transformations. These can serve both for simplifying protocols before verification and, in the other direction, for developing protocols by stepwise refinement of simple abstract protocols into complex concrete ones. ...

متن کامل

Security Evaluation of Pattern Classifiers under Attack

Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities,whose exploit...

متن کامل

OSRWQOS: Optimized Secure Routing Protocol with QoS against Byzantine Attack

Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and commercial applications. Secure ad hoc networks are expected to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. Routing Algorithm that integrates security and performance requirements ar...

متن کامل

Privacy-Enhancing Security Protocol in LTE Initial Attack

Long-Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile...

متن کامل

Research on Security Evaluation of XML Communication Protocol

According to the problem in communication protocol security assessments, a new protocol security comprehensive evaluation method based on the threedimensional sphere model is presented. In this method, a three-dimensional security evaluation index system was built through positions of index on the external of spherical shell. Evaluation index weights of the top two levels were obtained through ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2023

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography7020032