Secure Access Control for DAG-Based Distributed Ledgers

نویسندگان

چکیده

Access control is a fundamental component of the design distributed ledgers, influencing many aspects their functionality, such as fairness, efficiency, traditional notions network security, and adversarial attacks Denial-of-Service (DoS) attacks. 1 In this work, we consider security recently proposed access protocol for directed acyclic graph-based ledgers. We present number attack scenarios potential vulnerabilities introduce additional features which enhance its resilience. Specifically, blacklisting algorithm, based on reputation-weighted threshold, introduced to handle both spamming multirate malicious attackers. A solidification request also ensure fairness consistency in presence Finally, timestamp maintain Simulations illustrate efficacy robustness revised are presented.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Public Ledgers to Revocation in Distributed Access Control

There has recently been a flood of interest in potential new applications of blockchains, as well as proposals for more generic designs called public ledgers. Most of the novel proposals have been in the financial sector. However, the public ledger is an abstraction that solves several of the fundamental problems in the design of secure distributed systems: global time in the form of a strict l...

متن کامل

Secure hierarchy-based access control in distributed environments

Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarc...

متن کامل

Secure access control in distributed environment

This paper presents the designed concept to improve the public key infrastructure deployability in the mobile adhoc networks routed by B.A.T.M.A.N. Advanced. We have extended the B.A.T.M.A.N. Advanced routing protocol with authentication and authorization of routing updates based on X.509 certificates. Furthermore we have determined several levels of node’s trustworthiness and two levels of int...

متن کامل

Who Am I? Secure Identity Registration on Distributed Ledgers

Bitcoin is a decentralized cryptocurrency that uses a ledger (or “blockchain”) to keep track of the transactions made between its users. Because it is a fully decentralized system and anyone can join, every transaction is by necessity public. Thus, to preserve some semblance of privacy, users in the system are represented not by their real-world identities but by pseudonyms. While pseudonyms ar...

متن کامل

Distributed Hierarchical Access Control for Secure Group Communications

Hierarchical access control to ensure multiple levels of access privilege for group members is required in many environments, such as hierarchically managed organizations and multimedia applications. In this paper, to efficiently and effectively achieve this goal, we propose a distributed key management scheme whereby each SG (Service Group) maintains an SG server. This server is utilized to ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2022

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2021.3128025