Secure Access Control for DAG-Based Distributed Ledgers
نویسندگان
چکیده
Access control is a fundamental component of the design distributed ledgers, influencing many aspects their functionality, such as fairness, efficiency, traditional notions network security, and adversarial attacks Denial-of-Service (DoS) attacks. 1 In this work, we consider security recently proposed access protocol for directed acyclic graph-based ledgers. We present number attack scenarios potential vulnerabilities introduce additional features which enhance its resilience. Specifically, blacklisting algorithm, based on reputation-weighted threshold, introduced to handle both spamming multirate malicious attackers. A solidification request also ensure fairness consistency in presence Finally, timestamp maintain Simulations illustrate efficacy robustness revised are presented.
منابع مشابه
Application of Public Ledgers to Revocation in Distributed Access Control
There has recently been a flood of interest in potential new applications of blockchains, as well as proposals for more generic designs called public ledgers. Most of the novel proposals have been in the financial sector. However, the public ledger is an abstraction that solves several of the fundamental problems in the design of secure distributed systems: global time in the form of a strict l...
متن کاملSecure hierarchy-based access control in distributed environments
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarc...
متن کاملSecure access control in distributed environment
This paper presents the designed concept to improve the public key infrastructure deployability in the mobile adhoc networks routed by B.A.T.M.A.N. Advanced. We have extended the B.A.T.M.A.N. Advanced routing protocol with authentication and authorization of routing updates based on X.509 certificates. Furthermore we have determined several levels of node’s trustworthiness and two levels of int...
متن کاملWho Am I? Secure Identity Registration on Distributed Ledgers
Bitcoin is a decentralized cryptocurrency that uses a ledger (or “blockchain”) to keep track of the transactions made between its users. Because it is a fully decentralized system and anyone can join, every transaction is by necessity public. Thus, to preserve some semblance of privacy, users in the system are represented not by their real-world identities but by pseudonyms. While pseudonyms ar...
متن کاملDistributed Hierarchical Access Control for Secure Group Communications
Hierarchical access control to ensure multiple levels of access privilege for group members is required in many environments, such as hierarchically managed organizations and multimedia applications. In this paper, to efficiently and effectively achieve this goal, we propose a distributed key management scheme whereby each SG (Service Group) maintains an SG server. This server is utilized to ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2021.3128025