Security Attacks on E-Voting System Using Blockchain

نویسندگان

چکیده

Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In paper, some attacks were made on a proposed electronic election model based blockchain technology, where impact each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, time which it achieved calculated. study, we investigate Blockchain technology’s surface, focusing general blockchains. The following factors show how these have an model: 1) cryptographic architecture Blockchain. 2) distributed systems using 3) application context. For factors, identify several attacks, including selfish attack, sybil eclipse denial-of-service (DDos) consensus delay (due to behavior or attacks), forks, orphan blocks, block swallowing, wallet theft, smart contract privacy attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An E-voting Protocol Based on Blockchain

Because of the properties such as transparency, decentralization, irreversibility, nonrepudiation, etc., blockchain is not only a fundamental technology of great interest in its own right, but also has large potential when integrated into many other areas. In this paper, based on the blockchain technology, we propose a decentralized e-voting protocol, without the existence of a trusted third pa...

متن کامل

Using blockchain for enabling internet voting

Voting is an inherent process in a democratic society. Other methods for expressing the society participants’ will for example caucuses in US party elections or Landsgemeine in Switzerland can be inconvenient for the citizens and logistically difficult to organize. Furthermore, beyond inconvenience, there may be legitimate reasons for not being able to take part in the voting process, e.g. bein...

متن کامل

Security Assets in E-Voting

As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The purpose of this paper is to give a systematically ordered overview of attacks against e-voting and to show one solution to the issues. The challenge is to provide identification and anonymity at the same time and to exclude the possibility of fraudulent manipulations by the server administration, the vote...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iraqi journal for computer science and mathematics

سال: 2023

ISSN: ['2788-7421']

DOI: https://doi.org/10.52866//ijcsm.2023.02.02.016