Security Attacks on E-Voting System Using Blockchain
نویسندگان
چکیده
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In paper, some attacks were made on a proposed electronic election model based blockchain technology, where impact each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, time which it achieved calculated. study, we investigate Blockchain technology’s surface, focusing general blockchains. The following factors show how these have an model: 1) cryptographic architecture Blockchain. 2) distributed systems using 3) application context. For factors, identify several attacks, including selfish attack, sybil eclipse denial-of-service (DDos) consensus delay (due to behavior or attacks), forks, orphan blocks, block swallowing, wallet theft, smart contract privacy attacks.
منابع مشابه
An E-voting Protocol Based on Blockchain
Because of the properties such as transparency, decentralization, irreversibility, nonrepudiation, etc., blockchain is not only a fundamental technology of great interest in its own right, but also has large potential when integrated into many other areas. In this paper, based on the blockchain technology, we propose a decentralized e-voting protocol, without the existence of a trusted third pa...
متن کاملUsing blockchain for enabling internet voting
Voting is an inherent process in a democratic society. Other methods for expressing the society participants’ will for example caucuses in US party elections or Landsgemeine in Switzerland can be inconvenient for the citizens and logistically difficult to organize. Furthermore, beyond inconvenience, there may be legitimate reasons for not being able to take part in the voting process, e.g. bein...
متن کاملSecurity Assets in E-Voting
As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The purpose of this paper is to give a systematically ordered overview of attacks against e-voting and to show one solution to the issues. The challenge is to provide identification and anonymity at the same time and to exclude the possibility of fraudulent manipulations by the server administration, the vote...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iraqi journal for computer science and mathematics
سال: 2023
ISSN: ['2788-7421']
DOI: https://doi.org/10.52866//ijcsm.2023.02.02.016