Abstract
Blockchain is a technology that is decentralized. It has the ability to tackle a wide range of industrial issues. A blockchain transaction’s records are secured by cryptography, and each transaction is linked to previous transactions or records. Algorithms on the nodes validate blockchain transactions. As a final point, blockchains enable transparency, allowing each participant to keep track of transactions at any point in time. Smart contracts provide for safe transactions, reducing the risk of third-party interference. Readers will have a better understanding of how blockchain technology helps protect and manage today’s users. There is a thorough report on diverse blockchain studies and security proposed by the research community, and their distinct implications on blockchain, in the review. This article concludes with a detailed description of the blockchain security followed by a discussion of the many varieties of security enhancements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson JR Security engineering: a guide to building dependable distributed sys
Singh S, Singh N (2016) Blockchain: future of financial and cyber security, in tems, 2nd ed. Indianapolis, IN, USA; Wiley, 2008. In: 2016 2nd international conference on contemporary computing and informatics IC3I, pp 463–467. https://doi.org/10.1109/IC3I.2016.7918009
Stephen R, Alex A (2018) In: IOP conference series: materials science and engineering 396: 012030
https://www.business2community.com/tech-gadgets/issues-blockchain-security-02003488
Bartoletti M, Pompianu L (2017) An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Financial cryptography and data security: Springer, Cham
Abeyratne SA, Monfared RP (2016) Blockchain ready manufacturing supply chain using distributed ledger. Int J Res Eng Technol 5(9):1–10
Salman T, Zolanvari M, Erbad A, Jain R, Samaka M (2019) Security services using blockchains: a state of the art survey. IEEE Commun Surveys Tuts 21(1):858–880, 1st Quart
Sayeed S, Marco-Gisbert H (2019) Assessing blockchain consensus and security mechanisms against the 51% attack. Appl Sci 9(9):1788
Odera L (2020). Ethereum Classic and IOHK team up to find solutions to prevent 51% attacks on the blockchain. Accessed on 20 Dec 2020. [Online]. Available: https://bitcoinexchangeguide.com/ethereumclassic-iohk-team-up-to-find-solutions-to-prevent-51-attacks-on-the-blockchain/
Begum A, Tareq AH, Sultana M, Sohel MK, Rahman T, Sarwar AH (2020) Blockchain attacks, analysis and a model to solve double spending attack. Int J Mach Learn Comput 10(2):1–6
Apostolaki M, Zohar A, Vanbever L (2017) Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE symposium on security and privacy, pp 375–392
Xing Q, Wang B, Wang X (2017) POSTER: BGPCoin: a trustworthy blockchain-based resource management solution for BGP security. In: 2017 proceedings ACM SIGSAC conference on computer and communications security, pp 2591–2593
Ghaleb B, Al-Dubai A, Ekonomou E, Qasem M, Romdhani I, Mackenzie L (2019) Addressing the DAO insider attack in RPL’s Internet of Things networks. IEEE Commun Lett 23(1):68–71
Kiayias A, Panagiotakos G (2016) On trees, chains and fast transactions in the blockchain. URL https://eprint.iacr.org/2016/545.pdf
Chenxin L, Peilun L, Dong Z, Zhe Y, Ming W, Guang Y, Wei X, Fan L, Andrew CY (2020) A decentralized blockchain with high throughput and fast confirmation. In: Proceedings USENIX annual technical conference (USENIX ATC), pp 515–528
Swathi P, Modi C, Patel D (2019) Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: Proceedings 10th international conference on computing, communication and networking technologies (ICCCNT), pp 1–6
Meiklejohn M et al (2016) A fistful of bitcoins: characterizing payments among men with no names. Commun ACM 59(4):86–93. https://doi.org/10.1145/2896384
Heilman E, Alshenibr L, Baldimtsi F, Scafuro A, Goldberg S (2017) TumbleBit: an untrusted bitcoincompatible anonymous payment hub. In: Proceedings of NDSS https://doi.org/10.14722/ndss .2017.23086
Ruffing T, Moreno-Sanchez P, Kate A (2017) P2P mixing and unlinkable bitcoin transactions. In: Proceedings of NDSS. https://doi.org/10.14722/ndss .2017.23415
Chaum D, Heyst EV (1991) In: Proceedings of advances in cryptology—EUROCRYPT ’91. Group Signatures (Springer, Berlin, Heidelberg, 1991), pp 257–265
Dan B, Gentry C, Lynn B, Shacham H (2003) In: Proceedings of international conference on the theory and applications of cryptographic techniques. Aggregate and verifiably encrypted signatures from bilinear maps (Springer, Berlin, Heidelberg, 2003), pp 416–432
Chaum D (1984) Blind signature system. In: Proceedings of advances in cryptology—CRYPTO ‘83, Santa Barbara, California, USA, August 21–24, pp 153
Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM conference on computer and communications security. New Delhi, India, March 14–16, pp 48–57
Er-Rajy L, El Kiram My A, El Ghazouani M, Achbarou O (2017) Blockchain: bitcoin wallet cryptography security, challenges and countermeasures. J Internet Banking Commerce 22(3):1–29
Karame G, Androulaki E (2016) Bitcoin and blockchain security. Norwood, MA, USA: Artech House
Idelberger F, Governatori G, Riveret R, Sartor G, Evaluation of logic-based smart contracts for blockchain systems. In: Proceedings international symposium on rules and rule markup languages for the semantic web, Cham, Switzerland: Springer, pp 167–183
Aitzhan NZ, Svetinovic D (2018) Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans Depend Sec Comput 15(5):840–852
Zaghloul E, Li T, Mutka MW, Ren J (2020) Bitcoin and blockchain: security and privacy. IEEE Internet Things J 7(10):10288–10313. https://doi.org/10.1109/JIOT.2020.3004273
Kiayias A, Panagiotakos G (2015) Speed-security tradeoffs in blockchain protocols. IACR Cryptol ePrint Arch 2015:1–27
Cachin C (2017) Blockchains and consensus protocols: snake oil warning. In: Proceedings 13th European dependable computing conference (EDCC), pp 1–2
Natoli C, Gramoli V (2016) The balance attack against proof-of-work blockchains: the r3 testbed as an example. ArXiv preprint: arXiv:org/1612.09426
Rivest RL, Shamir A, Tauman Y [n. d.] How to leak a secret, pp 552–565
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shah, P., Chopade, M. (2022). Blockchain Security: A Systematic Review. In: Singh, P.K., Wierzchoń, S.T., Chhabra, J.K., Tanwar, S. (eds) Futuristic Trends in Networks and Computing Technologies . Lecture Notes in Electrical Engineering, vol 936. Springer, Singapore. https://doi.org/10.1007/978-981-19-5037-7_69
Download citation
DOI: https://doi.org/10.1007/978-981-19-5037-7_69
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5036-0
Online ISBN: 978-981-19-5037-7
eBook Packages: Computer ScienceComputer Science (R0)