2022
DOI: 10.3390/s22051835
|View full text |Cite
|
Sign up to set email alerts
|

Aurora-Trinity: A Super-Light Client for Distributed Ledger Networks Extending the Ethereum Trinity Client

Abstract: Light clients for distributed ledger networks can verify blockchain integrity by downloading and analyzing blockchain headers. They are designed to circumvent the high resource requirements, i.e., the large bandwidth and memory requirements that full nodes must meet, which are unsuitable for consumer-grade hardware and resource-constrained devices. Light clients rely on full nodes and trust them implicitly. This leaves them vulnerable to various types of attacks, ranging from accepting maliciously forged data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Since this scheme does not provide validation of transaction validity, the security is more dependent on the full node. Aurora‐Trinity [12] cooperation with Aurora algorithm [19], it is able to check whether the neighbors are malicious nodes and communicate with honest nodes. Eventually, the light nodes enter into a secure distributed network environment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since this scheme does not provide validation of transaction validity, the security is more dependent on the full node. Aurora‐Trinity [12] cooperation with Aurora algorithm [19], it is able to check whether the neighbors are malicious nodes and communicate with honest nodes. Eventually, the light nodes enter into a secure distributed network environment.…”
Section: Related Workmentioning
confidence: 99%
“…To enhance the security of light nodes and mitigate attacks, various approaches have been proposed, such as Fraud Proof [17,18], Super-light clients [11,12,13], block-specific secure light node schemes [9,10], and block compression schemes [14,15,16]. Among them, Fraud Proof plays a pivotal role in securing transactions.…”
Section: Introductionmentioning
confidence: 99%