2020
DOI: 10.1007/978-3-030-55789-8_36
|View full text |Cite
|
Sign up to set email alerts
|

Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…These attackers manipulate their fake identities to make a mutual perception based on network system effectiveness. The distributed network system [72] produces undesirable reports as spam for users. Thus, system users can lose their data privacy and data security.…”
Section: Network Intrusion Attackmentioning
confidence: 99%
“…These attackers manipulate their fake identities to make a mutual perception based on network system effectiveness. The distributed network system [72] produces undesirable reports as spam for users. Thus, system users can lose their data privacy and data security.…”
Section: Network Intrusion Attackmentioning
confidence: 99%
“…Sybil attack: The Sybil attack [33,50,52,58,59,67,68,76,97] refers to a malicious node with several valid IDs, which are used to block users' transactions and disconnect network connections. Iqbal and Matulevicius [68] describe the variations of breaking the consensus protocol attack, generating fake transactions attack, tampering nodes reputation, nodes isolation (partition) attack, routing table insertion attack, Sybil-based linking (deanonymization) attack, and Sybil-based DoS/DDoS attack.…”
Section: Network Issuesmentioning
confidence: 99%
“…BaaS incorporates delivering physical resources, blockchain implementation, and set-up templates, allowing individuals and enterprises to adopt blockchain technology fast by reducing the overall process complexity. It is also important as blockchain technology is issued with many security concerns [23,37,22]. The main goal is to make application deployment easier by delegating a set of responsibilities and necessary technical knowledge connected to blockchain and cloud infrastructure to the third-party provider.…”
Section: Introductionmentioning
confidence: 99%