2020
DOI: 10.1109/access.2020.3006113
|View full text |Cite
|
Sign up to set email alerts
|

Security Properties of Light Clients on the Ethereum Blockchain

Abstract: Ethereum is a decentralized blockchain, known as being the second most popular public blockchain after Bitcoin. Since Ethereum is decentralised the canonical state is determined by the Ethereum network participants via a consensus mechanism without a centralized coordinator. The network participants are required to evaluate every transaction starting from the genesis block, which requires a large amount of network, computing, and storage resources. This is impractical for many devices with either limited compu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 27 publications
0
14
0
Order By: Relevance
“…The method offers a secure and well-organized way to maintain vaccination records. The solution is based on Ethereum and relies on the idea of smart contracts in blockchain [230].…”
Section: Sharing Patient Datamentioning
confidence: 99%
“…The method offers a secure and well-organized way to maintain vaccination records. The solution is based on Ethereum and relies on the idea of smart contracts in blockchain [230].…”
Section: Sharing Patient Datamentioning
confidence: 99%
“…This approach ensured better data security and reliability. However, the GSM connection does not provide enough bandwidth to sustain this approach, so the architecture has been changed to switch to a light node approach when working with a GSM connection [31]. The light nodes do not have the total blockchain saved on their memory, so it was impossible to validate the state of the network in total security.…”
Section: On-site Installationmentioning
confidence: 99%
“…The light nodes do not have the total blockchain saved on their memory, so it was impossible to validate the state of the network in total security. In addition, the light nodes exchange only the proofs of the transactions in the Merkle tree form [31], which is, at least in principle, less secure. On the other hand, the exchange of the Merkle tree data requires far less bandwidth and local memory.…”
Section: On-site Installationmentioning
confidence: 99%
“…FIGURE 6. max and max vs. the proportion of addresses whose fall at or below, broken for each ∈ (3,6,9,12) separately. Please note that the vertical axis starts at one as, by definition, all modifications of an Ethereum account require access to at least that account's previous state, and at least one transaction to initiate that change.…”
Section: E Server Resourcesmentioning
confidence: 99%
“…To circumvent these resource requirements, many blockchains include so-called light protocols to provide sufficient security to constrained devices without directly utilizing trusted intermediaries. However, constrained devices operating a light protocol have been identified previously as vulnerable to state injection attacks [6].…”
Section: Introductionmentioning
confidence: 99%