2021
DOI: 10.1109/access.2021.3119291
|View full text |Cite
|
Sign up to set email alerts
|

The 51% Attack on Blockchains: A Mining Behavior Study

Abstract: The applications that use blockchain are cryptocurrencies, decentralized finance applications, video games and many others. Most of these applications trust that the blockchain will prevent issues like fraud, thanks to the built-in cryptographic mechanisms provided by the data structure and the consensus protocol. However, blockchains suffers from what is called a 51% attack or majority attack, which is considered a high risk for the integrity of these blockchains, where if a miner, or a group of them, has mor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 77 publications
(29 citation statements)
references
References 11 publications
0
29
0
Order By: Relevance
“…However, having a coordinator still presents a unique point of failure for this approach; Also, it solely relies on the proof of work (which may not have a solution) performed by a mining party at step 6. To reduce power concentration (hence, the 51% attack [5]) and increase the fairness of the mining process, a new version should complement the proof of work with other approaches, for example, access to random locations (similar to PoC) [17].…”
Section: Drawbacksmentioning
confidence: 99%
See 2 more Smart Citations
“…However, having a coordinator still presents a unique point of failure for this approach; Also, it solely relies on the proof of work (which may not have a solution) performed by a mining party at step 6. To reduce power concentration (hence, the 51% attack [5]) and increase the fairness of the mining process, a new version should complement the proof of work with other approaches, for example, access to random locations (similar to PoC) [17].…”
Section: Drawbacksmentioning
confidence: 99%
“…A blockchain network performs the secure administration of the shared ledger, where transactions are verified and stored in a network without a central authority [4]. Applications that use blockchain, such as cryptocurrencies, decentralized finance applications, video games, and many others, trust that blockchain will prevent problems such as fraud, thanks to the integrated cryptographic mechanisms provided by the data structure and the consensus protocol [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [53,52] the problem of centralization of PoW system is raised, where mining pools (groups of miners that combine their hashing power and split the reward proportionally) are in the possession of a large amount of hashing power in the network. E.g., in Bitcoin seven out of the ten biggest mining pools are based in China.…”
Section: % Attackmentioning
confidence: 99%
“…Furthermore, if the Ethereum public network was to be used instead, it should be taken into consideration that the deployed Smart Contract not only makes use of cryptographical libraries (as explained in the following point) but also would make use of a distributed system (the Ethereum network itself) that currently uses PoW as the consensus algorithm, which adds up to the proposed system characteristics. Indeed, performing a 51% attack [41] would demand that the attacker has more computational power than most of the validating nodes of the attacked blockchain. As it was explained before, this becomes quickly unfeasible if a certain number of users is reached.…”
Section: The Operations Performed By the Server Within Thementioning
confidence: 99%