Analysis of security in blockchain: Case study in 51%-attack detecting

Congcong Ye, Guoqiang Li, Hongming Cai, Yonggen Gu, Akira Fukuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.

Original languageEnglish
Title of host publicationProceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages15-24
Number of pages10
ISBN (Electronic)9781538692660
DOIs
Publication statusPublished - Dec 5 2018
Event5th International Conference on Dependable Systems and Their Applications, DSA 2018 - Dalian, China
Duration: Sep 22 2018Sep 23 2018

Publication series

NameProceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

Other

Other5th International Conference on Dependable Systems and Their Applications, DSA 2018
CountryChina
CityDalian
Period9/22/189/23/18

Fingerprint

Middleware
Viruses
attack
viruses
derivation
adjusting
computer programs

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Safety, Risk, Reliability and Quality
  • Instrumentation

Cite this

Ye, C., Li, G., Cai, H., Gu, Y., & Fukuda, A. (2018). Analysis of security in blockchain: Case study in 51%-attack detecting. In Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018 (pp. 15-24). [8563187] (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/DSA.2018.00015

Analysis of security in blockchain : Case study in 51%-attack detecting. / Ye, Congcong; Li, Guoqiang; Cai, Hongming; Gu, Yonggen; Fukuda, Akira.

Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018. Institute of Electrical and Electronics Engineers Inc., 2018. p. 15-24 8563187 (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ye, C, Li, G, Cai, H, Gu, Y & Fukuda, A 2018, Analysis of security in blockchain: Case study in 51%-attack detecting. in Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018., 8563187, Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018, Institute of Electrical and Electronics Engineers Inc., pp. 15-24, 5th International Conference on Dependable Systems and Their Applications, DSA 2018, Dalian, China, 9/22/18. https://doi.org/10.1109/DSA.2018.00015
Ye C, Li G, Cai H, Gu Y, Fukuda A. Analysis of security in blockchain: Case study in 51%-attack detecting. In Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018. Institute of Electrical and Electronics Engineers Inc. 2018. p. 15-24. 8563187. (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018). https://doi.org/10.1109/DSA.2018.00015
Ye, Congcong ; Li, Guoqiang ; Cai, Hongming ; Gu, Yonggen ; Fukuda, Akira. / Analysis of security in blockchain : Case study in 51%-attack detecting. Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 15-24 (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018).
@inproceedings{543e9f81d92b4e34baec40273c37d33b,
title = "Analysis of security in blockchain: Case study in 51{\%}-attack detecting",
abstract = "Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51{\%}-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51{\%}-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.",
author = "Congcong Ye and Guoqiang Li and Hongming Cai and Yonggen Gu and Akira Fukuda",
year = "2018",
month = "12",
day = "5",
doi = "10.1109/DSA.2018.00015",
language = "English",
series = "Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "15--24",
booktitle = "Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018",
address = "United States",

}

TY - GEN

T1 - Analysis of security in blockchain

T2 - Case study in 51%-attack detecting

AU - Ye, Congcong

AU - Li, Guoqiang

AU - Cai, Hongming

AU - Gu, Yonggen

AU - Fukuda, Akira

PY - 2018/12/5

Y1 - 2018/12/5

N2 - Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.

AB - Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.

UR - http://www.scopus.com/inward/record.url?scp=85060706293&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85060706293&partnerID=8YFLogxK

U2 - 10.1109/DSA.2018.00015

DO - 10.1109/DSA.2018.00015

M3 - Conference contribution

AN - SCOPUS:85060706293

T3 - Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

SP - 15

EP - 24

BT - Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -