Analysis of security in blockchain: Case study in 51%-attack detecting

Congcong Ye, Guoqiang Li, Hongming Cai, Yonggen Gu, Akira Fukuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Citations (Scopus)

Abstract

Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.

Original languageEnglish
Title of host publicationProceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages15-24
Number of pages10
ISBN (Electronic)9781538692660
DOIs
Publication statusPublished - Dec 5 2018
Event5th International Conference on Dependable Systems and Their Applications, DSA 2018 - Dalian, China
Duration: Sept 22 2018Sept 23 2018

Publication series

NameProceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

Other

Other5th International Conference on Dependable Systems and Their Applications, DSA 2018
Country/TerritoryChina
CityDalian
Period9/22/189/23/18

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Safety, Risk, Reliability and Quality
  • Instrumentation

Fingerprint

Dive into the research topics of 'Analysis of security in blockchain: Case study in 51%-attack detecting'. Together they form a unique fingerprint.

Cite this