TY - GEN
T1 - Analysis of security in blockchain
T2 - 5th International Conference on Dependable Systems and Their Applications, DSA 2018
AU - Ye, Congcong
AU - Li, Guoqiang
AU - Cai, Hongming
AU - Gu, Yonggen
AU - Fukuda, Akira
N1 - Funding Information:
ACKNOWLEDGEMENTS This work is supported by the Key Program of National Natural Science Foundation of China with grant No. 61732013, and Key the R&D Project of Zhejiang Province with No. 2017C02036.
Publisher Copyright:
© 2018 IEEE.
PY - 2018/12/5
Y1 - 2018/12/5
N2 - Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.
AB - Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.
UR - http://www.scopus.com/inward/record.url?scp=85060706293&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85060706293&partnerID=8YFLogxK
U2 - 10.1109/DSA.2018.00015
DO - 10.1109/DSA.2018.00015
M3 - Conference contribution
AN - SCOPUS:85060706293
T3 - Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018
SP - 15
EP - 24
BT - Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 22 September 2018 through 23 September 2018
ER -