ANALYSIS OF THE MAIN VULNERABILITIES AND WAYS OF PROTECTION OF THE CONSENSUS MECHANISM IN DECENTRALIZED BLOCKCHAIN SYSTEMS
DOI:
https://doi.org/10.26906/SUNZ.2024.3.170Keywords:
blockchain, consensus, PoS, PoW, DPoS, double spending attack, selfish mining, censorship attackAbstract
Topicality. The protection of the consensus mechanism in blockchain systems is one of the most important directions in the improvement of decentralized blockchain systems, this mechanism is responsible for validating transactions and confirming that transactions are authentic, that is, this mechanism is responsible for protecting resources and money in the system, as well as protecting against various vulnerabilities created by decentralization. so analyzing such vulnerabilities and protecting the consensus mechanism is a key topic of decentralized blockchain security The goal of this work is a description of the main implications and recommendations for choosing an approach to protection and promoting a consensus mechanism in decentralized blockchain systems. The subject of the research is the impact of the consensus mechanism in decentralized blockchain systems. The subject of research is the consensus mechanism of decentralized blockchain systems. Results. The work analyzed the consensus mechanism of decentralized blockchain systems, their differences and methods of protection from them. Conclusions. The consensus mechanism of a decentralized blockchain is unlikely to be susceptible to theft through its decentralized nature, but it is possible to reduce the risks to a minimum by introducing methods, and their reasonable combination to help reduce the type of risks and any threats to a minimum.Downloads
References
What is blockchain URL: https://www.ibm.com/topics/blockchain
Blockchain Facts: What Is It, How It Works, and How It Can Be Used URL: https://www.investopedia.com/terms/b/blockchain.asp
Understanding Blockchain Technology URL: https://www.forbes.com/advisor/investing/cryptocurrency/what-is-blockchain/
What is Blockchain Technology URL: https://www.coindesk.com/learn/what-is-blockchain-technology/
How does blockchain work URL: https://online.stanford.edu/how-does-blockchain-work
What Is a Consensus Mechanism URL: https://builtin.com/blockchain/consensus-mechanism
What Are Consensus Mechanisms in Blockchain and Cryptocurrency URL: https://www.investopedia.com/terms/c/consensus-mechanism-cryptocurrency.asp
Consensus Mechanisms In Blockchain: A Deep Dive Into The Different Types URL: https://hacken.io/discover/consensusmechanisms/
What Is Proof-of-work (PoW)? All You Need to Know URL: https://blockworks.co/news/what-is-proof-of-work
What Is Proof of Work (PoW) in Blockchain URL: https://www.investopedia.com/terms/p/proof-work.asp
What Does Proof-of-Stake (PoS) Mean in Crypto URL: https://www.investopedia.com/terms/p/proof-stake-pos.asp
What is proof of stake URL: https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-proof-of-stake
What is Delegated Proof of Stake (DPoS)? Your Comprehensive Guide to DPoS URL: https://medium.com/unicornultra/what-is-delegated-proof-of-stake-dpos-your-comprehensive-guide-to-dpos-07fd5185b108
What Is Delegated Proof-of-Stake (DPoS) URL: https://www.ledger.com/academy/what-is-delegated-proof-of-stake-dpos
Blockchain Common Vulnerability List URL: https://github.com/slowmist/Cryptocurrency-Security-AuditGuide/blob/main/Blockchain-Common-Vulnerability-List.md
Blockchain Security: Common Vulnerabilities and How to Protect Against Them URL: https://hacken.io/insights/blockchainsecurity-vulnerabilities/
Blockchain Vulnerabilities and Attacks URL: https://www.linkedin.com/pulse/blockchain-vulnerabilities-attacks-yeshwanth-n/
Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Yu., Yevstrat, D., Chyrva, Yu. & Kuchuk, H. (2022), “Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples”, Eastern-European Journal of Enterprise Technologies, 2022, 6 (4(120)), pp. 40–49, doi: https://doi.org/10.15587/1729-4061.2022.269128
Kovalenko, A., Kuchuk, H., Kuchuk, N. and Kostolny, J. (2021), “Horizontal scaling method for a hyperconverged network”, 2021 International Conference on Information and Digital Technologies (IDT), Zilina, Slovakia, doi: https://doi.org/10.1109/IDT52577.2021.9497534
Petrovska, I. and Kuchuk, H. (2023), “Adaptive resource allocation method for data processing and security in cloud environment”, Advanced Information Systems, vol. 7(3), pp. 67–73, doi: https://doi.org/10.20998/2522-9052.2023.3.10
Datsenko, S., and Kuchuk, H. (2023), “Biometric authentication utilizing convolutional neural networks”, Advanced Information Systems, vol. 7, no. 2, pp. 67–73. Doi: https://doi.org/10.20998/2522-9052.2023.3.10
Kovalenko, A. and Kuchuk, H. (2022), “Methods to Manage Data in Self-healing Systems”, Studies in Systems, Decision and Control, Vol. 425, pp. 113–171, doi: https://doi.org/10.1007/978-3-030-96546-4_3
51% Attack: The Concept, Risks & Prevention URL: https://hacken.io/discover/51-percent-attack/
Understanding Double-Spending and How to Prevent Attacks URL: https://www.investopedia.com/terms/d/doublespending.asp