ANALYSIS OF THE MAIN VULNERABILITIES AND WAYS OF PROTECTION OF THE CONSENSUS MECHANISM IN DECENTRALIZED BLOCKCHAIN SYSTEMS

Authors

  • Eugene Shevchuk
  • Volodymyr Fedorchenko

DOI:

https://doi.org/10.26906/SUNZ.2024.3.170

Keywords:

blockchain, consensus, PoS, PoW, DPoS, double spending attack, selfish mining, censorship attack

Abstract

Topicality. The protection of the consensus mechanism in blockchain systems is one of the most important directions in the improvement of decentralized blockchain systems, this mechanism is responsible for validating transactions and confirming that transactions are authentic, that is, this mechanism is responsible for protecting resources and money in the system, as well as protecting against various vulnerabilities created by decentralization. so analyzing such vulnerabilities and protecting the consensus mechanism is a key topic of decentralized blockchain security The goal of this work is a description of the main implications and recommendations for choosing an approach to protection and promoting a consensus mechanism in decentralized blockchain systems. The subject of the research is the impact of the consensus mechanism in decentralized blockchain systems. The subject of research is the consensus mechanism of decentralized blockchain systems. Results. The work analyzed the consensus mechanism of decentralized blockchain systems, their differences and methods of protection from them. Conclusions. The consensus mechanism of a decentralized blockchain is unlikely to be susceptible to theft through its decentralized nature, but it is possible to reduce the risks to a minimum by introducing methods, and their reasonable combination to help reduce the type of risks and any threats to a minimum.

Downloads

Download data is not yet available.

References

What is blockchain URL: https://www.ibm.com/topics/blockchain

Blockchain Facts: What Is It, How It Works, and How It Can Be Used URL: https://www.investopedia.com/terms/b/blockchain.asp

Understanding Blockchain Technology URL: https://www.forbes.com/advisor/investing/cryptocurrency/what-is-blockchain/

What is Blockchain Technology URL: https://www.coindesk.com/learn/what-is-blockchain-technology/

How does blockchain work URL: https://online.stanford.edu/how-does-blockchain-work

What Is a Consensus Mechanism URL: https://builtin.com/blockchain/consensus-mechanism

What Are Consensus Mechanisms in Blockchain and Cryptocurrency URL: https://www.investopedia.com/terms/c/consensus-mechanism-cryptocurrency.asp

Consensus Mechanisms In Blockchain: A Deep Dive Into The Different Types URL: https://hacken.io/discover/consensusmechanisms/

What Is Proof-of-work (PoW)? All You Need to Know URL: https://blockworks.co/news/what-is-proof-of-work

What Is Proof of Work (PoW) in Blockchain URL: https://www.investopedia.com/terms/p/proof-work.asp

What Does Proof-of-Stake (PoS) Mean in Crypto URL: https://www.investopedia.com/terms/p/proof-stake-pos.asp

What is proof of stake URL: https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-proof-of-stake

What is Delegated Proof of Stake (DPoS)? Your Comprehensive Guide to DPoS URL: https://medium.com/unicornultra/what-is-delegated-proof-of-stake-dpos-your-comprehensive-guide-to-dpos-07fd5185b108

What Is Delegated Proof-of-Stake (DPoS) URL: https://www.ledger.com/academy/what-is-delegated-proof-of-stake-dpos

Blockchain Common Vulnerability List URL: https://github.com/slowmist/Cryptocurrency-Security-AuditGuide/blob/main/Blockchain-Common-Vulnerability-List.md

Blockchain Security: Common Vulnerabilities and How to Protect Against Them URL: https://hacken.io/insights/blockchainsecurity-vulnerabilities/

Blockchain Vulnerabilities and Attacks URL: https://www.linkedin.com/pulse/blockchain-vulnerabilities-attacks-yeshwanth-n/

Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Yu., Yevstrat, D., Chyrva, Yu. & Kuchuk, H. (2022), “Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples”, Eastern-European Journal of Enterprise Technologies, 2022, 6 (4(120)), pp. 40–49, doi: https://doi.org/10.15587/1729-4061.2022.269128

Kovalenko, A., Kuchuk, H., Kuchuk, N. and Kostolny, J. (2021), “Horizontal scaling method for a hyperconverged network”, 2021 International Conference on Information and Digital Technologies (IDT), Zilina, Slovakia, doi: https://doi.org/10.1109/IDT52577.2021.9497534

Petrovska, I. and Kuchuk, H. (2023), “Adaptive resource allocation method for data processing and security in cloud environment”, Advanced Information Systems, vol. 7(3), pp. 67–73, doi: https://doi.org/10.20998/2522-9052.2023.3.10

Datsenko, S., and Kuchuk, H. (2023), “Biometric authentication utilizing convolutional neural networks”, Advanced Information Systems, vol. 7, no. 2, pp. 67–73. Doi: https://doi.org/10.20998/2522-9052.2023.3.10

Kovalenko, A. and Kuchuk, H. (2022), “Methods to Manage Data in Self-healing Systems”, Studies in Systems, Decision and Control, Vol. 425, pp. 113–171, doi: https://doi.org/10.1007/978-3-030-96546-4_3

51% Attack: The Concept, Risks & Prevention URL: https://hacken.io/discover/51-percent-attack/

Understanding Double-Spending and How to Prevent Attacks URL: https://www.investopedia.com/terms/d/doublespending.asp

Published

2024-09-06