Mostrar el registro sencillo del ítem
dc.contributor.author | Sayeed, Sarwar | es_ES |
dc.contributor.author | Marco-Gisbert, Héctor | es_ES |
dc.date.accessioned | 2021-11-11T19:30:45Z | |
dc.date.available | 2021-11-11T19:30:45Z | |
dc.date.issued | 2019-05-01 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/176988 | |
dc.description.abstract | [EN] The 51% attack is a technique which intends to fork a blockchain in order to conduct double-spending. Adversaries controlling more than half of the total hashing power of a network can perform this attack. In a similar way, n confirmation and selfish mining are two attack techniques that comprise a similar strategy to the 51% attack. Due to the immense attacking cost to perform the 51% attack, it was considered very unlikely for a long period. However, in recent times, the attack has befallen at a frequent pace, costing millions of dollars to various cryptocurrencies. The 51% attack strategy varies based upon the adopted consensus mechanism by a particular cryptocurrency, and it enables attackers to double-spend the same crypto-coin, restrict transactions, cancel blocks, and even have full control over the price of a cryptocurrency. A crypto-coin with a low hashing power is always jeopardized by the 51% attack due to the easily attainable hashing. In this paper, we analyze the real impact of the 51% attack, revealing serious weaknesses in consensus protocols that made this attack possible. We discuss the five most advanced protection techniques to prevent this attack and their main limitations. We conclude that in most cases, security techniques fail to provide real protection against the 51% attack because the weaknesses are inherited from the consensus protocols. | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | MDPI AG | es_ES |
dc.relation.ispartof | Applied Sciences | es_ES |
dc.rights | Reconocimiento (by) | es_ES |
dc.subject | 51% attack | es_ES |
dc.subject | Double-spending | es_ES |
dc.subject | Security techniques | es_ES |
dc.subject | Consensus mechanism | es_ES |
dc.subject.classification | ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES | es_ES |
dc.title | Assessing Blockchain Consensus and Security Mechanisms Against the 51% Attack | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.3390/app9091788 | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Informática de Sistemas y Computadores - Departament d'Informàtica de Sistemes i Computadors | es_ES |
dc.description.bibliographicCitation | Sayeed, S.; Marco-Gisbert, H. (2019). Assessing Blockchain Consensus and Security Mechanisms Against the 51% Attack. Applied Sciences. 9(9):1-17. https://doi.org/10.3390/app9091788 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://doi.org/10.3390/app9091788 | es_ES |
dc.description.upvformatpinicio | 1 | es_ES |
dc.description.upvformatpfin | 17 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 9 | es_ES |
dc.description.issue | 9 | es_ES |
dc.identifier.eissn | 2076-3417 | es_ES |
dc.relation.pasarela | S\439344 | es_ES |