4.7 Article

6G technology and taxonomy of attacks on blockchain technology

Journal

ALEXANDRIA ENGINEERING JOURNAL
Volume 61, Issue 6, Pages 4295-4306

Publisher

ELSEVIER
DOI: 10.1016/j.aej.2021.09.051

Keywords

Blockchain; Bitcoin; Proof of work; Security attacks; Core-oriented attacks; Client oriented attacks

Ask authors/readers for more resources

This paper provides a thorough overview of blockchain technology, discussing prevalent attacks and vulnerabilities, as well as possible countermeasures. It also suggests the need for redesigning blockchain architecture to make it more suitable for different applications.
Blockchain technology is now being used in every aspect of human life. It appears like everyone is racing to develop apps that run on top of the blockchain technology available today. Indeed, this is owing to the fact that it has distinct qualities and a distinctive design. However, it is not well suited to all applications of blockchain technology. Not merely altering the blockchain protocols would make it suitable, but instead redesigning its architecture is required to make it ideal for different applications. This paper describes the overview of blockchain technology thoroughly. It provides a detailed discussion on the prevalent core-oriented and client-oriented attacks on blockchain technology and the vulnerabilities exploited by them. It also presents the possible countermeasure to these attacks. Moreover, it provides insight into the creation of a better version of the blockchain that is more suitable for different types of blockchain applications. (C) 2021 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available