A survey on blockchain systems: Attacks, defenses, and privacy preservation
Owing to the incremental and diverse applications of cryptocurrencies and the continuous development of distributed system technology, blockchain has been broadly used in fintech, smart homes, public health, and intelligent transportation due to its properties of decentralization, collective mainten...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2022-06-01
|
Series: | High-Confidence Computing |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2667295221000386 |
_version_ | 1818552943808348160 |
---|---|
author | Yourong Chen Hao Chen Yang Zhang Meng Han Madhuri Siddula Zhipeng Cai |
author_facet | Yourong Chen Hao Chen Yang Zhang Meng Han Madhuri Siddula Zhipeng Cai |
author_sort | Yourong Chen |
collection | DOAJ |
description | Owing to the incremental and diverse applications of cryptocurrencies and the continuous development of distributed system technology, blockchain has been broadly used in fintech, smart homes, public health, and intelligent transportation due to its properties of decentralization, collective maintenance, and immutability. Although the dynamism of blockchain abounds in various fields, concerns in terms of network communication interference and privacy leakage are gradually increasing. Because of the lack of reliable attack analysis systems, fully understanding some attacks on the blockchain, such as mining, network communication, smart contract, and privacy theft attacks, has remained challenging. Therefore, in this study, we examine the security and privacy of the blockchain and analyze possible solutions. We systematical classify the blockchain attack techniques into three categories, then discuss the corresponding attack and defense methods based on these categories. We focus on (1) the attack and defense methods of mining pool attacks for blockchain security issues, such as block withholding, 51%, pool hopping, selfish mining, and fork after withholding attacks, in the attack type of consensus excitation; (2) the attack and defense methods of network communication and smart contracts for blockchain security issues, such as distributed denial-of-service, Sybil, eclipse, and reentrancy attacks, in the attack type of middle protocol; and (3) the attack and defense methods of privacy thefts for blockchain privacy issues, such as identity privacy and transaction information attacks, in the attack type of application service. Finally, we discuss future research directions for blockchain security. |
first_indexed | 2024-12-12T09:19:40Z |
format | Article |
id | doaj.art-385bb56c937f40fbb902038db8bb91b0 |
institution | Directory Open Access Journal |
issn | 2667-2952 |
language | English |
last_indexed | 2024-12-12T09:19:40Z |
publishDate | 2022-06-01 |
publisher | Elsevier |
record_format | Article |
series | High-Confidence Computing |
spelling | doaj.art-385bb56c937f40fbb902038db8bb91b02022-12-22T00:29:16ZengElsevierHigh-Confidence Computing2667-29522022-06-0122100048A survey on blockchain systems: Attacks, defenses, and privacy preservationYourong Chen0Hao Chen1Yang Zhang2Meng Han3Madhuri Siddula4Zhipeng Cai5Zhejiang Shuren University, Hangzhou, China; Zhejiang University, Hangzhou, ChinaChangzhou University, Changzhou, ChinaChangzhou University, Changzhou, ChinaBinjiang Insititute of Zhejiang University, Hangzhou, China; Zhejiang University, Hangzhou, China; Corresponding authors.North Carolina A&T State University, Greensboro, USAGeorgia State University, Atlanta, USA; Corresponding authors.Owing to the incremental and diverse applications of cryptocurrencies and the continuous development of distributed system technology, blockchain has been broadly used in fintech, smart homes, public health, and intelligent transportation due to its properties of decentralization, collective maintenance, and immutability. Although the dynamism of blockchain abounds in various fields, concerns in terms of network communication interference and privacy leakage are gradually increasing. Because of the lack of reliable attack analysis systems, fully understanding some attacks on the blockchain, such as mining, network communication, smart contract, and privacy theft attacks, has remained challenging. Therefore, in this study, we examine the security and privacy of the blockchain and analyze possible solutions. We systematical classify the blockchain attack techniques into three categories, then discuss the corresponding attack and defense methods based on these categories. We focus on (1) the attack and defense methods of mining pool attacks for blockchain security issues, such as block withholding, 51%, pool hopping, selfish mining, and fork after withholding attacks, in the attack type of consensus excitation; (2) the attack and defense methods of network communication and smart contracts for blockchain security issues, such as distributed denial-of-service, Sybil, eclipse, and reentrancy attacks, in the attack type of middle protocol; and (3) the attack and defense methods of privacy thefts for blockchain privacy issues, such as identity privacy and transaction information attacks, in the attack type of application service. Finally, we discuss future research directions for blockchain security.http://www.sciencedirect.com/science/article/pii/S2667295221000386BlockchainSystemDefenseAttackPrivacy |
spellingShingle | Yourong Chen Hao Chen Yang Zhang Meng Han Madhuri Siddula Zhipeng Cai A survey on blockchain systems: Attacks, defenses, and privacy preservation High-Confidence Computing Blockchain System Defense Attack Privacy |
title | A survey on blockchain systems: Attacks, defenses, and privacy preservation |
title_full | A survey on blockchain systems: Attacks, defenses, and privacy preservation |
title_fullStr | A survey on blockchain systems: Attacks, defenses, and privacy preservation |
title_full_unstemmed | A survey on blockchain systems: Attacks, defenses, and privacy preservation |
title_short | A survey on blockchain systems: Attacks, defenses, and privacy preservation |
title_sort | survey on blockchain systems attacks defenses and privacy preservation |
topic | Blockchain System Defense Attack Privacy |
url | http://www.sciencedirect.com/science/article/pii/S2667295221000386 |
work_keys_str_mv | AT yourongchen asurveyonblockchainsystemsattacksdefensesandprivacypreservation AT haochen asurveyonblockchainsystemsattacksdefensesandprivacypreservation AT yangzhang asurveyonblockchainsystemsattacksdefensesandprivacypreservation AT menghan asurveyonblockchainsystemsattacksdefensesandprivacypreservation AT madhurisiddula asurveyonblockchainsystemsattacksdefensesandprivacypreservation AT zhipengcai asurveyonblockchainsystemsattacksdefensesandprivacypreservation AT yourongchen surveyonblockchainsystemsattacksdefensesandprivacypreservation AT haochen surveyonblockchainsystemsattacksdefensesandprivacypreservation AT yangzhang surveyonblockchainsystemsattacksdefensesandprivacypreservation AT menghan surveyonblockchainsystemsattacksdefensesandprivacypreservation AT madhurisiddula surveyonblockchainsystemsattacksdefensesandprivacypreservation AT zhipengcai surveyonblockchainsystemsattacksdefensesandprivacypreservation |