Security Attacks on E-Voting System Using Blockchain
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each attack (Sybil, DDoS, Eclipse, Selfish mining,...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
College of Education, Al-Iraqia University
2023-05-01
|
Series: | Iraqi Journal for Computer Science and Mathematics |
Subjects: | |
Online Access: | https://journal.esj.edu.iq/index.php/IJCM/article/view/584 |
_version_ | 1827628404410679296 |
---|---|
author | Saba Abdulbaqi Salman Sufyan Al-Janabi Ali Makki Sagheer |
author_facet | Saba Abdulbaqi Salman Sufyan Al-Janabi Ali Makki Sagheer |
author_sort | Saba Abdulbaqi Salman |
collection | DOAJ |
description |
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, and the time in which it achieved 51% of the attack was calculated. In this study, we investigate of Blockchain technology’s attack surface, focusing on general blockchains. The following factors show how these attacks have an impact on the proposed model: 1) The cryptographic architecture of the Blockchain. 2) The distributed architecture of systems using Blockchain. 3) The Blockchain application context. For each of these factors, we identify several attacks, including selfish mining, 51% attack, sybil attacks, eclipse attacks, distributed denial-of-service (DDos) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), blockchain forks, orphan blocks, block swallowing, wallet theft, smart contract attacks, and privacy attacks.
|
first_indexed | 2024-03-09T13:32:08Z |
format | Article |
id | doaj.art-61767cb5e5ff42848684cd1d1d1e8b73 |
institution | Directory Open Access Journal |
issn | 2958-0544 2788-7421 |
language | English |
last_indexed | 2024-03-09T13:32:08Z |
publishDate | 2023-05-01 |
publisher | College of Education, Al-Iraqia University |
record_format | Article |
series | Iraqi Journal for Computer Science and Mathematics |
spelling | doaj.art-61767cb5e5ff42848684cd1d1d1e8b732023-11-30T21:16:26ZengCollege of Education, Al-Iraqia UniversityIraqi Journal for Computer Science and Mathematics2958-05442788-74212023-05-014210.52866/ijcsm.2023.02.02.016 Security Attacks on E-Voting System Using BlockchainSaba Abdulbaqi Salman 0Sufyan Al-Janabi 1Ali Makki Sagheer 2Aliraqia University, Baghdad, IraqUniversity of Anbar, Ramadi, IraqUniversity of Anbar, Ramadi, Iraq Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each attack (Sybil, DDoS, Eclipse, Selfish mining, 51% attack) was calculated, and the time in which it achieved 51% of the attack was calculated. In this study, we investigate of Blockchain technology’s attack surface, focusing on general blockchains. The following factors show how these attacks have an impact on the proposed model: 1) The cryptographic architecture of the Blockchain. 2) The distributed architecture of systems using Blockchain. 3) The Blockchain application context. For each of these factors, we identify several attacks, including selfish mining, 51% attack, sybil attacks, eclipse attacks, distributed denial-of-service (DDos) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), blockchain forks, orphan blocks, block swallowing, wallet theft, smart contract attacks, and privacy attacks. https://journal.esj.edu.iq/index.php/IJCM/article/view/584E-Voting, Cryptography, Blockchain, Security Attack |
spellingShingle | Saba Abdulbaqi Salman Sufyan Al-Janabi Ali Makki Sagheer Security Attacks on E-Voting System Using Blockchain Iraqi Journal for Computer Science and Mathematics E-Voting, Cryptography, Blockchain, Security Attack |
title | Security Attacks on E-Voting System Using Blockchain |
title_full | Security Attacks on E-Voting System Using Blockchain |
title_fullStr | Security Attacks on E-Voting System Using Blockchain |
title_full_unstemmed | Security Attacks on E-Voting System Using Blockchain |
title_short | Security Attacks on E-Voting System Using Blockchain |
title_sort | security attacks on e voting system using blockchain |
topic | E-Voting, Cryptography, Blockchain, Security Attack |
url | https://journal.esj.edu.iq/index.php/IJCM/article/view/584 |
work_keys_str_mv | AT sabaabdulbaqisalman securityattacksonevotingsystemusingblockchain AT sufyanaljanabi securityattacksonevotingsystemusingblockchain AT alimakkisagheer securityattacksonevotingsystemusingblockchain |