Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power


The paper considers blockchain based systems threats caused by uneven distribution of computational power. A model that allows to assess a system’s security against such threats is proposed.

This is a preview of subscription content, access via your institution.


  1. 1

    Nakamoto, S., Bitcoin: A peer-to-peer electronic cash system, Bitcoin, 2009. Accessed December 1, 2019.

  2. 2

    Amendment No. 4 to Form S-3 Registration Statement., Inc., United States Security and Exchange Commission, 2015. Accessed December 1, 2019.

  3. 3

    Notary, Accessed December 1, 2019.

  4. 4

    Kempe, M., The land registry in the blockchain - testbed, ChromaWay, 2017. Accessed December 1, 2019.

  5. 5

    Ali, M., et al., Blockstack: A global naming and storage system secured by blockchains, 2016 USENIX Annual Technical Conference, Denver, 2016, pp. 181–194.

  6. 6

    Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.

    Article  Google Scholar 

  7. 7

    How Walmart Brought Unprecedented Transparency to the Food Supply Chain with Hyperledger Fabric, 2018. Accessed December 1, 2019.

  8. 8

    Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, ACM International Conference Proceeding Series, 2018.

  9. 9

    Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.

  10. 10

    Busygin, A., Kalinin, M., and Konoplev, A., Supporting connectivity of VANET/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block, The Convergence of Digital and Physical Worlds: Technological, Economic and Social Challenges (CC-TESC2018), SHS Web of Conferences, 2018, vol. 44.

  11. 11

    Zegzhda, D.P., Moskvin, D.A., and Myasnikov, A.V., Assurance of cyber resistance of the distributed data storage systems using the blockchain technology, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1111–1116.

    Article  Google Scholar 

  12. 12

    Popov, S., The tangle, IOTA: Next Generation Blockchain, 2017. Accessed December 1, 2019.

  13. 13

    Bruce, J.D., The Mini-Blockchain Scheme, Cryptonite, 2017. Accessed December 1, 2019.

  14. 14

    Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.

    Article  Google Scholar 

  15. 15

    Bitcoin 0.3.2 released, Bitcoin Forum, 2010. Accessed December 1, 2019.

  16. 16

    Sayeed, S. and Marco-Gisbert, H., Assessing blockchain consensus and security mechanisms against the 51% attack, Appl. Sci., 2019, vol. 9, no. 9, p. 1788.

    Article  Google Scholar 

  17. 17

    Wang, M., Duan, M., and Zhu, J., Research on the security criteria of hash functions in the blockchain, BCC’18 Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Incheon, 2018, pp. 47–55.

  18. 18

    Difficulty, Bitcoin Wiki, 2019.

  19. 19

    Bitcoin Hash Rate, Accessed December 1, 2019.

  20. 20

    Block, Bitcoin Wiki, 2019. Accessed December 1, 2019.

Download references

Author information



Corresponding authors

Correspondence to A. G. Busygin or A. S. Konoplev.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by S. Kuznetsov

About this article

Verify currency and authenticity via CrossMark

Cite this article

Busygin, A.G., Konoplev, A.S. Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power. Aut. Control Comp. Sci. 54, 850–853 (2020).

Download citation


  • blockchain
  • 51% attack
  • security assessment