The paper considers blockchain based systems threats caused by uneven distribution of computational power. A model that allows to assess a system’s security against such threats is proposed.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Nakamoto, S., Bitcoin: A peer-to-peer electronic cash system, Bitcoin, 2009. https://bitcoin.org/bitcoin.pdf. Accessed December 1, 2019.
Amendment No. 4 to Form S-3 Registration Statement. Overstock.com, Inc., United States Security and Exchange Commission, 2015. https://www.sec.gov/Archives/edgar/data/1130713/000104746915008523/a2226515zs-3a.htm. Accessed December 1, 2019.
Notary, Bitcoin.com. https://notary.bitcoin.com. Accessed December 1, 2019.
Kempe, M., The land registry in the blockchain - testbed, ChromaWay, 2017. https://chromaway.com/papers/Blockchain_Landregistry_Report_2017.pdf. Accessed December 1, 2019.
Ali, M., et al., Blockstack: A global naming and storage system secured by blockchains, 2016 USENIX Annual Technical Conference, Denver, 2016, pp. 181–194.
Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.
How Walmart Brought Unprecedented Transparency to the Food Supply Chain with Hyperledger Fabric, 2018. https://www.hyperledger.org/resources/publications/walmart-case-study. Accessed December 1, 2019.
Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, ACM International Conference Proceeding Series, 2018. https://doi.org/10.1145/3264437.3264463
Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.
Busygin, A., Kalinin, M., and Konoplev, A., Supporting connectivity of VANET/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block, The Convergence of Digital and Physical Worlds: Technological, Economic and Social Challenges (CC-TESC2018), SHS Web of Conferences, 2018, vol. 44. https://doi.org/10.1051/shsconf/20184400020
Zegzhda, D.P., Moskvin, D.A., and Myasnikov, A.V., Assurance of cyber resistance of the distributed data storage systems using the blockchain technology, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1111–1116.
Popov, S., The tangle, IOTA: Next Generation Blockchain, 2017. https://www.iotatoken.com/IOTA_Whitepaper.pdf. Accessed December 1, 2019.
Bruce, J.D., The Mini-Blockchain Scheme, Cryptonite, 2017. http://cryptonite.info/files/mbc-scheme-rev3.pdf. Accessed December 1, 2019.
Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.
Bitcoin 0.3.2 released, Bitcoin Forum, 2010. https://bitcointalk.org/index.php?topic=437. Accessed December 1, 2019.
Sayeed, S. and Marco-Gisbert, H., Assessing blockchain consensus and security mechanisms against the 51% attack, Appl. Sci., 2019, vol. 9, no. 9, p. 1788.
Wang, M., Duan, M., and Zhu, J., Research on the security criteria of hash functions in the blockchain, BCC’18 Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Incheon, 2018, pp. 47–55.
Difficulty, Bitcoin Wiki, 2019. https://en.bitcoin.it/wiki/Difficulty.
Bitcoin Hash Rate, Blockchain.com. https://www.blockchain.com/ru/charts/hash-rate. Accessed December 1, 2019.
Block, Bitcoin Wiki, 2019. https://en.bitcoin.it/wiki/Block. Accessed December 1, 2019.
The authors declare that they have no conflicts of interest.
Translated by S. Kuznetsov
About this article
Cite this article
Busygin, A.G., Konoplev, A.S. Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power. Aut. Control Comp. Sci. 54, 850–853 (2020). https://doi.org/10.3103/S014641162008009X
- 51% attack
- security assessment