DOI QR코드

DOI QR Code

Research on Security Threats Emerging from Blockchain-based Services

  • Received : 2021.08.11
  • Accepted : 2021.08.18
  • Published : 2021.11.30

Abstract

The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

Keywords

Acknowledgement

This work was supported by the Hansei University Research Fund of 2021

References

  1. Dasgupta, Dipankar, John M. Shrein, and Kishor Datta Gupta. "A survey of blockchain from security perspective." Journal of Banking and Financial Technology 3.1 (2019): 1-17. https://doi.org/10.1007/s42786-018-00002-6
  2. Hee-yeol Kim, "Analyze the security threats and countermeasures of the blockchain platform." Journal of the Korea Information Technology Society 16.5 (2018): 103-112.
  3. Joshi, Archana Prashanth, Meng Han, and Yan Wang. "A survey on security and privacy issues of blockchain technology." Mathematical foundations of computing 1.2 (2018): 121. https://doi.org/10.3934/mfc.2018007
  4. Kumar, Nallapaneni Manoj, and Pradeep Kumar Mallick. "Blockchain technology for security issues and challenges in IoT." Procedia Computer Science 132 (2018): 1815-1823. https://doi.org/10.1016/j.procs.2018.05.140
  5. Moubarak, Joanna, Eric Filiol, and Maroun Chamoun. "On blockchain security and relevant attacks." 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM). IEEE, 2018.
  6. Natoli, Christopher, and Vincent Gramoli. "The balance attack against proof-of-work blockchains: The R3 testbed as an example." arXiv preprint arXiv:1612.09426 (2016).
  7. Park, Hyeon-Jeong, Hye-Im Yang, and Jeong-Hun Jeon. " Blockchain-based IoT security vulnerability." Korea Information Processing Society Review 24.3 (2017): 13-21.
  8. Park, Seong-Jun. "Blockchain Paradigm and Fintech Security." Information and Communications Magazine 34.3 (2017): 23-28.
  9. Yoo, Soonduck. "Blockchain based financial case analysis and its implications." Asia Pacific Journal of Innovation and Entrepreneurship (2017).
  10. Yoo, Soonduck, and Kim Kiheung. "Research on improvement measures for spreading blockchain-based services." The Korean Society for Internet Broadcasting and Communication 18.1 (2018): 185-194.
  11. Yoo, Soonduck. "Token's function and role for securing ecosystem." International Journal of Advanced Culture Technology 8.1 (2020): 128-134. https://doi.org/10.17703/IJACT.2020.8.1.128
  12. Youngsoo Kim, Youngchan Kim, and Byungyop Lee. "Anomaly behavior tracking security model using private blockchain in a cloud environment." Journal of the Korea Contents Association 18.11 (2018): 475-483. https://doi.org/10.5392/JKCA.2018.18.11.475
  13. Yu, Yong, et al. "Blockchain-based solutions to security and privacy issues in the Internet of Things." IEEE Wireless Communications 25.6 (2018): 12-18. https://doi.org/10.1109/mwc.2017.1800116