Advertisement

A Novel Approach on Advancement of Blockchain Security Solution

  • Lukram Dhanachandra SinghEmail author
  • Preetisudha Meher
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1040)

Abstract

Blockchain technology is an emerging technology that has the potential to transform the way of sharing data and transfer of value. Blockchain platforms are currently being used across the world in several government processes and business domains, for their unique characteristics. Even though blockchain shows potentials in its ability to provide a limitless number of inventive commercial trading, payments, government, healthcare, military and other critical applications, they face a security weakness on their recent prominent breaches of exchanges. Hence, there remain major security issues that are essential to be overcome before blockchain adopts the mainstream. And currently, this technology relies on hardware security modules (HSM) for the management and protection of their digital keys. The HSM generates key pairs, has secure storage and can off-load cryptographic operations from the entire system. But recently, FPGAs are preferred for hardware realization of algorithms considering its flexibility, low cost and long-term maintenance. It also has an advantage of reconfigurable or reprogrammable hardware design whenever new security or adaptation of an algorithm is required to support higher security levels. The paper presents a review of hardware security modules and proposed to enhance the scalability and reliability of the HSM by implementing it with the silicon-based secure module. Integrating PUF technology into the chip for storing and securing encryption or private keys, its security level can also be improved.

Keywords

Blockchain Bitcoin FPGA Hardware security modules Physical unclonable functions 

References

  1. 1.
    Mate, A.Y., Khaire, B.R.M.: A VLSI hardware architecture implemented of security system using encryption algorithm. Int. J. Sci. Eng. Res. 7(5) (May-2016)Google Scholar
  2. 2.
    Sakakibara, Y., Morishima, S., Nakamura K., Matsutani, H.: A hardware based caching system on FPGA NIC for blockchain. Inst. Electron., Inf. Commun. Eng. Trans. Inf. Syst. E101-D(5) (May 2018)CrossRefGoogle Scholar
  3. 3.
    Noor, N.Q.M., Ahmad, N.A., Sa‘at, N.I.M., Daud, S.M., Maroop N., Natasha, N.S.: Defense mechanisms against machine learning modeling attacks on strong physical unclonable functions for IoT authentication: a review. Int. J. Adv. Comput. Sci. Appl. 8(10), (2017)Google Scholar
  4. 4.
    Blockchains: the great chain of being sure about things. The Econ. (31 October 2015)Google Scholar
  5. 5.
    Haber, S., Scott Stornetta, W.: How to time-stamp a digital document. J. Cryptol. 3(2), 99–111 (1991)Google Scholar
  6. 6.
    Bayer, D., Haber, S., Scott Stornetta, W.: Improving the efficiency and reliability of digital time stamping. Sequences II, 329–334 (March 1992)Google Scholar
  7. 7.
    Tomshwom, Lessons from the Trezor Hack. Steemit, Aug 2017. Accessed Jan 2018. https://steemit.com/bitcoin/@tomshwom/lessonsfrom-the-trezor-hack
  8. 8.
    Redman, J. A Def Con 25 Demonstration Claims to Break Bitcoin Hardware Wallets. Bitcoin.com, 27 Jun 2017. Accessed Jan 2018Google Scholar
  9. 9.
    Redman, J. Small Ethereum Clones Getting Attacked by Mysterious ’51 Crew. Bitcoin.com, 4 Sep 2016. Accessed Jan 2018Google Scholar
  10. 10.
    Calore, M. This ultra-secure PC self destructs if someone messes with it. Wired, 23 Jun 2017. Accessed Jan 2018Google Scholar
  11. 11.
    Nunez Mencias, A., et al.: An optimized blockchain solution for the IBM z14. IBM J. Res. Dev. 62(2/3) (2018), paper 4CrossRefGoogle Scholar
  12. 12.
    Pegu, R., Mudoi, R.: Design and analysis of Mux based physical unclonable functions. Int. J Eng. Res. Technol. 4(05) (May 2015)Google Scholar
  13. 13.
    Wang, Q., Gao, M., Qu, G.: A machine learning attack resistant dual-mode PUF. In: GLSVLSI”18, May, Chicago, IL, USAGoogle Scholar
  14. 14.
    Wen, Y., Lao, Y.: Enhancing PUF reliability by machine learning. In: IEEE 2017Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.ECE DepartmentNIT Arunachal PradeshYupiaIndia

Personalised recommendations