Abstract
Blockchain is the biggest revolution affecting different sectors of activity: industrial, economic and civic. It offers its users essential security measures based on solid principles such as decentralization, consensus and cryptographic algorithms to guarantee the security of transactions. Moreover, this technology is considered one of the most secure in the world of information systems. However, blockchain has become the focus of cybercriminals because of the profits they can amass. The objective of this article is to present the different vulnerabilities of the Blockchain structure regularly exploited by hackers to cause irreparable damage as well as establishing a comparative approach between 06 cryptocurrencies in terms of: the algorithm of the cryptography, the type of consensus, the security mechanisms and the different attacks suffered between 2017 and 2022.
The above approach has shown that even though the cryptocurrency market has undergone a great evolution, the inefficiency of the different structures of the blockchain algorithms still presents itself.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf
Nofer, M., Gomber, P., Hinz, O., Schiereck, D.: Blockchain. Bus. Inform. Syst. Eng. 59(3), 183–187 (2017). https://doi.org/10.1007/s12599-017-0467-3. Accessed 6 Dec 2022
Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE
Miyaji, A.: Elliptic curves suitable for cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 77, 98–105 (1994)
Wang, H.Q., Wu, T.: Cryptography in Blockchain. J. Nanjing Univ. Posts Telecommun. 37, 61–67 (2017)
Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs/1402.1718 (2014)
Puthal, D., Malik, N., Mohanty, S., Kougianos, E., Yang, C.: The Blockchain as a Decentralized Security Framework [Future Directions]. IEEE Consum. Electron. Magaz. 7(2), 18–21 (2018). https://doi.org/10.1109/mce.2017.2776459. Accessed 9 Dec 2022
Team, C.: Defi hacks are stealing more crypto than ever before. In: Chainalysis (2022). https://blog.chainalysis.com/reports/2022-defi-hacks/. Accessed 10 Oct 2022
Zhai, S.P., Li, Z.Z.: The data blockchain of the key technologies Consistency. Comput. Technol. Develop. 8, 1–6 (2018)
He, P., Yu, G., Zhang, Y.F.: Prospective review of blockchain technology and application. Comput. Sci. 44, 1–7 (2017)
Zyskind, G., Nathan, O., Pentland, A.: Decentralizing decentra: Using Blockchain to Protect Personal Data - IEEE Conference Publication, Ieeexplore.ieee.org (2015). https://ieeexplore.ieee.org/document/7163223/. Accessed 04 Dec 2022
Zheng, Z., et al.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress). IEEE (2017)
Alachkar, K., Gaastra, D.: Blockchain-based Sybil Attack Mitigation: A Case Study of the I2PNetwork (2018)
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network (2015)
Zhu, Y., Gan, G.H., Deng, D.: Security research in key technologies of Blockchain. Inform. Secur. Res. 12, 1090–1097 (2016)
Al-Zubaidie, M., Zhang, Z., Zhang, J.: Efficient and Secure ECDSA Algorithm and its Applications: A Survey (2019)
Cyber criminals increasingly exploit vulnerabilities in decentralized finance platforms to obtain cryptocurrency, causing investors to Lose Money. https://www.ic3.gov/Media/Y2022/PSA220829. Accessed 10 Oct 2022
Network Outage Initial Overview. https://solana.com/news/9-14-network-outage-initial-overview. Accessed 10 Oct 2022
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hajar, D., Hilal, I., Afifi, N. (2023). Blockchain Security Attacks: A Review Study. In: Motahhir, S., Bossoufi, B. (eds) Digital Technologies and Applications. ICDTA 2023. Lecture Notes in Networks and Systems, vol 669. Springer, Cham. https://doi.org/10.1007/978-3-031-29860-8_20
Download citation
DOI: https://doi.org/10.1007/978-3-031-29860-8_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29859-2
Online ISBN: 978-3-031-29860-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)