Skip to main content

Blockchain Security Attacks: A Review Study

  • Conference paper
  • First Online:
Digital Technologies and Applications (ICDTA 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 669))

Included in the following conference series:

  • 745 Accesses

Abstract

Blockchain is the biggest revolution affecting different sectors of activity: industrial, economic and civic. It offers its users essential security measures based on solid principles such as decentralization, consensus and cryptographic algorithms to guarantee the security of transactions. Moreover, this technology is considered one of the most secure in the world of information systems. However, blockchain has become the focus of cybercriminals because of the profits they can amass. The objective of this article is to present the different vulnerabilities of the Blockchain structure regularly exploited by hackers to cause irreparable damage as well as establishing a comparative approach between 06 cryptocurrencies in terms of: the algorithm of the cryptography, the type of consensus, the security mechanisms and the different attacks suffered between 2017 and 2022.

The above approach has shown that even though the cryptocurrency market has undergone a great evolution, the inefficiency of the different structures of the blockchain algorithms still presents itself.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf

  2. Nofer, M., Gomber, P., Hinz, O., Schiereck, D.: Blockchain. Bus. Inform. Syst. Eng. 59(3), 183–187 (2017). https://doi.org/10.1007/s12599-017-0467-3. Accessed 6 Dec 2022

  3. Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE

    Google Scholar 

  4. Miyaji, A.: Elliptic curves suitable for cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 77, 98–105 (1994)

    Google Scholar 

  5. Wang, H.Q., Wu, T.: Cryptography in Blockchain. J. Nanjing Univ. Posts Telecommun. 37, 61–67 (2017)

    Google Scholar 

  6. Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs/1402.1718 (2014)

    Google Scholar 

  7. Puthal, D., Malik, N., Mohanty, S., Kougianos, E., Yang, C.: The Blockchain as a Decentralized Security Framework [Future Directions]. IEEE Consum. Electron. Magaz. 7(2), 18–21 (2018). https://doi.org/10.1109/mce.2017.2776459. Accessed 9 Dec 2022

  8. Team, C.: Defi hacks are stealing more crypto than ever before. In: Chainalysis (2022). https://blog.chainalysis.com/reports/2022-defi-hacks/. Accessed 10 Oct 2022

  9. Zhai, S.P., Li, Z.Z.: The data blockchain of the key technologies Consistency. Comput. Technol. Develop. 8, 1–6 (2018)

    Google Scholar 

  10. He, P., Yu, G., Zhang, Y.F.: Prospective review of blockchain technology and application. Comput. Sci. 44, 1–7 (2017)

    Google Scholar 

  11. Zyskind, G., Nathan, O., Pentland, A.: Decentralizing decentra: Using Blockchain to Protect Personal Data - IEEE Conference Publication, Ieeexplore.ieee.org (2015). https://ieeexplore.ieee.org/document/7163223/. Accessed 04 Dec 2022

  12. Zheng, Z., et al.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress). IEEE (2017)

    Google Scholar 

  13. Alachkar, K., Gaastra, D.: Blockchain-based Sybil Attack Mitigation: A Case Study of the I2PNetwork (2018)

    Google Scholar 

  14. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network (2015)

    Google Scholar 

  15. Zhu, Y., Gan, G.H., Deng, D.: Security research in key technologies of Blockchain. Inform. Secur. Res. 12, 1090–1097 (2016)

    Google Scholar 

  16. Al-Zubaidie, M., Zhang, Z., Zhang, J.: Efficient and Secure ECDSA Algorithm and its Applications: A Survey (2019)

    Google Scholar 

  17. Cyber criminals increasingly exploit vulnerabilities in decentralized finance platforms to obtain cryptocurrency, causing investors to Lose Money. https://www.ic3.gov/Media/Y2022/PSA220829. Accessed 10 Oct 2022

  18. Network Outage Initial Overview. https://solana.com/news/9-14-network-outage-initial-overview. Accessed 10 Oct 2022

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dahhak Hajar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hajar, D., Hilal, I., Afifi, N. (2023). Blockchain Security Attacks: A Review Study. In: Motahhir, S., Bossoufi, B. (eds) Digital Technologies and Applications. ICDTA 2023. Lecture Notes in Networks and Systems, vol 669. Springer, Cham. https://doi.org/10.1007/978-3-031-29860-8_20

Download citation

Publish with us

Policies and ethics