A Project Report On Summary Topic
A Project Report On Summary Topic
A Project Report On Summary Topic
On Summary
Topic:
Submitted to:
Sir Rashid
Submitted by:
Rana Isharib khan
Roll no:
BITM-F16-033
Course:
SNA
survey of security threats and possible attacks on Block Chain
SUMMARY
As blockchain is a type of emerging technology that have major impacts on future technology
trend. It involves around the computing algorithm to provide distributed communication in a
peer-to-peer network of subscribers where the transactions are transparent among the parties
involved.Blockchain is specially build for technology like bitcoin but it have interest in
industries (such as secure contracts, financial transactions, sharing health information, etc.)
The fundamental questions need to be addressed in terms of Blockchain’s security, privacy
and limitations concerns also need to discussed. The survey paper gives a viewpoint of
blockchain security concerns and summarize recent developments.
It has the potential to disrupt many areas of art in the future. But as a new undeveloped court,
It detects many problems that are found mainly in security. Security concerns do not come
from distribution only problem of continuity of operation. The report starts with an overview
of the blockchain security system and then highlights the specifc security threats and
summarizes them.
Security types
Algorithm based security
DSA is an asymmetric basic encryption system there a private key is used to sign digital
messages and a public key can be used to authenticate those messages. The variable elliptical
curve of DSA, ECDSA, is widespread used in block implementation Force module
algorithms. Elliptical curls are good cryptographic operations are defined by a known domain
parameters. A number of such converters, some are standardized NIST, IEEE, ANSI and
other groups are available.
Identity attacks
When adversary attack the blockchain network by trying to compromise blockchain users
identity, it is referred as Identity attack. Some of these attack are described below
Replay attack
a
It is a type of attack in which an attacker attack communication between two
legitimate groups and gain access. Holding the hash key and reusing it to make the
attacker a user which is a common threat to hacking in the blockchain space.
Impersonation attack
When some user want to gain access using ESDSA algorithm.
Sybil attack
This is a general type of attack on the peer network where most of the fraud is
committed and controlled by a single rogue division. The type of attack is used to
differentiate the target area from others which is used to implement various types of
attacks.
Privacy challenges
blockchain technology can be efectively added in vehicle to grid networks, It introduces a
registration and data maintenance process , which ensures the anonymity of user payment
data while enabling payment auditing by privileged users.
Scalability solution
To solve the scalability problem in blockchain several research work is being progressed.
Recently one of the patents [31] fled where Guerney et al. invented a way to vynamic
recording of blockchain transactions to optimize performance and scalability
Conclusion
The conclusion of this survey is to summarize all possible attacks on blockchain and
threats with their solution that how tackle these attacks by observing with keen
interest on threat of blockchain.
The survey tells about and aware all of those who are going to invest in blockchain as
a business to check al of these point that are written in paper for betterment.