Assessing blockchain consensus and security mechanisms against the 51% attack

Sarwar Sayeed, Hector Marco-Gisbert

Research output: Contribution to journalArticlepeer-review

204 Citations (Scopus)
251 Downloads (Pure)

Abstract

The 51% attack is a technique which intends to fork a blockchain in order to conduct double-spending. Adversaries controlling more than half of the total hashing power of a network can perform this attack. In a similar way, n confirmation and selfish mining are two attack techniques that comprise a similar strategy to the 51% attack. Due to the immense attacking cost to perform the 51% attack, it was considered very unlikely for a long period. However, in recent times, the attack has befallen at a frequent pace, costing millions of dollars to various cryptocurrencies. The 51% attack strategy varies based upon the adopted consensus mechanism by a particular cryptocurrency, and it enables attackers to double-spend the same crypto-coin, restrict transactions, cancel blocks, and even have full control over the price of a cryptocurrency. A crypto-coin with a low hashing power is always jeopardized by the 51% attack due to the easily attainable hashing. In this paper, we analyze the real impact of the 51% attack, revealing serious weaknesses in consensus protocols that made this attack possible. We discuss the five most advanced protection techniques to prevent this attack and their main limitations. We conclude that in most cases, security techniques fail to provide real protection against the 51% attack because the weaknesses are inherited from the consensus protocols.
Original languageEnglish
Article number1788
Number of pages17
JournalApplied Sciences
Volume9
Issue number9
DOIs
Publication statusPublished - 29 Apr 2019

Keywords

  • 51% attack
  • Double-spending
  • Security techniques
  • Consensus mechanism

Fingerprint

Dive into the research topics of 'Assessing blockchain consensus and security mechanisms against the 51% attack'. Together they form a unique fingerprint.

Cite this