The Vulnerability of the Blockchain Network From the Consensus Perspective

The Vulnerability of the Blockchain Network From the Consensus Perspective

Mohamed Ikbal Nacer, Simant Prakoonwit
Copyright: © 2022 |Pages: 20
ISBN13: 9781799879275|ISBN10: 1799879275|EISBN13: 9781799879299
DOI: 10.4018/978-1-7998-7927-5.ch001
Cite Chapter Cite Chapter

MLA

Nacer, Mohamed Ikbal, and Simant Prakoonwit. "The Vulnerability of the Blockchain Network From the Consensus Perspective." Regulatory Aspects of Artificial Intelligence on Blockchain, edited by Pardis Moslemzadeh Tehrani, IGI Global, 2022, pp. 1-20. https://doi.org/10.4018/978-1-7998-7927-5.ch001

APA

Nacer, M. I. & Prakoonwit, S. (2022). The Vulnerability of the Blockchain Network From the Consensus Perspective. In P. Tehrani (Ed.), Regulatory Aspects of Artificial Intelligence on Blockchain (pp. 1-20). IGI Global. https://doi.org/10.4018/978-1-7998-7927-5.ch001

Chicago

Nacer, Mohamed Ikbal, and Simant Prakoonwit. "The Vulnerability of the Blockchain Network From the Consensus Perspective." In Regulatory Aspects of Artificial Intelligence on Blockchain, edited by Pardis Moslemzadeh Tehrani, 1-20. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-7927-5.ch001

Export Reference

Mendeley
Favorite

Abstract

The blockchain is a registry shared among different participants intending to eliminate the need for a central authority to maintain information. The first proposal of this technology was to eliminate financial authorities in transactions of value. However, the application of the same technique for the transaction of information could facilitate trades and offer traceability and diamond tracking around the world. The consensus is at the core of the network because it orchestrates nodes to accept new information, but it operates over a data structure in an open network, consequently leading to many complex behaviours that introduce different vulnerabilities. This work aims to highlight the vulnerability within the blockchain network based on the different participant behaviours that dominate the shared registry. Moreover, different malicious behaviour can appear on the networking layer by taking advantage of the network topology.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.