The security of the Coordicide: the implementation and analysis of possible attack vectors

05/25/2022
by   Daria Dziubałtowska, et al.
0

The goal of the thesis is to study and perform an analysis of the possible attack vectors on the Iota network 2.0 version of the protocol. In this work, existing attack vectors on Distributed Ledger Technologies are studied and their applicability to the Iota 2.0 protocol is discussed. A specific attack that targets the capability of honest participants to write to the ledger is presented and analyzed in a network of nodes that run a full node software version.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/07/2021

Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

The core network architecture of telecommunication systems has undergone...
research
07/30/2020

Implications of Dissemination Strategies on the Security of Distributed Ledgers

This paper describes a simulation study on security attacks over Distrib...
research
12/03/2017

Analiza bezbednosnih mehanizama OSPF protokola

The security of the service and the system depends on the security of ea...
research
09/07/2021

Implementing Security Protocol Monitors

Cryptographic protocols are often specified by narrations, i.e., finite ...
research
06/14/2020

Cloud as an Attack Platform

We present an exploratory study of responses from 75 security profession...
research
03/07/2022

Towards Flexible Anonymous Networks

Anonymous Communication designs such as Tor build their security upon di...
research
01/28/2019

Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages

Recently, an ingenious protocol called Algorand has been proposed to ove...

Please sign up or login with your details

Forgot password? Click here to reset