Page 116 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 116

104   Chapter 4 A critical review on using blockchain technology in education domain




                                       chain. Some nodes can accept new rules, whereas others
                                       follow old rules resulting in forks. Forks can be categorized
                                       as soft forks and hard forks. Soft forks are backward compat-
                                       ible. When a new rule was added in Bitcoin network to
                                       support time-locked refunds, it resulted in a soft fork. The
                                       chain of nodes that follow new rules (updates nodes) can
                                       interact with those that follow old rules. Hard forks are not
                                       backward compatible. Here nodes that follow new rules
                                       follow a separate chain. This chain will not interact with nodes
                                       that do not follow new rules. In Ethereum, a flaw in smart
                                       contract resulted in Decentralised Autonomous Organisation
                                       (DAO) attack. To overcome this flaw, hard fork was con-
                                       structed to create a new chain. Joint consensus mechanism
                                       can be used to overcome this attack.
                                    (b) Double spending attacks: Here the digital currency is prom-
                                       ised to (spent for) two parties but delivered to only one. This is
                                       prevented in BC by using only unspent output of one transac-
                                       tion as input to the next. Timestamping (chronological order)
                                       of transactions is considered. As the number of confirmations
                                       (verifications) increases, the probability of double spending
                                       decreases. Double spending can occur due to attacks like
                                       51%, selfish mining, and eclipse attacks.
                                       • Finney attack: Consider a miner mines a block with his
                                          transaction and maintains it secretly. When an uncon-
                                          firmed transaction is accepted by the victim, then money
                                          can be sent to him. Later the secretly mined block is
                                          published, which results in double spending.
                                       • Race attack: The attacker submits an unconfirmed trans-
                                          action1 to a victim. Attacker also broadcasts another
                                          transaction2 to the network. Although it gives an illusion
                                          to the victim that trasaction1 is first, it is never submitted
                                          by attacker to the BC network. Vector76 is a combination
                                          of Finney and race attacks.
                                       • Alternative history attack: Here the hacker sends coins to
                                          sellers and simultaneously creates a transaction to return
                                          the same. This may result in attacker creating a longer
                                          chain on return of coins. This attack requires huge compu-
                                          tation power from the attacker.
                                       • 51% (majority) attack: If a group of miners control over
                                          51% nodes in the BC network, double spending or denial
                                          of service can occur. A malicious miner performing a
                                          double spend will try to create a regular transaction
                                          spending and also another spending in a private chain.
                                          Double spending is different from regular transactions in
                                          two ways:
   111   112   113   114   115   116   117   118   119   120   121