Page 120 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 120

108   Chapter 4 A critical review on using blockchain technology in education domain




                                       • Broad gateway protocol (BGP) hijacks: As networks are
                                          based on IP addresses, BGP hijacking is possible when
                                          the hacker takes control of BGP router. Hacker falsely an-
                                          nounces control of a group of IP addresses and reroutes
                                          traffic to a new chain. This attack was launched against
                                          MyEtherWallet.com
                                    (g) Quantum attacks: BC uses public key digital signature algo-
                                       rithms that are susceptible to attack by quantum algorithm
                                       due to Shor’s algorithm. Hashing and secret key algorithms
                                       also require larger key sizes to overcome attack by quantum
                                       computing. To overcome this, postquantum cryptography
                                       approaches such as lattice and code-based approaches can
                                       be used.


                                           Attack                    Countermeasures

                                           Forking is due to changes in  Hard forks can prevent attacks upto
                                             technology and implementation in  some extent.
                                             blockchain.
                                           Double spending threats: Promised Using unspent output of one
                                             to two but spent on one.  transaction as input to the next
                                           Race attack, Finney attack, Vector76  transaction. Listening period can
                                             attack, and alternative history are  be used to avoid double
                                             caused by transaction verification  spending. Observers can be used
                                             mechanism, while 51% attack by  to relay information to victim
                                             the consensus method.    nodes. Peers can notify others of
                                                                      double spending attempts, explicit
                                                                      outgoing connections to well-
                                                                      connected nodes, increase the
                                                                      number of verifications, and wait
                                                                      for multiple confirmations to
                                                                      avoid Finney and Vector76
                                                                      attacks. To prevent 51% attack, a
                                                                      mining pool should be prevented
                                                                      from having more than half of the
                                                                      network hash rate.
                                           Mining pool threats: A group of  Better consensus mechanisms such
                                             miners can share their resources  as PoS can be used.
                                             for mining. These attacks can be  To overcome selfish mining, recent
                                             selfish mining, block withholding  blocks can be chosen, and randomly
                                             attack (BWH), parasite chain  assigning miners to various
   115   116   117   118   119   120   121   122   123   124   125