Page 121 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 121

Chapter 4 A critical review on using blockchain technology in education domain 109






                        attack, and bribery attack and pool  branches of pools can be used.
                        hopping attack are caused by  To prevent BWH, only trusted miners
                        consensus mechanism.      should be present in the network.
                                                  Pool hopping attack can be
                                                  prevented by restricting the miners.
                      Wallet threats            Better DSA algorithms such as
                      Vulnerable signatures/flawed key  lattice-based and code-based
                        generation due to PKDSA flaws.  approaches for DSA.
                      Collision and preimage attacks due
                        to ECDSA and hash approaches.
                      Lack of control in address creation.
                      Bugs and malware due to client
                        design flaws.
                      Smart contract threats are due to Security bugs can be located using
                        design vulnerabilities in EVM,  tools such as Oyente. Similarly,
                        smart contract code, and smart  gas costly operations such as
                        contract language.        dead code and loops can also be
                                                  identified.
                      Network threats:          Can be mitigated using transaction
                      DDoS attack caused by adversary  fees and PoA protocol.
                        utilizing network bandwidth or  Using multiple metrics to verify
                        computational resources and  transactions.
                        making it unavailable for BC  Nodes time can be considered.
                        transactions.             Trusted nodes can be made to
                      Transaction malleability attack is  participate.
                        caused by modifying the  Establishing extra random
                        transaction ID.           connections on delay, establishing
                      Timejacking attack when network  gateways, and increasing diversity
                        time is considered to fix up  of node connections for routing
                        timestamp.                and delay attacks.
                      Partition routing attack is caused by New block can be attached to true
                        routing manipulations     chain formed using cumulative
                      Delay routing attack causes delay of  PoW through a trusted node.
                        block to victim node; usually  Participants to pay for each
                        caused by routing attack.  participating address.

                      Sybil attack is caused by many  Random selection of addresses.
                        pseudo identities maintained by  Trusted miners.
                        the attacker, thus enabling him to
                        control many nodes.
   116   117   118   119   120   121   122   123   124   125   126