Page 121 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 121
Chapter 4 A critical review on using blockchain technology in education domain 109
attack, and bribery attack and pool branches of pools can be used.
hopping attack are caused by To prevent BWH, only trusted miners
consensus mechanism. should be present in the network.
Pool hopping attack can be
prevented by restricting the miners.
Wallet threats Better DSA algorithms such as
Vulnerable signatures/flawed key lattice-based and code-based
generation due to PKDSA flaws. approaches for DSA.
Collision and preimage attacks due
to ECDSA and hash approaches.
Lack of control in address creation.
Bugs and malware due to client
design flaws.
Smart contract threats are due to Security bugs can be located using
design vulnerabilities in EVM, tools such as Oyente. Similarly,
smart contract code, and smart gas costly operations such as
contract language. dead code and loops can also be
identified.
Network threats: Can be mitigated using transaction
DDoS attack caused by adversary fees and PoA protocol.
utilizing network bandwidth or Using multiple metrics to verify
computational resources and transactions.
making it unavailable for BC Nodes time can be considered.
transactions. Trusted nodes can be made to
Transaction malleability attack is participate.
caused by modifying the Establishing extra random
transaction ID. connections on delay, establishing
Timejacking attack when network gateways, and increasing diversity
time is considered to fix up of node connections for routing
timestamp. and delay attacks.
Partition routing attack is caused by New block can be attached to true
routing manipulations chain formed using cumulative
Delay routing attack causes delay of PoW through a trusted node.
block to victim node; usually Participants to pay for each
caused by routing attack. participating address.
Sybil attack is caused by many Random selection of addresses.
pseudo identities maintained by Trusted miners.
the attacker, thus enabling him to
control many nodes.