[HTML][HTML] Sybil in the haystack: A comprehensive review of blockchain consensus mechanisms in search of strong Sybil attack resistance

M Platt, P McBurney - Algorithms, 2023 - mdpi.com
Consensus algorithms are applied in the context of distributed computer systems to improve
their fault tolerance. The explosive development of distributed ledger technology following …

Feasibility analysis for sybil attacks in shard-based permissionless blockchains

T Rajabi, AA Khalil, MH Manshaei… - … : Research and Practice, 2023 - dl.acm.org
Committee-based permissionless blockchain approaches overcome single leader
consensus protocols' scalability issues by partitioning the outstanding transaction set into …

A truth-inducing sybil resistant decentralized blockchain oracle

Y Cai, G Fragkos, EE Tsiropoulou… - 2020 2nd Conference …, 2020 - ieeexplore.ieee.org
Many blockchain applications use decentralized oracles to trustlessly retrieve external
information as those platforms are agnostic to real-world information. Some existing …

Blockchain consensus protocols in the wild

C Cachin, M Vukolić - arXiv preprint arXiv:1707.01873, 2017 - arxiv.org
A blockchain is a distributed ledger for recording transactions, maintained by many nodes
without central authority through a distributed cryptographic protocol. All nodes validate the …

The energy footprint of blockchain consensus mechanisms beyond proof-of-work

M Platt, J Sedlmeir, D Platt, J Xu… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
Popular permissionless distributed ledger technology (DLT) systems using proof-of-work
(PoW) for Sybil attack resistance have extreme energy requirements, drawing stern criticism …

[HTML][HTML] A survey on blockchain systems: Attacks, defenses, and privacy preservation

Y Chen, H Chen, Y Zhang, M Han, M Siddula… - High-Confidence …, 2022 - Elsevier
Owing to the incremental and diverse applications of cryptocurrencies and the continuous
development of distributed system technology, blockchain has been broadly used in fintech …

YAC: BFT consensus algorithm for blockchain

F Muratov, A Lebedev, N Iushkevich, B Nasrulin… - arXiv preprint arXiv …, 2018 - arxiv.org
Consensus in decentralized systems that asynchronously receive events and which are
subject to Byzantine faults is a common problem with many real-life applications. Advances …

Overview of attack surfaces in blockchain

M Saad, J Spaulding, L Njilla… - Blockchain for …, 2019 - books.google.com
In this chapter, we explore the attack surface of Blockchains and possible ways in which this
technology can be compromised. Towards this goal, we attribute attack viability in the attack …

Sybil attacks on identity-augmented Proof-of-Stake

M Platt, P McBurney - Computer Networks, 2021 - Elsevier
IdAPoS is an identity-based consensus protocol for decentralised Blockchain networks that
implements a trustless reputation system by extending Proof-of-Stake to facilitate leader …

Red belly: A secure, fair and scalable open blockchain

T Crain, C Natoli, V Gramoli - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Blockchain has found applications to track ownership of digital assets. Yet, several
blockchains were shown vulnerable to network attacks. It is thus crucial for companies to …