6
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Distributed Ledger Technology for IoT: Parasite Chain Attacks

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Directed Acyclic Graph (DAG) based Distributed Ledgers can be useful in a number of applications in the IoT domain. A distributed ledger should serve as an immutable and irreversible record of transactions, however, a DAG structure is a more complicated mathematical object than its blockchain counterparts, and as a result, providing guarantees of immutability and irreversibility is more involved. In this paper, we analyse a commonly discussed attack scenario known as a parasite chain attack for the IOTA Foundation DAG based ledger. We analyse the efficacy of IOTA core MCMC algorithm using a matrix model and present an extension which improves the ledger resistance to these attacks.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          On the Security and Performance of Proof of Work Blockchains

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Distributed Ledger Technology for Smart Cities, The Sharing Economy, and Social Compliance

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              On the Security and Scalability of Bitcoin's Blockchain

                Bookmark

                Author and article information

                Journal
                21 March 2019
                Article
                1904.00996
                35d3b15a-4a0c-4605-864a-9bbfe1bf5166

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                9 pages. arXiv admin note: text overlap with arXiv:1901.07302
                cs.DC cs.CR

                Security & Cryptology,Networking & Internet architecture
                Security & Cryptology, Networking & Internet architecture

                Comments

                Comment on this article