46

Blockchain Technology

registered with the cluster head, then the transaction will not be transferred

in the network and accelerated to other clusters.

Distributed DOS (DDoS) Attack

DDoS attacks render certain facilities inaccessible by overwhelm­

ing them with unnecessary counterfeit traffic. The traffic uses space and

energy, such that the platform is shut down. Mainly due to a lack of ade­

quate security features for connected IoT devices, the potential for disrup­

tion and the choice of manufacturing costs and profit potentials have been

under-estimated in the past. However, recent events have triggered a rethink

to include and promote safety characteristics for connected products as part

of a premium positioning. Now, it may not be simple for a professional

intruder to manipulate IoT devices and build a botnet.

51% Attack

A specific weakness in Blockchain implementations is the 51% attack,

where the hash rate of the network bulk for accessing the database is

obtained by one intruder, a community of Sybil nodes or a mining pool

on the network. Attackers would avoid confirmation of new transactions,

which would allow them to stop transactions between some or all users. In

rare circumstances, attackers with a hash rate of over 50% can take other

miners and add their blocks with a high likelihood to the Blockchain; in

addition, fraudulent or double-spent transactions may occur.

Double-Spending

Whether twice or on many occasions, double-spending involves the

usage of a onetime transaction. A transaction moves asset ownership from

the identity of a sender to the public address of the receiver, and the signa­

tory is required to sign the transaction using a private key. After the trans­

action has been signed, it will be transmitted to the network on which the

transaction is validated. The receiver searches for the sender’s unexpended

transaction, searches the signature of the sender and assumes that a transac­

tion is mined in a legitimate chain.

Mining Attack

In this attack, a few cluster heads are hacked by an adversary, who starts

manipulating several of them; false mining is possible in such a situation,

but if other cluster heads or nodes detect it, they can easily track the false

cluster heads. If the network senses a false cluster head, it can be altered by

the nodes in that cluster.

Collision Attack

A collision attack on an authenticated hash attempts to trigger a hash

collision, that is, two inputs of the same hash value. If an attacker succeeds,

this could generate two public keys with the same address. The intruder

does not monitor the content of any message during a classical collision

attack; it is randomly chosen by the algorithm.

Linking Attack

An attacker, who could be a cloud storage or service provider, connects

several cloud data or Blockchain transactions with the same ID to establish