This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DLTs). We specifically focus on attacks at the underlying peer-to-peer layer of these systems, that is in charge of disseminating messages containing data and transaction to be spread among all participants. In particular, we consider the Sybil attack, according to which a malicious node creates many Sybils that drop messages coming from a specific attacked node, or even all messages from honest nodes. Our study shows that the selection of the specific dissemination protocol, as well as the amount of connections each peer has, have an influence on the resistance to this attack
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Secure Multi-party Computation (MPC) allows a secure joint cooperation within a distributed group of...
Recent research years of development of network mainly affected denial of service attacks are a viru...
This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DL...
In this paper,1 we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on...
The distributed ledger or blockchain technologies originated from the Bitcoin have been rapidly wide...
The goal of the thesis is to study and perform an analysis of the possible attack vectors on the Iot...
none4noIn distributed environments, such as distributed ledgers technologies and other peer-to-peer ...
Abstract—Any decentralized distributed network is particularly vulnerable to the Sybil attack wher...
The Sybil attack, which creates a large amount of fake node identities to break the normal routing p...
There Peer-to-peer(P2P) networks is that they are continually subject to Sybil attacks malicious nod...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. ...
With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depict...
We propose a framework and methodology for quantifying the effect of denial of service (DoS) attacks...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Secure Multi-party Computation (MPC) allows a secure joint cooperation within a distributed group of...
Recent research years of development of network mainly affected denial of service attacks are a viru...
This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DL...
In this paper,1 we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on...
The distributed ledger or blockchain technologies originated from the Bitcoin have been rapidly wide...
The goal of the thesis is to study and perform an analysis of the possible attack vectors on the Iot...
none4noIn distributed environments, such as distributed ledgers technologies and other peer-to-peer ...
Abstract—Any decentralized distributed network is particularly vulnerable to the Sybil attack wher...
The Sybil attack, which creates a large amount of fake node identities to break the normal routing p...
There Peer-to-peer(P2P) networks is that they are continually subject to Sybil attacks malicious nod...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. ...
With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depict...
We propose a framework and methodology for quantifying the effect of denial of service (DoS) attacks...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Secure Multi-party Computation (MPC) allows a secure joint cooperation within a distributed group of...
Recent research years of development of network mainly affected denial of service attacks are a viru...