In response to this inefficiency and security compromise, this study proposes a blockchain-enabled distributed AMI secure communication scheme. The cryptography schemes entirely rely on trusted third parties (TTPs), leading to a single point of failure and increasing network overhead. The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated vulnerabilities. We also explore the causal relationships between these attacks to demonstrate how various attack vectors are connected to one another. To each of those contributing factors, we outline several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks. ![]() Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.
0 Comments
Leave a Reply. |