On the Security of the Blockchain Technology

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Network Science".

Deadline for manuscript submissions: 31 October 2024 | Viewed by 4189

Special Issue Editor


E-Mail Website
Guest Editor
1. EPITA School of Engineering, 94270 Le Kremlin-Bicetre, France
2. Computer Science Department, New York University, 57 Bd Saint-Germain, 75005 Paris, France
Interests: security; cloud computing; network security; blockchain; information security; computer networks security; IT security; network communication; cyber security; wireless security; wireless computing

Special Issue Information

Dear Colleagues,

Blockchain technology was designed to enable decentralized and secure crypto-currency.

Numerous studies have explored the features of blockchains, such as scalability, resiliency, decentralization, reliability, and immutability in different use cases. Hence, blockchains are becoming a cornerstone for the development and deployment of other technologies such as decentralized applications (Dapp), the Internet of Things (IoT), digital supply chains (DSCs), cooperative intelligent transportation systems (C-ITSs), federated learning (FL), and many others.

Blockchain is still a growing technology, and it has the potential to disrupt numerous technologies in the future. However, as an evolving technology, it is suffering from many setbacks; the most severe are from the security perspective.

This Special Issue calls for research contributions on how blockchains can ensure the security of systems and environments, and the different security issues related to blockchain-based technologies and architectures. More precisely, the topics of interests in this Special Issue include, but are not limited to:

  • Blockchain-based approaches for the security of IT systems;
  • Blockchain-based approaches for intrusion detection;
  • Blockchain issues and trends;
  • Blockchain privacy;
  • Blockchain new design;
  • Cryptocurrency fraud;
  • Cryptocurrency fraud detection;
  • Smart contracts for the security of IT systems;
  • Smart contracts privacy and security issues.

Dr. Badis Hammi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain
  • security
  • blockchain-based security
  • cryptography
  • crypto-currency
  • fraud
  • IoT security

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

16 pages, 1153 KiB  
Article
A Proposal for a Mobility-Control Data Transfer Mechanism Based on a Block Network Utilizing End-to-End Authentication Data
by Jinsu Kim, Eunsun Choi and Namje Park
Mathematics 2024, 12(13), 2073; https://doi.org/10.3390/math12132073 - 2 Jul 2024
Viewed by 84
Abstract
Advances in communications technology have had tremendous influence on network implementation to date, and as communication devices get smaller and technologies more intelligent, a great number of solutions are emerging that converge communications with a multitude of domains. In particular, as transportation modes [...] Read more.
Advances in communications technology have had tremendous influence on network implementation to date, and as communication devices get smaller and technologies more intelligent, a great number of solutions are emerging that converge communications with a multitude of domains. In particular, as transportation modes assisting with mobility have developed, many studies are in the pipeline on the domain of mobility. The development of mobility services has prompted the spread of car sharing, which also highlights the need for a system that controls shared vehicles. The data of such control system can be used not only for the operational management of vehicles but also the management of users in terms of user driving analysis or monitoring safe driving. In addition, it can be utilized in a variety of other applications that analyze traffic flow based on vehicle driving data, determine required vehicle maintenance intervals, or schedule vehicle maintenance in advance. However, if forged/altered by a third party, control data might pose a lot of challenges to data utilization. This study proposes a mechanism that manages control data on a blockchain to enhance the integrity of control data created in the communications process. In this paper, we propose a mechanism for applying a blockchain to the communication process between clients and servers. In the proposed mechanism, platform operators generate and provide independent identification information and identification numbers for users. The identification information and identification numbers are used to prove that the generated blocks were created by specific users. Data generated by clients create a block with a hash including user identification information alongside the user identification number. Verification of the generated block is performed on the platform vendor’s server, validating that the user identification number in the block matches the server-side user identification information and the hash of the data within the block. Thus, even when the contents of the block are shared in a public blockchain environment, user identification information is only held by the server and clients, preventing third parties from impersonating specific users to create data blocks. Furthermore, the verification process of the data includes hashes received from other nearby vehicles, preventing data tampering by the block creator. Full article
(This article belongs to the Special Issue On the Security of the Blockchain Technology)

Review

Jump to: Research

19 pages, 1103 KiB  
Review
A Quantum-Resistant Blockchain System: A Comparative Analysis
by P. Thanalakshmi, A. Rishikhesh, Joel Marion Marceline, Gyanendra Prasad Joshi and Woong Cho
Mathematics 2023, 11(18), 3947; https://doi.org/10.3390/math11183947 - 17 Sep 2023
Cited by 8 | Viewed by 3297
Abstract
Blockchain transactions are decentralized, secure, and transparent, and they have altered industries. However, the emergence of quantum computing presents a severe security risk to the traditional encryption algorithms used in blockchain. Post-quantum signatures are required to preserve integrity and reliability. Furthermore, combining the [...] Read more.
Blockchain transactions are decentralized, secure, and transparent, and they have altered industries. However, the emergence of quantum computing presents a severe security risk to the traditional encryption algorithms used in blockchain. Post-quantum signatures are required to preserve integrity and reliability. Furthermore, combining the InterPlanetary File System (IPFS) with blockchain provides a long-term strategy for data storage and sharing. This study investigates the integration of post-quantum signatures with the IPFS in a blockchain system, which can considerably enhance blockchain system efficiency. We increase security and efficiency by recording hash values of signatures and public keys within the blockchain and storing their actual content using the IPFS. The study compares NIST-recommended post-quantum signatures with the ECDSA in a Bitcoin exchange scheme to show how effective the system is in countering quantum threats while maintaining optimal performance. This research makes an important addition to the long-term viability and dependability of blockchain technology in the face of the growing landscape of quantum computing breakthroughs. Full article
(This article belongs to the Special Issue On the Security of the Blockchain Technology)
Show Figures

Figure 1

Back to TopTop