51. Simulation of transaction malleability attack for blockchain-based e-voting
- Author
-
Muhammad Mubashir Khan, Kashif Mehboob Khan, and Junaid Arshad
- Subjects
Blockchain ,computer_science ,General Computer Science ,Computer science ,Electronic voting ,media_common.quotation_subject ,Network delay ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Information security ,Cyber-security ,Computer security ,computer.software_genre ,Malleability ,Control and Systems Engineering ,Voting ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Database transaction ,computer ,Information-security ,media_common - Abstract
Blockchain has been adopted to address significant challenges, such as trust in diverse domains, including voting, logistics and finance. However, transaction malleability has been identified as a threat for blockchain, which can potentially lead to an inconsistent state that can result in further attacks such as double-spending. In this context, this paper is focused on investigating the feasibility of transaction malleability within a typical blockchain application aiming to identify scenarios that may lead to a successful transaction malleability attack. Our objective in doing so is to highlight conditions which cause such attack to facilitate the development of protection mechanisms for them. Specifically, this paper presents a successful simulation of transaction malleability attack within the context of blockchain-based electronic voting. The evaluation has identified the impact of parameters, such as network delay and block generation rate in achieving a successful transaction malleability attack, which highlights future directions of research.
- Published
- 2020