Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/30876
DC FieldValueLanguage
dc.contributor.authorPaphitis, Aristodemos-
dc.contributor.authorKourtellis, Nicolas-
dc.contributor.authorSirivianos, Michael-
dc.date.accessioned2023-11-29T08:30:22Z-
dc.date.available2023-11-29T08:30:22Z-
dc.date.issued2023-01-01-
dc.identifier.citationSecurity and Privacy in Social Networks and Big Data - 9th International Symposium, SocialSec 2023, Proceedings Canterbury, 14 - 16 August 2023en_US
dc.identifier.isbn9789819951765-
dc.identifier.issn03029743-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/30876-
dc.description.abstractIn blockchain systems, similar to any distributed system, the underlying network plays a crucial role and provides the infrastructure for communication and coordination among the participating peers. As a result, the properties of the network define the level of security, availability, and fault tolerance within a blockchain system. This study aims to improve our understanding of the structural properties of peer-to-peer overlay networks that underpin blockchain applications. Our objective is to gain insights into the security and resilience of these systems. By analyzing seven distinct blockchain overlay networks and evaluating a comprehensive set of graph characteristics, we draw important conclusions about their overall robustness. Our findings reveal that major blockchain networks have vulnerabilities that make them susceptible to exploitation by malicious actors. Furthermore, despite relying on similar protocols for node discovery and network formation, we observe dissimilar characteristics among these blockchains.en_US
dc.language.isoenen_US
dc.rights© The Author(s)en_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectBlockchainen_US
dc.subjectP2P Networksen_US
dc.subjectResilienceen_US
dc.titleGraph Analysis of Blockchain P2P Overlays and Their Security Implicationsen_US
dc.typeConference Papersen_US
dc.collaborationCyprus University of Technologyen_US
dc.collaborationTelefonica Researchen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.countryCyprusen_US
dc.countrySpainen_US
dc.subject.fieldEngineering and Technologyen_US
dc.relation.conferenceLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.identifier.doi10.1007/978-981-99-5177-2_10en_US
dc.identifier.scopus2-s2.0-85172144211-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/85172144211-
dc.relation.volume14097 LNCSen_US
cut.common.academicyear2022-2023en_US
dc.identifier.spage167en_US
dc.identifier.epage186en_US
item.languageiso639-1en-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairetypeconferenceObject-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-6500-581X-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation
CORE Recommender
Show simple item record

SCOPUSTM   
Citations 20

2
checked on Mar 14, 2024

Page view(s) 20

109
Last Week
1
Last month
1
checked on Oct 6, 2024

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons