An Overview of Block-Chain Technology and Related Security Attacks: Systematic Literature Review
An Overview of Block-Chain Technology and Related Security Attacks: Systematic Literature Review
An Overview of Block-Chain Technology and Related Security Attacks: Systematic Literature Review
10209791
SELIN UZELALTINBULAT
Faculty of Engineering and Architecture, World Peace University, Nicosia, TRNC.
Email: selin.kocyigit@wpu.edu.tr
Dr. SAHAR EBADINEZHAD*
Assistant Professor, Department of Computer Information Systems, Near East University, Nicosia, North Cyprus.
Computer Information Systems Research and Technology Center (Cisrtc), Near East University, Nicosia, North
Cyprus. *Corresponding Author Email: sahar.ebadinezhad@neu.edu.tr, ORCID: https://orcid.org/0000-0001-
9782-4820
Abstract
Blockchain technology, a transformative innovation with diverse applications, raises concerns about the security
and integrity of its networks. This article provides a comprehensive review, introducing blockchain concepts such
as consensus algorithms, distributed ledgers, and cryptographic methods. Understanding these fundamentals is
crucial for grasping the operational and security aspects of blockchain systems. The research delves into real-
world applications across industries like energy, supply chain, healthcare, and banking, examining both benefits
and challenges. Additionally, this study addresses cyberattacks on blockchain networks, identifying and analyzing
prevalent types like double spending, Sybil attacks, 51% assaults, and smart contract vulnerabilities. The findings
enable the design of robust security measures to safeguard blockchain networks.
Keywords: Blockchain Technology, Security Attacks, Cryptocurrency, Cybersecurity, Cryptographic Techniques,
Privacy in Blockchain.
1. INTRODUCTION
There is no denying that blockchain technology is becoming more and more popular. It has had
a significant impact on the world beyond just gaining popularity. Blockchain is a distributed,
decentralized system for logging and tracking online activity (Khalil et al., 2022). In addition
to facilitating bitcoin transactions, the blockchain has the potential to empower the
development of decentralized applications without intermediaries and serve as the foundation
for integral components of internet security infrastructures (Taylor et al., 2020). There are three
distinct types of blockchain: public, private, and consortium, as identified in studies by
Mohanta et al. (2019) and Islam (2023). The blockchain exhibits essential characteristics,
including decentralization, immutability, traceability, and autonomy, as noted by Chen et al.
(2022). The blockchain technology comprises of consensus algorithm, smart contract,
cryptography for blockchain (Guo, and Yu, 2022). Internet of Things (IoT), data storage and
sharing, network security, protection of private user data, and improving the usability and
dependability of the World Wide Web are just a few examples of domains where blockchain
applications with a security focus can be found (Taylor et al., 2020). Blockchain technology
are susceptible to various risks and attacks, which includes double spending, privacy breaches,
vulnerabilities in private key security, mining attacks, and balanced attacks, 51% vulnerability
842 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
attack, transaction privacy leakage, DAO attack, BGP hijacking attack, Sybil attack ((Mohanta
et al., 2019; Singh et al., 2021). By conducting a systematic literature, this study aim to provide
a comprehensive understanding of the fundamental principles, applications, and security
challenges associated with blockchain technology. In order to carry out this function 3 research
questions has been formulated. To address these research questions, the systematic literature
review explores relevant research papers, published within 2018-2023. This ensures that the
results of this study is based on the most recent advancements and insights in the field of
blockchain technology and security.
By combining current research, detecting developing patterns, and pointing out potential
research areas, the results of this review will add to the body of existing knowledge. In the end,
this research intends to improve our comprehension of blockchain technology and enable the
creation of future blockchain systems that are more reliable and secure.In this context, we
proposed three research questions as follow:
RQ1: What are the fundamental principles and components of blockchain technology?
RQ2: What are the applications of blockchain?
RQ3: What are the most common types of cyber-attacks targeting blockchain networks?
2. LITERATURE REVIEW
After comparing different types of blockchain, it is further elucidated that blockchain possesses
certain characteristics such as the ability to grant read permissions, efficiency, immutability,
consensus determination, and process that ultimately leads to decentralization (Vivekanadam,
2020). According to Idrees et al., (2021), blockchain may consist of various additional
elements, but the fundamental and essential components that need to be comprehended for
gaining a deeper understanding of the technology are block, hash pointer, markle tree, digital
signature, transactions, and consensus mechanism.
Puneeth and Parthasarathy (2021) provided an overview of diverse scalability solutions and
security-privacy techniques aimed at enhancing the efficiency of blockchain technology. These
security-privacy techniques encompass various approaches such as mixing, group signature,
homomorphic encryption, attribute-based encryption, secure multi-party encryption, and
trusted execution environment.
Abed and Manaa (2020) suggest a blockchain-based secure file approach to safeguard sensitive
and personal data from unauthorized access. By utilizing immutable and secure log files, this
approach offers evidence of log manipulation and non-repudiation. To assess its efficacy, the
researchers conducted experiments by comparing server attacks with and without the
implementation of blockchain technology. The findings demonstrate that the adoption of
blockchain technology can effectively prevent log file manipulation and enhance the security
of sensitive information.
ElMamy et al., (2020) perform a comparative evaluation of the most relevant studies focusing
on the utilization of blockchain technology in Industry 4.0. This assessment is based on various
843 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
3. METHODOLOGY
This study was carried out using Kitchenham's (2007) suggested methods for a systematic
literature review. A systematic review is a method for locating, assessing, and interpreting all
research studies that are relevant to a certain research question or area of interest (Kitchenham,
2007). Three steps of the review process with associated activities are:
a. Making the review plan: To determine whether a review is necessary, the review protocol
must be specified, including the search keywords and resources to be used, the inclusion
and exclusion criteria, the study selection process, the data extraction plan, and the data
synthesis process.
b. Carrying out the review: Locate a sizable number of primary studies that are relevant to the
study issue, and learn about the primary studies' caliber, data extraction, discussion, and
conclusions.
c. Reporting the evaluation: To construct the report document and write up the review's
findings.
3.1 Search Logic
The following keywords are considered during searching the databases. “blockchain” OR
“blockchain technology” OR “block chain technology” OR “block chain” OR “block chain
security” OR “distributed ledger” AND “Cyber security” OR “security” OR “network security”
AND “Attacks” OR “risks” OR “cyber-attacks” OR “security attacks” OR “vulnerabilities”
OR “threats”
844 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
845 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
4. RESULTS
4.1 RQ1: what are the fundamental principles and components of blockchain technology
Blockchain is an innovative method of handling and securing transactions through a
decentralized database system. It ensures that transactions are validated and protected against
unauthorized changes while maintaining consistency among a large group of participants
referred to as nodes (Ali et al., 2021). Blockchain is a comprehensive technical system that
consists of several different components rather than simply one technology. Distributed data
storage, point-to-point communication, consensus techniques, and encryption algorithms are
some of these elements. Blockchain builds a comprehensive foundation for safe and
846 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
847 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
848 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
849 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
source is unknown, there exists a potential for intentional dissemination of incorrect data
by a node. Such actions can give rise to security vulnerabilities like Sybil Attacks and
Double-Spending Attacks (Huo et al., 2022). Therefore, the layer of consensus
incorporates a range of consensus mechanisms that determine the selection of the entity
authorized to assemble the subsequent block (Wen et al., 2021).
F. Control layer: The control layer serves as the central hub where different applications and
the ledger interact. It encompasses components such as the processing model, control
contract, and execution environment (Huo et al., 2022).
G. Applicattion layer: The application layer encompasses a wide range of application
scenarios, including programmable currency, programmable finance, and programmable
society (Wen et al., 2021). Users can access various applications defined within the
application layer by utilizing the standard interface offered by the application layer (Li et
al., 2021).
850 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
et al., 2021), healthcare, integrity verification (provenance and counterfeit, insurance, and
intellectual property), governance, privacy and management, business and industrial
applications (supply chain management), education, data management (Casino et al., 2019),
manufacturing sector (Ali et al., 2021), power grid, transport system, commercial world, cloud
computing, reputation (Mohanta et al., 2019). An overview of the blockchain applications are
represented in Figure 4.
851 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
852 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
C. 51% vulnerability attack: Li et al., (2020) stated that the distributed consensus mechanism
plays a vital role in establishing trust within the blockchain. However, this mechanism is
susceptible to a 51% vulnerability, which attackers can exploit to gain control over the entire
blockchain. Particularly in PoW-based blockchains, if a single miner's hashing power
exceeds 50% of the total hashing power, a 51% attack becomes possible. Consequently,
concerns arise when mining power becomes concentrated in a few mining pools, leading to
the potential scenario where a single pool controls more than half of the computing power.
This vulnerability can be exploited by attackers to execute several types of attacks,
including: -Reversing transactions and initiating double spending attacks (spending the
same coins multiple times), -Manipulating the order and exclusion of transactions, -
Disrupting the normal mining operations of other miners, -Obstructing the confirmation
process of regular transactions. The 51% vulnerability attack is shown in Figure 5.
5. DISCUSSION
The discussion section of this article presents a comprehensive analysis of the research
questions posed in this systematic literature review on blockchain technology and related
security attacks.
5.1 Fundamental Principles and Components of Blockchain Technology
The findings reveal that blockchain technology is built on several fundamental principles and
components. The distributed ledger, which ensures data transparency and immutability, is a key
853 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
component. Consensus algorithms are essential for building participant confidence and
preserving the blockchain's integrity. Digital signatures and hashing are two examples of
cryptographic algorithms that offer data protection and authentication. Self-executing and
programmable transactions are made possible by smart contracts. Together, these tenets and
elements support blockchain technology's decentralized and secure structure.
5.2 Applications of Blockchain
The report demonstrates how blockchain technology can be applied in a multitude of industries.
Blockchain has the power to completely transform identity verification, cross-border
transactions, and payment systems in the financial industry. Blockchain technology can help
supply chain management by offering transparent, traceable records that guarantee product
authenticity and lower fraud. Voting systems, decentralized energy grids, healthcare data
management, and intellectual property rights management are a few other noteworthy
applications. According to studies, there is continuous investigation into a wide range of fields
on the possible applications of blockchain technology.
5.3 Common Types of Cyber Attacks Targeting Blockchain Networks
Several frequent categories of cyberattacks that target blockchain networks are identified by
this systematic review. These include 51% attacks, in which a single entity gains majority
control of the network's computational power; Sybil attacks, in which an attacker creates
multiple fake identities to control the network; double spending, in which a user tries to spend
the same digital asset more than once; and vulnerabilities in smart contracts, which can be used
to carry out malicious or unauthorized actions. These attacks emphasize how critical it is to
comprehend and manage the security concerns related to blockchain technology.
6. CONCLUSION
Finally, a thorough overview of blockchain technology and associated security threats is given
by this systematic literature study. The decentralized, transparent, and safe nature of blockchain
technology is revealed through an examination of its core ideas and constituent parts. The paper
also looks at the various uses of blockchain technology, showing how it can revolutionize
several sectors, including supply chain management, healthcare, and banking. In addition, the
recognition and analysis of prevalent forms of cyberattacks directed at blockchain networks
illuminated the susceptibilities and hazards linked to this technology. To counter these risks
and safeguard the integrity of blockchain networks, it highlights the necessity of implementing
strong security measures.
This comprehensive analysis of the literature adds to the body of knowledge already in
existence by compiling and interpreting research results on blockchain technology and
associated security threats. For scholars, professionals, and decision-makers looking for a
thorough grasp of blockchain technology and the related security environment, it offers
insightful information. This analysis lays the groundwork for future investigations and
developments in blockchain security by answering the research questions and providing an
overview of the major discoveries.
854 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
Disclosure Statement: The authors report there are no competing interests to declare.
Data Availability Statement: there is no data set associated with this paper.
References
1) Abed, F. N., & Manaa, M. E. (2020). A proactive secure file approach using a block chain technique.
Journal of Discrete Mathematical Sciences and Cryptography, 23(6), 1235-1242. doi:
10.1080/09720529.2020.1727610
2) Ali, O., Jaradat, A., Kulakli, A., & Abuhalimeh, A. (2021). A comparative study: Blockchain technology
utilization benefits, challenges and functionalities. Ieee Access, 9, 12730-12749. DOI:
10.1109/ACCESS.2021.3050241
3) Alladi, T., Chamola, V., Sahu, N., Venkatesh, V., Goyal, A., & Guizani, M. (2022). A comprehensive survey
on the applications of blockchain for securing vehicular networks. IEEE Communications Surveys &
Tutorials. DOI: 10.1109/COMST.2022.3160925
4) Casino, F., Dasaklis, T. K., & Patsakis, C. (2019). A systematic literature review of blockchain-based
applications: Current status, classification and open issues. Telematics and informatics, 36, 55-81. DOI:
https://doi.org/10.1016/j.tele.2018.11.006
5) Chen, Y., Chen, H., Zhang, Y., Han, M., Siddula, M., & Cai, Z. (2022). A survey on blockchain systems:
Attacks, defenses, and privacy preservation. High-Confidence Computing, 2(2), 100048.
https://doi.org/10.1016/j.hcc.2021.100048
6) ElMamy, S. B., Mrabet, H., Gharbi, H., Jemai, A., & Trentesaux, D. (2020). A Survey on the Usage of
Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Applied Sciences, 10(21),
7545. https://doi.org/10.3390/app10217545
7) Guo, H., & Yu, X. (2022). A Survey on Blockchain Technology and its security. Blockchain: research and
applications, 3(2), 100067. https://doi.org/10.1016/j.bcra.2022.100067
8) Huo, R., Zeng, S., Wang, Z., Shang, J., Chen, W., Huang, T., ... & Liu, Y. (2022). A comprehensive survey
on blockchain in industrial internet of things: Motivations, research progresses, and future challenges. IEEE
Communications Surveys & Tutorials, 24(1), 88-122.
9) Idrees, S. M., Nowostawski, M., Jameel, R., & Mourya, A. K. (2021). Security aspects of blockchain
technology intended for industrial applications. Electronics, 10(8), 951.
https://doi.org/10.3390/electronics10080951
10) Iqbal, M., & Matulevičius, R. (2021). Exploring sybil and double-spending risks in blockchain
systems. IEEE Access, 9, 76153-76177.
11) Islam, M. D. (2023). A survey on the use of blockchains to achieve supply chain security. Information
Systems, 102232. DOI: https://doi.org/10.1016/j.is.2023.102232
Chen, H., Luo, X., Shi, L., Cao, Y., & Zhang, Y. (2023). Security challenges and defense approaches for
blockchain-based services from a full-stack architecture perspective. Blockchain: Research and
Applications, 100135. https://doi.org/10.1016/j.bcra.2023.100135
12) Khalil, A. A., Franco, J., Parvez, I., Uluagac, S., Shahriar, H., & Rahman, M. A. (2022, June). A literature
review on blockchain-enabled security and operation of cyber-physical systems. In 2022 IEEE 46th Annual
Computers, Software, and Applications Conference (COMPSAC) (pp. 1774-1779). IEEE.
13) Kim, T., Ochoa, J., Faika, T., Mantooth, A.H., Di, J., Li, Q., Lee, Y. (2022). An Overview of Cyber-Physical
Security of Battery Management Systems and Adoption of Blockchain Technology, IEEE Journal of
Emerging and Selected Topics in Power Electronics, 10(1), 1270-1281, doi:
10.1109/JESTPE.2020.2968490.
855 | V 1 8 . I 1 1
DOI: 10.5281/zenodo.10209791
14) Kitchenham, B. (2007). Guidelines for performing systematic literature reviews in software engineering.
Version 2.3 EBSE technical report. EBSE-2007-01.
15) Lee, S., & Kim, S. (2021). Blockchain as a cyber defense: opportunities, applications, and challenges. IEEE
Access, 10, 2602-2618. DOI: 10.1109/ACCESS.2021.3136328
16) Li, W., He, M., & Haiquan, S. (2021, June). An overview of blockchain technology: applications,
challenges and future trends. In 2021 IEEE 11th International Conference on Electronics Information and
Emergency Communication (ICEIEC) 2021 IEEE 11th International Conference on Electronics
Information and Emergency Communication (ICEIEC) (pp. 31-39). IEEE. DOI:
10.1109/ICEIEC51955.2021.9463842
17) Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2020). A survey on the security of blockchain
systems. Future generation computer systems, 107, 841-853.
http://dx.doi.org/10.1016/j.future.2017.08.020
18) Mohanta, B. K., Jena, D., Panda, S. S., & Sobhanayak, S. (2019). Blockchain technology: A survey on
applications and security privacy challenges. Internet of Things, 8, 100107.
https://doi.org/10.1016/j.iot.2019.100107
19) Puneeth, R.P., & Parthasarathy, G. (2021). A Comprehensive Survey on Privacy-Security and Scalability
Solutions for Block Chain Technology. In Smart Intelligent Computing and Communication Technology,
(pp. 173–178). IOS Press. https://doi.org/10.3233/APC210031
20) Schlatt, V., Guggenberger, T., Schmid, J., & Urbach, N. (2023). Attacking the trust machine: Developing
an information systems research agenda for blockchain cybersecurity. International journal of information
management, 68, 102470. https://doi.org/10.1016/j.ijinfomgt.2022.102470
21) Singh, S., Hosen, A. S., & Yoon, B. (2021). Blockchain security attacks, challenges, and solutions for the
future distributed iot network. IEEE Access, 9, 13938-13959. DOI: 10.1109/ACCESS.2021.3051602
22) Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2020). A systematic literature
review of blockchain cyber security. Digital Communications and Networks, 6(2), 147-156.
https://doi.org/10.1016/j.dcan.2019.01.005
23) Thabit, F., Can, O., Aljahdali, A. O., Al-Gaphari, G. H., & Alkhzaimi, H. A. (2023). A Comprehensive
Literature Survey of Cryptography Algorithms for Improving the IoT Security. Internet of Things, 100759.
https://doi.org/10.1016/j.iot.2023.100759
24) Vance, T. R., & Vance, A. (2019, October). Cybersecurity in the blockchain era: a survey on examining
critical infrastructure protection with blockchain-based technology. In 2019 IEEE International Scientific-
Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T) (pp. 107-112).
IEEE. doi: 10.1109/PICST47496.2019.9061242.
25) Vivekanadam, B. (2020). Analysis of Recent Trend and Applications in Block Chain Technology. Journal
of ISMAC, 2(4), 200-206. https://doi.org/10.36548/jismac.2020.4.003
26) Wen, Y., Lu, F., Liu, Y., & Huang, X. (2021). Attacks and countermeasures on blockchains: A survey from
layering perspective. Computer Networks, 191, 107978. https://doi.org/10.1016/j.comnet.2021.107978
27) Wenhua, Z., Qamar, F., Abdali, T. A. N., Hassan, R., Jafri, S. T. A., & Nguyen, Q. N. (2023). Blockchain
Technology: Security Issues, Healthcare Applications, Challenges and Future Trends. Electronics, 12(3),
546. https://doi.org/10.3390/electronics12030546
856 | V 1 8 . I 1 1