Next Article in Journal
Quantitative Demonstration of Wear Rate and Dissipation Energy during Tension–Torsion Cyclic Loading of Steel Wires with Fretting Contact in Different Environmental Media
Next Article in Special Issue
From Agents to Blockchain: Stairway to Integration
Previous Article in Journal
Multidomain Simulation Model for Analysis of Geometric Variation and Productivity in Multi-Stage Assembly Systems
Previous Article in Special Issue
Rentable CDN Using Blockchain and Proof of Provenance

Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks

School of Computing, Engineering and Physical Sciences, University of the West of Scotland, High Street, Paisley PA1 2BE, UK
Author to whom correspondence should be addressed.
Current address: High Street, Paisley PA1 2BE, UK.
Appl. Sci. 2020, 10(18), 6607;
Received: 19 August 2020 / Revised: 3 September 2020 / Accepted: 17 September 2020 / Published: 22 September 2020
(This article belongs to the Special Issue Advances in Blockchain Technology and Applications II)
The blockchain is a distributed ledger technology that is growing in importance since inception. Besides cryptocurrencies, it has also crossed its boundary inspiring various organizations, enterprises, or business establishments to adopt this technology benefiting from the most innovative security features. The decentralized and immutable aspects have been the key points that endorse blockchain as one of the most secure technologies at the present time. However, in recent times such features seemed to be faded due to new attacking techniques. One of the biggest challenges remains within the consensus protocol itself, which is an essential component to bring all network participants to an agreed state. Cryptocurrencies adopt suitable consensus protocols based on their mining requirement, and Proof of Work (PoW) is the consensus protocol that is being predominated in major cryptocurrencies. Recent consensus protocol-based attacks, such as the 51% attack, Selfish Mining, Miner Bribe Attack, Zero Confirmation Attack, and One Confirmation Attack have been demonstrated feasible. To overcome these attacks, we propose Proof of Adjourn (PoAj), a novel consensus protocol that provides strong protection regardless of attackers hashing capability. After analyzing the 5 major attacks, and current protection techniques indicating the causes of their failure, we compared the PoAj against the most widely used PoW, showing that PoAj is not only able to mitigate the 5 attacks but also attacks relying on having a large amount of hashing power. In addition, the proposed PoAj showed to be an effective approach to mitigate the processing time issue of large-sized transactions. PoAj is not tailored to any particular attack; therefore, it is effective against malicious powerful players. The proposed approach provides a strong barrier not only to current and known attacks but also to future unknown attacks based on different strategies that rely on controlling the majority of the hashing power. View Full-Text
Keywords: blockchain attacks; attack techniques; 51% attack; vulnerability blockchain attacks; attack techniques; 51% attack; vulnerability
Show Figures

Graphical abstract

MDPI and ACS Style

Sayeed, S.; Marco-Gisbert, H. Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks. Appl. Sci. 2020, 10, 6607.

AMA Style

Sayeed S, Marco-Gisbert H. Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks. Applied Sciences. 2020; 10(18):6607.

Chicago/Turabian Style

Sayeed, Sarwar, and Hector Marco-Gisbert. 2020. "Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks" Applied Sciences 10, no. 18: 6607.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop