Special Issue "Blockchain Security"

Submission Deadline: 15 May 2021 (closed)
Guest Editors
Prof. Zhihong Tian, Guangzhou University, China
Prof. Yanhui Guo, University of Illinois Springfield, USA
Prof. Shen Su, Guangzhou University, China
Prof. Hui Lu, Guangzhou University, China


Motivated by the fast evolvement of blockchain technology, cloud-edge platforms, intelligent transportation systems, smart grid, vehicular networks, location based services, and other IoT applications have achieved significant breakthrough during recent years. Nowadays, blockchain based researches and projects are super-hot topics and focuses for both research and industrial communities. However, most of the current blockchain projects still suffer from insufficient security concerns. The defects of the underlying protocol make the node communication vulnerable to be hijacked, and further exacerbate the fork problem; smart contracts can hardly be fully tested before deployment because of the evolving blockchain platforms, while the smart contracts updating is impossible (or very complicated); current data privacy protection techniques are either inefficient or inaccurate; sharing and cross-chain schemes brought new security problems together with its TPS promotion. The intrinsic security vulnerabilities make the current blockchain based systems and architectures prone to be assaulted, and further do harm to the confidence of the investment on the blockchain industrial. Worse still, blockchain turns out to play a critical role in a lot of existing security solutions, which would be useless if the blockchain is insecure.


This special issue aims to bring together researchers, engineers, students in both academic and industrial communities to share and present their recent insights and emerging results of the blockchain security technologies.

Potential topics include but are not limited to:
• Key management schemes for blockchain
• Theoretical model for blockchain
• Transaction anonymization techniques
• Smart contract vulnerability mining and formal verification methods
• Online transaction protection for smart contract
• Supervisory control and governance in blockchain networks
• Security solutions for cross-chain communication and multi-chain technology
• Security solutions for sharding techniques
• Network security of blockchain
• Data privacy protection scheme for blockchain data and network
• Security solutions for external data collection
• Security of consensus protocol
• Initialization and reconstruction schemes for blockchain
• Defense mechanism for blockchain cyber attacks
• Blockchain-based security reinforcement solutions

Published Papers
  • FileWallet: A File Management System Based on IPFS and Hyperledger Fabric
  • Abstract Online file management systems enable cooperatively editing and sharing. However, due to the cost of communication and storage infrastructures, traditional online file management services, e.g., Google Drive and OneDrive, usually provide limited storage space and relatively low download speed for free users. To achieve better performance, ordinary users have to purchase their expensive services. Moreover, these file management systems are based on centralized architecture and bear the privacy leakage risk, because users’ personal files are stored and controlled by their servers. To address the above problems, we propose a peer-to-peer (P2P) file management system based on IPFS and Hyperledger Fabric,… More
  •   Views:853       Downloads:490        Download PDF

  • Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns
  • Abstract With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to computer network security. The blockchain uses the P2P protocol to implement various functions across the network. Furthermore, the P2P protocol format of blockchain may differ from the standard format specification, which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them. Therefore, the ability to distinguish different types of unknown network protocols is vital for network security. In this paper, we propose… More
  •   Views:529       Downloads:373        Download PDF

  • Ripple+: An Improved Scheme of Ripple Consensus Protocol in Deployability, Liveness and Timing Assumption
  • Abstract Ripple acts as a real-time settlement and payment system to connect banks and payment providers. As the consensus support of the Ripple network to ensure network consistency, Ripple consensus protocol has been widely concerned in recent years. Compared with those Byzantine fault tolerant protocols, Ripple has a significant difference that the system can reach an agreement under decentralized trust model. However, Ripple has many problems both in theory and practice, which are mentioned in the previous researches. This paper presents Ripple+, an improved scheme of Ripple consensus protocol, which improves Ripple from three aspects: (1) Ripple+ employs a specific trust… More
  •   Views:702       Downloads:416        Download PDF

  • IDV: Internet Domain Name Verification Based on Blockchain
  • Abstract The rapid development of blockchain technology has provided new ideas for network security research. Blockchain-based network security enhancement solutions are attracting widespread attention. This paper proposes an Internet domain name verification method based on blockchain. The authenticity of DNS (Domain Name System) resolution results is crucial for ensuring the accessibility of Internet services. Due to the lack of adequate security mechanisms, it has always been a challenge to verify the authenticity of Internet domain name resolution results. Although the solution represented by DNSSEC (Domain Name System Security Extensions) can theoretically solve the domain name verification problem, it has not been… More
  •   Views:843       Downloads:793        Download PDF

  • A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism
  • Abstract As one of the most valuable technologies, blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios. However, data on a blockchain cannot be deleted. As a result, it is impossible to clean invalid and sensitive data and correct erroneous data. This, to a certain extent, hinders the application of blockchains in supply chains and Internet of Things. To address this problem, this study presents a deletable and modifiable blockchain scheme (DMBlockChain) based on record verification trees (RVTrees) and the multisignature scheme. (1) In this scheme, an RVTree structure is designed and added… More
  •   Views:892       Downloads:809       Cited by:2        Download PDF

  • An Adversarial Smart Contract Honeypot in Ethereum
  • Abstract A smart contract honeypot is a special type of smart contract. This type of contract seems to have obvious vulnerabilities in contract design. If a user transfers a certain amount of funds to the contract, then the user can withdraw the funds in the contract. However, once users try to take advantage of this seemingly obvious vulnerability, they will fall into a real trap. Consequently, the user’s investment in the contract cannot be retrieved. The honeypot induces other accounts to launch funds, which seriously threatens the security of property on the blockchain. Detection methods for honeypots are available. However, studying… More
  •   Views:1044       Downloads:1948        Download PDF

  • Attribute-Based Keyword Search over the Encrypted Blockchain
  • Abstract To address privacy concerns, data in the blockchain should be encrypted in advance to avoid data access from all users in the blockchain. However, encrypted data cannot be directly retrieved, which hinders data sharing in the blockchain. Several works have been proposed to deal with this problem. However, the data retrieval in these schemes requires the participation of data owners and lacks finer-grained access control. In this paper, we propose an attribute-based keyword search scheme over the encrypted blockchain, which allows users to search encrypted files over the blockchain based on their attributes. In addition, we build a file chain… More
  •   Views:1001       Downloads:725        Download PDF

  • Mining Bytecode Features of Smart Contracts to Detect Ponzi Scheme on Blockchain
  • Abstract The emergence of smart contracts has increased the attention of industry and academia to blockchain technology, which is tamper-proofing, decentralized, autonomous, and enables decentralized applications to operate in untrustworthy environments. However, these features of this technology are also easily exploited by unscrupulous individuals, a typical example of which is the Ponzi scheme in Ethereum. The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant. To solve this problem, we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode. In… More
  •   Views:1023       Downloads:1057        Download PDF

  • Stereo Matching Method Based on Space-Aware Network Model
  • Abstract The stereo matching method based on a space-aware network is proposed, which divides the network into three sections: Basic layer, scale layer, and decision layer. This division is beneficial to integrate residue network and dense network into the space-aware network model. The vertical splitting method for computing matching cost by using the space-aware network is proposed for solving the limitation of GPU RAM. Moreover, a hybrid loss is brought forward to boost the performance of the proposed deep network. In the proposed stereo matching method, the space-aware network is used to calculate the matching cost and then cross-based cost aggregation… More
  •   Views:1240       Downloads:797        Download PDF