Tata, Venkata Nikhil (2024) Enhancing Peer-to-Peer Security with a Two-Stage Blockchain Model: Mitigating Sybil and 51% Attacks. Masters thesis, Dublin, National College of Ireland.
Preview |
PDF (Master of Science)
Download (1MB) | Preview |
Preview |
PDF (Configuration Manual)
Download (417kB) | Preview |
Abstract
The Blockchain technology is decentralized in nature which ensures data integrity and transparency but significantly fails in security challenges especially in peer-to-peer (P2P) networks, more prone to attacks like Sybil and 51% attacks. Therefore, applications like finance, secure communication and file sharing requires high security and trust to overcome these vulnerabilities. The current thesis work ensures to address these issues by implementing Two-Stage Secure P2P Model using Blockchain. It leverages the decentralized peer authentication method and ensure secure transaction validation mechanisms. Two-Stage Secure P2P includes, Blockchain centric cryptographic techniques to authenticate each person’s identity by limiting the number of nodes one can control. This limitation minimizes the domination of single user on the network reducing the Sybil and 51% attacks (Unchaining Blockchain Security Part 3: Exploring the Threats Associated with Private Blockchain Adoption | Trend Micro (US), 2024). In the later stage, Blockchain consensus mechanisms like Proof of Stake (PoS) which prioritizes the data integrity without affecting global consensus. Using NS-3 network simulator, model is being evaluated on the key performance metrics such as Scalability, latency, and resilience. Simulation results demonstrate that the proposed model effectively prevents common P2P attacks while maintaining high scalability and low transaction latency. By restricting node control per user, the model enhances trust and integrity within the network. This Two-Stage Secure P2P Model addresses critical security and privacy concerns in decentralized networks, offering a scalable and robust solution suitable for sensitive applications. Future work will explore optimizing scalability under high transaction volumes and refining node control mechanisms to further strengthen security.
Actions (login required)
![]() |
View Item |