NORMA eResearch @NCI Library

Enhancing Peer-to-Peer Security with a Two-Stage Blockchain Model: Mitigating Sybil and 51% Attacks

Tata, Venkata Nikhil (2024) Enhancing Peer-to-Peer Security with a Two-Stage Blockchain Model: Mitigating Sybil and 51% Attacks. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
Preview
PDF (Master of Science)
Download (1MB) | Preview
[thumbnail of Configuration Manual]
Preview
PDF (Configuration Manual)
Download (417kB) | Preview

Abstract

The Blockchain technology is decentralized in nature which ensures data integrity and transparency but significantly fails in security challenges especially in peer-to-peer (P2P) networks, more prone to attacks like Sybil and 51% attacks. Therefore, applications like finance, secure communication and file sharing requires high security and trust to overcome these vulnerabilities. The current thesis work ensures to address these issues by implementing Two-Stage Secure P2P Model using Blockchain. It leverages the decentralized peer authentication method and ensure secure transaction validation mechanisms. Two-Stage Secure P2P includes, Blockchain centric cryptographic techniques to authenticate each person’s identity by limiting the number of nodes one can control. This limitation minimizes the domination of single user on the network reducing the Sybil and 51% attacks (Unchaining Blockchain Security Part 3: Exploring the Threats Associated with Private Blockchain Adoption | Trend Micro (US), 2024). In the later stage, Blockchain consensus mechanisms like Proof of Stake (PoS) which prioritizes the data integrity without affecting global consensus. Using NS-3 network simulator, model is being evaluated on the key performance metrics such as Scalability, latency, and resilience. Simulation results demonstrate that the proposed model effectively prevents common P2P attacks while maintaining high scalability and low transaction latency. By restricting node control per user, the model enhances trust and integrity within the network. This Two-Stage Secure P2P Model addresses critical security and privacy concerns in decentralized networks, offering a scalable and robust solution suitable for sensitive applications. Future work will explore optimizing scalability under high transaction volumes and refining node control mechanisms to further strengthen security.

Item Type: Thesis (Masters)
Supervisors:
Name
Email
Hafeez, Khadija
UNSPECIFIED
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software > Computer Security > Database security > Blockchains (Databases)
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security > Database security > Blockchains (Databases)
Z Bibliography. Library Science. Information Resources > ZA Information resources > ZA4050 Electronic information resources > Databases > Distributed databases > Blockchains (Databases)
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Ciara O'Brien
Date Deposited: 28 Jul 2025 14:18
Last Modified: 28 Jul 2025 14:18
URI: https://norma.ncirl.ie/id/eprint/8268

Actions (login required)

View Item View Item