Table 3 Comparison of the threat actors and some of the attack scenarios and corresponding examples.
From: Adapting blockchain’s proof-of-work mechanism for multiple traveling salesmen problem optimization
Threat actor | Threat scenario | Example |
|---|---|---|
Malicious miners | 51% Attack22 | Malicious miners set controls over 50% of the blockchain's computational power, threatening transaction integrity |
External attackers | Double-spending23 | In a decentralized mTSP environment, external attackers try to utilize the same cryptocurrency multiple times |
Denial of service (DoS) and distributed DoS24 | Attackers overload the system with requests, preventing genuine users from accessing it | |
Sybil attacks25 | Attackers create multiple Sybil nodes or identities to control the network and disrupt consensus | |
Eclipse attacks26 | Attackers separate a node from the network in order to influence its routing choices or deny it access to certain information |