A systematic literature review on endpoint vulnerabilities of blockchain applications

1Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

Blockchain technology is a publicly accessible, decentralized, and immutable ledger that significantly simplifies transaction recording and asset management in a corporate network. Assets can be tangible, like houses, cars, cash, or land, or intangible, such as intellectual property, patents, copyrights, or branding. Each data piece is considered unique, with every block in the chain having its own hash and containing the hash of the previous block. As one of the most emerging technologies, blockchain has added built-in flexibility that has revolutionized various sectors. Due to its comprehensive nature, it's increasingly being adopted by both financial and non-financial transaction platforms. However, as with any developing technology, blockchain faces its own set of challenges, including scalability, privacy, regulatory, and security issues. Recent security breaches have raised significant concerns about its robustness and safety. Endpoint vulnerabilities represent a particularly critical security issue that needs addressing. This study systematically reviews the literature to present the current state of knowledge regarding endpoint vulnerabilities in blockchain, their potential causes, and possible mitigation strategies. It involves a selection of recent studies focusing on these vulnerabilities and related issues. The major findings highlight the lack of user knowledge, inadequate security mechanisms, the absence of multiple security layers beyond authentication, and the prevalence of keylogger malware as key factors behind the exploitation of endpoint vulnerabilities. The study delineates various factors and root causes of these vulnerabilities, establishing a relationship between the endpoint and its attributes/components. It notes that without sufficient mechanisms to counteract attacks, users are more prone to technical and behavioral errors. Furthermore, this research addresses the gap in systematic literature reviews (SLR) on endpoint vulnerabilities in blockchain. It aims to raise security awareness among users, enhance security measures for developers, and provide valuable insights for further investigation by researchers. This study is a step towards understanding and improving the security posture at the endpoints of blockchain networks.

Cite

CITATION STYLE

APA

Noor, M. A. F., & Mustafa, K. (2023, December 1). A systematic literature review on endpoint vulnerabilities of blockchain applications. International Journal of Advanced Technology and Engineering Exploration. Accent Social and Welfare Society. https://doi.org/10.19101/IJATEE.2023.10101498

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free