THREAT OF 51 % ATTACK FOR LOW-HASHRATE CRYPTOCURRENCIES

Authors

DOI:

https://doi.org/10.32689/maup.it.2025.2.16

Keywords:

digital currencies, cryptocurrency exchanges, 51 % attack, low hash rate, game theory, strategy of opposing parties

Abstract

51 % attacks pose a serious threat to the security of blockchains, especially for digital currencies (DCs) with a low hash rate, which makes them vulnerable to manipulation and loss of trust by users.Purpose. Research into the threats of 51 % attacks in blockchains with low hashrate, in particular for CCs and cryptocurrency exchanges (CCEs), with the aim of developing effective countermeasure strategies using intelligent information systems (IIS) and game theory.Methodology. The review and analysis of previous research conducted within the article showed that this threat requires a comprehensive approach to protection. The article substantiates the use of game theory as a tool for analyzing the strategies of both parties, which can significantly improve the understanding of the dynamics of interaction between defenders and attackers, which in the future will allow developing more effective proactive measures to protect DCs and cryptocurrency exchanges (CEs), including using the potential of intelligent information systems (IIS).Scientific novelty. IIS may include a module for assessing the strategies of the parties to resist attacks, as well as the financial resources of the parties to the confrontation, which will help predict the possibility of implementing 51 % attacks or, conversely, effectively counteract them. It is shown that none of the protection methods is universal, therefore, combining different approaches is critically necessary to create sustainable solutions that can effectively respond to new threats, both for DCs and CEs.Conclusion. Future research should focus on the development and testing of new game models for the computational core of the IIS, which will integrate existing approaches and take into account the evolution of attack and protection methods in cryptocurrency systems, which will not only increase the level of security, but also ensure user trust in digital currencies, which, in turn, is important for their successful implementation and use in financial systems.

References

Гонак І. М. Ризики функціонування криптовалютного бізнесу. Науковий вісник Херсонського державного університету. Серія "Економічні науки", 2021. (44), 81–86.

Гребельний А. Кіберризики на криптовалютних біржах: причини, наслідки та їх мінімізація. Modern engineering and innovative technologies, 2024. (34-01), 106–113.

Amin M. R. 51% Attacks on Blockchain: Architecture of a Solution for a Proof-of-Work Blockchain to Protect IoT. Bachelor’s thesis, International University of Business Agriculture and Technology, Dhaka, Bangladesh. 2020.

Aponte-Novoa F. A., Orozco A. L. S., Villanueva-Polanco R., Wightman P. The 51% Attack on Blockchains: A Mining Behavior Study. IEEE access, 2021. 9, 140549–140564.

Baruwa Z., Bhattacherjee S., Chandnani S. R., Zhu Z. Perceptions of Social Media Perceptions of 51% Attacks on Proof-of-Work Cryptocurrencies: A Natural Language Processing Approach. arXiv preprint arXiv:2310.14307. 2023.

Bastiaan M. Preventing the 51%-Attack: A Stochastic Analysis of Two-Phase Proof-of-Work in Bitcoin. Access by link. 2015, January. URL: https://fmt.ewi.utwente.nl/media/175.pdf.

Hao Y. Research of the 51% Attack Based on Blockchain. In 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA. IEEE. 2022, May. pp. 278–283.

Kim S. K., Yeun C. Y., Damiani E., Al-Hammadi Y. Diverse Perspectives in New Blockchain Design Using Inventive Problem Solving Theory. У IEEE International Conference on Blockchain and Cryptocurrency, Seoul, South Korea. 2019, May.

La Morgia M., Mei A., Sassi F., Stefa J. Dogecoin on Wall Street: Analyzing and Detecting Cryptocurrency Pump-and- Dump Manipulations. ACM Transactions on Internet Technology, 2023. 23(1), 1–28. DOI: 10.1145/356130

Lansiaux E., Tchagaspanian N., Forget J. Social Influence on Cryptocurrency: A Comparative Example on Twitter between Dogecoin and Litecoin. Frontiers in Blockchain, 2022. 5, 829865. DOI:10.3389/fbloc.2022.829865

Lee S. A. Investigating the impact of cyber security attacks on cryptocurrency markets (doctoral dissertation, Macquarie University). 2022.

Nabilou H. Testing the waters of the Rubicon: the European Central Bank and central bank digital currencies. Journal of Banking Regulation, 2020. 21(4), 299–314.

Niranjani V., Kamachi P. S., Siddharth S., Venkatchalam V., Vishal H. A hybrid approach to minimise 51% attack in cryptocurrencies. In 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) IEEE. 2022, March. Vol. 1, pp. 2100–2103.

Rahman A. Implementation of hybrid PoW–PoS to prevent 51% attack in cryptocurrency system (Ph.D. dissertation, United International University). 2019.

Raju R. S., Gurung S., Rai P. Огляд атаки 51% в мережі Bitcoin. Contemporary Issues in Communication, Cloud and Big Data Analytics: Proceedings of CCB 2020, 2022. 39–55.

Ramos S., Pianese F., Leach T., Oliveras E. The Great Crypto Turbulence: Understanding Cryptocurrency Profitability under Attacks. Blockchain: Research and Applications, 2021. 2(3), 100021.

Sayeed S., Marco-Gisbert H. Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack. Applied sciences, 2019. 9(9), 1788. DOI:10.3390/app9091788

Sethaput V., Innet S. Blockchain application for central bank digital currencies (CBDC). Cluster Computing, 2023. 26(4), 2183–2197.

Taylor C. What Happens in a 51% Attack? CoinMarketCap Academy. URL: https://coinmarketcap.com/academy/article/what-happens-in-51-attacks

Yang X., Chen Y., Chen X. An Efficient Scheme against 51% Blockchain Attacks in Proof-of-Work Systems with weighted historical information. In 2019 IEEE International Conference on Blockchain (Blockchain) (pp. 261-265). IEEE.

Ye, C., Li, G., Cai, H., Gu, Y., & Fukuda, A. (2018, September). Analysis of security in blockchain: Case study in 51%-attack detecting. In 2018 5th International conference on dependable systems and their applications (DSA). IEEE. 2019, July. pp. 15–24.

Yi X., Fang Y., Wu D., Jiang L. BlockScope: detection and analysis of common vulnerabilities in forked blockchain projects. 2022. arXiv preprint arXiv:2208.00205.

Published

2025-09-23

How to Cite

МАРТИНЮК, І., & ДЕСЯТКО, А. (2025). THREAT OF 51 % ATTACK FOR LOW-HASHRATE CRYPTOCURRENCIES . Information Technology and Society, (2 (17), 110-115. https://doi.org/10.32689/maup.it.2025.2.16