Francis Ikenga-Metuh, Chukwuebuka and Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274
(2026)
Blockchain security using confidentiality, integrity, and availability for secure communication.
Blockchains, 4 (1).
Preview |
PDF/A
Blockchain Security Using Confidentiality_Yeboah-OforiA_VoR_pdf.pdf - Published Version Available under License Creative Commons Attribution. Download (2MB) | Preview |
Abstract
Background:
Blockchain technology has emerged as a transformative communication solution for securing distributed systems. However, several vulnerabilities exist during transactions, including latency and network congestion issues during mempool processing, topology weaknesses, cross-chain bridge exploits, and cryptographic weaknesses. These vulnerabilities have led to attacks that have threatened system integrity, including Block Extractable Value (BEV) attacks, Maximal Extractable Value (MEV) attacks, sandwich attacks, liquidation, and Decentralized Finance (DeFi) reordering attacks, among others. Thus, implementing a robust security framework based on the Confidentiality, Integrity, and Availability (CIA) triad remains critical for addressing modern blockchain technology threats.
Objective:
This paper examines blockchain technology, its various vulnerabilities, and attacks to determine how criminals exploit the system during transactions. Further, it evaluates its impact on users. Then, implement a blockchain attack in a “MasterChain” virtual environment to demonstrate how vulnerable spots can be practically exploited and discuss the application of the CIA security triad through modern cryptographic primitives.
Methods:
The approach considers Hevner’s design science framework, which emphasizes creating innovative artifacts that address identified problems while contributing to the knowledge base through rigorous evaluation. Furthermore, we developed a MasterChain tool using Python with Flask for distributed node communication, utilizing the Elliptic Curve Digital Signature Algorithm (ECDSA) with the Standards for Efficient Cryptography Prime 256-bit Koblitz curve 1 (secp256k1) for digital signatures and Secure Hash (SHA-3) (Keccak-256) hashing for block integrity.
Results:
show how the CIA has been implemented to provide secure communication through ECDSA-based transactions, SHA-3 chain integrity verification, and a multi-node distributed architecture, respectively. The performance analysis shows that ECDSA provides 256-bit security with 64-byte signatures compared to 2048-bit Rivest–Shamir–Adleman (RSA)’s 256-byte signatures, achieving a 75% reduction in bandwidth overhead. SHA-3 provides immunity to length extension attacks while maintaining equivalent collision resistance to SHA-256.
Conclusions:
The MasterChain framework provides a practical foundation for implementing blockchain security that addresses both classical and emerging vulnerabilities. The adoption of ECDSA and SHA-3 (Keccak-256) positions the system favourably for modern blockchain applications, while providing insights into the cryptographic trade-offs between performance, security, and compatibility
| Item Type: | Article |
|---|---|
| Identifier: | 10.3390/blockchains4010003 |
| Keywords: | blockchain security; CIA triad; ECDSA; SHA-3; Keccak-256; MEV attacks; distributed ledger technology; cryptographic hash functions; smart contracts; Cybersecurity |
| Subjects: | Computing > Information security > Cyber security Computing > Information security |
| Date Deposited: | 01 Mar 2026 |
| URI: | https://repository.uwl.ac.uk/id/eprint/14685 |
Downloads
Downloads per month over past year
Actions (admin access)
![]() |
Lists
Lists