Blockchain security using confidentiality, integrity, and availability for secure communication

Francis Ikenga-Metuh, Chukwuebuka and Yeboah-Ofori, Abel ORCID logoORCID: https://orcid.org/0000-0001-8055-9274 (2026) Blockchain security using confidentiality, integrity, and availability for secure communication. Blockchains, 4 (1).

[thumbnail of Blockchain Security Using Confidentiality_Yeboah-OforiA_VoR_pdf.pdf]
Preview
PDF/A
Blockchain Security Using Confidentiality_Yeboah-OforiA_VoR_pdf.pdf - Published Version
Available under License Creative Commons Attribution.

Download (2MB) | Preview

Abstract

Background:
Blockchain technology has emerged as a transformative communication solution for securing distributed systems. However, several vulnerabilities exist during transactions, including latency and network congestion issues during mempool processing, topology weaknesses, cross-chain bridge exploits, and cryptographic weaknesses. These vulnerabilities have led to attacks that have threatened system integrity, including Block Extractable Value (BEV) attacks, Maximal Extractable Value (MEV) attacks, sandwich attacks, liquidation, and Decentralized Finance (DeFi) reordering attacks, among others. Thus, implementing a robust security framework based on the Confidentiality, Integrity, and Availability (CIA) triad remains critical for addressing modern blockchain technology threats.

Objective:
This paper examines blockchain technology, its various vulnerabilities, and attacks to determine how criminals exploit the system during transactions. Further, it evaluates its impact on users. Then, implement a blockchain attack in a “MasterChain” virtual environment to demonstrate how vulnerable spots can be practically exploited and discuss the application of the CIA security triad through modern cryptographic primitives.

Methods:
The approach considers Hevner’s design science framework, which emphasizes creating innovative artifacts that address identified problems while contributing to the knowledge base through rigorous evaluation. Furthermore, we developed a MasterChain tool using Python with Flask for distributed node communication, utilizing the Elliptic Curve Digital Signature Algorithm (ECDSA) with the Standards for Efficient Cryptography Prime 256-bit Koblitz curve 1 (secp256k1) for digital signatures and Secure Hash (SHA-3) (Keccak-256) hashing for block integrity.

Results:
show how the CIA has been implemented to provide secure communication through ECDSA-based transactions, SHA-3 chain integrity verification, and a multi-node distributed architecture, respectively. The performance analysis shows that ECDSA provides 256-bit security with 64-byte signatures compared to 2048-bit Rivest–Shamir–Adleman (RSA)’s 256-byte signatures, achieving a 75% reduction in bandwidth overhead. SHA-3 provides immunity to length extension attacks while maintaining equivalent collision resistance to SHA-256.

Conclusions:
The MasterChain framework provides a practical foundation for implementing blockchain security that addresses both classical and emerging vulnerabilities. The adoption of ECDSA and SHA-3 (Keccak-256) positions the system favourably for modern blockchain applications, while providing insights into the cryptographic trade-offs between performance, security, and compatibility

Item Type: Article
Identifier: 10.3390/blockchains4010003
Keywords: blockchain security; CIA triad; ECDSA; SHA-3; Keccak-256; MEV attacks; distributed ledger technology; cryptographic hash functions; smart contracts; Cybersecurity
Subjects: Computing > Information security > Cyber security
Computing > Information security
Date Deposited: 01 Mar 2026
URI: https://repository.uwl.ac.uk/id/eprint/14685

Downloads

Downloads per month over past year

Actions (admin access)

View Item

Menu