{"title":"A first Step towards a Protection Profile for the Security Evaluation of Consensus Mechanisms","authors":"Christine Hennebert","doi":"10.1109/IOTSMS52051.2020.9340216","DOIUrl":null,"url":null,"abstract":"While numerous studies deepen the security issues of the distributed consensus mechanisms, the lack of a normalized reference for their security evaluation makes it difficult to exploit their conclusions. In this paper, the author applies the rigorous standardized methodology of the Common Criteria to consensus mechanisms and defines the security problem to introduce a Protection Profile focused on a peer node as physical device, in its blockchain environment. The aim is to focus on the security assessment of a physical peer device in a distributed network. The further goal is to succeed in defining shared relevant evaluation metrics.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IOTSMS52051.2020.9340216","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
While numerous studies deepen the security issues of the distributed consensus mechanisms, the lack of a normalized reference for their security evaluation makes it difficult to exploit their conclusions. In this paper, the author applies the rigorous standardized methodology of the Common Criteria to consensus mechanisms and defines the security problem to introduce a Protection Profile focused on a peer node as physical device, in its blockchain environment. The aim is to focus on the security assessment of a physical peer device in a distributed network. The further goal is to succeed in defining shared relevant evaluation metrics.