Submitted:
07 October 2025
Posted:
22 October 2025
You are already at the latest version
Abstract
Network Security in blockchain Technology provides transparency, decentralization of user records during transactions, and immutability through consensus. However, integrating Confidentiality, Integrity and Availability (CIA) in blockchain Technology in Network Security environment cannot be over emphasized due to vulnerabilities on blockchain network nodes, and the security challenges including Private Key theft, Sybil attacks, Smart Contract exploits, 51% attacks and spear phishing attack that has led to data theft, data manipulation and breaches, financial losses and distrust. The paper explores network security issues and vulnerabilities in blockchain technology, focusing on the CIA to improve security. The contribution of the paper is threefold. First, it explores the various blockchain vulnerabilities and exploits during transactions. Secondly, it develops a blockchain system called MasterChain in a virtual environment as a testbed. An attack on the MasterChain blockchain system will then be orchestrated to exploit vulnerabilities. Finally, it models the system to conform to the CIA Triad and recommends control mechanisms to improve security. The results show that the CIA triad can be used to prevent possible Blockchain attacks during the exploitation of blockchain vulnerabilities.
Keywords:
1. Introduction
2. State of the Art
2.1. Blockchain Technology and Network
2.2. Blockchain Network Security Challenges
2.3. Security Analysis of Blockchain Technology
2.3.1. Blockchain and CIA Triad:
2.4. Cryptography Algorithms in Data and Networks
2.5. Hashing Functions in Cryptography Algorithm
2.6. RSA Encryption
- Prime Numbers p and q: - These are any secret prime numbers which are used for key generation.
- Modulus n - The product of p and q. This forms part of the public key used in encryption and decryption.
- Public Exponent e: A choice of number such that:
- 2)
- The Modular Multiplicative Inverse: The modular multiplicative inverse of (6) is a number d such that the following congruence relation is satisfied:
2.7. Addressing Gaps in Literature
3. Approach
4. Implementation
4.1. Software Requirements:
- Visual Studio Code: This is the primary Integrated Development Environment (IDE) where the MasterChain system will be coded. The IDE provides a coding platform for many programming languages and packages.
- Anaconda Python: Python is an all-purpose programming language that can be used to code across different platforms. It comes with suitable libraries which are ideal for the development of the MasterChain blockchain system. For this paper, the Anaconda distribution of python will be used.
- Flask: This is a python framework used to develop web applications. It will be used to program the distributed computing features of the MasterChain system to give it the functionality of constant availability.
- Postman: It is a web client that will be used to interact with the MasterChain blockchain system.
- VirtualBox: This is a virtualization software used to set up and run one or multiple complete or pre-packaged operating system known as guest OS inside another operating system running on a local computer.
- Ubuntu Linux OS: Ubuntu is a type of Linux Operating System distribution which is open-source, stable, and user-friendly.
4.2. Hardware Requirements and Lab Set up
4.3. Coding Process of the MasterChain System
- RSA Algorithm: Used for encrypting the information
- Hashlib: Used to call the SHA 256 or 512 hash functions
- JSON: Used for JavaScript Object Serialisation. It helps to show the python code data in human readable format.
- Base64: Used to encode byte data into JSON string
- Crypto.publickey: Used in combination with RSA to create encryption keys
- Crypto.cipher: Used in combination with RSA to create encryption keys
- Requests: Used to make JSON object requests for JSON data within an application or from across applications
- Time: Used for creating timestamps for mined blocks
- UUID4: This is used to create a unique identifier for an object, in our case, a computing node.
- Flask: A light python package or module use for web content programming.
- Jsonify: Used to manipulate and display data in human redable format in python and flask applications.
- Flask request: used to make web object requests in flask applications.
- URLparse: use for sending and pulling url requests and data.
5. Results and Discussion
6. Conclusions
Acknowledgments
Conflicts of Interest
Abbreviations
| NTRU | Nth Truncated polynomial Ring Units |
| NFT | Non-Fungible Token |
| P2E | Play to Earn |
References
- Yeboah-Ofori, A.; Sadat, S. K.; Darvishi, I. “Blockchain Security Encryption to Preserve Data Privacy and Integrity in Cloud Environment," 2023 10th (FiCloud), Morocco, 2023, pp. 344-351. [CrossRef]
- De Miranda, P. L.; Kerrigan, C. Cybersecurity amd Blockchain. In: Finteck. s.l.:Edward Elgar Publishing, pp. 242-266.
- Wylde, V.; Rawindaran, N.; Lawrence, J.; Balasubramanian, R.; Prakash, E.; Jayal, A.; Khan, I.; Hewage, C.; Platts, J. Cybersecurity, Data Privacy and Blockchain: A Review. SN COMPUT. SCI. 3(127). [CrossRef]
- Taherdoost, H. Blockchain Innovations, Applications, and Future Prospects. Electronics 2024, 13, 422. [Google Scholar] [CrossRef]
- Singh, G.; Garg, V.; Tiwari, P. Introduction to Blockchain Technology. In: R. Agrawal & N. Gupta, eds. Transforming Cybersecurity Solutions using Blockchain. Agrawal, Rashmi ed. Singapore: Springer, Singapore, pp. 1-18.
- Antonopoulos, A. Chapter 7: The Bitcoin. https://www.oreilly.com/library/view/mastering-bitcoin/9781491902639/ch07.html.
- Wang, Y.; Singgih, M.; Wang, J.; Rit, M. Making sense of blockchain technology: How will it transform supply chains?. Innsbruck, s.n.
- CompTIA. (N.D) Network Security: What Is It, Why Does It Matter and What Can You Do to Make Networks More Secure?. https://www.comptia.org/content/guides/network-security-basics-definition-threats-and-solutions.
- Bult, T. Security Analysis of Blockchain Technology, s.l.: Oulu University of Applied Sciences.
- Karpinski, M.; Kuznetsov, O.; Oliynykov, R. Security, Privacy, Confidentiality, and Trust in the Blockchain: From Theory to Applications. Electronics. 2025 Feb 1;14(3):581. [CrossRef]
- Yeboah-Ofori, A.; Agbodza, C. K.; Opoku-Boateng, F. A.; Darvishi, I.; Sbai, F. "Applied Cryptography in Network Systems Security for Cyberattack Prevention," 2021 (ICSIoT), France, 2021, pp. 43-48. [CrossRef]
- Kaspersky, What is Cryptography? https://www.kaspersky.com/resource-center/definitions/what-is-cryptography.
- Raikwar, M.; Gligoroski, D.; Kralevska, K. SoK of Used Cryptography in Blockchain. IEEE Access, 7(no issue), pp. 148550 – 148575. https://ieeexplore.ieee.org/document/8865045.
- Milanov, E. The RSA Algorithm. RSA Laboratories. pp 1-11. http://susanka.org/MathPhysics2/RSA_Algorithm_Yevgeny.pdf.
- Mahalakshmi, B.; Deshmukh, G.; Murthy, V. N. L. N. Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm. IEEE Xplore, (online) pp.363–366. [CrossRef]
- Cobb, M. ; What Is the RSA algorithm? https://www.techtarget.com/searchsecurity/definition/RSA.
- Yakymenko, I. Z.; Kasianchuk, M. M.; Ivasiev, S. V.; Melnyk, A. M.; Nykolaichuk, Y. M. Realization of RSA Cryptographic Algorithm Based on vector-module Method of Modular Exponention. IEEE Xplore, pp.550–554. //doi.org/10.1109/tcset.2018.8336262.
- StackExchange, RSA Key generation: Why Use lcm(p-1, q-1) Instead of the Totient ϕ(n)? Cryptography Stack Exchange. https://crypto.stackexchange.com/questions/95556/rsa-key-generation-why-use-lcmp-1-q-1-instead-of-the-totient-%cf%95n/95557#95557.
- Nanayakkara, S.; Rodrigo, M. N. N.; Perera, S.; Weerasuriya, G. T.; Hijazi, A. A. A methodology for selection of a Blockchain platform to develop an enterprise system. Journal of Industrial Information Integration. [CrossRef]
- Darvishi, I.; Asare, B. T.; Musa, A.; Yeboah-Ofori, A.; Oseni, W.; Ganiyu, A. "Blockchain Technology and Vulnerability Exploits on Smart Contracts," 2024 11th (FiCloud), Vienna, Austria, 2024, pp. 160-167. [CrossRef]









| Vulnerability Type | Description |
|---|---|
| Unpatched Systems | Failure to update OS or software introduces exploits |
| Weak Authentication | Use of insecure or default passwords |
| Improper Configurations | Poorly installed nodes or components |
| Design Flaws | Architectural gaps within the OS or blockchain software |
| Lack of Encryption | Absence of proper cryptographic protections |
| Step | Description |
|---|---|
| 1) Identification of the use case | Aim and Objectives on how the solution will be proffered |
| 2) Creation of proof of concept | Proof of concept created through detailed analysis of existing work |
| 3) Choosing the blockchain platform | Choice based on requirements of the implementation and desired results |
| 4) Choose the right consensus protocol | Proof of Work (PoW) as discussed in concept background and literature reviews |
| 5) Build an ecosystem | Main practical work for this exploration |
| 6) Determine rules of operation | Part of Section V. Results and Discussions |
| CIA Principle | Attack Types | Prevention Mechanisms |
|---|---|---|
| Confidentiality | Eavesdropping Attacks | Application of End-to-end encryption to secure data in transit. |
| Deanonymization Attack | Apply Zero-knowledge Proofs (ZKPs) and privacy-preserving techniques such as ring signatures. | |
| Metadata Leakage | Mixing services, coin tumblers, and onion routing (e.g., TOR). | |
| Integrity | Double Spending | Cryptographic consensus protocols (PoW, PoS), transaction finality mechanisms. |
| 51% Attack | Decentralization, checkpointing, hybrid consensus models. | |
| Smart Contract Exploits | Formal verification, rigorous auditing, and use of secure contract patterns. | |
| Availability | Denial of Service (DoS) | Rate limiting, minimum gas thresholds, and DDoS protection measures. |
| Sybil Attack | Identity validation, stake-based participation, and node reputation systems. | |
| Routing Attacks (e.g., BGP Hijacking) | Use of redundant nodes, encrypted communication, and real-time routing monitoring. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).