Rec. ITU-T X.1402 (07/2020) Security framework for distributed ledger technology
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Security threats to DLT
8 Security requirements for DLT
     8.1 Data security
     8.2 Network security
     8.3 Consensus security
     8.4 Application security
9 Security capabilities
     9.1 Security capabilities diagram
     9.2 Data security
          9.2.1 Merkle tree
          9.2.2 Time stamp
          9.2.3 Digital signature
          9.2.4 Data encryption
          9.2.5  Security storage
     9.3 Network security
          9.3.1 Routing attack defence
          9.3.2 Sybil attack defence
          9.3.3 Eclipse attack defence
          9.3.4  DDoS attack defence
     9.4 Consensus security
          9.4.1 Consensus mechanism
          9.4.2 51% Attack defence
          9.4.3 Selfish mining attack defence
          9.4.4 Double spending attack defence
     9.5 Application security
          9.5.1 Identity authentication
          9.5.2 Authorization
          9.5.3 Multi-signature
          9.5.4 Smart contract security design
10 Security framework methodology
Appendix I  Example of security framework analysis for commodity tracing as a service on a private distributed ledger system
Appendix II  A risk, target and protection relationship model for DLT
Bibliography