Smart Contracts Security Application and Challenges: A Review

Authors

  • Fadele Ayotunde Alaba Department of Computer Science, Federal College of Education, Zaria, Kaduna State., Nigeria https://orcid.org/0000-0002-1125-0780
  • Hakeem Adewale Sulaimon Department of Computer Science, Federal College of Education, Zaria, Kaduna State., Nigeria
  • Madu Ifeyinwa Marisa Industrial and computational Mathematics, Morgan State University, Baltimore Maryland,the United States
  • Owamoyo Najeem Department of Computer Science, Federal College of Education, Zaria, Kaduna State., Nigeria

DOI:

https://doi.org/10.37256/ccds.5120243271

Keywords:

blockchain, smart contract, security, bitcoin, ethereum, counterparty, stellar, monax, lisk

Abstract

There has been a rise in the demand for blockchain-based smart contract development platforms and language implementations. On the other hand, smart contracts and blockchain applications are generated using non-standard software life cycles, which means that, for example, distributed applications are rarely updated, or bugs are fully addressed by releasing a newer version, leading to security flaws and challenges for users to adopt the technology. Smart contracts have gained significant attention due to their potential to automate and secure various transactions in diverse domains. However, the increasing adoption of smart contracts has also raised concerns about security vulnerabilities and potential risks. In this paper, an overview of smart contracts was discussed in detail. It further distinguished and compared smart contracts security with conventional security regarding security, privacy, communication channel, etc. Different platforms for smart contracts, such as Bitcoin, Ethereum, Counterparty, Stellar, Monax, and Lisk, are also discussed in this paper. Some proposed techniques are used in different areas for handling security threats in smart contracts. In addition, a taxonomy of the smart contracts security application was proposed, which attempts to solve some of the flaws and inadequacies in smart contracts. The study also provides a comprehensive smart contracts security scenario with different techniques. Lastly, the possible attacks posed by threats and vulnerabilities of the smart contracts are provided. The security threats and vulnerabilities addressed in this study are unique to smart contracts.

Downloads

Published

2023-09-01

How to Cite

1.
Fadele Ayotunde Alaba, Hakeem Adewale Sulaimon, Madu Ifeyinwa Marisa, Owamoyo Najeem. Smart Contracts Security Application and Challenges: A Review. Cloud Computing and Data Science [Internet]. 2023 Sep. 1 [cited 2024 May 2];5(1):15-41. Available from: https://ojs.wiserpub.com/index.php/CCDS/article/view/3271