Главная
ГлоссарийdPoSec (Distributed Proof of Security)
dPoSec (Distributed Proof of Security)
dPoSec (Distributed Proof of Security) is a consensus mechanism designed to ensure that the blockchain network continues to operate even if a third of the nodes are compromised.
What Is dPoSec (Distributed Proof of Security)?
dPoSec (Distributed Proof of Security) is a new
consensus mechanism designed to ensure that the underlying blockchain network continues to operate even if nearly a third of the participating nodes are compromised. It addresses the key challenges faced by the existing distributed network of nodes and validators.
Traditional
Web2 cybersecurity methods rely extensively on networked devices that act as separate, centralized silos. These devices often end up operating independently from each other rather than in harmony. As a result, each device in the network becomes a single point of failure and a point of subversion for potential attackers, enabling access to the entire network.
Besides, existing cybersecurity solutions were never designed to cater to the ever-expanding endpoints scattered worldwide. As more and more devices connect to the network, evident given the rise of
IoT (
Internet of Things), the “single point of failures” will also continue to increase.
Most
Web3 and blockchain projects that utilize existing Web2 infrastructure are also vulnerable to cyber-attacks. Many Web3 services run at the service and server levels without any security policy at their baseline, inheriting similar risks from Web2. For instance, more than 70% of Ethereum’s nodes are operated via a cloud a centralized vendor owns. Not only does this go against the core ethos of decentralization, but it also inherits Web2’s cybersecurity weaknesses.
dPoSec (Distributed Proof of Security) has emerged as a potential solution to these problems. Designed to mitigate a diverse range of cyber vulnerabilities, the dPoSec mechanism enforces baseline security while acting as a decentralized assurance framework and a CyberSecurity Mesh. In this context, the CyberSecurity Mesh architecture provides a scalable and interoperable security approach based on identity. All assets are protected by the same integrated structure, regardless of location.
The dPoSec mechanism relies on the Zero-Trust framework to address the dynamic cybersecurity requirements across the Web2 and Web3 ecosystems. It ensures that all users and devices are duly authenticated, authorized, and frequently validated before being granted access to existing data and information. As a result of the usage of blockchain-enabled zero trust security, it is possible to discover hidden suspicious online transactions, isolated connections, and limit user access.
All of the network devices operating under the dPoSec consensus model act as secure validators in the decentralized CyberSecurity Mesh, thereby creating distributed security layers to eliminate the possibility of a single point of failure. Through peer-to-peer validation, each device brings trust to every other device, securing the baseline layer and enabling the baseline level of trust to be inherited by all other aspects of the network and operational processes. As every device is a
watchdog for every other device, they act together in synchronous harmony, adhering to consensus and ensuring policy is enforced in a prescribed manner, creating a distributed supercomputer.
dPoSec as a consensus mechanism easily solves a group of issues that are currently known to exist under the "
blockchain trilemma". By adding durability to its range of add-ons, dPoSec broadens the scope of its network. In addition to using dPoSec at its heart, the chain also enables rollups for its users, allowing them to gain off-chain access while leveraging the dPoSec network as the main chain.
Main Benefits
Since the dPoSec mechanism builds multiple layers into its baseline security, it can potentially address most of the critical challenges faced by the existing Web2 ecosystem and the decentralized networks of validators and nodes.
The dPoSec consensus model can overcome threats, such as selfish mining, feather forking, DoS attacks, bribery attacks and transaction integrity protection. Since the baseline security will expand whenever a new device (node/validator) joins the dPoSec network, it will also help Web3 products and services achieve higher scalability and decentralization without compromising security.
dPoSec is capable of pre-analyzing several distinct types of assaults to security and repairing smart contracts at the time of their deployment, allowing the network to keep track and evaluate its smart contracts, both before and after deployment.
On top of that, the consensus model is designed to convert the single point of failure into a valuable (and contributing) part of the network. dPoSec creates another highly-resilient layer of security atop distributed and centralized networks, also enabling to opt for zero-knowledge trust between participants, irrespective of the
use case.
Author Bio
Sumit Chauhan is the CTO of Naoris Protocol and is a specialist in blockchain technology. He has a diverse set of abilities, including modeling mission-critical corporate systems, managing intricate data-based solutions, and managing algorithms for digital transformations employing new technologies. He has more than 22 years of expertise in technical consulting, research, and delivering solutions using modern techstacks like blockchain, artificial intelligence, machine learning, big data, cloud information extraction, and knowledge management, as well as in anticipating and forecasting future innovations. He is an active participant and a technical reviewer for publications and papers.
Connect with Sumit on
LinkedIn.