other nodes. The probability of a successful attack is
proportional to the number of miners that are in the
same mining zone at the same time, since in our sys-
tem the mining zone is generated randomly. There-
fore, the probability of an attack is greater the greater
the number of miners in valid zones from which they
cannot be predicted. We propose to decrease the size
of the mining area to decrease the probability of an
attack, however we consider it important to keep in
mind that if the size of the mining areas is too small,
the block will take longer to be distributed.
5 CONCLUSION
We conclude that adding geographical validations to
the PoW algorithm can add a 51% layer of protec-
tion against attacks. Despite not prioritizing the most
optimal configurations, 29% protection was achieved
with our consensus algorithm compared to PoW us-
ing our metric of the average percentage of the last
100 blocks mined by attacking nodes.
We have analyzed the 51% attack on a blockchain
network and its possible countermeasures. The attack
is a serious problem in the world of cryptocurrencies,
as it allows the attacker to manipulate transactions and
even block them, which could lead to double spend-
ing. This shows how important it is to have protection
against this type of attack and the advantages that the
use of geographical validations offers. Considering
that the verification of locations was simulated due
to the complexity of its implementation, it is possible
to develop a system that, through a network, allows
knowing the geographical location of a node with so-
lutions such as Octant. A framework with which the
geographical position of a node can be determined
with great confidence, simply by measuring its la-
tency with reference points (Wong et al., 2007).
In a future work we will seek to implement a ge-
ographic location validator, since our consensus algo-
rithm continues with PoW as there are no valid nodes
in the mining zones, and try it with different kinds of
data such as healthcare data (Arroyo-Mari
˜
nos et al.,
2021) or Wood supply chain (Cueva-S
´
anchez et al.,
2020). With this validator it is possible to prioritize
the distance from a node to a mining area, which pro-
motes lower energy expenditure.
REFERENCES
Arroyo-Mari
˜
nos, J. C., Mejia-Valle, K. M., and Ugarte, W.
(2021). Technological model for the protection of ge-
netic information using blockchain technology in the
private health sector. In ICT4AWE.
Biryukov, A. and Feher, D. (2020). Recon: Sybil-resistant
consensus from reputation. Perva. Mob. Comput., 61.
Cueva-S
´
anchez, J. J., Coyco-Ordemar, A. J., and Ugarte, W.
(2020). A blockchain-based technological solution to
ensure data transparency of the wood supply chain. In
IEEE ANDESCON.
Ferdous, M. S., Chowdhury, M. J. M., and Hoque, M. A.
(2021). A survey of consensus algorithms in pub-
lic blockchain systems for crypto-currencies. J. Netw.
Comput. Appl., 182.
Juri
ˇ
ci
´
c, V., Rado
ˇ
sevi
´
c, M., and Fuzul, E. (2020). Optimiz-
ing the resource consumption of blockchain technol-
ogy in business systems. Busi. Syst. Res. J., 11(3).
Kausar, F., Senan, F. M., Asif, H. M., and Raahemifar, K.
(2022). 6g technology and taxonomy of attacks on
blockchain technology. Alexandria Eng. J., 61(6).
Liu, Z., Tang, S., Chow, S. S. M., Liu, Z., and Long,
Y. (2019). Fork-free hybrid consensus with flexible
proof-of-activity. Future Gener. Comput. Syst., 96.
Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic
cash system.
Pinz
´
on, C. and Rocha, C. (2016). Double-spend attack
models with time advantange for bitcoin. Electronic
Notes in Theoretical Computer Science, 329.
Platt, M. and McBurney, P. (2021). Sybil attacks on
identity-augmented proof-of-stake. Computer Net-
works, 199.
Qiao, L., Dang, S., Shihada, B., Alouini, M.-S., Nowak, R.,
and Lv, Z. (2021). Can blockchain link the future?
Digital Communications and Networks.
Shrestha, R. and Nam, S. Y. (2019). Regional blockchain
for vehicular networks to prevent 51% attacks. IEEE
Access, 7.
Song, H., Zhu, N., Xue, R., He, J., Zhang, K., and Wang, J.
(2021). Proof-of-contribution consensus mechanism
for blockchain and its application in intellectual prop-
erty protection. Inf. Process. Manag., 58(3).
Truby, J., Brown, R. D., Dahdal, A., and Ibrahim, I. (2022).
Blockchain, climate damage, and death: Policy in-
terventions to reduce the carbon emissions, mortality,
and net-zero implications of non-fungible tokens and
bitcoin. Energy Research & Social Science, 88.
Wendl, M., Doan, M. H., and Sassen, R. (2023). The envi-
ronmental impact of cryptocurrencies using proof of
work and proof of stake consensus algorithms: A sys-
tematic review. J. of Env. Management, 326.
Wong, B., Stoyanov, I., and Sirer, E. G. (2007). Octant: A
comprehensive framework for the geolocalization of
internet hosts. In NSDI. USENIX.
Xue, T., Yuan, Y., Ahmed, Z., Moniz, K., Cao, G., and
Wang, C. (2018). Proof of contribution: A modifi-
cation of proof of work to increase mining efficiency.
In IEEE COMPSAC.
Yan, S. (2022). Analysis on blockchain consensus mech-
anism based on proof of work and proof of stake.
CoRR, abs/2209.11545.
Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2018).
Blockchain challenges and opportunities: a survey.
Int. J. Web Grid Serv., 14(4).
262