IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v17y2025i4p183-d1639179.html
   My bibliography  Save this article

Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies

Author

Listed:
  • Md Kamrul Siam

    (Department of Computer Science, New York Institute of Technology, New York, NY 10023, USA)

  • Bilash Saha

    (Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA)

  • Md Mehedi Hasan

    (Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA)

  • Md Jobair Hossain Faruk

    (Department of Computer Science, New York Institute of Technology, New York, NY 10023, USA)

  • Nafisa Anjum

    (Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA)

  • Sharaban Tahora

    (Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA)

  • Aiasha Siddika

    (Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA)

  • Hossain Shahriar

    (Center for Cybersecurity, University of West Florida, Pensacola, FL 32514, USA)

Abstract

Blockchain technology has emerged as a transformative innovation, providing a transparent, immutable, and decentralized platform that underpins critical applications across industries such as cryptocurrencies, supply chain management, healthcare, and finance. Despite their promise of enhanced security and trust, the increasing sophistication of cyberattacks has exposed vulnerabilities within blockchain ecosystems, posing severe threats to their integrity, reliability, and adoption. This study presents a comprehensive and systematic review of blockchain vulnerabilities by categorizing and analyzing potential threats, including network-level attacks, consensus-based exploits, smart contract vulnerabilities, and user-centric risks. Furthermore, the research evaluates existing countermeasures and mitigation strategies by examining their effectiveness, scalability, and adaptability to diverse blockchain architectures and use cases. The study highlights the critical need for context-aware security solutions that address the unique requirements of various blockchain applications and proposes a framework for advancing proactive and resilient security designs. By bridging gaps in the existing literature, this research offers valuable insights for academics, industry practitioners, and policymakers, contributing to the ongoing development of robust and secure decentralized ecosystems.

Suggested Citation

  • Md Kamrul Siam & Bilash Saha & Md Mehedi Hasan & Md Jobair Hossain Faruk & Nafisa Anjum & Sharaban Tahora & Aiasha Siddika & Hossain Shahriar, 2025. "Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies," Future Internet, MDPI, vol. 17(4), pages 1-41, April.
  • Handle: RePEc:gam:jftint:v:17:y:2025:i:4:p:183-:d:1639179
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/17/4/183/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/17/4/183/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:17:y:2025:i:4:p:183-:d:1639179. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.