How ZelNodes Help Secure the Zel Network

Zel Official
Apr 13, 2019 · 3 min read

ZelNodes have many planned uses for the Zel ecosystem, including protecting Proof-of-Work (POW) integrity to resist malicious chain splits & hash attacks

Image for post
Image for post
  • All POW-based crypto assets are potentially susceptible to hash attacks & chain splits, even Bitcoin
  • Satoshi envisioned the “longest chain wins” consensus strategy to bolster the idea of complete decentralization of authority
  • This allows communities to essentially vote via their hash power for/against proposed forks
  • The introduction of cheap ASICs and rental services like NiceHash make it much easier to attack most POW algorithms for malicious reasons/monetary gain (51% attack)
  • Projects are utilizing available resources to secure chains, such as leveraging BTC hash power and/or networks of masternodes

ZelNodes Passively Help Protect Zel Network

Voting occurs a few blocks ahead of a scheduled payout, consensus is formed on which ZelNodes will receive payment, and these results are propagated on the network to be included in the scheduled block for ZelNode payout when it’s found by the miners. So now to submit a successful block hash and receive the block reward, the correct voting outputs must also be supplied at the same time.

This mechanism makes it much more difficult to attack the chain than relying 100% on hash power, which can relatively easily be attacked using NiceHash, especially for coins with lower network hash (Equihash algos are pretty cheap on NH). Requiring two separate forms of consensus means a would-be attacker needs 51% or more control of the network hash, while also knowing each ZelNode tier winner in advance (3 winners/round). This process needs to be performed for every block, expending considerably more resources than simply buying hash power.

This mitigation strategy is meant to resist attacks, not negate or be 100% effective against them. Hash attacks will more than likely always be possible, but projects are working on more sophisticated ways all the time to mitigate the effects of attack. [See dPOW from Komodo & PoP from Veriblock for examples of novel approaches to chain security]

Planned Additional Chain Security [Active] with ZelNodes

Proposals for active security are currently being reviewed to select the best course of action for using ZelNodes to secure the Zel chain. More information of the ongoing process will be published here on Medium as it becomes available.

Zel is also currently working on a POW algorithm change that is unique to the project, internally named ZelHash V1. The specifics of this algorithm and how Zel will benefit from a swap will be documented in a future Medium post.

Image for post
Image for post

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — -

Written by Zel Technologies, GmbH — 13 April 2019 — Rev. 1


Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store