Hao-Nan Zhu, Runkai Yang, J. Misic, V. Mišić, Xiaolin Chang
{"title":"How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach","authors":"Hao-Nan Zhu, Runkai Yang, J. Misic, V. Mišić, Xiaolin Chang","doi":"10.1109/ICC45855.2022.9838837","DOIUrl":null,"url":null,"abstract":"Malignant miners with small computing power can achieve unfair revenue and degrade system throughput through launching Fork after withholding (FAW) attack in a Proof-of-Work (PoW) blockchain system. The existing works about FAW attack have some of the following issues: (i) only studying Bitcoin blockchain, (ii) assuming that the blockchain network is perfect and then ignoring forks due to block propagation delay, and (iii) assuming that there is only one pool under attack. This paper attempts to investigate FAW attack in imperfect Bitcoin and Ethereum networks where malicious miners attack multiple victim pools. We develop a simulator to capture the chain dynamics under FAW attack in a PoW system where the longest-chain protocol is used. Two different computing power allocation strategies for malicious miners, PAS and EAS, are investigated in terms of the profitability of FAW adversaries, the loss of victims, and the blockchain throughput. The results reveal that FAW adversaries can get more revenue under PAS when more victim pools are subjected to attack in both Bitcoin and Ethereum. If FAW adversaries adopt EAS and the number of victims vary from 1 to 12, they can get maximal revenue when attack 7 victims in Bitcoin. The blockchain throughput decreases significantly under PAS while it is almost unchanged under EAS with the increasing number of victims in both Bitcoin and Ethereum. Our work helps the design of countermeasures against FAW attack.","PeriodicalId":193890,"journal":{"name":"ICC 2022 - IEEE International Conference on Communications","volume":"30 12","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICC 2022 - IEEE International Conference on Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC45855.2022.9838837","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Malignant miners with small computing power can achieve unfair revenue and degrade system throughput through launching Fork after withholding (FAW) attack in a Proof-of-Work (PoW) blockchain system. The existing works about FAW attack have some of the following issues: (i) only studying Bitcoin blockchain, (ii) assuming that the blockchain network is perfect and then ignoring forks due to block propagation delay, and (iii) assuming that there is only one pool under attack. This paper attempts to investigate FAW attack in imperfect Bitcoin and Ethereum networks where malicious miners attack multiple victim pools. We develop a simulator to capture the chain dynamics under FAW attack in a PoW system where the longest-chain protocol is used. Two different computing power allocation strategies for malicious miners, PAS and EAS, are investigated in terms of the profitability of FAW adversaries, the loss of victims, and the blockchain throughput. The results reveal that FAW adversaries can get more revenue under PAS when more victim pools are subjected to attack in both Bitcoin and Ethereum. If FAW adversaries adopt EAS and the number of victims vary from 1 to 12, they can get maximal revenue when attack 7 victims in Bitcoin. The blockchain throughput decreases significantly under PAS while it is almost unchanged under EAS with the increasing number of victims in both Bitcoin and Ethereum. Our work helps the design of countermeasures against FAW attack.
在工作量证明(PoW)区块链系统中,计算能力较小的恶意矿工可以通过发起FAW (Fork after withholding)攻击来获得不公平的收入,降低系统吞吐量。现有关于FAW攻击的工作存在以下一些问题:(i)只研究比特币区块链,(ii)假设区块链网络是完美的,然后忽略了由于块传播延迟而产生的分叉,(iii)假设只有一个池受到攻击。本文试图研究不完美比特币和以太坊网络中的FAW攻击,恶意矿工攻击多个受害者池。在使用最长链协议的PoW系统中,我们开发了一个模拟器来捕捉FAW攻击下的链动态。针对恶意矿工的两种不同的计算能力分配策略,PAS和EAS,根据FAW对手的盈利能力,受害者的损失和区块链吞吐量进行了研究。结果表明,当更多的受害者池在比特币和以太坊中受到攻击时,FAW对手可以在PAS下获得更多的收入。如果FAW攻击者采用EAS,受害者数量从1到12不等,攻击7个比特币受害者即可获得最大收益。在PAS下,区块链吞吐量显著下降,而在EAS下,随着比特币和以太坊受害者数量的增加,区块链吞吐量几乎没有变化。我们的工作有助于设计针对FAW攻击的对策。