{"title":"How to Break IOTA Heart by Replaying?","authors":"Gerard De Roode, Ikram Ullah, P. Havinga","doi":"10.1109/GLOCOMW.2018.8644437","DOIUrl":null,"url":null,"abstract":"IOTA is a novel cryptocurrency that uses distributed ledger technology based on directed acyclic graph data structure. Security of cryptocurrencies ought to be scrutinized in order to acquire esteemed security, attain trust, and accomplish indelible adoption. Although IOTA proffer resilient security controls, IOTA security is not yet well explored. Among all the propounded IOTA vulnerabilities that have been identified, we pragmatically exploit replay attack against IOTA. We further analyze the attack to perceive its impact. Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses. Distrust, and privation of balance can be some of the severe impacts of this vulnerability.","PeriodicalId":348924,"journal":{"name":"2018 IEEE Globecom Workshops (GC Wkshps)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2018.8644437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
IOTA is a novel cryptocurrency that uses distributed ledger technology based on directed acyclic graph data structure. Security of cryptocurrencies ought to be scrutinized in order to acquire esteemed security, attain trust, and accomplish indelible adoption. Although IOTA proffer resilient security controls, IOTA security is not yet well explored. Among all the propounded IOTA vulnerabilities that have been identified, we pragmatically exploit replay attack against IOTA. We further analyze the attack to perceive its impact. Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses. Distrust, and privation of balance can be some of the severe impacts of this vulnerability.