比特币网络中的块扩散延迟攻击及其对策

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara
{"title":"比特币网络中的块扩散延迟攻击及其对策","authors":"Masahiro Sasabe,&nbsp;Masanari Yamamoto,&nbsp;Yuanyu Zhang,&nbsp;Shoji Kasahara","doi":"10.1002/nem.2190","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>In the Bitcoin system, transactions and their collections (i.e., blocks) are distributed over a peer-to-peer (P2P) network (i.e., Bitcoin network) constructed by participating nodes. Each node maintains a distributed ledger (i.e., blockchain) consisting of retrieved blocks. Therefore, speedy block distribution over the Bitcoin network is essential for all nodes to reach a global consensus on the blockchain. On the other hand, Bitcoin clients are developed as open source software, and thus they can be modified by malicious users. Existing work has pointed out that an attacker can delay the block propagation between neighboring nodes by exploiting the regular timeout mechanism for unexpected slow block transfer caused by temporal network trouble. In this paper, we focus on block diffusion delay attacks, where multiple attackers collude with a specific miner (i.e., a special node that creates new blocks and broadcasts these blocks to the other miners) to disturb the propagation of blocks generated by competing miners. Through simulation experiments, we first reveal that about 30% of honest nodes cannot normally retrieve a block when there are only 1% of the nodes in the system are high-degree adversary nodes in the system. This indicates that the malicious miner colluding with the attackers can intentionally delay the diffusion of the block mined by the competing miner, so as to win the competitive block diffusion even if it loses at the competitive block mining. To alleviate the block diffusion delay attack, we propose two kinds of countermeasures: a proactive approach that is a speedy recovery method from the interruption by adjusting the timeout value and a reactive approach that is a block retrieval node selection method based on the past download rate from each neighbor. Through simulation experiments, we show the countermeasures can effectively alleviate the risk.</p>\n </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 3","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Block diffusion delay attack and its countermeasures in a Bitcoin network\",\"authors\":\"Masahiro Sasabe,&nbsp;Masanari Yamamoto,&nbsp;Yuanyu Zhang,&nbsp;Shoji Kasahara\",\"doi\":\"10.1002/nem.2190\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>In the Bitcoin system, transactions and their collections (i.e., blocks) are distributed over a peer-to-peer (P2P) network (i.e., Bitcoin network) constructed by participating nodes. Each node maintains a distributed ledger (i.e., blockchain) consisting of retrieved blocks. Therefore, speedy block distribution over the Bitcoin network is essential for all nodes to reach a global consensus on the blockchain. On the other hand, Bitcoin clients are developed as open source software, and thus they can be modified by malicious users. Existing work has pointed out that an attacker can delay the block propagation between neighboring nodes by exploiting the regular timeout mechanism for unexpected slow block transfer caused by temporal network trouble. In this paper, we focus on block diffusion delay attacks, where multiple attackers collude with a specific miner (i.e., a special node that creates new blocks and broadcasts these blocks to the other miners) to disturb the propagation of blocks generated by competing miners. Through simulation experiments, we first reveal that about 30% of honest nodes cannot normally retrieve a block when there are only 1% of the nodes in the system are high-degree adversary nodes in the system. This indicates that the malicious miner colluding with the attackers can intentionally delay the diffusion of the block mined by the competing miner, so as to win the competitive block diffusion even if it loses at the competitive block mining. To alleviate the block diffusion delay attack, we propose two kinds of countermeasures: a proactive approach that is a speedy recovery method from the interruption by adjusting the timeout value and a reactive approach that is a block retrieval node selection method based on the past download rate from each neighbor. Through simulation experiments, we show the countermeasures can effectively alleviate the risk.</p>\\n </div>\",\"PeriodicalId\":14154,\"journal\":{\"name\":\"International Journal of Network Management\",\"volume\":\"32 3\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2021-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Network Management\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/nem.2190\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2190","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

在比特币系统中,交易及其集合(即区块)分布在由参与节点构建的点对点(P2P)网络(即比特币网络)上。每个节点维护一个由检索块组成的分布式分类账(即区块链)。因此,比特币网络上的快速区块分配对于所有节点在区块链上达成全球共识至关重要。另一方面,比特币客户端是作为开源软件开发的,因此可以被恶意用户修改。已有研究指出,攻击者可以利用网络暂态故障导致的块传输异常缓慢的规则超时机制,延迟相邻节点之间的块传播。在本文中,我们关注块扩散延迟攻击,其中多个攻击者与特定的矿工(即创建新块并将这些块广播给其他矿工的特殊节点)串通,以干扰竞争矿工生成的块的传播。通过仿真实验,我们首先揭示了当系统中只有1%的节点是高度敌对节点时,大约30%的诚实节点无法正常检索块。这表明恶意矿工与攻击者串通,可以故意延迟竞争矿工挖出的区块扩散,从而即使在竞争区块挖掘中失败,也能赢得竞争区块扩散。为了减轻块扩散延迟攻击,我们提出了两种对策:一种是主动方法,即通过调整超时值从中断中快速恢复的方法;另一种是被动方法,即基于每个邻居过去的下载速率选择块检索节点的方法。通过仿真实验,证明了所提出的对策能够有效地降低风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Block diffusion delay attack and its countermeasures in a Bitcoin network

In the Bitcoin system, transactions and their collections (i.e., blocks) are distributed over a peer-to-peer (P2P) network (i.e., Bitcoin network) constructed by participating nodes. Each node maintains a distributed ledger (i.e., blockchain) consisting of retrieved blocks. Therefore, speedy block distribution over the Bitcoin network is essential for all nodes to reach a global consensus on the blockchain. On the other hand, Bitcoin clients are developed as open source software, and thus they can be modified by malicious users. Existing work has pointed out that an attacker can delay the block propagation between neighboring nodes by exploiting the regular timeout mechanism for unexpected slow block transfer caused by temporal network trouble. In this paper, we focus on block diffusion delay attacks, where multiple attackers collude with a specific miner (i.e., a special node that creates new blocks and broadcasts these blocks to the other miners) to disturb the propagation of blocks generated by competing miners. Through simulation experiments, we first reveal that about 30% of honest nodes cannot normally retrieve a block when there are only 1% of the nodes in the system are high-degree adversary nodes in the system. This indicates that the malicious miner colluding with the attackers can intentionally delay the diffusion of the block mined by the competing miner, so as to win the competitive block diffusion even if it loses at the competitive block mining. To alleviate the block diffusion delay attack, we propose two kinds of countermeasures: a proactive approach that is a speedy recovery method from the interruption by adjusting the timeout value and a reactive approach that is a block retrieval node selection method based on the past download rate from each neighbor. Through simulation experiments, we show the countermeasures can effectively alleviate the risk.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Network Management
International Journal of Network Management COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
5.10
自引率
6.70%
发文量
25
审稿时长
>12 weeks
期刊介绍: Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信