Blockchain Security: Situational Crime Prevention Theory and Distributed Cyber Systems

Nicholas J. Blasco, Nicholas A. Fett
{"title":"Blockchain Security: Situational Crime Prevention Theory and Distributed Cyber Systems","authors":"Nicholas J. Blasco, Nicholas A. Fett","doi":"10.52306/02020419tegr1675","DOIUrl":null,"url":null,"abstract":"The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack the sidechain while mainchain assets can be withdrawn, along with the disconnect between the integrity of the sidechain and the value of the stolen assets are among the top disadvantages. The current study used a vulnerability analysis and theoretical mathematics based on situational crime prevention theory to highlight the attack vectors and prevention methods for these systems. Much of the analysis can be applied to any distributed system (e.g. blockchain network), particularly any supposedly trustless off-chain component. The equations developed in the current study will hold for any two chains that are bridged and pass value back and forth and provides evidence to suggest a public sidechain is likely not a viable option for scalability due to security concerns. Criminal strategies on blockchain networks in the digital realm are similar to criminal strategies in the physical realm; therefore, the application of criminology can lead to more efficient development and ultimately more effective security protocols.","PeriodicalId":314035,"journal":{"name":"The International Journal of Cybersecurity Intelligence and Cybercrime","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The International Journal of Cybersecurity Intelligence and Cybercrime","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52306/02020419tegr1675","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack the sidechain while mainchain assets can be withdrawn, along with the disconnect between the integrity of the sidechain and the value of the stolen assets are among the top disadvantages. The current study used a vulnerability analysis and theoretical mathematics based on situational crime prevention theory to highlight the attack vectors and prevention methods for these systems. Much of the analysis can be applied to any distributed system (e.g. blockchain network), particularly any supposedly trustless off-chain component. The equations developed in the current study will hold for any two chains that are bridged and pass value back and forth and provides evidence to suggest a public sidechain is likely not a viable option for scalability due to security concerns. Criminal strategies on blockchain networks in the digital realm are similar to criminal strategies in the physical realm; therefore, the application of criminology can lead to more efficient development and ultimately more effective security protocols.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
区块链安全:情境犯罪预防理论与分布式网络系统
作者为分析互联区块链网络的加密经济激励奠定了基础,并利用情境犯罪预防理论来解释如何开发更安全的系统。区块链网络利用较小的区块链(通常称为侧链)来提高大型网络的吞吐量。确定了使用侧链的几个缺点,这些缺点会对锁定在侧链上的资产造成重大风险。如果没有主链以验证出口的形式提供安全性,那么具有桥接或主链资产表示的侧链或状态通道将面临重大的攻击风险。在可以提取主链资产的情况下,无法以足够高的成本攻击侧链,以及侧链的完整性与被盗资产的价值之间的脱节是最大的缺点。本研究采用基于情境犯罪预防理论的脆弱性分析和理论数学,重点研究了这些系统的攻击载体和预防方法。大部分分析可以应用于任何分布式系统(例如区块链网络),特别是任何被认为不可信的链下组件。目前研究中开发的方程将适用于任何两条桥接并来回传递价值的链,并提供证据表明,出于安全考虑,公共侧链可能不是可扩展性的可行选择。数字领域区块链网络上的犯罪策略与物理领域的犯罪策略相似;因此,犯罪学的应用可以导致更有效的开发和最终更有效的安全协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical Study Editorial introduction to the special issue: Supporting future scholarship on cybercrime North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework Level of Engagement with Social Networking Services and Fear of Online Victimization: The Role of Online Victimization Experiences The Challenges of Identifying Dangers Online and Predictors of Victimization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1