{"title":"Block diffusion delay attack and its countermeasures in a Bitcoin network","authors":"Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara","doi":"10.1002/nem.2190","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>In the Bitcoin system, transactions and their collections (i.e., blocks) are distributed over a peer-to-peer (P2P) network (i.e., Bitcoin network) constructed by participating nodes. Each node maintains a distributed ledger (i.e., blockchain) consisting of retrieved blocks. Therefore, speedy block distribution over the Bitcoin network is essential for all nodes to reach a global consensus on the blockchain. On the other hand, Bitcoin clients are developed as open source software, and thus they can be modified by malicious users. Existing work has pointed out that an attacker can delay the block propagation between neighboring nodes by exploiting the regular timeout mechanism for unexpected slow block transfer caused by temporal network trouble. In this paper, we focus on block diffusion delay attacks, where multiple attackers collude with a specific miner (i.e., a special node that creates new blocks and broadcasts these blocks to the other miners) to disturb the propagation of blocks generated by competing miners. Through simulation experiments, we first reveal that about 30% of honest nodes cannot normally retrieve a block when there are only 1% of the nodes in the system are high-degree adversary nodes in the system. This indicates that the malicious miner colluding with the attackers can intentionally delay the diffusion of the block mined by the competing miner, so as to win the competitive block diffusion even if it loses at the competitive block mining. To alleviate the block diffusion delay attack, we propose two kinds of countermeasures: a proactive approach that is a speedy recovery method from the interruption by adjusting the timeout value and a reactive approach that is a block retrieval node selection method based on the past download rate from each neighbor. Through simulation experiments, we show the countermeasures can effectively alleviate the risk.</p>\n </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 3","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2190","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In the Bitcoin system, transactions and their collections (i.e., blocks) are distributed over a peer-to-peer (P2P) network (i.e., Bitcoin network) constructed by participating nodes. Each node maintains a distributed ledger (i.e., blockchain) consisting of retrieved blocks. Therefore, speedy block distribution over the Bitcoin network is essential for all nodes to reach a global consensus on the blockchain. On the other hand, Bitcoin clients are developed as open source software, and thus they can be modified by malicious users. Existing work has pointed out that an attacker can delay the block propagation between neighboring nodes by exploiting the regular timeout mechanism for unexpected slow block transfer caused by temporal network trouble. In this paper, we focus on block diffusion delay attacks, where multiple attackers collude with a specific miner (i.e., a special node that creates new blocks and broadcasts these blocks to the other miners) to disturb the propagation of blocks generated by competing miners. Through simulation experiments, we first reveal that about 30% of honest nodes cannot normally retrieve a block when there are only 1% of the nodes in the system are high-degree adversary nodes in the system. This indicates that the malicious miner colluding with the attackers can intentionally delay the diffusion of the block mined by the competing miner, so as to win the competitive block diffusion even if it loses at the competitive block mining. To alleviate the block diffusion delay attack, we propose two kinds of countermeasures: a proactive approach that is a speedy recovery method from the interruption by adjusting the timeout value and a reactive approach that is a block retrieval node selection method based on the past download rate from each neighbor. Through simulation experiments, we show the countermeasures can effectively alleviate the risk.
期刊介绍:
Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.