Exploring Sybil and Double-Spending Risks in Blockchain Systems

被引:76
作者
Iqbal, Mubashar [1 ]
Matulevicius, Raimundas [1 ]
机构
[1] Univ Tartu, Inst Comp Sci, EE-51009 Tartu, Estonia
关键词
Blockchain; Security; Peer-to-peer computing; Bitcoin; Smart contracts; Business; Risk management; blockchain systems; sybil attack; double-spending; security risk management; blockchain emerging challenges; SMART CONTRACT; ATTACKS;
D O I
10.1109/ACCESS.2021.3081998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The first step to realise the true potential of blockchain systems is to explain the associated security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat agent to affect the valuable assets and services. In this work, we use a security risk management (SRM) domain model and develop a framework to explore two security risks - Sybil and Double-spending - that are observed and considered most concerning security risks within blockchain systems. The framework illustrates the protected assets or assets to secure, the classification of threats that the attacker can trigger using Sybil attack, the identification of threats that cause Double-spending, the vulnerabilities of identified threats, and their countermeasures. We evaluated a newly built framework by exploring Sybil and Double-spending risks in Ethereum-based healthcare applications. We also recognise the various other security and implementation challenges of blockchain that hinder the acceptance of blockchain-enabled solutions. Furthermore, we discuss the permissioned blockchain systems making an appearance in industry-level enterprises and how permissioned blockchain systems control these challenges. We conclude the paper and outline the future work that aims to build an ontology-based blockchain security reference model. The results of this work could help blockchain developers, practitioners, and other associated stakeholders to communicate about Sybil and Double-spending risks, what security countermeasures should be introduced, and what security and implementation challenges are emerging in blockchain systems.
引用
收藏
页码:76153 / 76177
页数:25
相关论文
共 134 条
[1]   A Poisoning Attack Against Cryptocurrency Mining Pools [J].
Ahmed, Mohiuddin ;
Wei, Jinpeng ;
Wang, Yongge ;
Al-Shaer, Ehab .
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 :140-154
[2]  
Ahn J., 2018, WHITE PAPER 12
[3]  
Alazab M., 2020, ARXIV PREPRINT ARXIV, P1
[4]  
Alazab M, 2017, PROT CRIT INFRASTRUC, V3, P251, DOI 10.1007/978-3-319-32824-9_13
[5]   A Blockchain-Based Authorization System for Trustworthy Resource Monitoring and Trading in Smart Communities [J].
Alcarria, Ramon ;
Bordel, Borja ;
Robles, Tomas ;
Martin, Diego ;
Manso-Callejo, Miguel-Angel .
SENSORS, 2018, 18 (10)
[6]   A Blockchain-based Decentralized Data Storage and Access Framework for PingER [J].
Ali, Saqib ;
Wang, Guojun ;
White, Bebo ;
Cottrell, Roger Leslie .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :1303-1308
[7]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[8]  
[Anonymous], 2007, P INT C DISTRIBUTED, DOI [DOI 10.1109/ICDCS.2007.91, 10.1109/ICDCS.2007.91]
[9]  
[Anonymous], WHAT IS DUSTING ATTA
[10]   Hijacking Bitcoin: Routing Attacks on Cryptocurrencies [J].
Apostolaki, Maria ;
Zohar, Aviv ;
Vanbever, Laurent .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :375-392