Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners

被引:0
作者
Swathi, P. [1 ]
Modi, Chirag [1 ]
Patel, Dhiren [2 ]
机构
[1] NIT Goa, Dept CSE, Farmagudi, India
[2] VJTI Mumbai, Mumbai, Maharashtra, India
来源
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT) | 2019年
关键词
Blockchain; Digital transaction; Security; Sybil attack; Behavior monitoring;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain technology is useful with the record keeping of digital transactions, IoT, supply chain management etc. However, we have observed that the traditional attacks are possible on blockchain due to lack of robust identity management. We found that Sybil attack can cause severe impact in public/permissionless blockchain, in which an attacker can subvert the blockchain by creating a large number of pseudonymous identities (i.e. Fake user accounts) and push legitimate entities in the minority. Such virtual nodes can act like genuine nodes to create disproportionately large influence on the network. This may lead to several other attacks like DoS, DDoS etc. In this paper, a Sybil attack is demonstrated on a blockchain test bed with its impact on the throughput of the system. We propose a solution directive, in which each node monitors the behavior of other nodes and checks for the nodes which are forwarding the blocks of only particular user. Such nodes are quickly identified, blacklisted and notified to other nodes, and thus the Sybil attack can be restricted. We analyze experimental results of the proposed solution.
引用
收藏
页数:6
相关论文
共 27 条
[1]  
[Anonymous], 2017, P ACM MEAS ANAL COMP, DOI [10.1145/3084459, DOI 10.1145/3084459]
[2]  
[Anonymous], 2017, NDSS
[3]  
[Anonymous], 2017, NETWORK DISTRIBUTED
[4]  
[Anonymous], 13 IEEE INT C PEER T
[5]  
[Anonymous], P WIR MOB NETW C WMN
[6]  
Bissias G., 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014, P149, DOI DOI 10.1145/2665943.2665955
[7]   Mixcoin: Anonymity for Bitcoin with Accountable Mixes [J].
Bonneau, Joseph ;
Narayanan, Arvind ;
Miller, Andrew ;
Clark, Jeremy ;
Kroll, Joshua A. ;
Felten, Edward W. .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :486-504
[8]   A Survey on Security and Privacy Issues of Bitcoin [J].
Conti, Mauro ;
Kumar, E. Sandeep ;
Lal, Chhagan ;
Ruj, Sushmita .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3416-3452
[9]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[10]  
GUPTA S, 2017, INT J RELIABLE INFOR, V5, P1