Availability analysis of a permissioned blockchain with a lightweight consensus protocol

被引:14
作者
Altarawneh, Amani [2 ,3 ]
Sun, Fei [1 ]
Brooks, Richard R. [1 ]
Hambolu, Owulakemi [1 ]
Yu, Lu [1 ]
Skjellum, Anthony [2 ,3 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC USA
[2] Univ Tennessee Chattanooga, SimCtr, Chattanooga, TN 37403 USA
[3] Univ Tennessee Chattanooga, Dept Comp Sci & Engn, Chattanooga, TN 37403 USA
基金
美国国家科学基金会;
关键词
Blockchain; Digital ledger technology; Non-cryptocurrency; Secure provenance; Scrybe; Lightweight mining; Consensus protocols;
D O I
10.1016/j.cose.2020.102098
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper offers a novel approach to the evaluation of provenance blockchain security and reliability using analytical methods for assessing system availability against malicious miner DoS attacks. In particular, we present the reliability and availability analysis of the LightWeight Mining (LWM) protocol for securing data provenance. Our analysis shows the reliability of the protocol and its ability to protect against malicious miner DoS attacks. We use digital signatures to prove integrity and non-repudiation of messages passing the system. We describe system behaviors using communicating sequential processes (CSP) to check for synchronization within a number of concurrent processes. Queuing theory is used to determine the average waiting time for client blockchain transactions when malicious miners work to slow the system. CSP and queuing theory jointly test the blockchain's ability to make progress despite the presence of malicious miners. Further, the methodology described can be extended to other blockchain applications. Additional threats, beyond the malicious miner DoS attack, are reserved for future work. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 42 条
[1]  
Altarawneh A, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P727, DOI [10.1109/CCWC47524.2020.9031204, 10.1109/ccwc47524.2020.9031204]
[2]  
[Anonymous], 2008, TECH REP
[3]  
[Anonymous], 2018, EOS IO TECHN PAP V2
[4]  
Baliga A., 2017, Understanding Blockchain Consensus Models, V4, P1
[5]  
Benchoufi M., 2017, TRACEABILITY CONSENT
[6]  
Benningfield A., 2015, HYPERLEDGER SUPPLY C
[7]  
Bhat Naazira Badar., 2020, Security analysis of a blockchain network
[8]   What is computer security? [J].
Bishop, Matt .
IEEE Security and Privacy, 2003, 1 (01) :67-69
[9]  
Cachin C, 2010, LECT NOTES COMPUT SC, V5959, P169, DOI 10.1007/978-3-642-11294-2_9
[10]  
Cachin Christian, 2017, DROPSIDN/8016, DOI [10.4230/LIPIcs.DISC.2017.1, DOI 10.4230/LIPICS.DISC.2017.1]