Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems

被引:12
作者
Bordel, Borja [1 ]
Alcarria, Ramon [2 ]
Robles, Tomas [1 ]
机构
[1] Univ Politecn Madrid, Dept Telemat Syst Engn, Ave Complutense 30, E-28040 Madrid, Spain
[2] Univ Politecn Madrid, Dept Topog Engn & Cartog, Campus Sur, Madrid 28031, Spain
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 116卷
关键词
Blockchain; Cyberattack; Vulnerability; Security; Trust provision systems; Risks analysis; INTERNET; BITCOIN;
D O I
10.1016/j.future.2020.11.013
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Blockchain has arisen as a revolutionary technology to provide trust in scenarios where several independent agents must agree about certain information. This characteristic makes Blockchain the perfect technology to operate with future next-generation internet applications, especially when involving critical data. However, assumptions and conditions that make Blockchain a secure technology are not usually considered, so many popular and recent Blockchain-supported proposals (such as only one-miner solutions) are unsecure in practice due to Blockchain intrinsic vulnerabilities and other technology limitations. In particular, most of these solutions are vulnerable to a novel and unstudied cyberattack: Denial of Chain (DoC). Therefore, in this paper this new cyberattack is defined and studied from a theoretical and experimental point of view. Besides, a framework to predict the occurrence of this new attack is also described. A mathematical model to represent blocks and chains in Blockchain solutions is proposed, and it is employed to create a statistical framework to analyze the novel DoC attack. Simulation instruments (such as Multichain simulators) and real hardware nodes (based on Raspberry Pi computers) are employed to validate the proposed model and framework, and the proposed solutions. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:426 / 439
页数:14
相关论文
共 54 条
[21]  
Dickson B., 2016, BLOCKCHAIN COULD HEL
[22]  
Dorri A, 2017, INT CONF PERVAS COMP
[23]  
E Anceaume, 2016, P 2016 IEEE 15 INT S
[24]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Gun .
COMMUNICATIONS OF THE ACM, 2018, 61 (07) :95-102
[25]   Distributed consensus tracking for multi-agent systems under two types of attacks [J].
Feng, Zhi ;
Hu, Guoqiang ;
Wen, Guanghui .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2016, 26 (05) :896-918
[26]   A Blockchain Implementation Prototype for the Electronic Open Source Traceability of Wood along the Whole Supply Chain [J].
Figorilli, Simone ;
Antonucci, Francesca ;
Costa, Corrado ;
Pallottino, Federico ;
Raso, Luciano ;
Castiglione, Marco ;
Pinci, Edoardo ;
Del Vecchio, Davide ;
Colle, Giacomo ;
Proto, Andrea Rosario ;
Sperandio, Giulio ;
Menesatti, Paolo .
SENSORS, 2018, 18 (09)
[27]  
Gabison G., 2016, SMU Science and Technology Review, V19, P327
[28]   The Circular Economy A new sustainability paradigm? [J].
Geissdoerfer, Martin ;
Savaget, Paulo ;
Bocken, Nancy M. P. ;
Hultink, Erik Jan .
JOURNAL OF CLEANER PRODUCTION, 2017, 143 :757-768
[29]   Is Bitcoin a Decentralized Currency? [J].
Gervais, Arthur ;
Karame, Ghassan O. ;
Capkun, Vedran ;
Capkun, Srdjan .
IEEE SECURITY & PRIVACY, 2014, 12 (03) :54-60
[30]  
Gipp B., 2015, P ICONFERENCE 2015