Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains

被引:26
作者
Alangot, Bithin [1 ]
Reijsbergen, Daniel [1 ]
Venugopalan, Sarad [1 ]
Szalachowski, Pawel [1 ]
Yeo, Kiat Seng [2 ]
机构
[1] Singapore Univ Technol & Design, Dept ISTD, Singapore 487372, Singapore
[2] Singapore Univ Technol & Design, Dept EPD, Singapore 487372, Singapore
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
关键词
Bitcoin; Protocols; Blockchain; Peer-to-peer computing; Servers; Internet; Routing; Eclipse attacks; Bitcoin client; gossip protocol;
D O I
10.1109/TNSM.2021.3069502
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Clients of permissionless blockchain systems, like Bitcoin, rely on an underlying peer-to-peer network to send and receive transactions. It is critical that a client is connected to at least one honest peer, as otherwise the client can be convinced to accept a maliciously forked view of the blockchain. In such an eclipse attack, the client is unable to reliably distinguish the canonical view of the blockchain from the view provided by the attacker. The consequences of this can be catastrophic if the client makes business decisions based on a distorted view of the blockchain transactions. In this paper, we investigate the design space and propose two approaches for Bitcoin clients to detect whether an eclipse attack against them is ongoing. Each approach chooses a different trade-off between average attack detection time and network load. The first scheme is based on the detection of suspicious block timestamps. The second scheme allows blockchain clients to utilize their natural connections to the Internet (i.e., standard Web activity) to gossip about their blockchain views with contacted servers and their other clients. Our proposals improve upon previously proposed eclipse attack countermeasures without introducing any dedicated infrastructure or changes to the Bitcoin protocol and network, and we discuss an implementation. We demonstrate the effectiveness of the gossip-based schemes through rigorous analysis using original Internet traffic traces and real-world deployment. The results indicate that our protocol incurs a negligible overhead and detects eclipse attacks rapidly with high probability, and is well-suited for practical deployment.
引用
收藏
页码:1659 / 1672
页数:14
相关论文
共 45 条
  • [1] Al-Bassam M., 2018, FRAUD PROOFS MAXIMIS
  • [2] Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges
    Al-Breiki, Hamda
    Rehman, Muhammad Habib Ur
    Salah, Khaled
    Svetinovic, Davor
    [J]. IEEE ACCESS, 2020, 8 : 85675 - 85685
  • [3] [Anonymous], BITCOINJ CHECKPOINT
  • [4] [Anonymous], MANY CONFIRMATIONS I
  • [5] [Anonymous], Flask Web Framework
  • [6] [Anonymous], Bitcoin transaction fee estimator
  • [7] [Anonymous], 2018, BITCOINJ SECURITY MO
  • [8] [Anonymous], ELECTRUM SPV CLIENT
  • [9] [Anonymous], 2013, 6962 RFC
  • [10] [Anonymous], Protocol documentation (inv)