Probability of a successful attack of double costs on a blockchain system with a probabilistic consensus protocol
DOI:
https://doi.org/10.30837/rt.2020.1.200.13Keywords:
decentralized system, blockchain technology, consensus protocol, independent player model, double waste attackAbstract
Most traditional information systems are built on a centralized hierarchical principle. In such systems, there is a single decision-making center, to which other nodes are subordinate, therefore, they must certainly perceive and follow centralized instructions. In addition, the presence of a decision center causes additional threats, since to disrupt the operation of the entire system it is enough to destroy or compromise the main node. Decentralized systems are more stable and secure, especially in a situation of complete distrust of each other. They are more reliable for storing important information, such as digital assets, registries, inventories and the like. That is why blockchain technologies for building decentralized systems are becoming increasingly popular and widespread. However, when deploying decentralized systems, the task of coordinating the state of various network nodes arises. This is especially true when the nodes operate in a mode of complete distrust of each other, that is, if situations are possible where the proportion of nodes is controlled by intruders. This problem is solved using consensus protocols, that is, such rules and algorithms that, when executed, achieve the same state for most nodes of a decentralized system. This article discusses probabilistic consensus protocols, that is, when the occurrence of a certain state is a random event. Coordination of system states is possible in various ways, including possible false cases that are imposed by attackers. For example, attackers can double their electronic assets by spending them twice. Of course, if most nodes are controlled by intruders, the system will not work properly. But even with a smaller share of resources, attackers can also with a certain probability impose a false state of the system and thus implement a double-spend attack. The article discusses various situations and possible states of the system, analytically deriving formulas for calculating the probability of a successful double spending attack on a blockchain system with a probabilistic consensus protocol. When conducting research, the model of independent players was used, which, unlike the well-known works, takes into account the complete set of elementary events and system states. Based on the results obtained, recommendations are given on the safe functioning of a decentralized system.References
Hackernoon: Two Ways to Double-Spend https://medium.com/hackernoon/bitcoin-core-bug-cve-2018-17144-an-analysis-f80d9d373362.
BitcoinCore: CVE-2018-17144 Full Disclosure https://bitcoincore.org/en/2018/09/20/notice/.
Hackernoon: Two Ways to Double-Spend https://medium.com/hackernoon/bitcoin-core-bug-cve-2018-17144-an-analysis-f80d9d373362.
Zaghloul, E., Li, T., Mutka, M.W., & Ren, J. (2019). Bitcoin and Blockchain: Security and Privacy. ArXiv, abs/1904.11435.
Rosenfeld M. Analysis of hashrate-based double-spending / Meni Rosenfeld, 2014. 13 с.
Gervais A., Ritzdorf H., Karame G. O., & Čapkun S. (2015). Tampering with the delivery of blocks and transactions in Bitcoin. In CCS 2015 – Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Vol. 2015-October, pp. 692-705). Association for Computing Machinery. https://doi.org/10.1145/2810103.2813655.
Zaghloul E., Li T., Mutka M.W., & Ren J. (2019). Bitcoin and Blockchain: Security and Privacy. ArXiv, abs/1904.11435.
BitcoinWiki: Double-spending https://ru.bitcoinwiki.org/wiki/Double-spending.
Ширяев А. Н. Вероятность : в 2-х кн. ; 4-е изд., перераб. и доп. Москва : МЦНМО, 2007.
Полуяненко Н.А., Кузнецов А.А. Моделирование атаки двойной траты на протокол консен-суса «proof of work» // Радиотехника. 2019. № 198. С. 146–161. DOI: 10.30837/rt.2019.3.198.11.
Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System / Satoshi Nakamoto, 2009. 9 с.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).