Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems

Abstract Blockchain has arisen as a revolutionary technology to provide trust in scenarios where several independent agents must agree about certain information. This characteristic makes Blockchain the perfect technology to operate with future next-generation internet applications, especially when involving critical data. However, assumptions and conditions that make Blockchain a secure technology are not usually considered, so many popular and recent Blockchain-supported proposals (such as only-one-miner solutions) are unsecure in practice due to Blockchain intrinsic vulnerabilities and other technology limitations. In particular, most of these solutions are vulnerable to a novel and unstudied cyberattack: Denial of Chain (DoC). Therefore, in this paper this new cyberattack is defined and studied from a theoretical and experimental point of view. Besides, a framework to predict the occurrence of this new attack is also described. A mathematical model to represent blocks and chains in Blockchain solutions is proposed, and it is employed to create a statistical framework to analyze the novel DoC attack. Simulation instruments (such as Multichain simulators) and real hardware nodes (based on Raspberry Pi computers) are employed to validate the proposed model and framework, and the proposed solutions.

[1]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[2]  Garry A. Gabison Policy Considerations for the Blockchain Technology Public and Private Applications , 2016 .

[3]  Borja Bordel,et al.  Process execution in Cyber-Physical Systems using cloud and Cyber-Physical Internet services , 2018, The Journal of Supercomputing.

[4]  Hyoung Joong Kim,et al.  Electronic Voting Service Using Block-Chain , 2016, J. Digit. Forensics Secur. Law.

[5]  Sergei Tikhomirov,et al.  Ethereum: State of Knowledge and Research Perspectives , 2017, FPS.

[6]  David Lee Kuo Chuen Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data , 2015 .

[7]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[8]  A. Lazarenko,et al.  Financial Risks of the Blockchain Industry: A Survey of Cyberattacks , 2018, Proceedings of the Future Technologies Conference (FTC) 2018.

[9]  Angela Walch,et al.  The Bitcoin Blockchain as Financial Market Infrastructure: A Consideration of Operational Risk , 2015 .

[10]  Ilsun You,et al.  Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Models , 2018, IEEE Access.

[11]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[12]  Jong Hyuk Park,et al.  Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions , 2017, Symmetry.

[13]  Borja Bordel,et al.  Protecting Industry 4.0 Systems Against the Malicious Effects of Cyber-Physical Attacks , 2017, UCAmI.

[14]  Norman Meuschke,et al.  Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.

[15]  Martijn Bastiaan,et al.  Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .

[16]  T. Robles,et al.  Digital Food Product Traceability: Using Blockchain in the International Commerce , 2018, Advances in Intelligent Systems and Computing.

[17]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[18]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[19]  Ghassan O. Karame,et al.  Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.

[20]  Ghassan O. Karame,et al.  Bitcoin and Blockchain Security , 2016 .

[21]  Guoqiang Hu,et al.  Distributed consensus tracking for multi‐agent systems under two types of attacks , 2016 .

[22]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[23]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[24]  Gareth Owen,et al.  Rep on the block: A next generation reputation system based on the blockchain , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[25]  Christof Weinhardt,et al.  A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.

[26]  Emin Gün Sirer,et al.  Majority is not enough , 2013, Financial Cryptography.

[27]  Borja Bordel,et al.  A Blockchain-Based Authorization System for Trustworthy Resource Monitoring and Trading in Smart Communities , 2018, Sensors.

[28]  Victoria L. Lemieux,et al.  Trusting records: is Blockchain technology the answer? , 2016 .

[29]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[30]  Christian Decker,et al.  BlueWallet: The Secure Bitcoin Wallet , 2014, STM.

[31]  Dan Boneh,et al.  Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security , 2017, LATINCRYPT.

[32]  E. Hultink,et al.  The Circular Economy - A New Sustainability Paradigm? , 2017 .

[33]  Bimal Kumar Mishra,et al.  Mathematical model on the transmission of worms in wireless sensor network , 2013 .

[34]  Corina Sas,et al.  Design for Trust: An Exploration of the Challenges and Opportunities of Bitcoin Users , 2017, CHI.

[35]  Bruno Sericola,et al.  Safety analysis of Bitcoin improvement proposals , 2016, 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA).

[36]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[37]  Giacomo Colle,et al.  A Blockchain Implementation Prototype for the Electronic Open Source Traceability of Wood along the Whole Supply Chain , 2018, Sensors.

[38]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[39]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[40]  Jagdeep Sidhu,et al.  Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[41]  Jeremy Clark,et al.  Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.

[42]  Sarah Underwood,et al.  Blockchain beyond bitcoin , 2016, Commun. ACM.

[43]  Borja Bordel,et al.  Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things , 2017, Pervasive Mob. Comput..