Implications of dissemination strategies on the security of distributed ledgers

This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DLTs). We specifically focus on attacks at the underlying peer-to-peer layer of these systems, that is in charge of disseminating messages containing data and transaction to be spread among all participants. In particular, we consider the Sybil attack, according to which a malicious node creates many Sybils that drop messages coming from a specific attacked node, or even all messages from honest nodes. Our study shows that the selection of the specific dissemination protocol, as well as the amount of connections each peer has, have an influence on the resistance to this attack.

[1]  Alex Biryukov,et al.  Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).

[2]  Jong-Hyouk Lee,et al.  Analysis of the main consensus protocols of blockchain , 2020, ICT Express.

[3]  Mario Zagar,et al.  Comparative analysis of blockchain consensus algorithms , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[4]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[5]  Emin Gün Sirer,et al.  Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.

[6]  Moreno Marzolla,et al.  A Blockchain-based Flight Data Recorder for Cloud Accountability , 2018, CRYBLOCK@MobiSys.

[7]  Yusuke Aoki,et al.  SimBlock: A Blockchain Network Simulator , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[8]  Sehyun Park,et al.  Nodes in the Bitcoin Network: Comparative Measurement Study and Survey , 2019, IEEE Access.

[9]  Mirko Zichichi,et al.  On the Efficiency of Decentralized File Storage for Personal Information Management Systems , 2020, 2020 IEEE Symposium on Computers and Communications (ISCC).

[10]  Rob Jansen,et al.  Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications , 2015, IACR Cryptol. ePrint Arch..

[11]  Maher Alharby,et al.  BlockSim: A Simulation Framework for Blockchain Systems , 2019, PERV.

[12]  Richard M. Fujimoto,et al.  Parallel and distributed simulation , 1995, 2015 Winter Simulation Conference (WSC).

[13]  Gabriele D'Angelo,et al.  Highly intensive data dissemination in complex networks , 2015, J. Parallel Distributed Comput..

[14]  Kaiwen Zhang,et al.  VIBES: fast blockchain simulations for large-scale peer-to-peer networks: demo , 2017, Middleware Posters and Demos.

[15]  Gabriele D'Angelo,et al.  Agent-based Simulation of Blockchains , 2019, AsiaSim.

[16]  Andrew Miller,et al.  Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees , 2018, SIGMETRICS.

[17]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[18]  Gabriele D'Angelo,et al.  A Distributed Ledger Based Infrastructure for Smart Transportation System and Social Good , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).

[19]  Alexander Mense,et al.  Security Vulnerabilities in Ethereum Smart Contracts , 2018, iiWAS.

[20]  Gabriele D'Angelo,et al.  On the Ethereum blockchain structure: A complex networks theory perspective , 2019, Concurr. Comput. Pract. Exp..

[21]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[22]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[23]  Pramod Viswanath,et al.  Dandelion: Redesigning the Bitcoin Network for Anonymity , 2017, Proc. ACM Meas. Anal. Comput. Syst..

[24]  Mirko Zichichi,et al.  A Framework Based on Distributed Ledger Technologies for Data Management and Services in Intelligent Transportation Systems , 2020, IEEE Access.

[25]  Jong-Hyouk Lee,et al.  Eclipse-based Stake-Bleeding Attacks in PoS Blockchain Systems , 2019, BSCI.