Defending Blockchain Forking Attack by Delaying MTC Confirmation

In terms of security, blockchain technology faces the potential risks of enormous attacks, among which forking attack is the most common one. Because of the decentralized structure of a blockchain, the trust degree directly relies on the length of the blockchain, which makes the longest chain on the current network the most trusted chain (MTC). The forking attack is the kind of hazard behavior that aims to replace the MTC by launching an alternative chain to gain benefits. Blockchain plays a vital role in multiple applications, such as cryptocurrency, and hence such forking attack leads to huge financial loss if it succeeds. In this paper, we propose a novel MTC confirmation mechanism to defend the forking attack. First, we theoretically analyze the success probability distribution of the forking attack and propose an estimation model of the attack’s expected profit. Then, we propose an arbitration mechanism to enforce branches from a fork to have competition. With the arbitration mechanism, we delay the confirmation of the MTC until the end of the competition. We set up an end threshold as the termination condition of the competition process to help the MTC become the winner. Finally, we define two dynamic difficulty factors and apply them for changing the difficulty of mining to reduce the value of the end threshold, which can improve the performance of the mechanism. The experiments demonstrate our proposed MTC confirmation mechanism can enhance the blockchain security by enforcing the expected profit of an attack to be negative. In the meantime, the mechanism balances well in both effectiveness and efficiency.

[1]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[2]  Wei Ni,et al.  Survey on blockchain for Internet of Things , 2019, Comput. Commun..

[3]  Nicolas Courtois,et al.  Optimizing SHA256 in Bitcoin Mining , 2014, CSS.

[4]  Zekeriya Erkin,et al.  Information Propagation on Permissionless Blockchains , 2017, ArXiv.

[5]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.

[6]  Aggelos Kiayias,et al.  Proof-of-Stake Sidechains , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[7]  Dongxu Liu,et al.  GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[8]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[9]  Xiaowen Chu,et al.  Reducing Forks in the Blockchain via Probabilistic Verification , 2019, 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW).

[10]  Ren Chen,et al.  Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[11]  Elaine Shi,et al.  FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..

[12]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[13]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[14]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[15]  Harry Halpin,et al.  Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[16]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[17]  Jonathan Katz,et al.  Incentivizing Blockchain Forks via Whale Transactions , 2017, Financial Cryptography Workshops.

[18]  Ying Liu,et al.  Model Checking PBFT Consensus Mechanism in Healthcare Blockchain Network , 2018, 2018 9th International Conference on Information Technology in Medicine and Education (ITME).

[19]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[20]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[21]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[22]  Yehuda Lindell,et al.  Secure Computation Without Authentication , 2005, Journal of Cryptology.

[23]  Mehmet A. Orgun,et al.  A Dispute Arbitration Protocol Based on a Peer-to-Peer Service Contract Management Scheme , 2016, 2016 IEEE International Conference on Web Services (ICWS).

[24]  Camilo Rocha,et al.  Double-spend Attack Models with Time Advantange for Bitcoin , 2016, CLEI Selected Papers.

[25]  Aggelos Kiayias,et al.  Linear Consistency for Proof-of-Stake Blockchains , 2019, ArXiv.

[26]  Abhi Shelat,et al.  Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.

[27]  Drew Stone,et al.  Delayed Blockchain Protocols , 2018, ArXiv.

[28]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.