LNGate$^{2}$2: Secure Bidirectional IoT Micro-Payments Using Bitcoin's Lightni

Bitcoin has emerged as a revolutionary payment system with its decentralized ledger concept; however it has significant problems such as high transaction fees and low throughput. Lightning Network (LN), which was introduced much later, solves most of these problems with an innovative concept called off-chain payments. With this advancement, Bitcoin has become an attractive venue to perform micro-payments which can also be adopted in many IoT applications (e.g., toll payments). Nevertheless, it is not feasible to host LN and Bitcoin on IoT devices due to the storage, memory, and processing restrictions. Therefore, in this paper, we propose a secure and efficient protocol that enables an IoT device to use LN's functions through an untrusted gateway node. Through this gateway which hosts the LN and Bitcoin nodes, the IoT device can open&close LN channels and send&receive LN payments. This delegation approach is powered by a threshold cryptography based scheme that requires the IoT device and the LN gateway to jointly perform all LN operations. Specifically, we propose thresholdizing LN's Bitcoin public and private keys as well as its public and private keys for the new channel states (i.e., commitment points). We prove with a game theoretical security analysis that the IoT device is secure against collusion attacks. We implemented the proposed protocol by changing LN's source code and thoroughly evaluated its performance using several Raspberry Pis. Our evaluation results show that the protocol; is fast, does not bring extra cost overhead, can be run on low data rate wireless networks, is scalable and has negligible energy consumption overhead. To the best of our knowledge, this is the first work that implemented threshold cryptography in LN.

[1]  Anastasios Sidiropoulos,et al.  Mass Exit Attacks on the Lightning Network , 2022, 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[2]  Pallipamu Venkateswara Rao,et al.  A secure IoT-based micro-payment protocol for wearable devices , 2022, Peer-to-Peer Networking and Applications.

[3]  Maria Potop-Butucaru,et al.  Securing Wireless Payment-Channel Networks With Minimum Lock Time Windows , 2021, ICC 2022 - IEEE International Conference on Communications.

[4]  Chi Zhang,et al.  HyperChannel: A Secure Layer-2 Payment Network for Large-Scale IoT Ecosystem , 2021, ICC 2021 - IEEE International Conference on Communications.

[5]  Kemal Akkaya,et al.  LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography , 2021, WISEC.

[6]  Kemal Akkaya,et al.  Cryptocurrency Solutions to Enable Micropayments in Consumer IoT , 2021, IEEE Consumer Electronics Magazine.

[7]  Magnus Almgren,et al.  TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).

[8]  Sylvain Kubler,et al.  Enhanced Lightning Network (off-chain)-based micropayment in IoT ecosystems , 2020, Future Gener. Comput. Syst..

[9]  Antonio Puliafito,et al.  P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual Release , 2020, Sensors.

[10]  Aviv Zohar,et al.  Congestion Attacks in Payment Channel Networks , 2020, Financial Cryptography.

[11]  A. Uluagac,et al.  LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network , 2019, ESORICS.

[12]  Hector Marco-Gisbert,et al.  Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack , 2019, Applied Sciences.

[13]  Aziz Mohaisen,et al.  Overview of Attack Surfaces in Blockchain , 2019, Blockchain for Distributed Systems Security.

[14]  Tilman Wolf,et al.  A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[15]  Konstantin Mikhaylov,et al.  Experimental Performance Evaluation of BLE 4 Versus BLE 5 in Indoors and Outdoors Scenarios , 2018, Advances in Body Area Networks I.

[16]  Dong Jin,et al.  Bitcoin Payment-Channels for Resource Limited IoT Devices , 2018, COINS.

[17]  Yehuda Lindell,et al.  Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody , 2018, CCS.

[18]  Anamika Chauhan,et al.  Blockchain and Scalability , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[19]  Massimo Bartoletti,et al.  SoK: unraveling Bitcoin smart contracts , 2018, IACR Cryptol. ePrint Arch..

[20]  Yehuda Lindell,et al.  Fast Secure Two-Party ECDSA Signing , 2017, Journal of Cryptology.

[21]  Zlatko Bundalo,et al.  Vehicle toll payment system based on Internet of Things concept , 2016, 2016 5th Mediterranean Conference on Embedded Computing (MECO).

[22]  Christian Decker,et al.  A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.

[23]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[24]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[25]  Pascal Thubert,et al.  Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.

[26]  Akira Matsumoto,et al.  Performance evaluation of IEEE 802.11n devices for vehicular networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[27]  John. Moore,et al.  Subgame Perfect Implementation , 1988 .

[28]  E. Damme Refinements of the Nash Equilibrium Concept , 1983 .

[29]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[30]  R. Myerson Refinements of the Nash equilibrium concept , 1978 .

[31]  Yi Wang,et al.  Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach , 2021, IEEE Access.

[32]  Yong Feng,et al.  A Data Trading Scheme Based on Payment Channel Network for Internet of Things , 2020, BlockSys.

[33]  Yanchun Zhang,et al.  Untraceable Electronic Cash System in the Internet of Things , 2020 .

[34]  Kent E. Seamons,et al.  A Usability Study of Five Two-Factor Authentication Methods , 2019, SOUPS @ USENIX Security Symposium.

[35]  Sharon Goldberg,et al.  Certifying RSA Public Keys with an Efficient NIZK , 2018, IACR Cryptol. ePrint Arch..

[36]  Daniel Davis Wood ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[37]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[38]  R. Aumann Backward induction and common knowledge of rationality , 1995 .

[39]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..