Dynamic Network Configuration: An Effective Defensive Protocol for Public Blockchain

To earning unfair profits, adversaries can attack the legitimate nodes in the Bitcoin network with selfish mining, the eclipse attack and the information delaying attack. In this paper, we study the patterns of the above attacks and then present a scheme to enhance the security of the Bitcoin network. First, we propose a new structure for the Bitcoin network called double-layer dynamic network, which improves the defense capability of Bitcoin against several attacks. Second, we design a new structure for the blocks in the Bitcoin network, which provides a way to store the IP addresses in the blocks. Third, we present a novel network protocol named dynamic network configuration for public blockchain. Our protocol pushes the updating of IP addresses in the blocks and changes the construction of the network periodically. From theoretical analysis and simulated evaluation, we find that under our protocol, the Bitcoin network can defend against the selfish mining, the eclipse attack and the information delaying attack effectively.

[1]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[2]  Tim Roughgarden,et al.  Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.

[3]  Atul Singh,et al.  Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[4]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[5]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[6]  Ghassan O. Karame,et al.  Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.

[7]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[8]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[9]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[10]  Sushmita Ruj,et al.  Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.

[11]  Aniket Kate,et al.  Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins , 2015, CCS.

[12]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[13]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.