Author: |
林睿桓 Jui-Huan Lin |
---|---|
Thesis Title: |
區塊鏈系統中透過有效難度調整之雙重支付攻擊防範 Double-Spending Attack Defending in the Blockchain System via the Novel Difficulty Adjustment |
Advisor: |
馮輝文
Huei-Wen Ferng |
Committee: |
查士朝
Shi-Cho Cha 鄭傑 Jay Cheng 張宏慶 Hung-Chin Jang |
Degree: |
碩士 Master |
Department: |
電資學院 - 資訊工程系 Department of Computer Science and Information Engineering |
Thesis Publication Year: | 2021 |
Graduation Academic Year: | 109 |
Language: | 中文 |
Pages: | 34 |
Keywords (in Chinese): | 區塊鏈 、比特幣 、工作量證明 、難度 、雙重支付攻擊 |
Keywords (in other languages): | Blockchain, Bitcoin, Proof of Work, Difficulty, Double-Spending Attack |
Reference times: | Clicks: 652 Downloads: 1 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
區塊鏈所建立的虛擬貨幣交易系統 (Virtual Currency Trading System)中,雙重支付攻擊 (Double-Spending Attack)是最被廣為討論的一種攻擊;最近的研究提出一套針對工作量證明 (Proof of Work, PoW)機制設計的個人化難度調整 (Personalized Difficulty Adjustment, PDA)規則,以對抗惡意礦工 (Malicious Miners)發動如此攻擊;另一方面,則將雙重支付攻擊與女巫攻擊 (Sybil Attack)結合,以有效減低於比特幣網路中發動雙重支付攻擊時所需的算力成本。於是,本論文首先對考量之攻擊做明確定義,且在工作量證明網路環境下,提出改善之防禦機制以補強PDA,此一防禦機制稱為EPDA-T (Enhanced PDA with the Target Computing Power to Consume);透過適當的分析,EPDA-T及PDA之防禦效果可以被成功攻擊之機率來呈現,數值結果說明EPDA-T能夠比PDA在防禦效果上大幅提升,其可獲95%以上的改善,顯現EPDA-T對所考量之攻擊具優越之防禦能力。
In the blockchain-based virtual currency trading system, the double-spending attack is one of the most wildly discussed attacks. Recently, designed a personalized difficulty adjustment (PDA) strategy to counter the malicious miners to launch such an attack. On the contrary, combined the double-spending attack and the sybil attack to lower the computing power required to launch the double-spending attack. Therefore, this thesis first define the behavior of the attacker considered precisely in the Proof of Work (PoW) network. Then, the defending mechanism called the enhanced PDA with the target computing power to consume (EPDA-T) is proposed to strengthen PDA. The defending effect of EPDA-T and PDA can be demonstrated through the proper analysis in terms of the probability to be compromised. Our numerical results to be presented can reveal the superiority of EPDA-T over PDA in defending, showing that more than 95% of improvement can be achieved by EPDA-T as compared to PDA. This explicitly demonstrates that the excellent capability of EPDA-T to defend against the attack considered in this thesis.
[1] C.N.
Chou,Y.J.Lin,R.Chen,H.Y.Chang,I.P.Tu,andS.W.Liao,“Personalized
difficultyadjustmentforcounteringthedoublespendingattackin
proofofwork
consensusprotocols,”in Proc. IEEEInternationalConference
on InternetofThings(iThings), pp.1456–1462,IEEE,Jul.2018.
[2] S. ZhangandJ.H.Lee,“Doublespendingwithasybilattackinthebitcoin
decentralized network,” IEEE TransactionsonIndustrialInformatics, vol.15,
pp. 5715–5722,Oct.2019.
[3] S. Nakamoto,“Bitcoin:Apeertopeerelectroniccashsystem,”
Bitcoin.–
URL: https://bitcoin.org/bitcoin.pdf, Oct.2008.
[4] G. Malavolta,P.MorenoSanchez,C.Schneidewind,A.Kate,andM.Maffei,
“Anonymous multihoplocksforblockchainscalabilityandinteroperability,”in
26th AnnualNetworkandDistributedSystemSecuritySymposium,NDSS,
Feb. 2019.
[5] S. Pongnumkul,C.Siripanpornchana,andS.Thajchayapong,“Performance
analysis ofprivateblockchainplatformsinvaryingworkloads,”in Proc. International
ConferenceonComputerCommunicationandNetworks(ICCCN),
pp. 1–6,Sep.2017.
[6] T.T.A.Dinh,R.Liu,M.Zhang,G.Chen,B.C.Ooi,andJ.Wang,“Untangling
blockchain:Adataprocessingviewofblockchainsystems,” IEEE
TransactionsonKnowledgeandDataEngineering, vol.30,pp.1366–1385,
Jan. 2018.
[7] I. Eyal,A.E.Gencer,E.G.Sirer,andR.VanRenesse,“BitcoinNG:Ascalable
blockchainprotocol,”in USENIX symposiumonnetworkedsystemsdesign
andimplementation(NSDI), pp.45–59,Mar.2016.
[8] C. GrunspanandR.PérezMarco,“Doublespendraces,” International Journal
ofTheoreticalandAppliedFinance, vol.21,no.08,pp.1–32,Nov.2018.
31
[9] S. KingandS.Nadal,“PPCoin:Peertopeercryptocurrencywithproofofstake,”
selfpublished
paper,August, vol.19,Aug.2012.
[10] G. Ramezan,C.Leung,andZ.JaneWang,“Astrongadaptive,strategic
doublespending
attackonblockchains,”in Proc. IEEEInternationalConference
onInternetofThings(iThings), pp.1219–1227,Jun.2018.
[11] G. RamezanandC.Leung,“Analysisofproofofworkbasedblockchains
under anadaptivedoublespendattack,”
IEEE TransactionsonIndustrialInformatics,
vol.16,no.11,pp.7035–7045,Mar.2020.
[12] C. PinzónandC.Rocha,“Doublespendattackmodelswithtimeadvantange
for bitcoin,” Electronic NotesinTheoreticalComputerScience, vol.329,
no. 12,pp.79–103,Dec.2016.
[13] K. NicolasandY.Wang,“Anoveldoublespendingattackcountermeasurein
blockchain,” in Proc. IEEEAnnualUbiquitousComputing,ElectronicsMobile
Communication Conference(UEMCON), pp.383–388,Feb.2019.
[14] L. Kovalchuk,D.Kaidalov,A.Nastenko,M.Rodinko,O.Shevtsov,and
R. Oliynykov,“Decreasingsecuritythresholdagainstdoublespendattackin
networks withslowsynchronization,”in Proc. IEEEINFOCOMConference
on ComputerCommunicationsWorkshops(INFOCOMWKSHPS), pp.216–
221, Sep.2019.
[15] X. Yu,M.T.Shiwen,Y.Li,andR.DengHuijie,“Fairdepositsagainstdoublespending
forbitcointransactions,”in Proc. IEEEConferenceonDependable
and SecureComputing, pp.44–51,Oct.2017.
[16] R. TsoandC.Lin,“Anofflinemobilepaymentprotocolprovidingdoublespending
detection,”in Proc. InternationalConferenceonAdvancedInformation
NetworkingandApplicationsWorkshops(WAINA), pp.570–575,May.
2017.
[17] J.H.
Hoepman,“Distributeddoublespendingprevention,”in International
Workshop onSecurityProtocols, pp.152–165,Springer,Feb.2008.
32
[18] M. Rosenfeld,“Analysisofhashratebaseddoublespending,”
arXiv preprint
arXiv:1402.2009, Feb.2014.
[19] V.Buterin,“EthereumWhitepaper.” https://ethereum.org/en/
whitepaper/, 2013.[Online;accessedon20January2021].
[20] K. Zheng,S.Zhang,andX.Ma,“Difficultypredictionforproofofworkbased
blockchains,” in Proc. IEEEInternationalWorkshoponSignalProcessing
Advances inWirelessCommunications(SPAWC), pp.1–5,Aug.2020.
[21] D. FullmerandA.S.Morse,“Analysisofdifficultycontrolinbitcoinandproofofwork
blockchains,”in Proc. IEEEConferenceonDecisionandControl
(CDC), pp.5988–5992,Dec.2018.
[22] S. ZhangandX.Ma,“Ageneraldifficultycontrolalgorithmforproofofwork
based blockchains,”in Proc. IEEEInternationalConferenceonAcoustics,
Speech andSignalProcessing(ICASSP), pp.3077–3081,Apr.2020.
[23] J. R.Douceur,“Thesybilattack,”in International workshoponpeertopeer
systems, pp.251–260,Springer,Oct.2002.
[24] B. N.Levine,C.Shields,andN.B.Margolin,“Asurveyofsolutionstothe
sybil attack,” University ofMassachusettsAmherst,Amherst,MA, vol.7,Nov.
2005.
[25] G. GuetteandB.Ducourthial,“OnthesybilattackdetectioninVANET,”in
Proc. IEEEInternationalConferenceonMobileAdhocandSensorSystems,
pp. 1–6,Jan.2008.
[26] H. Yu,P.B.Gibbons,M.Kaminsky,andF.Xiao,“SybilLimit:Anearoptimal
social networkdefenseagainstsybilattacks,”in Proc. IEEESymposiumon
Security andPrivacy(2008), pp.3–17,Feb.2008.
[27] A. K.Mishra,A.K.Tripathy,D.Puthal,andL.T.Yang,“Analyticalmodelfor
sybil attackphasesininternetofthings,” IEEE InternetofThingsJournal,
vol. 6,no.1,pp.379–387,Jun.2018.
33
[28] A. Rajan,J.Jithish,andS.Sankaran,“SybilattackinIoT:Modellinganddefenses,”
in Proc. InternationalConferenceonAdvancesinComputing,Communications
andInformatics(ICACCI), pp.2323–2327,Dec.2017.
[29] J. Wadii,H.Rim,andB.Ridha,“Detectingandpreventingsybilattacksin
wireless sensornetworks,”in Proc. IEEEMediterraneanMicrowaveSymposium
(MMS), pp.1–5,Aug.2020.
[30] Y.Yao,B.Xiao,G.Yang,Y.Hu,L.Wang,andX.Zhou,“Powercontrolidentification:
AnovelsybilattackdetectionschemeinVANETsusingRSSI,” IEEE
Journal onSelectedAreasinCommunications, vol.37,no.11,pp.2588–
2602, Aug.2019.
[31] Q. Li,H.Li,Z.Wen,andP.Yuan,“Researchonthep2psybilattackandthe
detection mechanism,”in Proc. IEEEInternationalConferenceonSoftware
Engineering andServiceScience(ICSESS), pp.668–671,Apr.2018.
[32] T.SilawanandC.Aswakul,“SybilVote:Formulastoquantifythesuccess
probability ofsybilattackinonlinesocialnetworkvoting,” IEEE Communications
Letters, vol.21,no.7,pp.1553–1556,Mar.2017.
[33] G. Bissias,A.P.Ozisik,B.N.Levine,andM.Liberatore,“Sybilresistant
mixing forbitcoin,”in Proceedings ofthe13thWorkshoponPrivacyinthe
Electronic Society, pp.149–158,Nov.2014.
[34] P.Otte,M.deVos,andJ.Pouwelse,“TrustChain:Asybilresistantscalable
blockchain,” Future GenerationComputerSystems, vol.107,pp.770–780,
Jun. 2020.