Abstract
As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. Multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.
摘要
跨链技术的发展使得不同区块链间的互操作成为可能, 多链共识在区块链网络中变得日益重要。然而, 目前对单链共识方案的研究较多, 涉及可信矿工的多链共识方案的探讨相对较少, 这为恶意用户在不同链上发起多样化矿工行为(diverse miner behavior, DMB)攻击提供了机会。DMB攻击者可以在某些链(称为mask链)上表现友好并参与共识过程, 以提升其信任值, 而在其他链(称为kill链)上从事对网络具有破坏性的行为。本文提出一种名为Proof-of-DiscTrust(PoDT)的多链共识方案, 旨在防范DMB攻击。该方案引入DiscTrust信任理念, 用于评估每个用户在不同链上的信任值。用户的信任值被分为本地信任值和全局信任值。针对DMB攻击者通过在kill链上交替创建真实或虚假区块来维持其信任度的问题, 设计了一种实施DiscTrust机制的动态行为预测方法。此外, 针对多链环境, 提出3个可信矿工选择算法, 分别用于选择网络矿工、链矿工和链矿工领导者。实验结果表明, PoDT方案能够抵抗DMB攻击, 并且在多链环境中比传统共识方案更为有效。
Data availability
Due to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data are not available.
References
Alzahrani N, Bulusu N, 2018. Towards true decentralization: a blockchain consensus protocol based on game theory and randomness. Proc 9th Int Conf on Decision and Game Theory for Security, p.465–485. https://doi.org/10.1007/978-3-030-01554-1_27
Azaria A, Ekblaw A, Vieira T, et al., 2016. MedRec: using blockchain for medical data access and permission management. 2nd Int Conf on Open and Big Data, p.25–30. https://doi.org/10.1109/OBD.2016.11
Borkowski M, Sigwart M, Frauenthaler P, et al., 2019. Dextt: deterministic cross-blockchain token transfers. IEEE Access, 7:111030–111042. https://doi.org/10.1109/ACCESS.2019.2934707
Buchman E, 2016. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains. PhD Thesis, The University of Guelph, Ontario, Canada.
Buterin V, 2022. Chain Interoperability. Available from https://www.r3.com/reports/chain-interoperability [Accessed on Oct. 20, 2022].
Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4):398–461. https://doi.org/10.1145/571637.571640
Chaudhary R, Jindal A, Aujla GS, et al., 2019. BEST: blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput Secur, 85:288–299. https://doi.org/10.1016/j.cose.2019.05.006
Chen CH, Chen X, Yu JS, et al., 2021. Impact of temporary fork on the evolution of mining pools in blockchain networks: an evolutionary game analysis. IEEE Trans Netw Sci Eng, 8(1):400–418. https://doi.org/10.1109/TNSE.2020.3038943
Cheng HJ, Xie Z, Shi YS, et al., 2019. Multi-step data prediction in wireless sensor networks based on one-dimensional CNN and bidirectional LSTM. IEEE Access, 7:117883–117896. https://doi.org/10.1109/ACCESS.2019.2937098
Ding XJ, Guo JX, Li DY, et al., 2021. An incentive mechanism for building a secure blockchain-based Internet of Things. IEEE Trans Netw Sci Eng, 8(1):477–487. https://doi.org/10.1109/TNSE.2020.3040446
Feng JY, Zhao XY, Chen KX, et al., 2020. Towards random-honest miners selection and multi-blocks creation: proof-of-negotiation consensus mechanism in blockchain networks. Fut Gener Comput Syst, 105:248–258. https://doi.org/10.1016/j.future.2019.11.026
Frankenfield J, 2023. What Does Proof-of-Stake (PoS) Mean in Crypto? Available from https://www.investopedia.com/terms/p/proof-stake-pos.asp [Accessed on June 1, 2023].
Gupta R, Tanwar S, Tyagi N, et al., 2019. HaBiTs: blockchain-based telesurgery framework for Healthcare 4.0. Int Conf on Computer, Information and Telecommunication Systems, p.1–5. https://doi.org/10.1109/CITS.2019.8862127
He HY, Luo Z, Wang Q, et al., 2020. Joint operation mechanism of distributed photovoltaic power generation market and carbon market based on cross-chain trading technology. IEEE Access, 8:66116–66130. https://doi.org/10.1109/ACCESS.2020.2985577
Herlihy M, 2018. Atomic cross-chain swaps. Proc ACM Symp on Principles of Distributed Computing, p.245–254. https://doi.org/10.1145/3212734.3212736
Hewa TM, Kalla A, Nag A, et al., 2020. Blockchain for 5G and IoT: opportunities and challenges. IEEE 8th Int Conf on Communications and Networking, p.1–8. https://doi.org/10.1109/ComNet47917.2020.9306082
Hou H, 2017. The application of blockchain technology in e-government in China. 26th Int Conf on Computer Communication and Networks, p.1–4. https://doi.org/10.1109/ICCCN.2017.8038519
Kumar P, Kumar R, Srivastava G, et al., 2021. PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans Netw Sci Eng, 8(3):2326–2341. https://doi.org/10.1109/TNSE.2021.3089435
Liu DX, Huang C, Ni JB, et al., 2021. Blockchain-based smart advertising network with privacy-preserving accountability. IEEE Trans Netw Sci Eng, 8(3):2118–2130. https://doi.org/10.1109/TNSE.2020.3027796
Nakamoto S, 2008. Bitcoin: a Peer-to-Peer Electronic Cash System. Available from https://bitcoin.org/bitcoin.pdf [Accessed on Oct. 20, 2022].
Peters GW, Panayi E, Chapelle A, 2015. Trends in cryptocurrencies and blockchain technologies: a monetary theory and regulation perspective. J Finan Persp, 3(3):92–113.
Sharma PK, Kumar N, Park JH, 2019. Blockchain-based distributed framework for automotive industry in a smart city. IEEE Trans Ind Inform, 15(7):4197–4205. https://doi.org/10.1109/TII.2018.2887101
Shi GH, Zhong H, Chen WG, 2008. Study on the models of cross-chain inventory collaboration in the cluster supply chain. IEEE Int Conf on Service Operations and Logistics, and Informatics, p.2114–2118. https://doi.org/10.1109/SOLI.2008.4682883
Xiong NX, Vasilakos AV, Wu J, et al., 2012. A self-tuning failure detection scheme for cloud computing service. IEEE 26th Int Parallel and Distributed Processing Symp, p.668–679. https://doi.org/10.1109/IPDPS.2012.126
Zhang W, Zhu SW, Tang J, et al., 2018. A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput, 74(4):1779–1801. https://doi.org/10.1007/s11227-017-2150-3
Zheng ZB, Xie SA, Dai HN, et al., 2018. Blockchain challenges and opportunities: a survey. Int J Web Grid Serv, 14(4): 352–375. https://doi.org/10.1504/IJWGS.2018.095647
Author information
Authors and Affiliations
Contributions
Wenbo ZHANG and Jingyu FENG designed the research. Tao WANG and Chaoyang ZHANG processed the data. Wenbo ZHANG and Tao WANG drafted the paper. Jingyu FENG helped organize the paper. Wenbo ZHANG and Jingyu FENG revised and finalized the paper.
Corresponding author
Ethics declarations
All the authors declare that they have no conflict of interest.
Additional information
Project supported by the Natural Science Basic Research Program of Shaanxi Province, China (No. 2023-JC-YB-561)
List of supplementary materials
1 Related works
2 Simulation analysis
3 Application analysis in a medical scenario
Fig. S1 Network overload comparison of PoDT, Tendermint, and PoR
Fig. S2 Efficiency comparison of PoDT, Tendermint, and PoR
Fig. S3 Storage volume comparison of PoDT, Tendermint, and PoR
Fig. S4 Block throughput analysis in the multi-chain consensus process
Fig. S5 Delay analysis in the multi-chain consensus process
Fig. S6 Industrial application case of PoDT
Electronic Supplementary materials
Rights and permissions
About this article
Cite this article
Zhang, W., Wang, T., Zhang, C. et al. Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks. Front Inform Technol Electron Eng 25, 540–554 (2024). https://doi.org/10.1631/FITEE.2200505
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.2200505