Advertisement

Dynamic Network Configuration: An Effective Defensive Protocol for Public Blockchain

  • Zhengwei JiangEmail author
  • Chenyang LvEmail author
  • Bo ZhangEmail author
  • Chao ZhangEmail author
  • Wei LuEmail author
  • Shouling JiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 895)

Abstract

To earning unfair profits, adversaries can attack the legitimate nodes in the Bitcoin network with selfish mining, the eclipse attack and the information delaying attack. In this paper, we study the patterns of the above attacks and then present a scheme to enhance the security of the Bitcoin network. First, we propose a new structure for the Bitcoin network called double-layer dynamic network, which improves the defense capability of Bitcoin against several attacks. Second, we design a new structure for the blocks in the Bitcoin network, which provides a way to store the IP addresses in the blocks. Third, we present a novel network protocol named dynamic network configuration for public blockchain. Our protocol pushes the updating of IP addresses in the blocks and changes the construction of the network periodically. From theoretical analysis and simulated evaluation, we find that under our protocol, the Bitcoin network can defend against the selfish mining, the eclipse attack and the information delaying attack effectively.

Keywords

Bitcoin Defensive protocol P2P network 

Notes

Acknowledgement

This work was partly supported by NSFC under No. 61772466, the Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars under No. R19F020013, the Provincial Key Research and Development Program of Zhejiang, China under No. 2017C01055, the Fundamental Research Funds for the Central Universities, and the Alibaba-ZJU Joint Research Institute of Frontier Technologies. Technology Project of State Grid Zhejiang Electric Power co. LTD under NO. 5211HZ17000J.

References

  1. 1.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  2. 2.
    Heilman, E., Kendler, A., Zohar, A., et al.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX, pp. 129–144 (2015)Google Scholar
  3. 3.
    Gervais, A., Ritzdorf, H., Karame, G.O., et al.: Tampering with the delivery of blocks and transactions in bitcoin. In: CCS, pp. 692–705 (2015)Google Scholar
  4. 4.
    Ruffing, T., Kate, A., Schröder, D.: Liar, liar, coins on fire!: penalizing equivocation by loss of bitcoins. In: CCS, pp. 219–230 (2015)Google Scholar
  5. 5.
    Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Financial Cryptography, pp. 436–454 (2014)Google Scholar
  6. 6.
  7. 7.
    Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network (2013)Google Scholar
  8. 8.
    Bonneau, J., Miller, A., Clark, J., et al.: Sok: research perspectives and challenges for bitcoin and cryptocurrencies. In: S&P, pp. 104–121 (2015)Google Scholar
  9. 9.
    Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: CCS, pp. 906–917 (2012)Google Scholar
  10. 10.
    Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)
  11. 11.
    Gervais, A., Karame, G., Capkun, S., et al.: Is bitcoin a decentralized currency? S&P 12(3), 54–60 (2014)Google Scholar
  12. 12.
    Singh, A., Ngan, T.W., Druschel, P., et al.: Eclipse attacks on overlay networks: threats and defenses. In: INFOCOM, pp. 1–12 (2006)Google Scholar
  13. 13.
    Sit, E., Morris, R.: Security considerations for peer-to-peer distributed hash tables. In: IPTPS, vol. 2429, pp. 261–269 (2002)Google Scholar
  14. 14.
    Castro, M., Druschel, P., Ganesh, A., et al.: Secure routing for structured peer-to-peer overlay networks. OSDI 36(SI), 299–314 (2002)CrossRefGoogle Scholar
  15. 15.
    Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. TIFS 12(8), 1967–1978 (2017)Google Scholar
  16. 16.
    Schrijvers, O., Bonneau, J., Dan, B., et al.: Incentive compatibility of bitcoin mining pool reward functions. In: Financial Cryptography, pp. 477–498 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.State Grid Zhejiang Electric Power CO., LTD.HangzhouChina
  2. 2.College of Computer Science and TechnologyZhejiang UniversityHangzhouChina
  3. 3.NARI Group CorporationBeijingChina
  4. 4.State Grid Hangzhou Power Supply CompanyHangzhouChina

Personalised recommendations