Abstract
In this paper, we provide a new approach to modeling and analyzing the Goldfinger attacks in blockchain networks, based on the topology of a peer-to-peer network; this paper studied the impact of the Goldfinger well known as 51% attacks in the case of the ring, mesh and fully connected topology. The outcome of simulation has proven that in the case of fully connected topology, the attacker node with 501 (hash/s) has found 155 blocks in 60 s and the rest of the nodes, on average, 58 per node; this gives the control of the balance to the blocks of node J with 131 balance and 43 balance on average for nine nodes, in practice, the node with more than 50% will monopolize the balance. The Goldfinger occurred very worst in the fully connected topology and monopolized the network because of topologically connections; the attacker in fully connected topology is a direct and duplicated connection with the nine nodes. In terms of connection duplicated bidirectional or directional, the fully connected topology presents a hard fork compared to ring and mesh topology after the attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kim TW, Zetlin-Jones A (2019) The ethics of contentious hard forks in blockchain networks with fixed features. Front Blockchain:9
Banerjee S, Das D, Biswas M, Biswas U (2020) Study and survey on blockchain privacy and security issues. In: Cross-industry use of blockchain technology and opportunities for the future. IGI Global, pp 80–102
Neudecker T, Andelfinger P, Hartenstein H (2015) A simulation model for analysis of attacks on the Bitcoin peer-to-peer network. In: The 2015 IFIP/IEEE international symposium on integrated network management (IM). IEEE, pp 1327–1332
Fan W, Chang SY, Zhou X, Xu S (2021) Conman: a connection manipulation-based attack against bitcoin networking. In: 2021 IEEE conference on communications and network security (CNS). IEEE, pp 101–109
Fox G (2001) Peer-to-peer networks. Comput Sci Eng 3(3):75–77
Bisht N, Singh S (2015) Analytical study of different network topologies. Int Res J Eng Technol (IRJET) 2(01):88–90
Thai CDT, Lee J, Prakash J, Quek TQ (2018) Secret group-key generation at the physical layer for multi-antenna mesh topology. IEEE Trans Inf Forensics Secur 14(1):18–33
Puelles L, Alonso A, García-Calero E, Martínez-de-la-Torre M (2019) Concentric ring topology of mammalian cortical sectors and relevance for patterning studies. J Comp Neurol 527(10):1731–1752
Tsujimoto T, Shindo T, Kimura T, Jin’no K (2012) A relationship between network topology and search performance of PSO. In: 2012 IEEE congress on evolutionary computation. IEEE, pp 1–6
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Muteba, A.K., Ogudo, K.A. (2023). Leveraging the Goldfinger Attack in Blockchain Based on the Topological Properties. In: Ogudo, K.A., Saha, S.K., Bhattacharyya, D. (eds) Smart Technologies in Data Science and Communication. Lecture Notes in Networks and Systems, vol 558. Springer, Singapore. https://doi.org/10.1007/978-981-19-6880-8_10
Download citation
DOI: https://doi.org/10.1007/978-981-19-6880-8_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-6879-2
Online ISBN: 978-981-19-6880-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)