Skip to main content

Leveraging the Goldfinger Attack in Blockchain Based on the Topological Properties

  • Conference paper
  • First Online:
Smart Technologies in Data Science and Communication

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 558))

  • 234 Accesses

Abstract

In this paper, we provide a new approach to modeling and analyzing the Goldfinger attacks in blockchain networks, based on the topology of a peer-to-peer network; this paper studied the impact of the Goldfinger well known as 51% attacks in the case of the ring, mesh and fully connected topology. The outcome of simulation has proven that in the case of fully connected topology, the attacker node with 501 (hash/s) has found 155 blocks in 60 s and the rest of the nodes, on average, 58 per node; this gives the control of the balance to the blocks of node J with 131 balance and 43 balance on average for nine nodes, in practice, the node with more than 50% will monopolize the balance. The Goldfinger occurred very worst in the fully connected topology and monopolized the network because of topologically connections; the attacker in fully connected topology is a direct and duplicated connection with the nine nodes. In terms of connection duplicated bidirectional or directional, the fully connected topology presents a hard fork compared to ring and mesh topology after the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kim TW, Zetlin-Jones A (2019) The ethics of contentious hard forks in blockchain networks with fixed features. Front Blockchain:9

    Google Scholar 

  2. Banerjee S, Das D, Biswas M, Biswas U (2020) Study and survey on blockchain privacy and security issues. In: Cross-industry use of blockchain technology and opportunities for the future. IGI Global, pp 80–102

    Google Scholar 

  3. Neudecker T, Andelfinger P, Hartenstein H (2015) A simulation model for analysis of attacks on the Bitcoin peer-to-peer network. In: The 2015 IFIP/IEEE international symposium on integrated network management (IM). IEEE, pp 1327–1332

    Google Scholar 

  4. Fan W, Chang SY, Zhou X, Xu S (2021) Conman: a connection manipulation-based attack against bitcoin networking. In: 2021 IEEE conference on communications and network security (CNS). IEEE, pp 101–109

    Google Scholar 

  5. https://simewu.com/blockchainsimulator/index.html

  6. Fox G (2001) Peer-to-peer networks. Comput Sci Eng 3(3):75–77

    Article  MATH  Google Scholar 

  7. Bisht N, Singh S (2015) Analytical study of different network topologies. Int Res J Eng Technol (IRJET) 2(01):88–90

    Google Scholar 

  8. Thai CDT, Lee J, Prakash J, Quek TQ (2018) Secret group-key generation at the physical layer for multi-antenna mesh topology. IEEE Trans Inf Forensics Secur 14(1):18–33

    Article  Google Scholar 

  9. Puelles L, Alonso A, García-Calero E, Martínez-de-la-Torre M (2019) Concentric ring topology of mammalian cortical sectors and relevance for patterning studies. J Comp Neurol 527(10):1731–1752

    Article  Google Scholar 

  10. Tsujimoto T, Shindo T, Kimura T, Jin’no K (2012) A relationship between network topology and search performance of PSO. In: 2012 IEEE congress on evolutionary computation. IEEE, pp 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arcel Kalenga Muteba .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Muteba, A.K., Ogudo, K.A. (2023). Leveraging the Goldfinger Attack in Blockchain Based on the Topological Properties. In: Ogudo, K.A., Saha, S.K., Bhattacharyya, D. (eds) Smart Technologies in Data Science and Communication. Lecture Notes in Networks and Systems, vol 558. Springer, Singapore. https://doi.org/10.1007/978-981-19-6880-8_10

Download citation

Publish with us

Policies and ethics