论文标题

关于基于碎片的无许可区块链的Sybil攻击的可行性

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains

论文作者

Rajab, Tayebeh, Manshaei, Mohammad Hossein, Dakhilalian, Mohammad, Jadliwala, Murtuza, Rahman, Mohammad Ashiqur

论文摘要

比特币的单个领导者共识协议(Nakamoto共识)由于IT工作证明(POW)的领导者选择策略的计算要求而遭受了重大的交易吞吐量和网络可伸缩性问题。为了克服这一问题,已经提出了基于委员会的方法(例如Elastico),该方法已提出并(随机)选择多个委员会以并行处理这些交易,并已经非常受欢迎。但是,通过设计,这些委员会或基于碎片的区块链解决方案很容易受到Sybil攻击的影响,如果对手有足够的计算能力来产生多个Sybil委员会成员(通过生成多个有效的节点标识符),则对手可以轻松折衷/操纵共识协议。尽管这些攻击的性质很直接,但尚未系统地分析它们。在本文中,我们通过对代表性且流行的基于碎片的协议Elastico进行建模和分析SYBIL攻击来填补这一研究差距。我们表明,在协议的初始阶段,用于标识符或ID生成的POW技术容易受到SYBIL攻击的影响,并且具有较高哈希功率的节点可以生成足够的SYBIL ID,以成功地妥协Elastico。我们在分析中得出了两个不同类别的Sybil攻击的条件,并执行数值模拟,以在不同的网络和协议参数下验证我们的理论结果。

Bitcoin's single leader consensus protocol (Nakamoto consensus) suffers from significant transaction throughput and network scalability issues due to the computational requirements of it Proof-of-Work (PoW) based leader selection strategy. To overcome this, committee-based approaches (e.g., Elastico) that partition the outstanding transaction set into shards and (randomly) select multiple committees to process these transactions in parallel have been proposed and have become very popular. However, by design these committee or shard-based blockchain solutions are easily vulnerable to the Sybil attacks, where an adversary can easily compromise/manipulate the consensus protocol if it has enough computational power to generate multiple Sybil committee members (by generating multiple valid node identifiers). Despite the straightforward nature of these attacks, they have not been systematically analyzed. In this paper, we fill this research gap by modelling and analyzing Sybil attacks in a representative and popular shard-based protocol called Elastico. We show that the PoW technique used for identifier or ID generation in the initial phase of the protocol is vulnerable to Sybil attacks, and a node with high hash-power can generate enough Sybil IDs to successfully compromise Elastico. We analytically derive conditions for two different categories of Sybil attacks and perform numerical simulations to validate our theoretical results under different network and protocol parameters.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源