Affiliation:
1. Isfahan University of Technology, Iran
2. Florida International University, USA
3. University of Texas at San Antonio, USA
Abstract
Committee-based permissionless blockchain approaches overcome single leader consensus protocols’ scalability issues by partitioning the outstanding transaction set into shards and selecting multiple committees to process these transactions in parallel. However, by design, shard-based blockchain solutions are vulnerable to Sybil attacks. An adversary with enough computational/hash power can easily manipulate the consensus protocol by generating multiple valid node identifiers/IDs (i.e., multiple Sybil committee members).Despite the straightforward nature of these attacks, they have not been systematically investigated. This article fills this research gap by analyzing Sybil attacks in shard-based consensus of proof-of-work blockchain systems. Specifically, we provide a detailed analysis for Elastico, one of the prominent shard-based blockchain models. We show that the proof-of-work technique used for ID generation in the initial phase of such protocols is vulnerable to Sybil attacks when an adversary (could be a group of colluding nodes) possesses enough hash power. We analytically derive conditions for two different Sybil attacks and perform numerical simulations to validate our theoretical results under various parameters. Further, we utilize the BlockSim simulator to validate our mathematical computation, and results confirm the correctness of the analysis.
Publisher
Association for Computing Machinery (ACM)
Reference45 articles.
1. Bitcoin: A peer-to-peer electronic cash system;Nakamoto Satoshi;Decentralized Business Review,2008
2. Blockchain Mining Games
3. The Energy Footprint of Blockchain Consensus Mechanisms Beyond Proof-of-Work
4. A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems
5. Bitcoin Wiki. 2018. Scalability. Retrieved September 9 2023 from https://en.bitcoin.it/wiki/Scalability/. (July2018).
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献