Author:
Zhou Chencheng,Xing Liudong,Liu Qisi,Wang Honggang
Abstract
The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of these applications, it is pivotal to model and evaluate dependability of the block chain-based systems, contributing to their reliable and robust operation. This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities. Built upon the block chain technology, the Bitcoin is a peer-to-peer cryptocurrency system enabling an individual user to trade freely without the involvement of banks or any other types of intermediate agents. However, a node in the Bitcoin is vulnerable to the Eclipse attack, which aims to monopolize the information flow of the victim node. A semi-Markov process (SMP) based approach is proposed to model the Eclipse attack behavior and possible mitigation activities that may prevent the attack from being successful during the attack process. The SMP model is then evaluated to determine the steady-state dependability of the Bitcoin node. Numerical examples are provided to demonstrate the influence of the time to restart the Bitcoin software and time to detect and delete the malicious message on the Bitcoin node dependability.
Publisher
International Journal of Mathematical, Engineering and Management Sciences plus Mangey Ram
Subject
General Engineering,General Business, Management and Accounting,General Mathematics,General Computer Science
Reference46 articles.
1. Akbari, E., Wu, Q., Zhao, W., Arabnia, H.R., & Yang, M.Q. (2017, December). From block chain to internet-based Voting. In 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 218-221). IEEE. Las Vegas, United States.
2. Atzei, N., Bartoletti, M., & Cimoli, T. (2017, April). A survey of attacks on ethereum smart contracts SOK. In International Conference on Principles of Security and Trust (pp. 164-186). Springer. Berlin, Heidelberg.
3. Bag, S., Ruj, S., & Sakurai, K. (2016). Bitcoin block withholding attack: analysis and mitigation. IEEE Transactions on Information Forensics and Security, 12(8), 1967-1978.
4. Bahack, L. (2013). Theoretical bitcoin attacks with less than half of the computational power. arXiv preprint arXiv:1312.7013, https://eprint.iacr.org/2013/868.pdf.
5. Bailey, R.L., & Dell, T.R. (1973). Quantifying diameter distributions with the Weibull function. Forest Science, 19(2), 97-104.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献