Full Text:   <275>

Summary:  <45>

Suppl. Mater.: 

CLC number: TP309

On-line Access: 2024-05-06

Received: 2022-10-25

Revision Accepted: 2024-05-06

Crosschecked: 2023-06-16

Cited: 0

Clicked: 354

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Wenbo ZHANG

https://orcid.org/0000-0002-3304-3221

Jingyu FENG

https://orcid.org/0000-0002-5353-3295

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.4 P.540-554

http://doi.org/10.1631/FITEE.2200505


Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks


Author(s):  Wenbo ZHANG, Tao WANG, Chaoyang ZHANG, Jingyu FENG

Affiliation(s):  School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an 710121, China; more

Corresponding email(s):   zhangwenbo@xupt.edu.cn, fengjy@xupt.edu.cn

Key Words:  Blockchain, Cross-chain, Trust mechanism, Multi-chain consensus


Wenbo ZHANG, Tao WANG, Chaoyang ZHANG, Jingyu FENG. Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(4): 540-554.

@article{title="Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks",
author="Wenbo ZHANG, Tao WANG, Chaoyang ZHANG, Jingyu FENG",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="25",
number="4",
pages="540-554",
year="2024",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2200505"
}

%0 Journal Article
%T Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks
%A Wenbo ZHANG
%A Tao WANG
%A Chaoyang ZHANG
%A Jingyu FENG
%J Frontiers of Information Technology & Electronic Engineering
%V 25
%N 4
%P 540-554
%@ 2095-9184
%D 2024
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200505

TY - JOUR
T1 - Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks
A1 - Wenbo ZHANG
A1 - Tao WANG
A1 - Chaoyang ZHANG
A1 - Jingyu FENG
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 25
IS - 4
SP - 540
EP - 554
%@ 2095-9184
Y1 - 2024
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200505


Abstract: 
As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.

区块链网络中抗多样化矿工行为攻击的安全多链共识方案

张文波1,汪涛1,2,张朝阳1,冯景瑜1
1西安邮电大学网络空间安全学院,中国西安市,710121
2中国邮政储蓄银行,中国西安市,710000
摘要:跨链技术的发展使得不同区块链间的互操作成为可能,多链共识在区块链网络中变得日益重要。然而,目前对单链共识方案的研究较多,涉及可信矿工的多链共识方案的探讨相对较少,这为恶意用户在不同链上发起多样化矿工行为(diverse miner behavior, DMB)攻击提供了机会。DMB攻击者可以在某些链(称为mask链)上表现友好并参与共识过程,以提升其信任值,而在其他链(称为kill链)上从事对网络具有破坏性的行为。本文提出一种名为Proof-of-DiscTrust(PoDT)的多链共识方案,旨在防范DMB攻击。该方案引入DiscTrust信任理念,用于评估每个用户在不同链上的信任值。用户的信任值被分为本地信任值和全局信任值。针对DMB攻击者通过在kill链上交替创建真实或虚假区块来维持其信任度的问题,设计了一种实施DiscTrust机制的动态行为预测方法。此外,针对多链环境,提出3个可信矿工选择算法,分别用于选择网络矿工、链矿工和链矿工领导者。实验结果表明,PoDT方案能够抵抗DMB攻击,并且在多链环境中比传统共识方案更为有效。

关键词:区块链;跨链;信任机制;多链共识

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Alzahrani N, Bulusu N, 2018. Towards true decentralization: a blockchain consensus protocol based on game theory and randomness. Proc 9th Int Conf on Decision and Game Theory for Security, p.465-485.

[2]Azaria A, Ekblaw A, Vieira T, et al., 2016. MedRec: using blockchain for medical data access and permission management. 2nd Int Conf on Open and Big Data, p.25-30.

[3]Borkowski M, Sigwart M, Frauenthaler P, et al., 2019. Dextt: deterministic cross-blockchain token transfers. IEEE Access, 7:111030-111042.

[4]Buchman E, 2016. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains. PhD Thesis, The University of Guelph, Ontario, Canada.

[5]Buterin V, 2022. Chain Interoperability. Available fromhttps://www.‍r3.‍com/reports/chain-interoperability [Accessed on Oct. 20, 2022].

[6]Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4):398-461.

[7]Chaudhary R, Jindal A, Aujla GS, et al., 2019. BEST: blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput Secur, 85:288-299.

[8]Chen CH, Chen X, Yu JS, et al., 2021. Impact of temporary fork on the evolution of mining pools in blockchain networks: an evolutionary game analysis. IEEE Trans Netw Sci Eng, 8(1):400-418.

[9]Cheng HJ, Xie Z, Shi YS, et al., 2019. Multi-step data prediction in wireless sensor networks based on one-dimensional CNN and bidirectional LSTM. IEEE Access, 7:117883-117896.

[10]Ding XJ, Guo JX, Li DY, et al., 2021. An incentive mechanism for building a secure blockchain-based Internet of Things. IEEE Trans Netw Sci Eng, 8(1):477-487.

[11]Feng JY, Zhao XY, Chen KX, et al., 2020. Towards random-honest miners selection and multi-blocks creation: proof-of-negotiation consensus mechanism in blockchain networks. Fut Gener Comput Syst, 105:248-258.

[12]Frankenfield J, 2023. What Does Proof-of-Stake (PoS) Mean in Crypto?Available fromhttps://www.investopedia.com/terms/p/proof-stake-pos.asp [Accessed on June 1, 2023].

[13]Gupta R, Tanwar S, Tyagi N, et al., 2019. HaBiTs: blockchain-based telesurgery framework for Healthcare 4.0. Int Conf on Computer, Information and Telecommunication Systems, p.1-5.

[14]He HY, Luo Z, Wang Q, et al., 2020. Joint operation mechanism of distributed photovoltaic power generation market and carbon market based on cross-chain trading technology. IEEE Access, 8:66116-66130.

[15]Herlihy M, 2018. Atomic cross-chain swaps. Proc ACM Symp on Principles of Distributed Computing, p.245-254.

[16]Hewa TM, Kalla A, Nag A, et al., 2020. Blockchain for 5G and IoT: opportunities and challenges. IEEE 8th Int Conf on Communications and Networking, p.1-8.

[17]Hou H, 2017. The application of blockchain technology in e-government in China. 26th Int Conf on Computer Communication and Networks, p.1-4.

[18]Kumar P, Kumar R, Srivastava G, et al., 2021. PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans Netw Sci Eng, 8(3):2326-2341.

[19]Liu DX, Huang C, Ni JB, et al., 2021. Blockchain-based smart advertising network with privacy-preserving accountability. IEEE Trans Netw Sci Eng, 8(3):2118-2130.

[20]Nakamoto S, 2008. Bitcoin: a Peer-to-Peer Electronic Cash System. Available fromhttps://bitcoin.org/bitcoin.pdf [Accessed on Oct. 20, 2022].

[21]Peters GW, Panayi E, Chapelle A, 2015. Trends in cryptocurrencies and blockchain technologies: a monetary theory and regulation perspective. J Finan Persp, 3(3):92-113.

[22]Sharma PK, Kumar N, Park JH, 2019. Blockchain-based distributed framework for automotive industry in a smart city. IEEE Trans Ind Inform, 15(7):4197-4205.

[23]Shi GH, Zhong H, Chen WG, 2008. Study on the models of cross-chain inventory collaboration in the cluster supply chain. IEEE Int Conf on Service Operations and Logistics, and Informatics, p.2114-2118.

[24]Xiong NX, Vasilakos AV, Wu J, et al., 2012. A self-tuning failure detection scheme for cloud computing service. IEEE 26th Int Parallel and Distributed Processing Symp, p.668-679.

[25]Zhang W, Zhu SW, Tang J, et al., 2018. A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput, 74(4):1779-1801.

[26]Zheng ZB, Xie SA, Dai HN, et al., 2018. Blockchain challenges and opportunities: a survey. Int J Web Grid Serv, 14(4):352-375.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE