Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model
Abstract
:1. Introduction
- (1)
- We introduce an improved epidemic model TG_SEI. IOTA can effectively synchronize the number of nodes in the Tangle estimated by using the TG_SEI model, which is not only an important indicator to measure whether IOTA is running normally, but also an important part of the PC attack cost.
- (2)
- We propose a computational expression for the PC attack cost. The transaction involves multiple key links, from creation to issuance. If a malicious node wants to successfully launch a PC attack, an additional cost must be paid. We used the method of dividing the time according to the key points of events to complete the cost accounting of each stage.
- (3)
- We designed the parasite chain attack prevention algorithms based on price splitting. Using evolutionary game theory to analyze the behaviors of IOTA nodes, it was found that the commodity prices are the main factor that triggers PC attacks. Moreover, we predicted the concentrated time slot of PC attacks, which makes it more efficient to resist PC attacks.
2. Related Work
2.1. PC Attack
2.2. Blockchain and Game Theory
3. Background
3.1. IOTA
3.2. Epidemic Model
3.3. Evolutionary Game Theory
4. Improved Epidemic Model TG_SEI
5. Evolution Game Analysis of Nodes in IOTA
5.1. Research Hypothesis and Parameter Description
5.2. Transaction Number, Cumulative Weight, Time to Successfully Launch Parasite Chain Attack, and Its Cost Function
- (1)
- If node A launches a parasite chain attack successfully, the number of transactions issued is
- (2)
- Cumulative weight
- (3)
- Time of successful parasite chain attack
- (4)
- Cost function
5.3. Constructing Evolutionary Game Model and Results
5.3.1. Nodes Conspire to Create the Parasite Chain
- (1)
- The ESS when
- (2)
- The ESS when
- (3)
- The ESS when
- (1)
- Assuming , , and takes 2, 4, and 6, respectively, the strategy selection of node i changes as shown in Figure 8.
- (2)
- Assuming , , and takes 2, , and , respectively, the strategy selection of node i changes as shown in Figure 9.
5.3.2. Each Node Will Make Its Parasite Chain
6. The Proposed Algorithms
6.1. Concentrated Time Slot of PC Attacks
Algorithm 1 Algorithm for determining the concentrated time slot of PC attacks. |
Input: Commodity price ; The average transaction arrival rate of an honest node ; The average transaction arrival rate of a malicious node ; The average cost of generating and issuing a transaction ; The average cost of verifying and disseminating a transaction ; Actual number of synchronized ledger nodes X; Number of malicious nodes n; The time when the node issues a transaction to the merchant in the main Tangle ; The time when the cumulative weight of transaction reaches the merchant weight threshold and the merchant accepts the transaction . |
Output: The concentrated time slot. |
; |
Calculate the time points and according to Equations (12) and (25) respectively; |
While |
if and |
Monitor the Tangle in real-time; |
If conflicting transactions are detected, run the tip select algorithm and only retain the legal branch with the largest cumulative weight; |
Endif |
Monitor the Tangle regularly; |
If conflicting transactions are detected, run the tip select algorithm and only retain the legal branch with the largest cumulative weight. Monitor in real-time for some time to ensure the complete elimination of conflicting transactions; |
6.2. The Algorithm for Preventing PC Attacks Based on Price Splitting—APS
Algorithm 2 APS-conspiracy. |
Input: Commodity price ; PC attack cost ; Cost of not launching an attack . |
Output: Splitting the price stored in and the price split copies j. |
,,,; |
M.append(); |
While |
; |
M.append(); |
i = i + 1; |
While and |
; |
M.append(); |
i = i + 1; |
; |
Return and j; |
Algorithm 3 APS-independence. |
Input: Commodity price ; PC attack cost ; Cost of not launching an attack . |
Output: Splitting the price stored in and the price split copies j. |
,,,; |
M.append(); |
While |
; |
M.append(); |
i = i + 1; |
; |
Return and j; |
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Popov, S. The Tangle. Version 1.4.3. 2018. Available online: https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf (accessed on 16 February 2022).
- Silvano, W.F.; Marcelino, R. IOTA Tangle: A cryptocurrency to communicate Internet-of-Things data. Future Gener. Comput. Syst. 2020, 112, 307–319. [Google Scholar] [CrossRef]
- Guo, F.; Xiao, X.; Hecker, A.; Dustdar, S. Characterizing IOTA Tangle with Empirical Data. In Proceedings of the GLOBECOM 2020–2021 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Halgamuge, M.N. Optimization framework for best approver selection method (BASM) and best tip selection method (BTSM) for IOTA tangle network: Blockchain-enabled next generation industrial IoT. Comput. Netw. 2021, 199, 108418. [Google Scholar] [CrossRef]
- Eyal, I.; Sirer, E.G. Majority Is Not Enough: Bitcoin mining is vulnerable. Commun. ACM 2018, 61, 95–102. [Google Scholar] [CrossRef]
- Sapirshtein, A.; Sompolinsky, Y.; Zohar, A. Optimal Selfish Mining Strategies in Bitcoin. In International Conference on Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Nayak, K.; Kumar, S.; Miller, A.; Shi, E. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. In Proceedings of the IEEE European Symposium on Security & Privacy, Saarbruecken, Germany, 21–24 March 2016. [Google Scholar]
- Niu, J.; Feng, C. Selfish Mining in Ethereum. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019. [Google Scholar]
- Cai, D. A Parasite Chain Attack in IOTA. Bachelor’s Thesis, University of Twente, Enschede, The Netherlands, 2019. [Google Scholar]
- Li, Y.; Cao, B.; Peng, M.; Zhang, L.; Zhang, L.; Feng, D.; Yu, J. Direct Acyclic Graph-based Ledger for Internet of Things: Performance and Security Analysis. IEEE/ACM Trans. Netw. 2020, 28, 1643–1656. [Google Scholar] [CrossRef]
- Staupe, P. Quasi-Analytic Parasite Chain Absorption Probabilities in the Tangle. 2017. Available online: https://www.iota.org/foundation/research-papers (accessed on 16 February 2022).
- Cullen, A.; Ferrar, P.; King, C.; Shorten, R. Distributed Ledger Technology for IoT: Parasite Chain Attacks. 2019. Available online: https://arxiv.org/pdf/1904.00996.pdf (accessed on 16 February 2022).
- Penzkofer, A.; Kusmierz, B.; Capossele, A.; Sanders, W.; Saa, O. Parasite Chain Detection in the IOTA Protocol. 2020. Available online: https://arxiv.org/abs/2004.13409 (accessed on 16 February 2022).
- Liu, Z.; Luong, N.C.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.C.; Kim, D.I. A Survey on Applications of Game Theory in Blockchain. arXiv 2019, arXiv:1902.10865. [Google Scholar]
- Tang, C.B.; Yang, Z.; Zheng, Z.L.; Chen, Z.Y.; Li, X. Game Dilemma Analysis and Optimization of PoW Consensus Algorithm. Acta Autom. Sin. 2017, 43, 1520–1531. [Google Scholar]
- Song, L.; Li, T.; Wang, Y. Applications of Game Theory in Blockchain. J. Cryptologic Res. 2019, 6, 100–111. [Google Scholar]
- Shi, H.; Wang, S.; Hu, Q.; Cheng, X.; Yu, J. Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain. IEEE Trans. Dependable Secur. Comput. 2020, 18, 1580–1590. [Google Scholar] [CrossRef]
- Phelps, S.; Wooldridge, M. Game Theory and Evolution. Intell. Syst. 2013, 28, 76–81. [Google Scholar] [CrossRef] [Green Version]
- Hu, S.; Cai, C.; Wang, Q.; Wang, C.; Luo, X.; Ren, K. Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 792–800. [Google Scholar]
- Cai, C.; Weng, J.; Yuan, X.; Wang, C. Enabling reliable keyword search in encrypted decentralized storage with fairness. IEEE Trans. Dependable Secur. Comput. 2018, 18, 131–144. [Google Scholar] [CrossRef]
- Yan, D.; Jia, X.; Shu, J.; Yu, R. A Blockchain-based Database System for Decentralized Information Management. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
- Zhang, Y.; Deng, R.H.; Shu, J.; Yang, K.; Zheng, D. TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 2018, 6, 31077–31087. [Google Scholar] [CrossRef]
- Xu, L.; Xu, C.; Liu, Z.; Wang, Y.; Wang, J. Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving. Comput. Mater. Contin. 2019, 60, 675–690. [Google Scholar] [CrossRef] [Green Version]
- Cai, C.; Zheng, Y.; Du, Y.; Qin, Z.; Wang, C. Towards private, robust, and verifiable crowdsensing systems via public blockchains. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1893–1907. [Google Scholar] [CrossRef]
- Miao, Y.; Ma, J.; Liu, X.; Weng, J.; Li, H.; Li, H. Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans. Serv. Comput. 2018, 12, 772–785. [Google Scholar] [CrossRef]
- Guo, Y.; Xie, H.; Wang, C.; Jia, X. Enabling privacy-preserving geographic range query in fog-enhanced iot services. IEEE Trans. Dependable Secur. Comput. 2021. [Google Scholar] [CrossRef]
- Wang, M.; Guo, Y.; Zhang, C.; Wang, C.; Huang, H.; Jia, X. MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. IEEE TSC 2021. [Google Scholar] [CrossRef]
- Zhang, C.; Guo, Y.; Jia, X.; Wang, C.; Du, H. Enabling Proxy-free Privacy-preserving and Federated Crowdsourcing by Using Blockchain. IEEE IoT-J 2020, 8, 6624–6636. [Google Scholar] [CrossRef]
- Yao, J.; Zheng, Y.; Guo, Y.; Cai, C.; Zhou, A.; Wang, C.; Gui, X. A Privacy-preserving System for Targeted Coupon Service. IEEE Access 2019, 7, 120817–120830. [Google Scholar] [CrossRef]
- Miao, Y.; Ma, J.; Liu, X.; Li, X.; Liu, Z.; Li, H. Practical attribute-based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J. 2017, 5, 3008–3018. [Google Scholar] [CrossRef]
- Guo, Y.; Xie, H.; Miao, Y.; Wang, C.; Jia, X. Fedcrowd: A federated and privacy-preserving crowdsourcing platform on blockchain. IEEE Trans. Serv. Comput. 2020. [Google Scholar] [CrossRef]
- Li, C.; Qu, X.; Guo, Y. TFCrowd: A blockchain-based crowdsourcing framework with enhanced trustworthiness and fairness. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–20. [Google Scholar] [CrossRef]
- Xuan, S.; Zheng, L.; Chung, I.; Wang, W.; Man, D.; Du, X.; Yang, W.; Guizani, M. An incentive mechanism for data sharing based on blockchain with smart contracts. Comput. Electr. Eng. 2020, 83, 106587. [Google Scholar] [CrossRef]
- Motepalli, S.; Jacobsen, H.A. Reward Mechanism for Blockchains Using Evolutionary Game Theory. 2021. Available online: https://arxiv.org/abs/2104.05849 (accessed on 16 February 2022).
- Popov, S.; Saa, O.; Finardi, P. Equilibria in the tangle. Comput. Ind. Eng. 2019, 136, 160–172. [Google Scholar] [CrossRef] [Green Version]
- Fang, L. The Analysis of SI Group Knowledge Dissemination Model with Expected Effect. J. Taiyuan Norm. Univ. Sci. Ed. 2020, 19, 9–12. [Google Scholar]
- Gong, Y.; Li, F.; Zhou, L.; Hu, F. Global Dissemination of Information Based on Online Social Hypernetwork. J. Univ. Electron. Sci. Technol. China 2021, 50, 437–444. [Google Scholar]
- Feng, L.; Wang, H.; Feng, S. Improved SIR model of computer virus propagation in the network. J. Comput. Appl. 2011, 31, 1891–1893. [Google Scholar]
- Lu, T. Qualitative Analysis of SEI Model with the Impact of Media. J. Nanjing Norm. Univ. (Nat. Sci. Ed.) 2011, 34, 32–35. [Google Scholar]
- Li, G.; Zhen, J. Global stability of an SEI epidemic model with general contact rate. Chaos Solitons Fractals 2005, 23, 997–1004. [Google Scholar] [CrossRef]
- Wang, X.; Chen, G. Complex Network Theory and Its Application; Tsinghua University Press: Beijing, China, 2006. [Google Scholar]
- Mata, A.S. An overview of epidemic models with phase transitions to absorbing states running on top of complex networks. Chaos 2021, 31, 012101. [Google Scholar] [CrossRef]
Parameter | Description |
---|---|
i, j | Node number, representing node i and node j |
, | Strategies adopted by node i and node j respectively, |
Probability of selecting attack strategy | |
Cost of node successfully launching PC attack | |
Cost of node not launching attack | |
, | Represent the expected returns of both parties respectively |
Commodity price | |
The node issues the initial weight of a transaction (recorded as tran1) in the main tangle | |
The merchant agrees to the cumulative weight threshold of the transaction (tran1) | |
The time when the node issues a transaction tran1 to the merchant in main tangle and also the starting time of the private PC chain | |
The time when the cumulative weight of transaction tran1 reaches the merchant weight threshold and the merchant accepts the transaction | |
t | The time after the node implements the PC attack, the cumulative weight of the double-spending transaction generated on the PC exceeds the cumulative weight time of the legal transaction in main tangle |
The sum of cumulative weights of transaction tran1 in main Tangle at time t | |
The sum of cumulative weights corresponding to the double-spending transaction in the parasite chain at time t | |
Average transaction arrival rate of the node no launching PC attacks (i.e., an honest node), | |
Average transaction arrival rate of nodes launching PC attacks (i.e., a malicious node), | |
The average weight of transactions generated by honest nodes | |
The average weight of transactions generated by malicious nodes |
Node j | |||
---|---|---|---|
Attack | No Attack | ||
Node i | Attack | , | , |
No attack | , | , |
Node j | |||
---|---|---|---|
Attack | No Attack | ||
Node i | Attack | , | , |
No attack | , | , |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, Y.; Guo, Y.; Wang, Y.; Bie, R. Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model. Mathematics 2022, 10, 1108. https://doi.org/10.3390/math10071108
Chen Y, Guo Y, Wang Y, Bie R. Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model. Mathematics. 2022; 10(7):1108. https://doi.org/10.3390/math10071108
Chicago/Turabian StyleChen, Yinfeng, Yu Guo, Yaofei Wang, and Rongfang Bie. 2022. "Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model" Mathematics 10, no. 7: 1108. https://doi.org/10.3390/math10071108
APA StyleChen, Y., Guo, Y., Wang, Y., & Bie, R. (2022). Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model. Mathematics, 10(7), 1108. https://doi.org/10.3390/math10071108