A Countermeasure for Double Spending Attacks on Blockchain Technology in Smart Grid

Page 1

ACountermeasureforDoubleSpendingAttacks onBlockchainTechnologyinSmartGrid

LanqinSang,HenryHexmoor SouthernIllinoisUniversityatCarbondale

March31,2023

Abstract

Asadistributedtechnology,blockchainhasbeenappliedinmany fields.Muchresearchhasbeendoneonitsinherentsecurityissues.Among thesesecurityissues,doublespendingisoneofthemostpernicious.Currentcountermeasuresarenotsystematic,theyeitherfocusonmonitoring ordetectionwithnoeffectivestrategytopreventfuturedoublespending.Thesecountermeasuresalsohaveseriousdrawbacks,suchashigh networktraffic,highCPUutilization,andheavymanagementoverhead. Inthispaper,wepresentasystematicapproachtoaddressdoublespendingattackonsmartgrid.Areputablenodeisselected,whichconstantly comparesalltransactionsincurrenttimewindowwithpreviouslyvalidatedblockandcurrentblock.Upondiscoveringconflictingtransactions, awarningmessagewiththeconflictingtransactionandtwopenaltytransactionsarebroadcastedtothenetworktostopthecurrentattackandto preventfutureattacks.Ourexperimenthasdemonstratedourdesignis highlyeffectivetodetectdoublespending,withshortdetectiontimeand lowCPUutilizations.

Keywords:DoubleSpending,SmartGrid,Blockchain,Reputation-Based, Consensus.

International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023 DOI: 10.5121/ijnsa.2023.15203 37

Asadecentralized,distributed,andimmutableledgertechnologyoperatingonp2pnetwork[1],blockchaintechnologyhasbeenappliedinmanyfields toimprovesecurityindistributedsystems,suchasInternetofThings(IoT), healthcare,supplychain,financialservices[2],andfutureenergysystems[3]. Forexample,blockchainhasbeenusedtoperformsecurityandderivativetransactions[4],[5],digitalpayment[6],[7],[8],datasharinginenergymanagementto addressenergytraders’privacyinsmartpowergrid[9],[10],anovelblockchainbasedenergyframeworktoexchangeexcessenergyamongneighboringnodesto ensureprivacypreservation[11].

Blockchainconstructsblocksregisteringofdifferentdistincttransactions. Withaninternalconsensusmechanism,itguidesthesystemtoproduceaccurateandidenticalinformationacrosstheentirenetwork.Blockchaintechnology isdesignedtoovercomesecuritychallengesandenhancedataintegrity.Thus, securityplaysanimportantroletoguaranteeblockchainacceptability.However,theinvolvementofmonetaryassetsraisessecurityconcerns[12].Double spending,eclipseattacks,selfishattacks,andflashattacksareallcommonexamples[13].Accordingto[14],Sybilanddoublespendingrisksaretheutmost concernsinblockchainsystems.

Doublespendingattackisatypeofdataintegrityattack.Adoublespending attackoccurswhenanattackertriestospendthesametokenormoneymore thanonce[15].Ingeneral,doublespendingisatechniquethatisusedtodeceive someoneaboutthestateofatransaction[16].Inrecentyears,theproposed strategiesagainstdoublespendingandselfishminingconsistofmonitoring, checking,alterforwarding,alterbroadcasting,aswellasconceptualresearch proposals[2].Afewcountermeasurestodoublespendinghavebeenproposed [18],[19],[20].Thesemethodslargelyfocusonbroadcasting,confirmation,and enforcinglisteningperiods.Theyalsosuggestinsertingobserversintothenetworkandblockingincomingconnectionrequests.Broadcastingwouldalertthe systemofanattackandprovidetheminerswiththeproblematictransactions. Confirmationisthestrategytocheckthenumberofblockswhereatransaction appearsortoinspectpropagationdepthoftransactions.Duetothetimethat ittakestoauthenticateatransactionbetweenavendoranditsclient,atransactionmayberecordedwithoutfullconfirmationdepthreview.Althoughno amountofconfirmationdepthwillbeabletocompletelypreventsuchattacks, itisaneffectivemeasuretomitigateattacksinthesystem.Implementinga listeningperiodallowsneighboringminersorevensensorstobeabletospyon andwatchovertheblockchain[15].Theeffectofenforcinglisteningperiodsis alsolimitedbecausetheattackcanoccurafterthelisteningperiod,thoughit ishelpfultocounterdoublespendingattacks.Insertingobserversintothenetworktoforwardalltransactionstothevendorincreasestheopportunitythat thetransactionscanbedetectedinalisteningperiod.Thismethodrequires managingtheobservers.

Inthepreviouslyproposedstrategies,theconflictingtransactionswerenot handled,theresourceswerewastedbecauseallpeerswerecheckingdouble

1Introduction
38
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

spendingtransactions,andthemonitoringwindowwasshort.Sincetheobserversinsertedintothenetworkrequiredmanagementoverhead,theydemand increasednetworktrafficandCPUutilization.Theobserversmayalsocause DDoSattackduetoitsspecialtrafficpattern.Thesestrategiesdonotexplain howconflictingtransactionswillaffecttheconsensusresultsandhowtoprevent theoffendingnodestoimplementdoublespendingattackagain.Anotherissue withblockchainisevenifablockpassedtheconsensus,itonlymeansthatall thenodesreceivedthesamesetoftransactions.Thisdoesnotmeanthatall thetransactionsintheblockaretrulyaccurate,eventhoughallthenodesare honest.Thisisbecausetherearenomechanismstotestifthesetransactionsare correctfromtheirsources,i.e.,onenode’sevaluationtoanothernode,themoney anodeneedstopay.Incorrecttransactionswillcausedisputesamongusersand damagenetworkreputation.Inthispaper,weproposeadesignthatwilladdresstheseissues.Ourcontributionisweuseasinglereputablenodeasthe detectortocheckdoublespendingtransactions,andourdesignisasystematic countermeasure,whichwillmonitor,detect,warn,penalizedoublespending, andpreventitinfuture.Belowarethekeypointsinoursolution:

1. Thedetectionresultsofdoublespendingattackswillbeincludedinthe blockconsensus.

2. Onenodespecificallyactsastheattackdetector,whichfreesothernodes toperformotherduties.Thisdetectorchecksthetransactionsduringthe wholetransactionreceivingandconsensustime.

3. Onlyoneofthemostreputablenodesisselectedasthedetector,the detectorchangesfrequently,anditscommunicationisnotmuchdifferent thanothernodes’.Thesetwofeaturesreducethechanceofthenodeto bethetargetofDDoS.

4. Theattackdetectorandothernodesworkinaparallelfashion.Thedetectionnodechecksdoublespendingduringthewholetransactioncollecting timeintervalandsendsoutitscheckingresultsuponfindinganyconflictingtransactions.

5. Aspenalty,thedetectorwillcreatetwotransactions,onerequiringthe offendingnodetopaythevalueintheconflictingtransactiontothedetector,theotherreducingtheoffendingnode’sreputationscores.Lower reputationscoreswillreducethenode’schancetoparticipateinimportant tasksinthefuture,includingcreatingtransactions.

Therestofthepaperisorganizedasfollows.Section2reviewsrelated work,Section3discussessystemdesign,Section4presentsexperimentalresult analysis,andthelastsectioncontainstheconclusion.

39
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

2Relatedworks

Asecureblockchainnetworkdependsonthesafetyandsecurityofthenodes involved.Asmorenodesjointheblockchainnetwork,theingenuityofattacks inthechainwillprogressivelybecomemoresusceptible.Amongallthesecurity attacks,doublespendingcausesthemostconcern.Doublespendingusually targetssellersorvendors.Asuccessfulattackwouldbethatthemoneyand servicearetakenbytheattacker,leavingthesellerwithnothing.Thiswould causehonestnodestohinderfunctioningduetothelackofsecurityintheir transactions.Muchresearchhasbeenconductedtofindsolutionstomitigate oreliminatedoublespendingattackinblockchainnetwork.

Amethodthatblocksincomingconnectionrequestswasproposed[20].This essentiallypreventsonekindofdoublespendingthatrequirestheattackerconnecttothevendordirectly.Byblockingincomingconnectionrequests,the attackercannotestablishadirectconnectiontothevendortosendthevendor theoffensivetransaction.However,newlyjoinedvendorsmustrequestconnectionstootherpeerstoensuretheyhavethelatestblockchaininformation.The attackercanusethisopportunitytocreatemaliciousnodesanddistributethem throughoutthenetwork.Theattackerhopesthenewvendorswouldrandomly connecttosomeofthesemaliciousnodes.

Aforwardingframeworkin[21]increasestheamountofconfirmationtomake ithardertoattack.Increasingconfirmationwouldrequiremoreauthentications tobemadeinthesysteminordertoconfirmatransaction.Basedonthehash rateofasender,theamountofconfirmationwascalculated,whichwouldbe adequatetomitigatedoublespendingattacks.Theresearcherconcludedthat whentheirprobabilitymethodstocombatattacksisapplied,ifanattackercontrolsmorehashratethanthehonestminingnetwork,thesuccessrateofthe attackwillstillbe100%.Aforwardingmechanismin[22]usespeermonitoringtechniquestoalertthenodesinthesystemthatthereareattacksonthe blockchain.Ifthenodesconfigurethealertsystemtoavoidreceivingalerts, theywillbevulnerabletoattacks.Amethodproposedin[20]requiresthevendortowaitforatransactiontopropagateanumberofstepsbeforeaccepting it.Theideaisthatifmorenodeshaveseenthetransaction,itismorelikely trustworthyandthegreaterdepthisassumedtobebetter.However,witha chainofmaliciousnodes,anattackercouldsimplymoveoffensivetransactions alonguntilthepropagationreachestherequireddepth.

Adynamicobservationmethodin[23]proposedtheENHOBS(enhanced observers)method,whichusedactiveobserverswithindistinguishabletraffic patternsforvaluabletransactioninspection.Todetectdoublespendingattack onthenetwork,aone-timescanwasrunontheblockchaintofindduplicate transactions.Whenmatchingtransactionsweredetected,analertwouldbe sentthroughthenetwork.Oncethealertwasreceivedandwasseenashaving verifiableproofofanattack,anytransactionsmatchingthesameinputvalue wouldbedroppedfromthememorypoolimmediately.Amethodproposedin [19]requirespeerstoconductadeeperinvestigationofconflictingtransactions andbroadcastalertstoallpeersifadoublespendingattackisdetected.This

40
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

approachcancatchdouble-spendersonlyafteranattackhasoccurred,and thereisnopreventionforfutureoccurrence.Eveniftheattackerwasputona blacklist,theattackercouldcreateanewpseudonymeasilyandattackagain.

Alisteningperiodwasusedin[18]tomonitoralltransactionsthathavebeen previouslyreceivedandcheckediftherewereattemptstodoublespend.Ifthere were,analertwouldbesentouttothenetwork.Thiswillnotbeeffectivein detectingattacksbecausetheattackercandelaysendingtheattackingtransactionsuntilthemonitoringwindowhasexpired.Anothertechniqueproposedin [18]istorandomlyinsertobserversacrosstheP2Pnetwork,whichforwardsall transactionsinthemonitoringperiodtohelpdetectdoublespendingbecause atleastoneoftheobserverswillreceiveconflictingtransactions,ifthereare any.Ifanattackisdetected,analertmessagewillbesenttothenetwork.This approachissomewhateffective.However,itdoesnotdirectlypreventthedoublespendingattackorthepropagationoftheoffensivetransaction.Plus,the observer’strafficpatternscanbeeasilyanalyzedbyanattacker[24],whocan carryoutDDoSattacksagainsttheobserversandre-enabledoublespending.

Abroadcastingprogrammingstrategyin[25]proposedamechanismtoconstructspecialtransactionoutputstocombatdoublespending.Theoutputof abitcointransactionincludestwofields:thefirstoneindicatestheamountof bitcoinsthatwillbedeposited,thesecondfield,namedFR-P2PK(fixed-r-payto-pubkey),definestheconditionsunderwhichthisoutputcouldbespent.Such outputcanbespentwithasinglesignaturebuthasthepropertythatiftwo differentsignatureshavethesameoutput,whichindicatesadoublespending attack,theprivatekeyusedtosignthetransactionisrevealed.Thentheobservercangenerateathirdtransactionspendingthesameoutputandsendthe amounttohimself.

Adetectionmethodin[26]usesblindsignaturecryptographywithapublicly verifiabletime-basedpaymenttranscriptasdoublespendingcountermeasure. Forthecointobecashedbytheclient,thevendormustpresentaNIZK(noninteractivezero-knowledge)proof,whichwillbindthepaymenttranscriptto thetargetclientandtime.Anothersolutionpresentedin[26]isacoinrenewal protocolwhichprovidesacoinwiththreestages.Beforereachingthedates,the coincanbecashedorrenewed.Ifthecoinreachesthefirstdate,itcanonlybe renewed.Ifitreachestheseconddate,thecoinwillbetotallyvoid.

3SystemDesign

3.1DoubleSpending

Toimplementadoublespendingattack,theattackerfirstcreatestwotransactions.ThefirsttransactionTV,transactiontovendor,liststhevendoras therecipientofthepayment,andthesecondtransactionTA,transactionto attacker,liststheattackerastherecipientofthepayment.Theattacker’sgoal istohavethevendoracceptTVlongenoughtodeliverthegoodsorservicesand havetherestofthenetworkacceptTAsothattheattackerkeepsthemoney.

41
International Journal of Network Security & Its Applications (IJNSA) Vol.15,
No.2, March 2023

Theattackersendsoutbothtransactions.TVistransmitteddirectlytothe vendor,whileTAisbroadcastedtotherestofthenetwork.Inorderforadoublespendingattacktobesuccessful,1)Theattackermustknowthevendor’s IPaddresssoitcanconnecttothevendordirectlyandsendTVtothevendor; 2)ThevendormustreceiveTVbeforeTAarrives[20]toensurethatTAwill beautomaticallydroppedwhenthevendoreventuallyreceivesit;3)TAmust beconfirmedintheblockchainfirstorelseTVwillactuallybeconfirmedand thatblockwillbecometheacceptedblockinthenetwork;4)Givenanequal propagationofbothtransactions,thereisa50percentchanceforeithertransactiontobeconfirmed.MorenodesarerequiredtoworkonTAthanonTVto increaseTA’slikelihoodofbeingacceptedintotheblockchain,anditrequires thatthevendoronlyseesTV.Becausetheneighborsofthevendorwilllikely getTVfirst(directlyfromthevendor)andthusdropTAratherthanpropagateittothevendor.Thiskindofdoublespendingcansucceedinfast-paying transactionsinwhichthevendordoesnotwaitforconfirmation.Figure1shows 0-confirmationdoublespending.

Figure1:0-confirmationDoubleSpending

Anotherformofdoublespendingattackisblockwithholdingattack[27], [28]inwhichtheattackerpoolsresourcestocreateablockBV,whichcontains TV.Theattackerblocksallotherconnectionstothevendorandpreventsthe vendorfromeverreceivingallotherblocksconfirmingTAwhilesendingBVthe momentitiscalculated.BVrepresentstheblockcontainingTV.Theattacker essentiallycreatesaforkintheblockchaincontainingBVthatwilleventually bedisregardedsincenootherminingpoolsworktoextendthissideofthefork [19].Thismethodofdoublespendingcansucceedinslow-paytransactions inwhichthevendorawaitsconfirmation.Figure2showstheN-confirmation doublespending[16].

3.2DesignAssumptions

1. Ourdesignisbasedonenergytradinginsmartgridandthepayment methodscanbetokens,moneyorders,checks,oranyotherpaymentsthat canbedefinedasuniqueandcanbereusable.

2. Ourdoublespendingcountermeasureisforslow-paymentsituations,such aspayingelectricitybillorbuyingrenewableenergybyconsumers.We assumetheattackerwilltrytousethesamepaymentinatmosttwo

International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023 42

consecutiveblocks,oneisapreviouslyvalidatedblockandtheotheris currentlycollectingtransactions.Iftherearetwoconflictingtransactions inonevalidatedblock,thetransactionwiththelatertimestampwilldecide theblock’sfinalstatus.

3. Ourdesignisbasedonourpreviouspaper[29]andaddsanotherreputation score,detection,tothereputationformula.ThescoreofdetectionDTis cumulativeandDTiscalculatedthesamewayasthevoter’sscore. DTi = ±

ThetotalreputationscoreiscalculatedwithOffensecontainsallother attackingbehaviorsexceptdoublespending.

Reputation = Resource + Defense + Availability

+ Offense + Service + Function

+ Detection + DoubleSpend

(3)

4. Whenanewtransactionarrives,everynodechecksifthetransaction timestampislaterthancurrenttimestamp[16],ifitis,thistransaction isillegalandwillbedropped.Otherwise,thetransactionwillbesavedin thenode’slocalmemorypool.

5. Wealsouseasimilarconsensusalgorithmasin[29]byaddingdetection stepstotheconsensusin[29].

Figure2:N-confirmationDoubleSpending
(1)
N i=1 DTi (2)
Point
DT =
43
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

6. Allthefieldsinthebusinesstransactions,exceptthesetwofields:the timestampandthepayment’sreceiver[29],arecomparedtodecideiftwo transactionsareconflictingornot.

7. Theexperimentalenvironmentisthesameasin[29]

3.3DoubleSpendingAttackModels

1. Case1:SupposetheattackonlysendsavendorTV,thenonlythevendor’s localblockBVcontainsTV.WhenthevendorreceivestheblockBL,which representstheblockproposedbytheleader,andfindsout:

BV = BL

ThevendorwillfailBL.IfBLispassed,thevendorwilldropitslocal blockBVandtakeBL.Theattackerwillnotgetthegoodsorservice.

2. Case2:TVisinavalidatedblock.TAisaddedtothecurrentblock andwaitsforvalidation.ThedetectorwilldiscoverTAisaconflicting transactionwhencomparingitwiththetransactionsinthepreviously validatedblock.TAwillbereplacedwiththetransactionscreatedbythe detector(TDs).IfBLisvalidated,theattackerwillbepenalizedwiththe sameamountpaymentitmadeinTA.

3. Case3:IfbothTVandTAareputintooneblock,thetransactionwith thelatertimestampwillbediscoveredbythedetectorandreplacedby TDs,whichiscreatedbythedetector.Thedetectorisrewardedwiththe sameamountofpaymentinTA.IfBLisvalidated,theattackereither getstheserviceorkeepsitsmoney.Italsogetsapenaltyatthesame time.

4. Case4:Thevictimistheblockleader,whichisaspecialcaseforCase 1.BLisdropped,andtheattackerfaileditspurpose.Thedetectorisnot awareoftheattackandtherewillbenopenaltytotheattacker.

5. Case5:Thedetectoristhevictim,anotherspecialcaseforCase1.Any doublespendingwillbediscovered.

3.4DoubleSpendingDetectionProcedure

Figure3showsthedoublespendingdetectionflowchart.

1. Atthebeginningofeachtimeinterval,eachnodeselectsnodeswithat least90%ofthehighesttotalreputationscoreamongallnodesaspotential detectorpool.

2. Selectthenodewiththehighestdetectionscorefromthepotentialdetector poolasthedetector.

44
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

3. Thedetectorcontinuouslychecksandbroadcastsconflictingtransactions againstthepreviousvalidatedblockandthetransactionsincurrenttime interval.Ifanoffendingtransactionisdiscovered,asarewardtothedetectorandapenaltytotheattacker,thedetectorwillcreatetwotransactions, onetransactionwillpaythesameamountasintheconflictingtransaction tothedetector,theotheronewillbeanoffendingreputationtransaction totheattacker.Theoffendingtransactionandthetwopenaltytransactionswillformawarningmessageandbebroadcastedtoallnodesinthe network.

4. Uponreceivingthedetector’swarningmessage,allnodesdroptheoffendingtransactionandaddthedetector’srewardtransactionandthe attacker’soffendingreputationtransactionintheirmemorypools.

Uponfinishingtheconsensus,allnodesupdatetheoffendingnode’sscoresaccordingly,andupdatethedetector’sreputationscoresthesamewayasupdating anode’svotingscores.

Figure3:Double-SpendDetectionFlowChart
45
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

Table1:DetectionandConsensusPerformance

4ExperimentalResultsandAnalysis

4.1ExperimentalTransactionCreation

Figure4showshowtheexperimentaltransactionswerecreated.Whenitis timetosimulate,aloopnumberwasset,whichcontrolsthenumberoftransactionstobecreated.Ineachloop,onebusinesstransactionandonereputation transactionwerecreated.

Figure5showsthecasetestingflowchart.Ineachtestingcase,thetesting transactionswereeithersenttoaspecificnodeorwerebroadcastedtotheentire network.

4.2DetectionandConsensusPerformance

Table1andFigure6displaytheexperimentaldataandgraph,respectively. Thenormaldetectiontimewasfivesecondsforonedoublespendingdetection, whichwasnotaffectedbythenumberoftransactionsintheblock.Thetime wasjustnecessarytorunthedetectionprogram,whichperformedmuchbetter thanallthethreecasesin[23]:ofAllENHOBS,1%Skinny,and2%Skinny. Theconsensustimedidnotchangeuntilthenumberoftransactionsreached 400.Thepatternandvaluesoftheconsensusareliketheresultsweobtained previously[29].Thisisexpectedbecausetheconsensuswasconductedina similarway.

OurapproachusedmuchlessCPUtimethan[23].Ourdetectionnode used0.1%ofCPU,whilewitheverynodeactingasobserversin[23],theCPU utilizationjumpedfrom31%to50.6%,withthemaximumCPUutilization reachingashighas96%.Thisisunderstandablebecauseonedetectionnode willusemuchlessresourcesthanmanynodesasdetectionnodesatthesame time.

Wetestedallfivedoublespendingcases.Thedetectionrateis100%forC2, C3andC4,and0forC1andC5,asshowninFigure7.Wetestedthedetection rateswithblockchainstandardmaximumblocksize1.1MB,whichisequivalent to2000transactions.Worthnoticingisthatthedetectionrateis0whenthe doublespendingvictimisthevendorortheblockleader.Thisisbecausethe

Testing Numberof Transactions Timeof Consensus(s) Timeof Detection(s) Statusof Block DoubleSpending Detected? Sizeof Block 1 7 5 5 Passed Yes 4KB 2 53 5 5 Passed Yes 32KB 3 103 5 5 Passed Yes 58KB 4 203 5 5 Passed Yes 115KB 5 403 6 5 Passed Yes 227KB 6 803 8 5 Passed Yes 452KB 7 1203 12 5 Passed Yes 677KB 8 1603 18 5 Passed Yes 902KB 9 2003 19 5 Passed Yes 1.1MB
46
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

International Journal of Network Security & Its Applications (IJNSA) Vol.15,

No.2, March 2023

Figure4:TransactionCreationFlowChart conflicttransactionwasonlysenttothevendororleaderandthedetectordid notreceiveTA.Inbothsituations,thelocalblock/blockswerenotthesameas theproposedblock.Inthesetwosituations,moresystemresourceswerewasted whentheleaderwasthevictimthanwhennon-leadernodewasattacked.This isbecausenon-leadernodeonlyneedstodropitslocalblockwhiletheleader’s 47

4.3DetectionComplexity

ThecomplexityofthedoublespendingdetectionisO(N),whereNisthe numberoftransactionsinablock.Theconflictingtransactionwillbesearched throughoutthepreviouslyvalidatedblockandcurrentblock,sothedetection timeshouldbe2O(N).Thecomplexityofconsensusalgorithmis O(N 2)because thetransactionsintwoblockarecompared.

Figure5:Double-SpendCaseTestFlowChart blockwasdroppedafterallthenodesinthenetworkhadverifiedit.
48
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023
0 500 1,000 1,500 2,000 5 10 15 20 NumberofTransactions ConsensusTime(Seconds) Detection Consensus
C1
0 25 50 75 100
DetectionRate%
Figure6:ConsensusandDetectionPerformance
C2 C3 C4 C5
TestCases
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2,
2023 49
Figure7:Double-SpendDetectionEffectiveness
March

4.4SecurityAnalysis

1. TVwasonlysenttothevendor,whereasothernodesreceivedTA.The blockBA,whichcontainedTA,wasvalidated,andthevendordroppedits localblockBV,whichcontainedTV.Theattackfailedtogetserviceand didnotgetpenalizedeitherbecausetheattackwasnotuncovered.

2. WhenTVwasincludedinthepreviousblock,andTAwasincurrent block,thedetectorfoundTAwasaconflictingtransactionandsenta rewardingtransactiontoitselfandareducingreputationtransactionto theattacker.Theblock,whichdidnotcontainTA,wasvalidatedbyall nodes.Theattackerdidnotrecoveritspayment.

3. WhenTVwasincurrentblockalreadyandTAwasbroadcastedagain, thedetectorfoundTAandsentarewardingtransactiontoitselfanda reducingreputationtransactiontotheattacker.TheblockcontainingTV wasvalidated.Theattackeronlyreceivedservice.

4. Whentheleaderwasattacked,thedetectionfailedbecausetheoffending transactionTAwasonlysenttotheleader.TheproposedblockBLbythe leaderfailedbecauseothernodesdidn’thavethesametransactionsasthe leader.Nodamagewasdonetoanynodesbutthesystemresourceswere wasted.Theattackeronlyreceivedserviceandfailedtogetitsmoney back.

5. Whenthedetectorwasattacked,thedoublespendingdetectionratewas 100%,thiswasbecausethedetectorhadbothTAandTV.Besidefailing togetitsmoneyback,theattackergottwopenaltytransactions,payment tothedetectorandlostitsreputationscores.

5Conclusion

Inthispaper,weproposedadoublespendingcountermeasure,whichcan effectivelydetectdoublespendingintwoconsecutiveblocks.Ourdesignputs detectionresultsintotheconsensusmechanism,handlestheoffendingtransaction,andhasamechanismtopreventtheperpetratortodoublespendagain. Comparingtoothercountermeasures,suchastimeperiodmonitoringandinsertingobservers,ourmethodconstantlymonitorstransactions,useslesscomputing resources,andreducesnetworktrafficandthemanagementoverhead.Another advantageofourdesignisourdetectionnodeisnotfixatedanditdoesnothave aspecificcommunicationpattern,whichwilllesslikelyattractDDoSattack. However,therearesomelimitationsforthecurrentresearch.Forexample,becauseitonlycheckstheconflictingtransactionsintwoconsecutiveblocks,it willnotbeabletodetectdoublespendingifatransactionconfirmationislarger than1.Anotherlimitationisthesingledetectormightbehavemaliciously,or itmightnotbeabletoprocessalltransactionsifthenumberoftransactionsis

50
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

huge.Futureresearchwill:1)handlethesituationwhentheblockleaderisattacked;2)becheckingallkindsoftransactions,suchassybilattack,self-mining attack,business,andservicetransactions;3)expandthedetectiontotheentire blockchaintoovercomeN-confirmationsdoublespending;4)useasetofdetectortocheckthesecurityattacktransactions.Ofthefourfuturedirections,2 and3arepartsofthereasonswechosetohaveasinglenodetoperformthe detectionduties.

References

[1] TatsuyaSato,YosukeHimura.Smart-contractbasedsystemoperationsfor permissionedblockchain.In 20189thIFIPInternationalConferenceon NewTechnologies,MobilityandSecurity(NTMS),pages1–6,2018.

[2] KervinsNicolas,YiWang,GeorgeC.Giakos,BingyangWei,HongdaShen. Blockchainsystemdefensiveoverviewfordouble-spendandselfishmining attacks:Asystematicapproach. IEEEAccess,9:3838–3857,2021.

[3] ZhaoyangDong,FengjiLuo,GaoqiLiang.Blockchain:asecure,decentralized,trustedcyberinfrastructuresolutionforfutureenergysystems. JournalofModernPowerSystemsandCleanEnergy,6:958—-967,Jul. 2018.

[4] YunsenWangandAlexanderKogan.Designingconfidentiality-preserving blockchain-basedtransactionprocessingsystems. InternationalJournalof AccountingInformationSystems,30:1–18,September2018.

[5] DrMahdiH.Miraz,DavidDonaldDavid.Applicationofblockchainin bookingandregistrationsystemsofsecuritiesexchanges. inProc.Int. Conf.Comput.,Electron.Commun.Eng.(iCCECE),page35–40,August 2018.

[6] FengGao,LiehuangZhu,MengShen,KashifSharif,ZhiguoWan,KuiRen. Ablockchain-basedprivacy-preservingpaymentmechanismforvehicle-togridnetworks. IEEENetwork,32(6):184–192,2018.

[7] LinZhong,QianhongWu,JanXie,JinLi,BoQin.Asecureversatile lightpaymentsystembasedonblockchain. FutureGenerationComputer Systems,93:327–337,2019.

[8] LeiXu,LinChen,ZhiminGao,LarryCarranco,XinxinFan,NolanShah, NourDiallo,WeidongShi.Supportingblockchain-basedcryptocurrency mobilepaymentwithsmartdevices. IEEEConsumerElectronicsMagazine, 9(2):26–33,2020.

[9] AhmedS.Musleh,GangYao,S.M.Muyeen.Blockchainapplicationsin smartgrid–reviewandframeworks. IEEEAccess,7:86746–86757,2019.

51

[10] KekeGai,YuluWu,LiehuangZhu,MeikangQiu,MengShen.Privacypreservingenergytradingusingconsortiumblockchaininsmartgrid. IEEE TransactionsonIndustrialInformatics,15(6):3548–3558,2019.

[11] MohamedAmineFerrag,LeandrosMaglaras.Deepcoin:Anoveldeep learningandblockchain-basedenergyexchangeframeworkforsmartgrids. IEEETransactionsonEngineeringManagement,67(4):1285–1297,2020.

[12] CongT.Nguyen,DinhThaiHoang,DiepN.Nguyen,DusitNiyato,Huynh TuongNguyen,ErykDutkiewicz.Proof-of-stakeconsensusmechanismsfor futureblockchainnetworks:Fundamentals,applicationsandopportunities. IEEEAccess,7:85727–85745,2019.

[13] NAnita.,MVijayalakshmi.Blockchainsecurityattack:Abriefsurvey. pages1–6,2019.

[14] MubasharLqbal,RaimundasMatuleviˇciusi.Blockchain-basedapplication securityrisks:Asystematicliteraturereview. InAdvancedInformation SystemsEngineeringWorkshops,page176–188.,2019.

[15] KervinsNicolas,YiWang.Anoveldoublespendingattackcountermeasure inblockchain.In 2019IEEE10thAnnualUbiquitousComputing,Electronics&MobileCommunicationConference(UEMCON),pages0383–0388, 2019.

[16] MubasharIqbal,RaimundasMatuleviˇcius.Exploringsybilanddoublespendingrisksinblockchainsystems. IEEEAccess,9:76153–76177,2021.

[17] AzizMohaisen,oongheonKim.Thesybilattacksanddefenses:Asurvey. SmartComputingReview,3:1–10.,2013.

[18] GhassanO.Karame,ElliAndroulaki,SrdjanCapkun.Double-spending attacksonfastpaymentsinbitcoin.page906–917,2012.

[19] G.O.Karame,E.Androulaki,M.Roeschlin,A.Gervais,andS.Capkun. Misbehaviorinbitcoin:Astudyofdouble-spendingandaccountability. ACMTransactionsonInformationandSystemSecurity(TISSEC),18, June2015.

[20] TobiasBamert,ChristianDecker,LennartElsen,RogerWattenhofer, SamuelWelten.Haveasnack,paywithbitcoins.In IEEEP2P2013 Proceedings,pages1–5,2013.

[21] Rosenfeld,Meni.Analysisofhashrate-baseddoublespending. arXiveprints,pagearXiv:1402.2009,Feberary2014.

[22] MatthiasGrundmann,TillNeudecker,HannesHartenstein.Exploiting transactionaccumulationanddoublespendsfortopologyinferenceinbitcoin.In FinancialCryptographyandDataSecurity,pages113–126,2019.

52
International Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

[23]

JohnP.Podolanko,JiangMing.Counteringdouble-spendattacksonbitcoinfast-paytransactions.2017.

[24] MichaOber,StefanKatzenbeisser,KayHamacher.Structureand anonymityofthebitcointransactiongraph. FutureInternet,5:237–250, 2013.

[25] CristinaPerez-Sola,SergiDelgado-Segura,GuillermoNavarro-Arribas, JordiHerrera-Joancomarti.Double-spendingpreventionforbitcoinzeroconfirmationtransactions,2017.

[26]

IvanOsipkov,EugeneY.Vasserman,NicholasHopper,YongdaeKim.Combatingdouble-spendingusingcooperativep2psystems.In 27thInternationalConferenceonDistributedComputingSystems(ICDCS’07),pages 41–41,2007.

[27]

ArthurGervais,HubertRitzdorf,GhassanO.Karame,SrdjanCapkun. Tamperingwiththedeliveryofblocksandtransactionsinbitcoin. inProceedingsofthe22ndACMSIGSACConferenceonComputerandCommunicationsSecurity(CCS’15),page692–705,October2015.

[28]

SamiranBag,SushmitaRuj,KouichiSakurai.Bitcoinblockwithholdingattack:Analysisandmitigation. IEEETransactionsonInformation ForensicsandSecurity,12(8):1967–1978,2017.

[29] LanqinSangandHenryHexmoor.Reputation-basedconsensusfor blockchaintechnologyinsmartgrid.

International
53
Journal of Network Security & Its Applications (IJNSA) Vol.15, No.2, March 2023

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.