TY - JOUR
T1 - Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains
AU - Rajabi, Tayebeh
AU - Khalil, Alvi Ataur
AU - Manshaei, Mohammad Hossein
AU - Rahman, Mohammad Ashiqur
AU - Dakhilalian, Mohammad
AU - Ngouen, Maurice
AU - Jadliwala, Murtuza
AU - Uluagac, A. Selcuk
N1 - Publisher Copyright:
© 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM.
PY - 2023/12/14
Y1 - 2023/12/14
N2 - Committee-based permissionless blockchain approaches overcome single leader consensus protocols’ scalability issues by partitioning the outstanding transaction set into shards and selecting multiple committees to process these transactions in parallel. However, by design, shard-based blockchain solutions are vulnerable to Sybil attacks. An adversary with enough computational/hash power can easily manipulate the consensus protocol by generating multiple valid node identifiers/IDs (i.e., multiple Sybil committee members).Despite the straightforward nature of these attacks, they have not been systematically investigated. This article fills this research gap by analyzing Sybil attacks in shard-based consensus of proof-of-work blockchain systems. Specifically, we provide a detailed analysis for Elastico, one of the prominent shard-based blockchain models. We show that the proof-of-work technique used for ID generation in the initial phase of such protocols is vulnerable to Sybil attacks when an adversary (could be a group of colluding nodes) possesses enough hash power. We analytically derive conditions for two different Sybil attacks and perform numerical simulations to validate our theoretical results under various parameters. Further, we utilize the BlockSim simulator to validate our mathematical computation, and results confirm the correctness of the analysis.
AB - Committee-based permissionless blockchain approaches overcome single leader consensus protocols’ scalability issues by partitioning the outstanding transaction set into shards and selecting multiple committees to process these transactions in parallel. However, by design, shard-based blockchain solutions are vulnerable to Sybil attacks. An adversary with enough computational/hash power can easily manipulate the consensus protocol by generating multiple valid node identifiers/IDs (i.e., multiple Sybil committee members).Despite the straightforward nature of these attacks, they have not been systematically investigated. This article fills this research gap by analyzing Sybil attacks in shard-based consensus of proof-of-work blockchain systems. Specifically, we provide a detailed analysis for Elastico, one of the prominent shard-based blockchain models. We show that the proof-of-work technique used for ID generation in the initial phase of such protocols is vulnerable to Sybil attacks when an adversary (could be a group of colluding nodes) possesses enough hash power. We analytically derive conditions for two different Sybil attacks and perform numerical simulations to validate our theoretical results under various parameters. Further, we utilize the BlockSim simulator to validate our mathematical computation, and results confirm the correctness of the analysis.
KW - consensus protocol
KW - Shard-based blockchain
KW - Sybil attack
UR - https://www.scopus.com/pages/publications/105010171937
UR - https://www.scopus.com/pages/publications/105010171937#tab=citedBy
U2 - 10.1145/3618302
DO - 10.1145/3618302
M3 - Article
AN - SCOPUS:105010171937
SN - 2769-6480
VL - 2
JO - Distributed Ledger Technologies
JF - Distributed Ledger Technologies
IS - 4
M1 - 25
ER -