Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains

  • Tayebeh Rajabi
  • , Alvi Ataur Khalil
  • , Mohammad Hossein Manshaei
  • , Mohammad Ashiqur Rahman
  • , Mohammad Dakhilalian
  • , Maurice Ngouen
  • , Murtuza Jadliwala
  • , A. Selcuk Uluagac

Research output: Contribution to journalArticlepeer-review

17 Scopus citations

Abstract

Committee-based permissionless blockchain approaches overcome single leader consensus protocols’ scalability issues by partitioning the outstanding transaction set into shards and selecting multiple committees to process these transactions in parallel. However, by design, shard-based blockchain solutions are vulnerable to Sybil attacks. An adversary with enough computational/hash power can easily manipulate the consensus protocol by generating multiple valid node identifiers/IDs (i.e., multiple Sybil committee members).Despite the straightforward nature of these attacks, they have not been systematically investigated. This article fills this research gap by analyzing Sybil attacks in shard-based consensus of proof-of-work blockchain systems. Specifically, we provide a detailed analysis for Elastico, one of the prominent shard-based blockchain models. We show that the proof-of-work technique used for ID generation in the initial phase of such protocols is vulnerable to Sybil attacks when an adversary (could be a group of colluding nodes) possesses enough hash power. We analytically derive conditions for two different Sybil attacks and perform numerical simulations to validate our theoretical results under various parameters. Further, we utilize the BlockSim simulator to validate our mathematical computation, and results confirm the correctness of the analysis.

Original languageEnglish (US)
Article number25
JournalDistributed Ledger Technologies
Volume2
Issue number4
DOIs
StatePublished - Dec 14 2023
Externally publishedYes

Keywords

  • consensus protocol
  • Shard-based blockchain
  • Sybil attack

ASJC Scopus subject areas

  • Management Information Systems
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains'. Together they form a unique fingerprint.

Cite this