Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3318265.3318289acmotherconferencesArticle/Chapter ViewAbstractPublication Pageshp3cConference Proceedingsconference-collections
research-article

Multivariable based checkpoints to mitigate the long range attack in proof-of-stake based blockchains

Published: 08 March 2019 Publication History

Abstract

Proof-of-Stake (PoS) is getting popularity among low power computing devices as compared to high power and energy demanded proof-of work (PoW). Among the security issues of PoS, Long range attack is declared as one of the major issue by many researchers. Long range attack allows the minority stakeholders to become majority stakeholders over a long time span and then they can control the whole blockchain protocol to produce the valid alternative history. Checkpointing is referred as solution to mitigate the impact of the long range attack but still for the newly joined users as well as the users those will stay offline for long period of time, checkpointing mechanism needs to be re-evaluated. In this paper we studied the checkpointing mechanism and proposed a new strategy to implement the checkpointing inside the blockchain technology. The proposed strategy is designed specifically to mitigate the long range attack or stake bleeding attack.

References

[1]
D. Buldin, M. G. Gorodnichev, S. S. Makhrov, E. N. Denisova, "Next Generation Industrial Blockchain-Based Wireless Sensor Networks", Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), Saint-Petersburg, Russia, 2018.
[2]
Pietro Danzi, Anders Ellersgaard Kalor, Cedomir Stefanovic, Petar PopovskiHh, "Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices", IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018.
[3]
Kristián Košt'ál, Tomáš Krupa, Martin Gembec, Igor Vereš, Michal Ries, Ivan Kotuliak, "On Transition between PoW and PoS", 60th International Symposium ELMAR-, Zadar, Croatia, 2018.
[4]
Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles Kamhoua, Laurent Njilla, "Consensus Protocols for Blockchain-based Data Provenance: Challenges and Opportunities", IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, USA, 2017.
[5]
Xinxin Fan, Qi Chai, "Roll-DPoSk: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems", MobiQuitous, New York, USA, 2018.
[6]
J. Kwon, "TenderMint: Consensus without Mining", 2014.
[7]
Sunny King, Scott Nadal, "Ppcoin: Peer-to-peer crypto-currency with proof-of-stake", peercoin.net, 2013.
[8]
Deepak K. Tosh, Sachin Shetty, Peter Foytik, Charles A. Kamhoua, Laurent Njilla, "CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud", 2018 IEEE 11th International Conference on Cloud Computing, San Francisco, CA, USA, 2018.
[9]
Jason Spasovski, Peter Eklund, "Proof of Stake Blockchain: Performance and Scalability for Groupware Communications", Proceedings of the 9th International Conference on Management of Digital EcoSystems, New York, USA, 2017.
[10]
Andrew Poelstra. On stake and consensus. https://download.wpsoftware.net/bitcoin/pos.pdf, March 2015.
[11]
Vitalik Buterin. Long-range attacks: The serious problem with adaptive proof of work. https://blog.ethereum.org, 2014/05/15/long-range-attacks-the-serious-problem-with-adaptive-proof-of-work/, 2014.
[12]
Peter Gaži, Aggelos Kiayias, Alexander Russell, "Stake-Bleeding Attacks on Proof-of-Stake Blockchains", Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 2018.
[13]
Hunt; Guerney D.H., Koved; Lawrence, "Blockchain checkpoints and certified checkpoints", United States Patent Application, 20180150799, 2018.
[14]
Hunt; Guerney D.H., Koved; Lawrence, "Auditing certified blockchain checkpoints", United States Patent Application, 20180150835, 2018.

Cited By

View all
  • (2023)A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash Function2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00061(318-325)Online publication date: 1-Nov-2023
  • (2022)Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing EnvironmentsIEEE Transactions on Mobile Computing10.1109/TMC.2021.305323021:9(3298-3311)Online publication date: 1-Sep-2022
  • (2022)A Lightweight and Attack-Proof Bidirectional Blockchain Paradigm for Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2021.31032759:6(4371-4384)Online publication date: 15-Mar-2022
  • Show More Cited By

Index Terms

  1. Multivariable based checkpoints to mitigate the long range attack in proof-of-stake based blockchains

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    HP3C '19: Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications
    March 2019
    201 pages
    ISBN:9781450366380
    DOI:10.1145/3318265
    • Conference Chair:
    • Steven Guan
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 March 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchain
    2. checkpointing
    3. long range attack
    4. proof-of-stake

    Qualifiers

    • Research-article

    Conference

    HP3C '19

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash Function2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00061(318-325)Online publication date: 1-Nov-2023
    • (2022)Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing EnvironmentsIEEE Transactions on Mobile Computing10.1109/TMC.2021.305323021:9(3298-3311)Online publication date: 1-Sep-2022
    • (2022)A Lightweight and Attack-Proof Bidirectional Blockchain Paradigm for Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2021.31032759:6(4371-4384)Online publication date: 15-Mar-2022
    • (2022)Collusion Attack Analysis and Detection of DPoS Consensus MechanismBlockchain and Trustworthy Systems10.1007/978-981-19-8043-5_14(194-206)Online publication date: 10-Dec-2022
    • (2020)Design a Proof of Stake Based Directed Acyclic Graph ChainFrontiers in Cyber Security10.1007/978-981-15-9739-8_13(150-165)Online publication date: 4-Nov-2020

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media