Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network

Published: 06 February 2024 Publication History
  • Get Citation Alerts
  • Abstract

    The Lightning Network (LN) is a second layer system for solving the scalability problem of Bitcoin transactions. In the current implementation of LN, channel capacity (i.e., the sum of individual balances held in the channel) is public information, while individual balances are kept secret for privacy concerns. Attackers may discover a particular balance of a channel by sending multiple fake payments through the channel. Such an attack, however, can hardly threaten the security of the LN system due to its high cost and noticeable intrusions. In this work, we present a novel non-intrusive balance tomography attack, which infers channel balances silently by performing legal transactions between two pre-created LN nodes. To minimize the cost of the attack, we propose an algorithm to compute the optimal payment amount for each transaction and design a path construction method using reinforcement learning to explore the most informative path to conduct the transactions. Finally, we propose two approaches (NIBT-RL and NIBT-RL-β) to accurately and efficiently infer all individual balances using the results of these transactions. Experiments using simulated account balances over actual LN topology show that our method can accurately infer 90% ∼ 94% of all balances in LN with around 12 USD.

    References

    [1]
    Marianna Belotti, Nikola Božić, Guy Pujolle, and Stefano Secci. 2019. A vademecum on blockchain technologies: When, which, and how. IEEE Commun. Surv. Tutor. 21, 4 (2019), 3796–3838.
    [2]
    Charles-Edmond Bichot and Patrick Siarry. 2013. Graph Partitioning. John Wiley & Sons.
    [3]
    Alex Biryukov, Gleb Naumenko, and Sergei Tikhomirov. 2022. Analysis and probing of parallel channels in the Lightning Network. In International Conference on Financial Cryptography and Data Security. Springer, 337–357.
    [4]
    Alex Biryukov and Sergei Tikhomirov. 2019. Deanonymization and linkability of cryptocurrency transactions based on network analysis. In IEEE European Symposium on Security and Privacy (EuroS&P’19). IEEE172–184.
    [5]
    Bitcoin Transaction Fee 2019. Bitcoin Transaction Fee historical chart. Retrieved from: https://bitinfocharts.com/en/comparison/bitcoin-transactionfees.html
    [6]
    Bitcoin Visuals 2019. Bitcoin Visuals. Retrieved from https://bitcoinvisuals.com/lightning
    [7]
    Florian Bourse, Marc Lelarge, and Milan Vojnovic. 2014. Balanced graph edge partition. In 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1456–1465.
    [8]
    Aydın Buluç, Henning Meyerhenke, Ilya Safro, Peter Sanders, and Christian Schulz. 2016. Recent Advances in Graph Partitioning. Springer.
    [9]
    Marco Conoscenti, Antonio Vetrò, Juan Carlos De Martin, and Federico Spini. 2018. The CLoTH simulator for HTLC payment networks with introductory Lightning Network performance results. Information 9, 9 (2018), 223.
    [10]
    Bradley Efron and Trevor Hastie. 2016. Computer Age Statistical Inference. Vol. 5. Cambridge University Press, UK.
    [11]
    Wenfei Fan, Muyang Liu, Chao Tian, Ruiqi Xu, and Jingren Zhou. 2020. Incrementalization of graph partitioning algorithms. Proc. VLDB Endow. 13, 8 (2020), 1261–1274.
    [12]
    Michael Fleder, Michael S. Kester, and Sudeep Pillai. 2015. Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657 (2015).
    [13]
    Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 3–16.
    [14]
    David Goldschlag, Michael Reed, and Paul Syverson. 1999. Onion routing. Commun. ACM 42, 2 (1999), 39–41.
    [15]
    Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, and Joaquin Garcia-Alfaro. 2019. On the difficulty of hiding the balance of Lightning Network channels. In ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, 602–612.
    [16]
    George Kappos, Haaroon Yousaf, Ania Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, and Sarah Meiklejohn. 2021. An empirical analysis of privacy in the Lightning Network. In International Conference on Financial Cryptography and Data Security. Springer, Berlin, 167–186.
    [17]
    Nida Khan and Radu State. 2019. Lightning network: A comparative review of transaction fees and data analysis. In International Congress on Blockchain and Applications. Springer, 11–18.
    [18]
    Soohyeong Kim, Yongseok Kwon, and Sunghyun Cho. 2018. A survey of scalability solutions on blockchain. In International Conference on Information and Communication Technology Convergence (ICTC’18). IEEE, 1204–1207.
    [19]
    Dmitry Laptev. 2019. Solutions to inbound capacity problem in Lightning Network. Retrieved from medium.com/lightningto-me/practical-solutions-to-inbound-capacity-problem-in-lightning-network-60224aa13393
    [20]
    Liang Ma, Ting He, Kin K. Leung, Don Towsley, and Ananthram Swami. 2013. Efficient identification of additive link metrics via network tomography. In IEEE 33rd International Conference on Distributed Computing Systems. IEEE, 581–590.
    [21]
    Ayelet Mizrahi and Aviv Zohar. 2020. Congestion attacks in payment channel networks. arXiv preprint arXiv: 2002.06564 (2020).
    [22]
    Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf
    [23]
    Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid, and Christian Decker. 2020. Toward active and passive confidentiality attacks on cryptocurrency off-chain networks. arXiv preprint arXiv:2003.00003 (2020).
    [24]
    Cristina Pérez-Sola, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joaquin Garcia-Alfaro. 2020. Lockdown: Balance availability attack against Lightning Network channels. In International Conference on Financial Cryptography and Data Security. Springer, 245–263.
    [25]
    Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable off-Chain Instant Payments. Retrieved from https://lightning.network/lightning-network-paper.pdf
    [26]
    Pavel Prihodko, Slava Zhigulin, Mykola Sahno, Aleksei Ostrovskiy, and Olaoluwa Osuntokun. 2016. Flare: An approach to routing in Lightning Network. White Paper (2016). Retrieved from https://bitfury.com/content/downloads/whitepaper_flare_an_approach_to_routing_in_lightning_network_7_7_2016.pdf
    [27]
    Yan Qiao, Kui Wu, and Majid Khabbazian. 2021. Non-intrusive and high-efficient balance tomography in the Lightning Network. In ACM Asia Conference on Computer and Communications Security. ACM, 832–843.
    [28]
    Sonbol Rahimpour and Majid Khabbazian. 2022. Torrent: Strong, fast balance discovery in the Lightning Network. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC’22). IEEE, 1–7.
    [29]
    Raiden 2020. Raiden Network. Retrieved from https://github.com/raiden-network/raiden
    [30]
    Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2017. Settling payments fast and private: Efficient decentralized routing for path-based transactions. arXiv preprint arXiv:1709.05748 (2017).
    [31]
    Sebastian Schlag, Christian Schulz, Daniel Seemaier, and Darren Strash. 2019. Scalable edge partitioning. In 21st Workshop on Algorithm Engineering and Experiments (ALENEX’19). SIAM, 211–225.
    [32]
    Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Kathleen Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Giulia Fanti, and Mohammad Alizadeh. 2020. High throughput cryptocurrency routing in payment channel networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI’20). USENIX, 777–796.
    [33]
    Richard S. Sutton and Andrew G. Barto. 2018. Reinforcement Learning: An Introduction. MIT Press.
    [34]
    Thunder 2017. Thunder Network. Retrieved from https://github.com/blockchain/thunder
    [35]
    Sergei Tikhomirov, Rene Pickhardt, Alex Biryukov, and Mariusz Nowostawski. 2020. Probing channel balances in the Lightning Network. arXiv preprint arXiv:2004.00333 (2020).
    [36]
    Manny Trillo. 2013. Stress test prepares VisaNet for the most wonderful time of the year. Retrieved from http://www.visa.com/blogarchives/us/2013/10/10/stress-testprepares-visanet-for-the-most-wonderful-time-of-the-year/index.html
    [37]
    Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, and Halimah Badioze Zaman. 2019. Improvements of the balance discovery attack on Lightning Network payment channels. IACR Cryptol. ePrint Arch. 2019 (2019), 1385.
    [38]
    Yehuda Vardi. 1996. Network tomography: Estimating source-destination traffic intensities from link data. J. Am. Stat. Assoc. 91, 433 (1996), 365–377.
    [39]
    Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ether. Proj. Yell. Pap. 151, 2014 (2014), 1–32.
    [40]
    Ruozhou Yu, Guoliang Xue, Vishnu Teja Kilari, Dejun Yang, and Jian Tang. 2018. CoinExpress: A fast payment routing mechanism in blockchain-based payment channel networks. In 27th International Conference on Computer Communication and Networks (ICCCN’18). IEEE, 1–9.
    [41]
    Chenzi Zhang, Fan Wei, Qin Liu, Zhihao Gavin Tang, and Zhenguo Li. 2017. Graph edge partitioning via neighborhood heuristic. In 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 605–614.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Privacy and Security
    ACM Transactions on Privacy and Security  Volume 27, Issue 1
    February 2024
    369 pages
    ISSN:2471-2566
    EISSN:2471-2574
    DOI:10.1145/3613489
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 February 2024
    Online AM: 29 December 2023
    Accepted: 20 December 2023
    Revised: 16 November 2023
    Received: 05 August 2022
    Published in TOPS Volume 27, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Lightning Network
    2. security and privacy
    3. system attack
    4. network tomography
    5. reinforcement learning

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 154
      Total Downloads
    • Downloads (Last 12 months)154
    • Downloads (Last 6 weeks)16
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media