SoK: Network-Level Attacks on the Bitcoin P2P Network
نویسندگان
چکیده
Over the last decade, Bitcoin has revolutionized global economic and technological landscape, inspiring a new generation of blockchain-based technologies. Its protocol is today among most influential for cryptocurrencies distributed networks. In particular, P2P layer represents reference point all permissionless blockchains, which often implement its solutions in their network layer. Unfortunately, lacks strong security model, leaving it exposed to several threats. Attacks at this level can affect reliability trustworthiness consensus layer, mining credibility whole system. It therefore utmost importance properly understand address protocol. paper, we give comprehensive detailed overview known network-level attacks Bitcoin, as well countermeasures that have been implemented We propose generic adversary an objective-based taxonomy attacks. Finally, identify core weaknesses study relationship between different types attack. believe our contribution help both experienced researchers broader deeper understanding threats, allow better modeling properties.
منابع مشابه
The Bitcoin P2P Network
The Bitcoin virtual currency is built on the top of a decentralized peer-to-peer (P2P) network used to propagate system information such as transactions or blockchain updates. In this paper, we have performed a data collection process identifying more than 872000 different Bitcoin nodes. This data allows us to present information on the size of the Bitcoin P2P network, the node geographic distr...
متن کاملAnonymity Properties of the Bitcoin P2P Network
Bitcoin is a popular alternative to fiat money, widely used for its perceived anonymity properties. However, recent attacks on Bitcoin’s peer-to-peer (P2P) network demonstrated that its gossip-based flooding protocols, which are used to ensure global network consistency, may enable user deanonymization— the linkage of a user’s IP address with her pseudonym in the Bitcoin network. In 2015, the B...
متن کاملIMPACT OF ATTACKS ON CORRELATED P2P NETWORK TOPOLOGY: A COMPLEX NETWORK APPROACH Animesh Srivastava IMPACT OF ATTACKS ON CORRELATED P2P NETWORK TOPOLOGY: A COMPLEX NETWORK APPROACH
Measuring robustness of real-world P2P networks has been a major challenge for the research community. Analytical study of resilience of realworld P2P networks against various kind of node/link failures and attacks are limited to the existence of a giant connected component in the network. However, the actual communication in a P2P based communication network depends entirely on the network top...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملAn Analysis of Anonymity in Bitcoin Using P2P Network Traffic
Over the last 4 years, Bitcoin, a decentralized P2P cryptocurrency, has gained widespread attention. The ability to create pseudoanonymous financial transactions using bitcoins has made the currency attractive to users who value their privacy. Although previous work has analyzed the degree of anonymity Bitcoin offers using clustering and flow analysis, none have demonstrated the ability to map ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3204387