SoK: Network-Level Attacks on the Bitcoin P2P Network

نویسندگان

چکیده

Over the last decade, Bitcoin has revolutionized global economic and technological landscape, inspiring a new generation of blockchain-based technologies. Its protocol is today among most influential for cryptocurrencies distributed networks. In particular, P2P layer represents reference point all permissionless blockchains, which often implement its solutions in their network layer. Unfortunately, lacks strong security model, leaving it exposed to several threats. Attacks at this level can affect reliability trustworthiness consensus layer, mining credibility whole system. It therefore utmost importance properly understand address protocol. paper, we give comprehensive detailed overview known network-level attacks Bitcoin, as well countermeasures that have been implemented We propose generic adversary an objective-based taxonomy attacks. Finally, identify core weaknesses study relationship between different types attack. believe our contribution help both experienced researchers broader deeper understanding threats, allow better modeling properties.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Bitcoin P2P Network

The Bitcoin virtual currency is built on the top of a decentralized peer-to-peer (P2P) network used to propagate system information such as transactions or blockchain updates. In this paper, we have performed a data collection process identifying more than 872000 different Bitcoin nodes. This data allows us to present information on the size of the Bitcoin P2P network, the node geographic distr...

متن کامل

Anonymity Properties of the Bitcoin P2P Network

Bitcoin is a popular alternative to fiat money, widely used for its perceived anonymity properties. However, recent attacks on Bitcoin’s peer-to-peer (P2P) network demonstrated that its gossip-based flooding protocols, which are used to ensure global network consistency, may enable user deanonymization— the linkage of a user’s IP address with her pseudonym in the Bitcoin network. In 2015, the B...

متن کامل

IMPACT OF ATTACKS ON CORRELATED P2P NETWORK TOPOLOGY: A COMPLEX NETWORK APPROACH Animesh Srivastava IMPACT OF ATTACKS ON CORRELATED P2P NETWORK TOPOLOGY: A COMPLEX NETWORK APPROACH

Measuring robustness of real-world P2P networks has been a major challenge for the research community. Analytical study of resilience of realworld P2P networks against various kind of node/link failures and attacks are limited to the existence of a giant connected component in the network. However, the actual communication in a P2P based communication network depends entirely on the network top...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

An Analysis of Anonymity in Bitcoin Using P2P Network Traffic

Over the last 4 years, Bitcoin, a decentralized P2P cryptocurrency, has gained widespread attention. The ability to create pseudoanonymous financial transactions using bitcoins has made the currency attractive to users who value their privacy. Although previous work has analyzed the degree of anonymity Bitcoin offers using clustering and flow analysis, none have demonstrated the ability to map ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3204387