Digital Forensic Implications of Collusion Attacks on the Lightning Network

نویسندگان

  • Dmytro Piatkivskyi
  • Stefan Axelsson
  • Mariusz Nowostawski
چکیده

The limited size of a block in the Bitcoin blockchain produces a scaling bottleneck. The transaction scalability problem can be addressed by performing smaller transactions off-chain and periodically reporting the results to the Bitcoin blockchain. One such solution is the Lightning Network. Bitcoin is employed by lawful users and criminals. This requires crimes against lawful users as well as the use of Bitcoin for nefarious purposes to be investigated. However, unlike Bitcoin, the Lightning Network enables collusion attacks involving intermediate nodes and recipients. In such an attack, regardless of a sender’s actions, money is received by an intermediate node that colludes with a dishonest recipient. Since the dishonest recipient does not “actually” receive the money, it does not provide the goods/service to the sender. Thus, the sender pays for the unprovided goods/service, but the recipient can prove that the payment was not received. This chapter discusses the forensic implications of collusion attacks with regard to lawful users because no discernible traces of attacks remain, as well as for law enforcement, where the attacks can target parties as a form of forfeiture, analogous to law enforcement “sting” operations. This chapter also discusses the potential of the Lightning Network to be used for money laundering activities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Binary forensic code for multimedia signals: resisting minority collusion attacks

Digital forensic marking is a technology to discourage unauthorized redistribution of multimedia signals by embedding a unique mark into each user’s copy of the content. A powerful class of attacks on forensic marking is the collusion attack by a group of users. Recently, a new collusion attack, called the minority attack, has been proposed against forensic marking schemes with correlation-base...

متن کامل

One case of a lightning strike leads to death: case report

Background: Lightning is one of the most mysterious phenomena of nature that also, it has caused many financial and human losses. In tropical and sub-tropical countries, death due to thunderbolt is not unusual, and even tragic events may occur at high altitudes. Lightning physics is complex and not completely clear. Usually, the clouds are heavily pregnant and high voltages and amperages, they ...

متن کامل

On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking

Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customer...

متن کامل

Performance of detection statistics under collusion attacks on independent multimedia fingerprints

Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Collusion attack is a cost effective attack against digital fingerprinting where several copies with the same content but different fingerprints are combined to remove the original fingerprints. In this paper, we consider average attack and several nonl...

متن کامل

Analysis of Boneh-Shaw Finger Printing Codes under Majority Value Collusion Attacks

Lot of research has been done in the previous years to deal with threat of collusion attacks on finger printing codes. Digital fingerprints are code inserted in the media contents before distribution. Each fingerprinting code is assigned to an intended recipient. This fingerprinting code is used to track the culprit in case of illegal distribution of media contents by users. It is now possible ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017