CLC number: TP309
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2023-06-16
Cited: 0
Clicked: 1061
Citations: Bibtex RefMan EndNote GB/T7714
Wenbo ZHANG, Tao WANG, Chaoyang ZHANG, Jingyu FENG. Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(4): 540-554.
@article{title="Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks",
author="Wenbo ZHANG, Tao WANG, Chaoyang ZHANG, Jingyu FENG",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="25",
number="4",
pages="540-554",
year="2024",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2200505"
}
%0 Journal Article
%T Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks
%A Wenbo ZHANG
%A Tao WANG
%A Chaoyang ZHANG
%A Jingyu FENG
%J Frontiers of Information Technology & Electronic Engineering
%V 25
%N 4
%P 540-554
%@ 2095-9184
%D 2024
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200505
TY - JOUR
T1 - Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks
A1 - Wenbo ZHANG
A1 - Tao WANG
A1 - Chaoyang ZHANG
A1 - Jingyu FENG
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 25
IS - 4
SP - 540
EP - 554
%@ 2095-9184
Y1 - 2024
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200505
Abstract: As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.
[1]Alzahrani N, Bulusu N, 2018. Towards true decentralization: a blockchain consensus protocol based on game theory and randomness. Proc 9th Int Conf on Decision and Game Theory for Security, p.465-485.
[2]Azaria A, Ekblaw A, Vieira T, et al., 2016. MedRec: using blockchain for medical data access and permission management. 2nd Int Conf on Open and Big Data, p.25-30.
[3]Borkowski M, Sigwart M, Frauenthaler P, et al., 2019. Dextt: deterministic cross-blockchain token transfers. IEEE Access, 7:111030-111042.
[4]Buchman E, 2016. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains. PhD Thesis, The University of Guelph, Ontario, Canada.
[5]Buterin V, 2022. Chain Interoperability. Available fromhttps://www.r3.com/reports/chain-interoperability [Accessed on Oct. 20, 2022].
[6]Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4):398-461.
[7]Chaudhary R, Jindal A, Aujla GS, et al., 2019. BEST: blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput Secur, 85:288-299.
[8]Chen CH, Chen X, Yu JS, et al., 2021. Impact of temporary fork on the evolution of mining pools in blockchain networks: an evolutionary game analysis. IEEE Trans Netw Sci Eng, 8(1):400-418.
[9]Cheng HJ, Xie Z, Shi YS, et al., 2019. Multi-step data prediction in wireless sensor networks based on one-dimensional CNN and bidirectional LSTM. IEEE Access, 7:117883-117896.
[10]Ding XJ, Guo JX, Li DY, et al., 2021. An incentive mechanism for building a secure blockchain-based Internet of Things. IEEE Trans Netw Sci Eng, 8(1):477-487.
[11]Feng JY, Zhao XY, Chen KX, et al., 2020. Towards random-honest miners selection and multi-blocks creation: proof-of-negotiation consensus mechanism in blockchain networks. Fut Gener Comput Syst, 105:248-258.
[12]Frankenfield J, 2023. What Does Proof-of-Stake (PoS) Mean in Crypto?Available fromhttps://www.investopedia.com/terms/p/proof-stake-pos.asp [Accessed on June 1, 2023].
[13]Gupta R, Tanwar S, Tyagi N, et al., 2019. HaBiTs: blockchain-based telesurgery framework for Healthcare 4.0. Int Conf on Computer, Information and Telecommunication Systems, p.1-5.
[14]He HY, Luo Z, Wang Q, et al., 2020. Joint operation mechanism of distributed photovoltaic power generation market and carbon market based on cross-chain trading technology. IEEE Access, 8:66116-66130.
[15]Herlihy M, 2018. Atomic cross-chain swaps. Proc ACM Symp on Principles of Distributed Computing, p.245-254.
[16]Hewa TM, Kalla A, Nag A, et al., 2020. Blockchain for 5G and IoT: opportunities and challenges. IEEE 8th Int Conf on Communications and Networking, p.1-8.
[17]Hou H, 2017. The application of blockchain technology in e-government in China. 26th Int Conf on Computer Communication and Networks, p.1-4.
[18]Kumar P, Kumar R, Srivastava G, et al., 2021. PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans Netw Sci Eng, 8(3):2326-2341.
[19]Liu DX, Huang C, Ni JB, et al., 2021. Blockchain-based smart advertising network with privacy-preserving accountability. IEEE Trans Netw Sci Eng, 8(3):2118-2130.
[20]Nakamoto S, 2008. Bitcoin: a Peer-to-Peer Electronic Cash System. Available fromhttps://bitcoin.org/bitcoin.pdf [Accessed on Oct. 20, 2022].
[21]Peters GW, Panayi E, Chapelle A, 2015. Trends in cryptocurrencies and blockchain technologies: a monetary theory and regulation perspective. J Finan Persp, 3(3):92-113.
[22]Sharma PK, Kumar N, Park JH, 2019. Blockchain-based distributed framework for automotive industry in a smart city. IEEE Trans Ind Inform, 15(7):4197-4205.
[23]Shi GH, Zhong H, Chen WG, 2008. Study on the models of cross-chain inventory collaboration in the cluster supply chain. IEEE Int Conf on Service Operations and Logistics, and Informatics, p.2114-2118.
[24]Xiong NX, Vasilakos AV, Wu J, et al., 2012. A self-tuning failure detection scheme for cloud computing service. IEEE 26th Int Parallel and Distributed Processing Symp, p.668-679.
[25]Zhang W, Zhu SW, Tang J, et al., 2018. A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput, 74(4):1779-1801.
[26]Zheng ZB, Xie SA, Dai HN, et al., 2018. Blockchain challenges and opportunities: a survey. Int J Web Grid Serv, 14(4):352-375.
Open peer comments: Debate/Discuss/Question/Opinion
<1>