Home > Research > Publications & Outputs > Delayed packing attack and countermeasure again...

Links

Text available via DOI:

View graph of relations

Delayed packing attack and countermeasure against transaction information based applications

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Delayed packing attack and countermeasure against transaction information based applications. / Li, Jiliang; Wang, Yuheng; Su, Yuan et al.
In: Information Sciences, Vol. 652, 119742, 31.01.2024.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Li, J, Wang, Y, Su, Y, Su, Z, Wang, Y, Meng, W & Shen, Y 2024, 'Delayed packing attack and countermeasure against transaction information based applications', Information Sciences, vol. 652, 119742. https://doi.org/10.1016/j.ins.2023.119742

APA

Li, J., Wang, Y., Su, Y., Su, Z., Wang, Y., Meng, W., & Shen, Y. (2024). Delayed packing attack and countermeasure against transaction information based applications. Information Sciences, 652, Article 119742. https://doi.org/10.1016/j.ins.2023.119742

Vancouver

Li J, Wang Y, Su Y, Su Z, Wang Y, Meng W et al. Delayed packing attack and countermeasure against transaction information based applications. Information Sciences. 2024 Jan 31;652:119742. Epub 2023 Oct 11. doi: 10.1016/j.ins.2023.119742

Author

Li, Jiliang ; Wang, Yuheng ; Su, Yuan et al. / Delayed packing attack and countermeasure against transaction information based applications. In: Information Sciences. 2024 ; Vol. 652.

Bibtex

@article{40844d9c750e48c3a8038def2b516cf4,
title = "Delayed packing attack and countermeasure against transaction information based applications",
abstract = "Due to the nature of decentralization, blockchain-based applications are gradually adopted by more and more systems in different fields to replace centralized third-party agencies. Many applications, like blockchain oracles, rely on on-chain transactions to deliver information that is used to make final decisions. There have been many methods proposed to guarantee the correctness of the final results, and most of them are in terms of the management of information providers and the application's design. However, to our notice, only a few works have discussed the security threat caused by rational mining pools that are responsible for packing transactions and information into blocks and uploading them to the blockchain. Therefore in this paper, we propose a possible delayed packing attack carried out by rational mining pools against these transaction information based applications. Game theory analysis is conducted to obtain the Nash equilibrium strategy, and the price of anarchy is calculated to depict the success probability of such an attack under different circumstances. In addition, we design a countermeasure protocol based on cryptography tools to defend against the delayed packing attack. Finally, we carry out a thorough security analysis as well as corresponding experiments to prove the security and feasibility of our countermeasure.",
author = "Jiliang Li and Yuheng Wang and Yuan Su and Zhou Su and Yuyi Wang and Weizhi Meng and Yinghua Shen",
year = "2024",
month = jan,
day = "31",
doi = "10.1016/j.ins.2023.119742",
language = "English",
volume = "652",
journal = "Information Sciences",
issn = "0020-0255",
publisher = "Elsevier Inc.",

}

RIS

TY - JOUR

T1 - Delayed packing attack and countermeasure against transaction information based applications

AU - Li, Jiliang

AU - Wang, Yuheng

AU - Su, Yuan

AU - Su, Zhou

AU - Wang, Yuyi

AU - Meng, Weizhi

AU - Shen, Yinghua

PY - 2024/1/31

Y1 - 2024/1/31

N2 - Due to the nature of decentralization, blockchain-based applications are gradually adopted by more and more systems in different fields to replace centralized third-party agencies. Many applications, like blockchain oracles, rely on on-chain transactions to deliver information that is used to make final decisions. There have been many methods proposed to guarantee the correctness of the final results, and most of them are in terms of the management of information providers and the application's design. However, to our notice, only a few works have discussed the security threat caused by rational mining pools that are responsible for packing transactions and information into blocks and uploading them to the blockchain. Therefore in this paper, we propose a possible delayed packing attack carried out by rational mining pools against these transaction information based applications. Game theory analysis is conducted to obtain the Nash equilibrium strategy, and the price of anarchy is calculated to depict the success probability of such an attack under different circumstances. In addition, we design a countermeasure protocol based on cryptography tools to defend against the delayed packing attack. Finally, we carry out a thorough security analysis as well as corresponding experiments to prove the security and feasibility of our countermeasure.

AB - Due to the nature of decentralization, blockchain-based applications are gradually adopted by more and more systems in different fields to replace centralized third-party agencies. Many applications, like blockchain oracles, rely on on-chain transactions to deliver information that is used to make final decisions. There have been many methods proposed to guarantee the correctness of the final results, and most of them are in terms of the management of information providers and the application's design. However, to our notice, only a few works have discussed the security threat caused by rational mining pools that are responsible for packing transactions and information into blocks and uploading them to the blockchain. Therefore in this paper, we propose a possible delayed packing attack carried out by rational mining pools against these transaction information based applications. Game theory analysis is conducted to obtain the Nash equilibrium strategy, and the price of anarchy is calculated to depict the success probability of such an attack under different circumstances. In addition, we design a countermeasure protocol based on cryptography tools to defend against the delayed packing attack. Finally, we carry out a thorough security analysis as well as corresponding experiments to prove the security and feasibility of our countermeasure.

U2 - 10.1016/j.ins.2023.119742

DO - 10.1016/j.ins.2023.119742

M3 - Journal article

VL - 652

JO - Information Sciences

JF - Information Sciences

SN - 0020-0255

M1 - 119742

ER -