International Journal of Mathematical, Engineering and Management Sciences

ISSN: 2455-7749

Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation

Chencheng Zhou
Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, MA, USA.

Liudong Xing
Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, MA, USA.

Qisi Liu
Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, MA, USA.

Honggang Wang
Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, MA, USA.

DOI https://doi.org/10.33889/IJMEMS.2021.6.2.029

Received on October 30, 2020
  ;
Accepted on December 21, 2020

Abstract

The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of these applications, it is pivotal to model and evaluate dependability of the block chain-based systems, contributing to their reliable and robust operation. This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities. Built upon the block chain technology, the Bitcoin is a peer-to-peer cryptocurrency system enabling an individual user to trade freely without the involvement of banks or any other types of intermediate agents. However, a node in the Bitcoin is vulnerable to the Eclipse attack, which aims to monopolize the information flow of the victim node. A semi-Markov process (SMP) based approach is proposed to model the Eclipse attack behavior and possible mitigation activities that may prevent the attack from being successful during the attack process. The SMP model is then evaluated to determine the steady-state dependability of the Bitcoin node. Numerical examples are provided to demonstrate the influence of the time to restart the Bitcoin software and time to detect and delete the malicious message on the Bitcoin node dependability.

Keywords- Bitcoin, Block chain, Dependability, Eclipse attack, Semi-Markov process (SMP).

Citation

Zhou, C., Xing, L., Liu, Q., & Wang, H. (2021). Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation. International Journal of Mathematical, Engineering and Management Sciences, 6(2), 480-492. https://doi.org/10.33889/IJMEMS.2021.6.2.029.

Conflict of Interest

The authors confirm that there is no conflict of interest to declare for this publication.

Acknowledgements

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors. The authors would like to thank the editor and anonymous reviewers for their comments that help improve the quality of this work.

References

Akbari, E., Wu, Q., Zhao, W., Arabnia, H.R., & Yang, M.Q. (2017, December). From block chain to internet-based Voting. In 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 218-221). IEEE. Las Vegas, United States.

Atzei, N., Bartoletti, M., & Cimoli, T. (2017, April). A survey of attacks on ethereum smart contracts SOK. In International Conference on Principles of Security and Trust (pp. 164-186). Springer. Berlin, Heidelberg.

Bag, S., Ruj, S., & Sakurai, K. (2016). Bitcoin block withholding attack: analysis and mitigation. IEEE Transactions on Information Forensics and Security, 12(8), 1967-1978.

Bahack, L. (2013). Theoretical bitcoin attacks with less than half of the computational power. arXiv preprint arXiv:1312.7013, https://eprint.iacr.org/2013/868.pdf.

Bailey, R.L., & Dell, T.R. (1973). Quantifying diameter distributions with the Weibull function. Forest Science, 19(2), 97-104.

Bamert, T., Decker, C., Wattenhofer, R., & Welten, S. (2014, September). Bluewallet: the secure bitcoin wallet. In International Workshop on Security and Trust Management (pp. 65-80). Springer. Cham. Switzerland.

Bastiaan, M. (2015, January). Preventing the 51%-attack: a stochastic analysis of two phase proof of work in Bitcoin. https://fmt.ewi.utwente.nl/media/175.pdf. Accessed in December 2020.

Biryukov, A., & Pustogarov, I. (2015a, January). Proof-of-work as anonymous micropayment: rewarding a tor relay. In International Conference on Financial Cryptography and Data Security (pp. 445-455). Springer. Berlin, Heidelberg.

Biryukov, A., & Pustogarov, I. (2015b, May). Bitcoin over tor isn't a good idea. In IEEE Symposium on Security and Privacy (pp. 122-134). IEEE. San Jose, United States.

Dai, H.N., Zheng, Z., & Zhang, Y. (2019). Blockchain for Internet of things: a survey. IEEE Internet of Things Journal, 6(5), 8076-8094.

Dohi, T., Goševa-Popstojanova, K., & Trivedi, K. (2001). Estimating software rejuvenation schedules in high-assurance systems. The Computer Journal, 44(6), 473-485.

Eyal, I., & Sirer, E.G. (2014, March). Majority is not enough: bitcoin mining is vulnerable. In International Conference on Financial Cryptography and Data Security (pp. 436-454). Springer. Berlin, Heidelberg.

Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2018). Blockchain technologies for the internet of things: research issues and challenges. IEEE Internet of Things Journal, 6(2), 2188-2204.

Frizzo-Barker, J., Chow-White, P.A., Adams, P.R., Mentanko, J., Ha, D., & Green, S. (2020). Blockchain as a disruptive technology for business: a systematic review. International Journal of Information Management, 51, 102029.

Garay, J., Kiayias, A., & Leonardos, N. (2017, August). The bitcoin backbone protocol with chains of variable difficulty. In Annual International Cryptology Conference (pp. 291-323). Springer. Cham, Switzerland.

Gervais, A., Ritzdorf, H., Karame, G.O., & Capkun, S. (2015, October). Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 692-705). Denver, United States.

Göbel, J., Keeler, H.P., Krzesinski, A.E., & Taylor, P.G. (2016). Bitcoin blockchain dynamics: the selfish-mine strategy in the presence of propagation delay. Performance Evaluation, 104, 23-41.

Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015). Eclipse attacks on bitcoin’s peer-to-peer network. In 24th USENIX Security Symposium (pp. 129-144). Washington D.C., United States.

Joux, A. (2004, August). Multicollisions in iterated hash functions. Application to cascaded constructions. In Annual International Cryptology Conference (pp. 306-316). Springer. Berlin, Heidelberg.

Kang, J., Yu, R., Huang, X., Wu, M., Maharjan, S., Xie, S., & Zhang, Y. (2018). Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things Journal, 6(3), 4660-4670.

Kharoufeh, J.P., Solo, C.J., & Ulukus, M.Y. (2010). Semi-Markov models for degradation-based reliability. IIE Transactions, 42(8), 599-612.

Koshy, P., Koshy, D., & McDaniel, P. (2014, March). An analysis of anonymity in bitcoin using P2P network traffic. In International Conference on Financial Cryptography and Data Security (pp. 469-485). Springer. Berlin, Heidelberg.

Kroll, J.A., Davey, I.C., & Felten, E.W. (2013, June). The economics of Bitcoin mining, or bitcoin in the presence of adversaries. In Proceedings of WEIS (Vol. 2013, p. 11). Washington D.C., United States.

Kulkarni, V.G. (2016). Modeling and analysis of stochastic systems. Taylor & Francis, CRC Press, United States.

Kumar, G., Jain, V., & Gandhi, O.P. (2013). Availability analysis of repairable mechanical systems using analytical semi-Markov approach. Quality Engineering, 25(2), 97-107.

Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2020). A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841-853.

Liao, K., Zhao, Z., Doupé, A., & Ahn, G.J. (2016, June). Behind closed doors: measurement and analysis of CryptoLocker ransoms in bitcoin. In 2016 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-13). IEEE. Toronto, Canada.

Liu, Q., Xing, L., & Zhou, C. (2019). Probabilistic modeling and analysis of sequential cyber‐attacks. Engineering Reports, 1(4), e12065.

Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., & Savage, S. (2013, October). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement Conference (pp. 127-140). Barcelona, Spain.

Monaco, J.V. (2015, May). Identifying bitcoin users by transaction behavior. In Biometric and Surveillance Technology for Human and Activity Identification XII (Vol. 9457, p. 945704). International Society for Optics and Photonics. Baltimore, United States.

Qin, R., Yuan, Y., & Wang, F.Y. (2020). Optimal block withholding strategies for blockchain mining pools. IEEE Transactions on Computational Social Systems, 7(3), 709-717.

Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks. Springer, New York, United States, pp. 197-223.

Rosenfeld, M. (2011). Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980.

Rudden, J. (2020). Bitcoin market capitalization quarterly. In 2020 Statista. https://www.statista.com/statistics/377382/bitcoin-market-capitalization/. Accessed in October 2020.

Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014, May). Zerocash: decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy (pp. 459-474). IEEE. San Jose, CA, USA.

Satoshi, N. (2008). Bitcoin: A peer-to-peer electronic cash system. Consulted, 1(2012), 28.

Thoman, D.R., Bain, L.J., & Antle, C.E. (1969). Inferences on the parameters of the Weibull distribution. Technometrics, 11(3), 445-460.

Trivedi, K.S. (1982). Probability and statistics with reliability, queuing, and computer science applications (Vol. 13). Englewood Cliffs, NJ: Prentice-Hall.

Wingreen, S.C., Kavanagh, D., John Ennis, P., & Miscione, G. (2020). Sources of cryptocurrency value systems: the case of bitcoin. International Journal of Electronic Commerce, 24(4), 474-496.

Xing, L. (2020). Reliability in internet of things: current status and future perspectives. IEEE Internet of Things Journal, 7(8), 6704-6721.

Xing, L. (2021). Cascading failures in internet of things: review and perspectives on reliability and resilience. IEEE Internet of Things Journal, 8(1), 44-64. doi: 10.1109/JIOT.2020.3018687.

Xing, L., & Amari, S.V (2015). Binary decision diagrams and extensions for system reliability analysis. Wiley-Scrivener, MA. United States. ISBN: 978-1-118-54937-7.

Xing, L., Levitin, G., & Wang, C. (2019). Dynamic system reliability: modeling and analysis of dynamic and dependent behaviors. John Wiley & Sons.

Yang, R., Chang, X., Mišić, J., & Mišić, V.B. (2020). Assessing block chain selfish mining in an imperfect network: honest and selfish miner views. Computers & Security, 97, 101956.

Zhang, S., & Lee, J.H. (2019). Double-spending with a sybil attack in the bitcoin decentralized network. IEEE Transactions on Industrial Informatics, 15(10), 5715-5722.

Zhou, C., Xing, L., & Liu, Q. (2020). Dependability analysis of Bitcoin subject to Eclipse attacks. International Journal of Mathematical, Engineering and Management Sciences, accepted in September 2020 and currently in press.

Privacy Policy| Terms & Conditions