Availability analysis of a permissioned blockchain with a lightweight consensus protocol

被引:13
|
作者
Altarawneh, Amani [2 ,3 ]
Sun, Fei [1 ]
Brooks, Richard R. [1 ]
Hambolu, Owulakemi [1 ]
Yu, Lu [1 ]
Skjellum, Anthony [2 ,3 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC USA
[2] Univ Tennessee Chattanooga, SimCtr, Chattanooga, TN 37403 USA
[3] Univ Tennessee Chattanooga, Dept Comp Sci & Engn, Chattanooga, TN 37403 USA
基金
美国国家科学基金会;
关键词
Blockchain; Digital ledger technology; Non-cryptocurrency; Secure provenance; Scrybe; Lightweight mining; Consensus protocols;
D O I
10.1016/j.cose.2020.102098
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper offers a novel approach to the evaluation of provenance blockchain security and reliability using analytical methods for assessing system availability against malicious miner DoS attacks. In particular, we present the reliability and availability analysis of the LightWeight Mining (LWM) protocol for securing data provenance. Our analysis shows the reliability of the protocol and its ability to protect against malicious miner DoS attacks. We use digital signatures to prove integrity and non-repudiation of messages passing the system. We describe system behaviors using communicating sequential processes (CSP) to check for synchronization within a number of concurrent processes. Queuing theory is used to determine the average waiting time for client blockchain transactions when malicious miners work to slow the system. CSP and queuing theory jointly test the blockchain's ability to make progress despite the presence of malicious miners. Further, the methodology described can be extended to other blockchain applications. Additional threats, beyond the malicious miner DoS attack, are reserved for future work. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] ISCP: An improved blockchain consensus protocol
    Li, Zhong-Cheng
    Huang, Jian-Hua
    Gao, Da-Qi
    Jiang, Ya-Hui
    Fan, Li
    International Journal of Network Security, 2019, 21 (03) : 359 - 367
  • [32] A Blockchain Oracle Interoperability Technique for Permissioned Blockchain
    Alhussayen, Asma A.
    Jambi, Kamal
    Khemakhem, Maher
    Eassa, Fathy E.
    IEEE ACCESS, 2024, 12 : 68130 - 68148
  • [33] Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
    Graf, Mike
    Kusters, Ralf
    Rausch, Daniel
    2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 236 - 255
  • [34] Economics of Permissioned Blockchain Adoption
    Iyengar, Garud
    Saleh, Fahad
    Sethuraman, Jay
    Wang, Wenjun
    MANAGEMENT SCIENCE, 2023, 69 (06) : 3415 - 3436
  • [35] Attacks on Permissioned Blockchain for IoT
    Pavithran, Deepa
    Angeles, Enrico
    Shibu, Charles
    Shaikh, Munavwar
    2021 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INFORMATION SECURITY (ICSPIS), 2021,
  • [36] vCubeChain: A scalable permissioned blockchain
    Freitas, Allan Edgard Silva
    Rodrigues, Luiz Antonio
    Duarte Jr, Elias Procopio
    AD HOC NETWORKS, 2024, 158
  • [37] Permissionless and permissioned blockchain diffusion
    Helliar, Christine, V
    Crawford, Louise
    Rocca, Laura
    Teodori, Claudio
    Veneziani, Monica
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2020, 54
  • [38] An Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain
    Ra, Gyeongjin
    Seo, Deahee
    Bhuiyan, Md Zakirul Alam
    Lee, Imyeong
    ELECTRONICS, 2020, 9 (08) : 1 - 22
  • [39] K-Bucket based Raft-like consensus algorithm for Permissioned blockchain
    Wang, Rihong
    Zhang, Lifeng
    Xu, Quanqing
    Zhou, Hang
    2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 996 - 999
  • [40] A decentralized lightweight authentication protocol under blockchain
    Xu, Mingcheng
    Xu, Gaojian
    Xu, Haoyu
    Zhou, Jiadong
    Li, Shaowen
    Concurrency and Computation: Practice and Experience, 2022, 34 (13):