MoneroResearch.info |
Franzoni, F., & Daza, V. (2022). SoK: Network-Level Attacks on the Bitcoin P2P Network, IEEE Access, 10, 94924–94962. Added by: Rucknium (09/08/2024, 19:50) |
Resource type: Journal Article DOI: 10.1109/ACCESS.2022.3204387 ID no. (ISBN etc.): 2169-3536 BibTeX citation key: Franzoni2022b View all bibliographic details |
Categories: Not Monero-focused Keywords: Bitcoin;Security;Protocols;Blockchains;Consensus protocol;Data mining;Internet;Economics;Taxonomy;Blockchain;bitcoin P2P network;bitcoin security;survey Creators: Daza, Franzoni Collection: IEEE Access |
Views: 219/991
|
Attachments SoK_Network-Level_Attacks_on_the_Bitcoin_P2P_Network.pdf [42/378] | URLs https://ieeexplore ... t/document/9877811 |
Abstract |
Over the last decade, Bitcoin has revolutionized the global economic and technological landscape, inspiring a new generation of blockchain-based technologies. Its protocol is today among the most influential for cryptocurrencies and distributed networks. In particular, the P2P layer represents a reference point for all permissionless blockchains, which often implement its solutions in their network layer. Unfortunately, the Bitcoin network protocol lacks a strong security model, leaving it exposed to several threats. Attacks at this level can affect the reliability and trustworthiness of the consensus layer, mining the credibility of the whole system. It is therefore of utmost importance to properly understand and address the security of the Bitcoin P2P protocol. In this paper, we give a comprehensive and detailed overview of known network-level attacks in Bitcoin, as well as the countermeasures that have been implemented in the protocol. We propose a generic network adversary model, and propose an objective-based taxonomy of the attacks. Finally, we identify the core weaknesses of the protocol and study the relationship between different types of attack. We believe our contribution can help both new and experienced researchers have a broader and deeper understanding of the Bitcoin P2P network and its threats, and allow for a better modeling of its security properties.
Added by: Rucknium |