Preventing Sybil Attack in Blockchain Using Distributed Behavior Monitoring of Miners
Title | Preventing Sybil Attack in Blockchain Using Distributed Behavior Monitoring of Miners |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Swathi, P, Modi, Chirag, Patel, Dhiren |
Conference Name | 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) |
ISBN Number | 978-1-5386-5906-9 |
Keywords | Behavior monitoring, blockchain, blockchain technology, blockchain test bed, composability, computer network security, cryptography, data privacy, Digital transaction, distributed behavior, Fake user accounts, genuine nodes, Metrics, preventing Sybil attack, pseudonymous identities, pubcrawl, resilience, Resiliency, robust identity management, security, supply chain management, supply chain management etc, Sybil attack, sybil attacks, traditional attacks, virtual nodes |
Abstract | Blockchain technology is useful with the record keeping of digital transactions, IoT, supply chain management etc. However, we have observed that the traditional attacks are possible on blockchain due to lack of robust identity management. We found that Sybil attack can cause severe impact in public/permissionless blockchain, in which an attacker can subvert the blockchain by creating a large number of pseudonymous identities (i.e. Fake user accounts) and push legitimate entities in the minority. Such virtual nodes can act like genuine nodes to create disproportionately large influence on the network. This may lead to several other attacks like DoS, DDoS etc. In this paper, a Sybil attack is demonstrated on a blockchain test bed with its impact on the throughput of the system. We propose a solution directive, in which each node monitors the behavior of other nodes and checks for the nodes which are forwarding the blocks of only particular user. Such nodes are quickly identified, blacklisted and notified to other nodes, and thus the Sybil attack can be restricted. We analyze experimental results of the proposed solution. |
URL | https://ieeexplore.ieee.org/document/8944507 |
DOI | 10.1109/ICCCNT45670.2019.8944507 |
Citation Key | swathi_preventing_2019 |
- preventing Sybil attack
- virtual nodes
- traditional attacks
- sybil attacks
- Sybil attack
- supply chain management etc
- supply chain management
- security
- robust identity management
- Resiliency
- resilience
- pubcrawl
- pseudonymous identities
- Behavior monitoring
- Metrics
- genuine nodes
- Fake user accounts
- distributed behavior
- Digital transaction
- data privacy
- Cryptography
- computer network security
- composability
- blockchain test bed
- blockchain technology
- blockchain