Metamorphic IOTA

07/08/2019
by   Gewu Bu, et al.
0

IOTA opened recently a new line of research in distributed ledgers area by targeting algorithms that ensure a high throughput for the transactions generated in IoT systems. Transactions are continuously appended to an acyclic structure called tangle and each new transaction selects as parents two existing transactions (called tips) that it approves. G-IOTA, a very recent improvement of IOTA, targets to protect tips left behind offering hence a good confidence level. However, this improvement had a cost: the use of an additional tip selection mechanism which may be critical in IoT systems since it needs additional energy consumption. In this paper we propose a new metamorphic algorithm for tip selection that offers the best guaranties of both IOTA and G-IOTA. Our contribution is two fold. First, we propose a parameterized algorithm, E-IOTA, for tip selection which targets to reduce the number of random walks executed in previous versions (IOTA and G-IOTA) while maintaining the same security guaranties as IOTA and the same confidence level and fairness with respect to tips selection as G-IOTA. Then we propose a formal analysis of the security guaranties offered by E-IOTA against various attacks mentioned in the original IOTA proposal (e.g. large weight attack, parasite chain attack and splitting attack). Interestingly, to the best of our knowledge this is the first formal analysis of the security guaranties of IOTA and its derivatives.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/15/2019

G-IOTA: Fair and confidence aware tangle

This paper proposes strategies to improve the IOTA tangle in terms of re...
research
10/26/2021

Efficient and Secure TSA for the Tangle

The Tangle is the data structure used to store transactions in the IOTA ...
research
08/29/2023

Masquerade: Simple and Lightweight Transaction Reordering Mitigation in Blockchains

Blockchains offer strong security gurarantees, but cannot protect users ...
research
03/21/2019

Distributed Ledger Technology for IoT: Parasite Chain Attacks

Directed Acyclic Graph (DAG) based Distributed Ledgers can be useful in ...
research
07/16/2020

Denial-of-Service Vulnerability of Hash-based Transaction Sharding: Attacks and Countermeasures

Since 2016, sharding has become an auspicious solution to tackle the sca...
research
06/27/2023

Condorcet Attack Against Fair Transaction Ordering

We introduce the Condorcet attack, a new threat to fair transaction orde...
research
01/21/2020

Properties of the Tangle for Uniform Random and Random Walk Tip Selection

The growing number of applications for distributed ledger technologies i...

Please sign up or login with your details

Forgot password? Click here to reset