DeepAI AI Chat
Log In Sign Up

Security Analysis on Tangle-based Blockchain through Simulation

by   Bozhi Wang, et al.

The Tangle-based structure becomes one of the most promising solutions when designing DAG-based blockchain systems. The approach improves the scalability by directly confirming multiple transactions in parallel instead of single blocks in linear. However, the performance gain may bring potential security risks. In this paper, we construct three types of attacks with comprehensive evaluations, namely parasite attack (PS), double spending attack (DS), and hybrid attack (HB). To achieve that, we deconstruct the Tangle-based projects (e.g. IOTA) and abstract the main components to rebuild a simple but flexible network for the simulation. Then, we informally define three smallest actions to build up the attack strategies layer by layer. Based on that, we provide analyses to evaluate different types of attacks. To the best of our knowledge, this is the first study to provide a comprehensive security analysis of Tangle-based blockchains.


The Discrepancy Attack on Polyshard-ed Blockchains

Sharding, i.e. splitting the miners or validators to form and run severa...

Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation

In this paper we describe LUNES-Blockchain, an agent-based simulator of ...

BLOCKEYE: Hunting For DeFi Attacks on Blockchain

Decentralized finance, i.e., DeFi, has become the most popular type of a...

A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols

Blockchain like Bitcoin and Ethereum suffer from scalability issues. Sha...

Statistical Model Checking of Common Attack Scenarios on Blockchain

Blockchain technology has developed significantly over the last decade. ...