The Attack of the Clones against Proof-of-Authority

02/26/2019
by   Parinya Ekparinya, et al.
0

In this paper, we explore vulnerabilities and countermeasures of the recently proposed blockchain consensus based on proof-of-authority. The proof-of-work blockchains, like Bitcoin and Ethereum, have been shown both theoretically and empirically vulnerable to double spending attacks. This is why Byzantine fault tolerant consensus algorithms have gained popularity in the blockchain context for their ability to tolerate a limited number t of attackers among n participants. We formalize the recently proposed proof-of-authority consensus algorithms that are Byzantine fault tolerant by describing the Aura and Clique protocols present in the two mainstream implementations of Ethereum. We then introduce the Cloning Attack and show how to apply it to double spend in each of these protocols with a single malicious node. Our results show that the Cloning Attack against Aura is always successful while the same attack against Clique is about twice as fast and succeeds in most cases.

READ FULL TEXT

page 7

page 11

research
03/27/2019

A lightweight BFT consensus protocol for blockchains

We present a general consensus framework that allows to easily introduce...
research
09/16/2019

Certifying Blockchain Byzantine Fault Tolerance

To implement a blockchain, the trend is now to integrate a non-trivial B...
research
11/02/2018

Rationality-proof consensus: extended abstract

Blockchain systems benefit from lessons in prior art such as fault toler...
research
09/16/2019

KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability

This paper applies biomimetic engineering to the problem of permissionle...
research
06/09/2023

Fault Independence in Blockchain

Byzantine Fault-Tolerant (BFT) protocols have been proposed to tolerate ...
research
07/09/2018

Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols

Bitcoin is the first secure decentralized electronic currency system. Ho...
research
08/17/2022

Proof Engineering with Predicate Transformer Semantics

We present a lightweight, open source Agda framework for manually verify...

Please sign up or login with your details

Forgot password? Click here to reset