Time-Dilation Attacks on the Lightning Network

06/02/2020
by   Antoine Riard, et al.
0

Lightning Network (LN) is a widely-used network of payment channels enabling faster and cheaper Bitcoin transactions. In this paper, we outline three ways an attacker can steal funds from honest LN users. The attacks require dilating the time for victims to become aware of new blocks by eclipsing (isolating) victims from the network and delaying block delivery. While our focus is on the LN, time-dilation attacks may be relevant to any second-layer protocol that relies on a timely reaction. According to our measurements, it is currently possible to steal the total channel capacity by keeping a node eclipsed for as little as 2 hours. Since trust-minimized Bitcoin light clients currently connect to a very limited number of random nodes, running just 500 Sybil nodes allows an attacker to Eclipse 47% of newly deployed light clients (and hence prime them for an attack). As for the victims running a full node, since they are often used by large hubs or service providers, an attacker may justify the higher Eclipse attack cost by stealing all their available liquidity. In addition, time-dilation attacks neither require access to hashrate nor purchasing from a victim. Thus, this class of attacks is a more practical way of stealing funds via Eclipse attacks than previously anticipated double-spending. We argue that simple detection techniques based on the slow block arrival alone are not effective, and implementing more sophisticated detection is not trivial. We suggest that a combination of anti-Eclipse/anti-Sybil measures are crucial for mitigating time-dilation attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/15/2020

Flood Loot: A Systemic Attack On The Lightning Network

The Lightning Network promises to alleviate Bitcoin's known scalability ...
research
02/16/2020

Congestion Attacks in Payment Channel Networks

Payment channel networks provide a fast and scalable solution to relay f...
research
10/19/2020

The Impact of DNS Insecurity on Time

We demonstrate the first practical off-path time shifting attacks agains...
research
02/03/2021

Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders

We outline two dishonest strategies that can be cheaply executed on the ...
research
10/12/2018

How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction

A major limitation of open P2P networks is the lack of strong identities...
research
05/19/2020

Griefing-Penalty: Countermeasure for Griefing Attack in Bitcoin-compatible PCNs

Payment Channel Networks or PCNs have gained prominence ensuring faster ...
research
09/15/2019

Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff

Off-chain transaction networks can mitigate the scalability issues of to...

Please sign up or login with your details

Forgot password? Click here to reset