Original language | English |
---|
Article number | 108424 |
---|
Journal | COMPUTER NETWORKS |
---|
Volume | 199 |
---|
Early online date | 29 Aug 2021 |
---|
DOIs | |
---|
Accepted/In press | 16 Aug 2021 |
---|
E-pub ahead of print | 29 Aug 2021 |
---|
Published | 9 Nov 2021 |
---|
Additional links | |
---|
Funding Information:
We gratefully acknowledge Google Cloud for in-kind contributions through the Google Cloud Research Grant programme.
Funding Information:
Moritz Platt is employed by Enterprise Blockchain firm R3 and has received a research grant from Google Cloud.
Publisher Copyright:
© 2021
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
identity-based-pos
identity_based_pos.pdf, 460 KB, application/pdf
Uploaded date:18 Aug 2021
Version:Submitted manuscript
IdAPoS is an identity-based consensus protocol for decentralised Blockchain networks that implements a trustless reputation system by extending Proof-of-Stake to facilitate leader selection in non-economic contexts. Like any protocol operating in a public/permissionless setting, it is vulnerable to Sybil attacks in which byzantine actors interfere with peer sampling by presenting artificially large numbers of identities. This paper demonstrates what influence these attacks have on the stability of member selection of a Blockchain system using the IdAPoS protocol and investigates how attacks can be mitigated. As a novel protocol, its vulnerability to this type of attack has not previously been researched. The research question is approached via an agent-based model of an IdAPoS system in which both honest and malicious actors are represented as agents. Simulations are run on some reasonable configurations of an IdAPoS system that employ different attack mitigation strategies. The results show that a super strategy that combines multiple individual mitigation strategies is more effective for containing Sybil attacks than the unmitigated protocol and any other individual strategies proposed. In the simulation this strategy extended the time until a system was taken over by a malicious entity approximately by a factor of 5. These positive initial results indicate that further research into the practical viability of the protocol is warranted.