Exploring Security Threats On Blockchain Technology Along With Possible Remedies

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

2022 IEEE 7th International conference for Convergence in Technology (I2CT)

Pune, India. Apr 07-09, 2022

Exploring Security Threats on Blockchain


Technology along with possible Remedies
Sachin Sharma Kaushal Shah
Dept. of Computer Science Dept. of Computer Engineering
Pandit Deendayal Energy University Pandit Deendayal Energy University
2022 IEEE 7th International conference for Convergence in Technology (I2CT) | 978-1-6654-2168-3/22/$31.00 ©2022 IEEE | DOI: 10.1109/I2CT54291.2022.9825123

Gandhinagar, India Gandhinagar, India


iamsachin3110@gmail.com shah.kaushal.a@gmail.com

Abstract—Being the center of commotion in recent times, II. WORKING OF BLOCKCHAIN: OVERVIEW
Blockchain Technology is on its way to bloom in the
technological world. With countless applications, even Let’s look at working of blockchain from abstract view
governments and health facilities are adopting blockchain followed by example of bitcoin’s proof of work mechanism.
technology into their applications because of the reliability and Consider there are three blocks with addresses 1201, 1202
security it is supposed to provide. Not to mention how it bought and 1203. The node 1202 wants to add/modify some
about revolution in currency by making it possible for crypto- transaction.
currency to exist as introduced by Satoshi Nakamoto in his
ground-breaking paper. Unfortunately like every other 1) The node 1202 will broadcast the message to all the
technology in existence, blockchain is also potentially other nodes.
vulnerable no matter how secure it was meant to be designed.
We will take a look at such potential threats to the blockchain 2) All the other nodes act as receiving node, and if the
technology in this paper, from seemingly human factors to message is proved correct and authentic.
some technical aspects that are not too deep to understand for 3) To do this, consensus algorithms such as Proof of
anyone. We will also discuss about the possible remedies to the
explored threats to the blockchain technology. Work and Proof of Stake are used to decide
authenticity and reliability of information.
Keywords—Blockchain Technology, Blockchain Security,
Cryptocurrency, Bitcoin, Threats 4) If algorithm approves, then block will be then
stored on blockchain else rejected. In case of
I. INTRODUCTION
success, block is replicated on 1201 and 1203
A blockchain is a network of information “nodes” which nodes.
are registered securely on something known as a “distributed
ledger” and the information inside each node is duplicated in One of the most popular use of blockchain is Bitcoin
all other nodes. Some basic features of blockchain includes cryptocurrency [1]. Let’s briefly go through it how it works.
being decentralized, open-source, immutable, autonomous
and anonymity [13, 19]. The privacy issues and secure data 1) Suppose a transaction is to be stored. It is
aggregation for wireless sensor networks and smart grids are broadcasted to all the nodes into network and a
discussed in [14, 15, 16, 17, 18]. “hash” is generated based on something known as
Blockchain can be categorized into public, private, difficulty which is predetermined by system. For
consortium and hybrid as shown in Fig.1. Public blockchains example, hash is prefixed by some number of zero.
are one in which all the nodes can have equal access to
If difficulty needs to be increased these number of
blockchain thus these are also known as permissionless
blockchain. In contrast, private blockchain are governed by zeroes will be increased by system thus making it
one entity and are thus also called permissioned blockchain. more difficult to “solve” the hash. This hash is
Consortium blockchain are like private ones but, it is SHA256.
governed by group of organizations and not by a single 2) Every node will use trial and error method to find
identity thus provides more room for decentralization than
the number to the hash.
private ones. Hybrid blockchains combine benefits of both
private and public blockchains, thus making it possible to 3) Whichever node is able to solve the hash will be
design a blockchain where ledger is accessible to all but the rewarded with some “bitcoin” for all the
modification is governed and centralized. computational power it has put into solving the
hash. This process is also known as mining.
4) Now since the node that solved the hash put into
efforts, it is considered to be valid transaction and
not just something that was put by malicious node.
5) This is how Proof of Work is carried out, and it has
been proven reliable in Bitcoin technology.

III. LITERATURE REVIEW


Below is summarized table of reference sources used.
Other than these, some online blogs and forums were also
Fig. 1. Blockchain types

978-1-6654-2168-3/22/$31.00 ©2022 IEEE 1

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on September 01,2022 at 12:23:39 UTC from IEEE Xplore. Restrictions apply.
looked up into, which are referenced as and when needed maliciously created blockchain where the transaction X has
throughout the paper. not occurred. This gives unwanted profit to the attacker. [8]

TABLE I. SUMMARIZED RELATED WORK Larger networks are rather not much vulnerable to this
attack, given their sheer size. However, smaller blockchains
Author Title Summary are more likely to be affected. The prevention of 51% attack
can be done by using Proof of Stake rather than Proof of
Lin, Iuon-Chang A Survey of Provided
and Tzu-Chun Liao Blockchain Security introductory concepts
Work where the validation of a block depends on how many
Issues and Challenges regarding threats to coins a miner holds not by its computational power.
blockchain
2) The problem of Forking
Dasgupta, D., A survey of Provided threats
Shrein, J.M. & Gupta, blockchain from and their practical Since blockchain are decentralized, there is no central
K.D. security perspective impacts for example, body taking decision on behalf of all others. In such case,
in economy when a software upgrade is to be made and if for some
Nakamoto, Bitcoin: A peer- Revolutionary reason it is not agreed upon by all the nodes this becomes a
Satoshi to-peer electronic cash paper that introduced problem termed as “Forking” [3]. Basically, software upgrade
system concept of takes place for various enhancement reasons such as
cryptocurrency - improving the computing power, revising some policies, etc.
bitcoin
In case of forking, we may find any of these cases:
Zibin Zheng, An overview on Provided in-depth
Shaoan Xie, Hong- smart contracts: information about the 1) The new nodes of “upgraded” blockchain agrees
Ning Dai, Weili Chen, Challenges, advances smart contracts, some with the transactions of blocks sent by old nodes.
Xiangping Chen, Jian and platforms case study as well as 2) In this case, new nodes do not agree with the old
Weng, Muhammad threats
Imran nodes.
3) Similarly, old nodes may not agree with the
A. Sonnino, S. Replay Attacks This work
Bano, M. Al-Bassam and Defenses Against focused mainly on transaction made by newer nodes.
and G. Danezis Cross-shard Replay attacks and 4) Or for the last case, old nodes agrees to the
Consensus in Sharded how it can affect the transaction made by newer ones.
Distributed Ledgers consensus algorithm
from attacker point of
view The problem of forking can be divided into two
categories namely, Hard fork and soft fork. Hard Fork occurs
Wang H., Wang An Overview of This work
Y., Cao Z., Li Z., Blockchain Security explained blockchain
when upgrade is not compatible to previous version, so
Xiong G. Analysis attack threat vectors blockchain divides into 2 parts one with older ones, other
with examples with upgraded version. This also means new nodes will work
Vasileios The Impact of Explained how
with old nodes but this is already dangerous. Soft Fork is
Mavroeidis, Kamer Quantum Computing quantum computers when the new nodes and old nodes operate as different
Vishi, Mateusz D. on Present can change the entity. They would never approve work of each other but
Zych and Audun Cryptography landscape of “may” not cause problems.
Jøsang cryptographic world
we know today. 3) Faults in Smart Contracts
Smart contracts are simple (or complex) computer
IV. TYPES OF ATTACK ON BLOCKCHAIN programs, that run inside a blockchain as a node and also
As secure blockchain seems to be, there are some vectors participate in all the node activities including consensus
that may lead to its compromise. On positive side, mitigation algorithm [4]. These programs are useful when some set of
factors are also available for some of them. In this section, rule needs to be maintained, for monitor purposes or maybe
we will be discussing basic attacks on blockchain to carry out basic automation regarding transactions. Since
technology. these are just computer program in the end, they are
vulnerable to various attacks such as a basic buffer overflow,
1) The 51% rule string format, some bypasses, logical errors, business errors,
The 51% Rule is when a single entity has control of etc.
about 51% of total computational power available in These have been exploited in past such as in case of
blockchain [2]. This can cause exploitation such as in case of DAO [7]. DAO is Decentralized Autonomous Organization.
double spend. Double spend is a problem native to digital Created back in 2016, it was developed on Ethereum
currencies so we will take example of blockchain. An platform that used currency known as ethers. Investors used
attacker would first create an isolated “stealth” blockchain of to pay Ethers to DAO for certain startups made on same
its own. Later he/she decides to spend an amount X, it gets platform. But a notorious hacker was able to exploit the
registered on the original blockchain but it is not registered smart contract handling the transactions and was able to steal
on the isolated blockchain that is just created. Thus, at a around $50M USD worth of Ethers. Unfortunate enough,
point when attacker has much more computational power there was no way to make system perfectly functional again
and is able to make this isolated blockchain longer than other than going back to a point before attack, create a new
original the 51% rule comes into play. Blockchains are fork and make all non-malicious nodes agree to use newly
designed to follow the majority hence following the longer formed blockchain. Smart Contracts related flaws can be
blockchain. Attacker would then suddenly broadcast isolated mitigated by code analysis and testing before deployment in
blockchain on original one and since it is now bigger and crucial environment.
longer than original, all the original nodes will join the

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on September 01,2022 at 12:23:39 UTC from IEEE Xplore. Restrictions apply.
4) Replay Attacks 7) Quantum Computing
Replay attacks sound simple but they are very dangerous The very existence of Quantum Computers will threaten
for technology such as Blockchain because of its transparent every security principle we know today. This may very well
and distributed nature. In such attacks, an attacker is able to cause something known as “Cryptographic Apocalypse”
resend some already used credentials on the network and it is where secrets generated using mathematics may not hold
validated by all the nodes again and again without realizing unbreakable anymore [12]. By means of all the previous
they have done it previously. To avoid such attacks a simple discussion it is clear how important hashes are for both
way is to use a “nonce” token [6] and keep it recorded, or signature purpose and from consensus algorithm point of
best, simply use a timestamp with expiry and validity of view, with them at verge of being broken cryptographic
functionality of blockchain will be definitely affected. All the
nonce token.
consensus algorithms such as PoW and PoS becomes no
5) Eclipse Attacks longer reliable with this threat to SHA-256 hashes. This is
Eclipse attacks are a type of attack in which an attacker how dangerous of threat Quantum computers possess to
attempts to isolate a target from the rest of the network by future of security.
monopolizing all of the target’s incoming and outgoing Fortunately, US National Institution of Standards and
connections. Typically, this results in that particular node Technology (NIST), is in process to develop something
being cut-off from network for significant amount of time or known as Post Quantum Cryptography or PQCrypto. It is
is unable to co-operate with rest of nodes [5]. This allows the expected to be developed between 2022-2024 and will
attacker to corrupt the targets view of the blockchain, force it probably be able to deal with problems related to quantum
to waste compute power, or subvert the target’s compute
computing in cryptography.
power for malicious purposes. Evident enough from Fig.2,
these attacks are prevalent on Peer-to-Peer networks. V. CONCLUSIONS
It can be prevented in number of ways. One way is Blockchain technology is undoubtably capable of
Random Node selection, where the connections between bringing revolution in several departments. With the
nodes are randomized rather than connecting to same set of Artificial Intelligence and Machine Learning opening ways
nodes every time. This makes it difficult to “isolate” a node for advancements, blockchain is one of most anticipated
or take advantage. There is Deterministic Node selection contenders. With its application varying from personal use,
method which is opposite of Random Node. Other than these to government use and even as far as forming a
two solutions, the number of peer-to-peer connections can cryptocurrency it has been targeted in past since its
also be increased which will increase probability of node introduction and will be targeted in future as well.
connecting to legitimate node. But this has clear
disadvantage of bandwidth consumption. While some factors do not directly affect the security of
blockchain and are dependent on external agents such as
users themselves, the mitigations for blockchain specific
problems need to be solved as it will soon be the need of the
hour. Fortunately, since its introduction, it has protected
itself throughout the times. As for the big knock-over, in
which the whole system is taken down, we can say that the
probability is low. But it is not zero.
REFERENCES
[1] Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash
system." Decentralized Business Review (2008): 21260.
Fig. 2. Pictorial representation of eclipse attack [2] Lin, Iuon-Chang and Tzu-Chun Liao. “A Survey of Blockchain
Security Issues and Challenges.” Int. J. Netw. Secur. 19 (2017): 653-
6) Malware Attacks 659.
Malware have been threat to cyber security since the [3] Dasgupta, D., Shrein, J.M. & Gupta, K.D. A survey of blockchain
beginning. In case of blockchains, they have indirect threat. from security perspective. J BANK FINANC TECHNOL 3, 1–17
(2019). https://doi.org/10.1007/s42786-018-00002-6
Using malware, it is possible to infect multiple hosts inside a
chain and thus potentially makes new way of exploitation [4] Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping
Chen, Jian Weng, Muhammad Imran, “An overview on smart
possible. Just imagine a malware used for infecting nodes in contracts: Challenges, advances and platforms”, Future Generation
blockchain and later a 51% attack is carried out, that sounds Computer Systems, Volume 105, 2020, Pages 475-491, ISSN 0167-
very alarming. Another use case of malware attacks, crypt- 739X, https://doi.org/10.1016/j.future.2019.12.019.
miners. Infected systems can unknowingly dedicate their [5] Wang H., Wang Y., Cao Z., Li Z., Xiong G. (2019) An Overview of
resource consumption and energy for mining of Blockchain Security Analysis. In: Yun X. et al. (eds) Cyber Security.
cryptocurrency and later transfer the benefit to the attacker CNCERT 2018. Communications in Computer and Information
Science, vol 970. Springer, Singapore. https://doi.org/10.1007/978-
which is clearly illegal. Such systems become slow, and 981-13-6621-5_5.
sometimes may result in hardware failure for end users. [6] A. Sonnino, S. Bano, M. Al-Bassam and G. Danezis, "Replay Attacks
Mitigation measures for these attacks are to be carried and Defenses Against Cross-shard Consensus in Sharded Distributed
Ledgers," 2020 IEEE European Symposium on Security and Privacy
out by users themselves. General measures include keeping (EuroS&P), 2020, pp. 294-308, doi:
operating systems and software up-to-date, using quality 10.1109/EuroSP48549.2020.00026.
Anti-Virus Software, taking care of own credentials and not [7] https://www.igi-global.com/article/understanding-a-revolutionary-
disclosing it to unknown entities, etc. and-flawed-grand-experiment-in-blockchain/216950, Last Accessed:
23/10/2021

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on September 01,2022 at 12:23:39 UTC from IEEE Xplore. Restrictions apply.
[8] https://cipher.com/blog/how-blockchain-can-be-hacked-the-51-rule- [14] Shah, K., & Jinwala, D. C. (2016, May). A secure expansive
and-more, Last Accessed: 23/10/2021 aggregation in wireless sensor networks for linear infrasturcture. In
[9] Efpraxia Zamani, Ying He, Matthew Phillips. (2020) On the Security 2016 IEEE Region 10 Symposium (TENSYMP) (pp. 207-212). IEEE.
Risks of the Blockchain. Journal of Computer Information [15] Shah, K. A., & Jinwala, D. C. (2017). Novel approach for pre-
Systems 60:6, pages 495-506. distributing keys in WSNs for linear infrastructure. Wireless Personal
[10] Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen,"A Communications, 95(4), 3905-3921.
survey on the security of blockchain systems",Future Generation [16] Shah, K., & Jinwala, D. C. (2018). Performance analysis of
Computer Systems,Volume 107, 2020,Pages 841-853,ISSN 0167- symmetric key ciphers in linear and grid based sensor networks.
739X, https://doi.org/10.1016/j.future.2017.08.020. arXiv preprint arXiv:1809.06587.
[11] doi: https://doi.org/10.1038/d41586-018-07449-z, Last Accessed: [17] Shah, K., & Jinwala, D. (2021). Privacy preserving secure expansive
19/10/2021 aggregation with malicious node identification in linear wireless
[12] Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych and Audun sensor networks. Frontiers of Computer Science, 15(6), 1-9.
Jøsang, “The Impact of Quantum Computing on Present [18] Shah, K. A., & Jinwala, D. C. (2018). Privacy preserving, verifiable
Cryptography” International Journal of Advanced Computer Science and resilient data aggregation in grid-based networks. The Computer
and Applications(ijacsa), 9(3), Journal, 61(4), 614-628.
2018. http://dx.doi.org/10.14569/IJACSA.2018.090354 [19] Patel, V., Khatiwala, F., Shah, K., & Choksi, Y. (2020). A review on
[13] Lepore, C., Ceria, M., Visconti, A., Rao, U. P., Shah, K. A., & blockchain technology: Components, issues and challenges. In
Zanolini, L. (2020). A survey on blockchain consensus with a ICDSMLA 2019 (pp. 1257-1262). Springer, Singapore.
performance comparison of PoW, PoS and pure PoS. Mathematics,
8(10), 1782.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on September 01,2022 at 12:23:39 UTC from IEEE Xplore. Restrictions apply.

You might also like