AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
Article Link
Collect
Submit Manuscript
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Regular Paper

Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks

School of Computer Science and Technology, Shandong University, Qingdao 266237, China
Department of Computer and Information Science, Indiana University-Purdue University Indianapolis Indianapolis 46202, U.S.A.

A preliminary version of the paper was published in the Proceedings of MASS 2021.

Show Author Information

Abstract

Scalability has long been a major challenge of cryptocurrency systems, which is mainly caused by the delay in reaching consensus when processing transactions on-chain. As an effective mitigation approach, the payment channel networks (PCNs) enable private channels among blockchain nodes to process transactions off-chain, relieving long-time waiting for the online transaction confirmation. The state-of-the-art studies of PCN focus on improving the efficiency and availability via optimizing routing, scheduling, and initial deposits, as well as preventing the system from security and privacy attacks. However, the behavioral decision dynamics of blockchain nodes under potential malicious attacks is largely neglected. To fill this gap, we employ the game theory to study the characteristics of channel interactions from both the micro and macro perspectives under the situation of channel depletion attacks. Our study is progressive, as we conduct the game-theoretic analysis of node behavioral characteristics from individuals to the whole population of PCN. Our analysis is complementary, since we utilize not only the classic game theory with the complete rationality assumption, but also the evolutionary game theory considering the limited rationality of players to portray the evolution of PCN. The results of numerous simulation experiments verify the effectiveness of our analysis.

Electronic Supplementary Material

Download File(s)
2032_ESM.pdf (154.6 KB)

References

[1]
Li P, Miyazaki T, Zhou W. Secure balance planning of off-blockchain payment channel networks. In Proc. the IEEE Conference on Computer Communications, Jul. 2020, pp. 1728-1737. DOI: 10.1109/INFOCOM41043.2020.9155375.
[2]
Lin S, Zhang J, Wu W. FSTR: Funds skewness aware transaction routing for payment channel networks. In Proc. the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun. 29-Jul. 2, 2020, pp. 464-475. DOI: 10.1109/DSN48063.2020.00060.
[3]
Bagaria V K, Neu J, Tse D. Boomerang: Redundancy improves latency and throughput in payment-channel networks. In Proc. the 24th International Conference on Financial Cryptography and Data Security, Feb. 2020, pp. 304-324. DOI: 10.1007/978-3-030-51280-4_17.
[4]
Khalil R, Gervais A. Revive: Rebalancing off-blockchain payment networks. In Proc. the 2017 ACM SIGSAC Conference on Computer and Communications Security, Oct. 30-Nov. 3, 2017, pp. 439-453. DOI: 10.1145/3133956.3134033.
[5]
Rohrer E, Malliaris J, Tschorsch F. Discharged payment channels: Quantifying the lightning network's resilience to topology-based attacks. In Proc. the 2019 IEEE European Symposium on Security and Privacy Workshops, Aug. 2019, pp. 347-356. DOI: 10.1109/EuroSPW.2019.00045.
[6]
Kappos G, Yousaf H, Piotrowska A M, Kanjalkar S, Delgado-Segura S, Miller A, Meiklejohn S. An empirical analysis of privacy in the lightning network. In Proc. the 25th International Conference on Financial Cryptography and Data Security, Mar. 2021, pp. 167-186. DOI: 10.1007/978-3-662-64322-8_8.
[7]
Tang W, Wang W, Fanti G C, Oh S. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst., 2020, 4(2): Article No. 29. DOI: 10.1145/3392147.
[8]
Banerjee P, Mazumdar S, Ruj S. Griefing-penalty: Countermeasure for griefing attack in bitcoin-compatible PCNs. arXiv: 2005.09327, 2020. https://arxiv.org/abs/2005.09327, May 2022.
[9]
Harris J, Zohar A. Flood & loot: A systemic attack on the lightning network. In Proc. the 2nd ACM Conference on Advances in Financial Technologies, Oct. 2020, pp. 202-213. DOI: 10.1145/3419614.3423248.
[10]
Avarikioti Z, Heimbach L, Wang Y, Wattenhofer R. Ride the lightning: The game theory of payment channels. In Proc. the 24th International Conference on Financial Cryptography and Data Security, Feb. 2020, pp. 264-283. DOI: 10.1007/978-3-030-51280-4_15.
[11]
Lange K, Rohrer E, Tschorsch F. On the impact of attachment strategies for payment channel networks. In Proc. the IEEE International Conference on Blockchain and Cryptocurrency, May 2021. DOI: 10.1109/ICBC51069.2021.9461104.
[12]
Pickhardt R, Nowostawski M. Imbalance measure and proactive channel rebalancing algorithm for the lightning network. In Proc. the IEEE International Conference on Blockchain and Cryptocurrency, May 2020. DOI: 10.1109/ICBC48266.2020.9169456.
[13]
Lu Z, Han R, Yu J. General congestion attack on HTLC-based payment channel networks. In Proc. the 3rd International Conference on Blockchain Economics, Security and Protocols, Nov. 2021, Article No. 2. DOI: 10.4230/OASIcs.Tokenomics.2021.2.
[14]
Qin Y, Hu Q, Yu D, Cheng X. Malice-aware transaction forwarding in payment channel networks. In Proc. the 18th IEEE International Conference on Mobile Ad Hoc and Smart Systems, Oct. 2021, pp. 297-305. DOI: 10.1109/MASS52906.2021.00046.
[15]

Press W H, Dyson F J. Iterated prisoner's dilemma contains strategies that dominate any evolutionary opponent. Proceedings of the National Academy of Sciences of the United States of America, 2012, 109(26): 10409-10413. DOI: 10.1073/pnas.1206569109.

[16]
Govaert A, Cao M. Zero-determinant strategies in finitely repeated n-player games. arXiv: 1910.07858, 2019. http://arxiv.org/abs/1910.07858, Oct. 2021.
[17]
Traulsen A, Nowak M A, Pacheco J M. Stochastic dynamics of invasion and fixation. Physical Review E, 2006, 74(1): Article No. 011909. DOI: 10.1103/PhysRevE.74.011909.
[18]

Szabó G, Töke C. Evolutionary prisoner's dilemma game on a square lattice. Physical Review E, 1998, 58(1): 69-73. DOI: 10.1103/PhysRevE.58.69.

[19]

Taylor P D, Jonker L B. Evolutionary stable strategies and game dynamics. Mathematical Biosciences, 1978, 40(1/2): 145-156. DOI: 10.1016/0025-5564(78)90077-9.

[20]
Smith J M. Evolution and the Theory of Games (1st edition). Cambridge University Press, 1982.
Journal of Computer Science and Technology
Pages 888-905
Cite this article:
Qin Y, Hu Q, Yu D-X, et al. Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks. Journal of Computer Science and Technology, 2022, 37(4): 888-905. https://doi.org/10.1007/s11390-022-2032-x

469

Views

0

Crossref

0

Web of Science

0

Scopus

0

CSCD

Altmetrics

Received: 19 November 2021
Revised: 30 May 2022
Accepted: 08 June 2022
Published: 25 July 2022
©Institute of Computing Technology, Chinese Academy of Sciences 2022
Return