103 research outputs found
Time-Restricted Double-Spending Attack on PoW-based Blockchains
Numerous blockchain applications are designed with tasks that naturally have
finite durations, and hence, a double-spending attack (DSA) on such blockchain
applications leans towards being conducted within a finite timeframe,
specifically before the completion of their tasks. Furthermore, existing
research suggests that practical attackers typically favor executing a DSA
within a finite timeframe due to their limited computational resources. These
observations serve as the impetus for this paper to investigate a
time-restricted DSA (TR-DSA) model on Proof-of-Work based blockchains. In this
TR-DSA model, an attacker only mines its branch within a finite timeframe, and
the TR-DSA is considered unsuccessful if the attacker's branch fails to surpass
the honest miners' branch when the honest miners' branch has grown by a
specific number of blocks. First, we developed a general closed-form expression
for the success probability of a TR-DSA. This developed probability not only
can assist in evaluating the risk of a DSA on blockchain applications with
timely tasks, but also can enable practical attackers with limited
computational resources to assess the feasibility and expected reward of
launching a TR-DSA. In addition, we provide rigorous proof that the success
probability of a TR-DSA is no greater than that of a time-unrestricted DSA
where the attacker indefinitely mines its branch. This result implies that
blockchain applications with timely tasks are less vulnerable to DSAs than
blockchain applications that provide attackers with an unlimited timeframe for
their attacks. Furthermore, we show that the success probability of a TR-DSA is
always smaller than one even though the attacker controls more than half of the
hash rate in the network. This result alerts attackers that there is still a
risk of failure in launching a TR-DSA even if they amass a majority of the hash
rate in the network.Comment: 13 pages, 8 figures. arXiv admin note: text overlap with
arXiv:2304.0996
Distributed Detection Over Blockchain-Aided Internet Of Things In The Presence Of Attacks
Distributed detection over a blockchain-aided Internet of Things (BIoT) network in the presence of attacks is considered, where the integrated blockchain is employed to secure data exchanges over the BIoT as well as data storage at the agents of the BIoT. We consider a general adversary model where attackers jointly exploit the vulnerability of IoT devices and that of the blockchain employed in the BIoT. The optimal attacking strategy which minimizes the Kullback-Leibler divergence is pursued. It can be shown that this optimization problem is nonconvex, and hence it is generally intractable to find the globally optimal solution to such a problem. To overcome this issue, we first propose a relaxation method that can convert the original nonconvex optimization problem into a convex optimization problem, and then the analytic expression for the optimal solution to the relaxed convex optimization problem is derived. The optimal value of the relaxed convex optimization problem provides a detection performance guarantee for the BIoT in the presence of attacks. In addition, we develop a coordinate descent algorithm which is based on a capped water-filling method to solve the relaxed convex optimization problem, and moreover, we show that the convergence of the proposed coordinate descent algorithm can be guaranteed
Testing the Structure of a Gaussian Graphical Model with Reduced Transmissions in a Distributed Setting
Testing a covariance matrix following a Gaussian graphical model (GGM) is
considered in this paper based on observations made at a set of distributed
sensors grouped into clusters. Ordered transmissions are proposed to achieve
the same Bayes risk as the optimum centralized energy unconstrained approach
but with fewer transmissions and a completely distributed approach. In this
approach, we represent the Bayes optimum test statistic as a sum of local test
statistics which can be calculated by only utilizing the observations available
at one cluster. We select one sensor to be the cluster head (CH) to collect and
summarize the observed data in each cluster and intercluster communications are
assumed to be inexpensive. The CHs with more informative observations transmit
their data to the fusion center (FC) first. By halting before all transmissions
have taken place, transmissions can be saved without performance loss. It is
shown that this ordering approach can guarantee a lower bound on the average
number of transmissions saved for any given GGM and the lower bound can
approach approximately half the number of clusters when the minimum eigenvalue
of the covariance matrix under the alternative hypothesis in each cluster
becomes sufficiently large
Attack Detection in Sensor Network Target Localization Systems with Quantized Data
We consider a sensor network focused on target localization, where sensors
measure the signal strength emitted from the target. Each measurement is
quantized to one bit and sent to the fusion center. A general attack is
considered at some sensors that attempts to cause the fusion center to produce
an inaccurate estimation of the target location with a large mean-square-error.
The attack is a combination of man-in-the-middle, hacking, and spoofing attacks
that can effectively change both signals going into and coming out of the
sensor nodes in a realistic manner. We show that the essential effect of
attacks is to alter the estimated distance between the target and each attacked
sensor to a different extent, giving rise to a geometric inconsistency among
the attacked and unattacked sensors. Hence, with the help of two secure
sensors, a class of detectors are proposed to detect the attacked sensors by
scrutinizing the existence of the geometric inconsistency. We show that the
false alarm and miss probabilities of the proposed detectors decrease
exponentially as the number of measurement samples increases, which implies
that for sufficiently large number of samples, the proposed detectors can
identify the attacked and unattacked sensors with any required accuracy
Unsupervised BLSTM-Based Electricity Theft Detection With Training Data Contaminated
Electricity theft can cause economic damage and even increase the risk of outage. Recently, many methods have implemented electricity theft detection on smart meter data. However, how to conduct detection on the dataset without any label still remains challenging. In this article, we propose a novel unsupervised two-stage approach under the assumption that the training set is contaminated by attacks. Specifically, the method consists of two stages: (1) a Gaussian mixture model is employed to cluster consumption patterns with respect to different habits of electricity usage, and with the goal of improving the accuracy of the model in the posterior stage; (2) an attention-based bidirectional long short-term memory encoder-decoder scheme is employed to improve the robustness against the non-malicious changes in usage patterns leveraging the process of encoding and decoding. Quantifying the similarity of consumption patterns and reconstruction errors, the anomaly score is defined to improve detection performance. Experiments on a real dataset show that the proposed method outperforms the state-of-the-art unsupervised detectors
- …