TY - GEN
T1 - Leveraging the Goldfinger Attack in Blockchain Based on the Topological Properties
AU - Muteba, Arcel Kalenga
AU - Ogudo, Kingsley A.
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
PY - 2023
Y1 - 2023
N2 - In this paper, we provide a new approach to modeling and analyzing the Goldfinger attacks in blockchain networks, based on the topology of a peer-to-peer network; this paper studied the impact of the Goldfinger well known as 51% attacks in the case of the ring, mesh and fully connected topology. The outcome of simulation has proven that in the case of fully connected topology, the attacker node with 501 (hash/s) has found 155 blocks in 60 s and the rest of the nodes, on average, 58 per node; this gives the control of the balance to the blocks of node J with 131 balance and 43 balance on average for nine nodes, in practice, the node with more than 50% will monopolize the balance. The Goldfinger occurred very worst in the fully connected topology and monopolized the network because of topologically connections; the attacker in fully connected topology is a direct and duplicated connection with the nine nodes. In terms of connection duplicated bidirectional or directional, the fully connected topology presents a hard fork compared to ring and mesh topology after the attack.
AB - In this paper, we provide a new approach to modeling and analyzing the Goldfinger attacks in blockchain networks, based on the topology of a peer-to-peer network; this paper studied the impact of the Goldfinger well known as 51% attacks in the case of the ring, mesh and fully connected topology. The outcome of simulation has proven that in the case of fully connected topology, the attacker node with 501 (hash/s) has found 155 blocks in 60 s and the rest of the nodes, on average, 58 per node; this gives the control of the balance to the blocks of node J with 131 balance and 43 balance on average for nine nodes, in practice, the node with more than 50% will monopolize the balance. The Goldfinger occurred very worst in the fully connected topology and monopolized the network because of topologically connections; the attacker in fully connected topology is a direct and duplicated connection with the nine nodes. In terms of connection duplicated bidirectional or directional, the fully connected topology presents a hard fork compared to ring and mesh topology after the attack.
KW - 51% attack
KW - Bitcoin
KW - Network topologies
KW - P2P network
UR - http://www.scopus.com/inward/record.url?scp=85148011687&partnerID=8YFLogxK
U2 - 10.1007/978-981-19-6880-8_10
DO - 10.1007/978-981-19-6880-8_10
M3 - Conference contribution
AN - SCOPUS:85148011687
SN - 9789811968792
T3 - Lecture Notes in Networks and Systems
SP - 101
EP - 108
BT - Smart Technologies in Data Science and Communication - Proceedings of SMART-DSC 2022
A2 - Ogudo, Kingsley A.
A2 - Saha, Sanjoy Kumar
A2 - Bhattacharyya, Debnath
PB - Springer Science and Business Media Deutschland GmbH
T2 - 5th International Conference on Smart Technologies in Data Science and Communication, SMART-DSC 2022
Y2 - 16 June 2022 through 17 June 2022
ER -