skip to main content
10.1145/3409934.3409936acmotherconferencesArticle/Chapter ViewAbstractPublication PagesieccConference Proceedingsconference-collections
research-article

Sybil Tolerant Consensus Method Using Mutual Proof of Validation

Published: 25 August 2020 Publication History

Abstract

This paper introduces a method to make a consensus by recording proof of block validation, which operates in a public blockchain environment, with a consensus algorithm named Sybil Tolerant Equality Protocol (STEP). To solve the problem of centralization, which is pointed out as a problem of existing consensus algorithms, all nodes are given the same power. Also, methods to prevent Sybil attack in which one principal creates multiple nodes are proposed. To this end, STEP randomly selects nodes to create blocks, divides the validation process into two stages, and provides a reward for rapid and correct validation. Through simulations and experiments on STEP, we confirmed whether the random number generation method, the incentive function for block validation, and the network following this consensus algorithm work correctly within the practicable scope of execution time.

References

[1]
Douceur, J. R. 2002. The Sybil Attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems (Cambridge, MA, USA, March 07-08, 2002). IPTPS 2002. Springer, Berlin, Heidelberg, 251--260. DOI=https://doi.org/10.1007/3-540-45748-8_24
[2]
Yu, H., Kaminsky, M., Gibbons, P. B., and Flaxman, A. 2008. SybilGuard: defending against sybil attacks via social networks. IEEE/ACM Trans. Networking. 16, 3 (Jun. 2008), 576--589. DOI= https://doi.org/10.1109/TNET.2008.923723
[3]
Yu, H., Gibbons, P. B., Kaminsky, M. and Xiao, F. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. IEEE/ACM Trans. Networking. 18, 3 (Jun. 2010), 885--898. DOI= https://doi.org/10.1109/SP.2008.13
[4]
Danezis, G. and Mittal, P. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. In Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, USA, February 08--11, 2009). NDSS 2009.
[5]
Mohaisen, A., Yun, A., and Kim, Y. 2010. Measuring the mixing time of social graphs. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement (Melbourne, Australia, August 30-September 03). IMC '10. ACM, New York, NY, USA, 383--389. DOI=https://doi.org/10.1145/1879141.1879191
[6]
Otte, P., de Vos, M., and Pouwelse, J. A. 2017. TrustChain: A Sybil-resistant scalable blockchain. Future Generation Computer Systems. DOI=https://doi.org/10.1016/j.future.2017.08.048
[7]
Li, F., Mittal, P., Caesar, M., and Borisov, N. 2012. SybilControl: Practical Sybil Defense with Computational Puzzles. In Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing (Raleigh, NC, USA, October 15). STC '12. ACM, New York, NY, USA. DOI=https://doi.org/10.1145/2382536.2382548
[8]
Kwon, Y., Liu, J., Kim, M., Song, D., and Kim, Y. 2019. Impossibility of Full Decentralization in Permissionless Blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies (Zurich, Switzerland, October 21-23). AFT '19. ACM, New York, NY, USA. DOI= https://doi.org/10.1145/3318041.3355463
[9]
Gilad, Y., Hemo, R., Micali, S., Vlachos, G., and Zeldovich, N. 2017. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. In Proceedings of 26th Symposium on Operating Systems Principles (Shanghai, China, October 28-31). SOSP 2017. ACM, New York, NY, USA. DOI=https://doi.org/10.1145/3132747.3132757
[10]
Kiayias, A., Russell, A., David, B. and Oliynykov, R. 2017. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology - CRYPTO 2017 (Santa Barbara, CA, USA, August 20-24). CRYPTO 2017. Springer, Cham. DOI= https://doi.org/10.1007/978-3-319-63688-7_12
[11]
Nakamoto, S. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http://bitcoin.org/bitcoin.pdf
[12]
Steem. 2017. Steem: An incentivized, blockchain-based, public content platform. https://steem.com/SteemWhitePaper.pdf
[13]
block.one. 2018. EOS.IO Technical White Paper v2. https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md
[14]
V. Buterin. 2014. Ethereum White Paper: A Next-Generation Smart Contract and Decentralized Application Platform. https://github.com/ethereum/wiki/wiki/White-Paper

Cited By

View all

Index Terms

  1. Sybil Tolerant Consensus Method Using Mutual Proof of Validation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IECC '20: Proceedings of the 2nd International Electronics Communication Conference
    July 2020
    184 pages
    ISBN:9781450377706
    DOI:10.1145/3409934
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 August 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Blockchain
    2. Sybil attack
    3. block validation
    4. consensus algorithm
    5. decentralization

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • National Research Foundation of Korea
    • Institute for Information communication Technology Planning & evaluation (IITP)

    Conference

    IECC 2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 14 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media