How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction

Saar Tochner, Aviv Zohar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A major limitation of many blockchain systems is the lack of strong identities in the underlying P2P network. This allows any nodes to attack the system by creating multiple false personas, thereby disrupting the network's connectivity and sabotaging its operation. In this paper, we focus on P2P networks, and explore practical ways to defend them from such attacks. To do so, we employ a game theoretic approach to the management of each peer's list of known nodes and to the overlay construction mechanisms that utilize this list. We consider the interaction between the defender and attacker as a game. We show that the cost of attacks can be driven up substantially if the defender utilizes available information about peers it chooses to connect to, such as their IP address. In addition to theoretical analysis of the underlying game, we apply our approach to the Bitcoin P2P network and derive effective and practical strategies that guarantee a high safety level against attacks.

Original languageAmerican English
Title of host publicationAFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies
PublisherAssociation for Computing Machinery, Inc
Pages37-45
Number of pages9
ISBN (Electronic)9781450381390
DOIs
StatePublished - 21 Oct 2020
Event2nd ACM Conference on Advances in Financial Technologies, AFT 2020 - Virtual, Online, United States
Duration: 21 Oct 202023 Oct 2020

Publication series

NameAFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies

Conference

Conference2nd ACM Conference on Advances in Financial Technologies, AFT 2020
Country/TerritoryUnited States
CityVirtual, Online
Period21/10/2023/10/20

Bibliographical note

Publisher Copyright:
© 2020 ACM.

Keywords

  • Cryptocurrencies
  • Eclipse Attack
  • Game Theory Analysis
  • Sybil Attack

Fingerprint

Dive into the research topics of 'How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction'. Together they form a unique fingerprint.

Cite this