Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
149 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Mass Exit Attacks on the Lightning Network (2208.01908v3)

Published 3 Aug 2022 in cs.CR and cs.DC

Abstract: The Lightning Network (LN) has enjoyed rapid growth over recent years, and has become the most popular scaling solution for the Bitcoin blockchain. The security of the LN relies on the ability of the nodes to close a channel by settling their balances, which requires confirming a transaction on the Bitcoin blockchain within a pre-agreed time period. We study the susceptibility of the LN to mass exit attacks in case of high transaction congestion, in the presence of a small coalition of adversarial nodes that forces a large set of honest users to interact with the blockchain. We focus on two types of attacks: (i) The first is a zombie attack, where a set of k nodes become unresponsive with the goal of locking the funds of many channels for a period of time longer than what the LN protocol dictates. (ii) The second is a mass double-spend attack, where a set of k nodes attempt to steal funds by submitting many closing transactions that settle channels using expired protocol states; this causes many honest nodes to have to quickly respond by submitting invalidating transactions. We show via simulations that, under historically plausible congestion conditions, with mild statistical assumptions on channel balances, both attacks can be performed by a very small coalition. To perform our simulations, we formulate the problem of finding a worst-case coalition of k adversarial nodes as a graph cut problem. Our experimental findings are supported by theoretical justifications based on the scale-free topology of the LN.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (16)
  1. J. Poon and T. Dryja, “The bitcoin lightning network: Scalable off-chain instant payments,” 2016.
  2. E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, “Eclipse attacks on bitcoin’s peer-to-peer network,” in 24th USENIX Security Symposium (USENIX Security 15), 2015, pp. 129–144.
  3. Y. Marcus, E. Heilman, and S. Goldberg, “Low-resource eclipse attacks on ethereum’s peer-to-peer network,” Cryptology ePrint Archive, 2018.
  4. S. Martinazzi and A. Flori, “The evolving topology of the lightning network: Centralization, efficiency, robustness, synchronization, and anonymity,” Plos one, vol. 15, no. 1, p. e0225966, 2020.
  5. M. Gast, M. Hauptmann, and M. Karpinski, “Approximation complexity of max-cut on power law graphs,” arXiv preprint arXiv:1602.08369, 2016.
  6. R. M. Karp, “Reducibility among combinatorial problems,” in Complexity of computer computations.   Springer, 1972, pp. 85–103.
  7. R. Gundlach, M. Gijsbers, D. Koops, and J. Resing, “Predicting confirmation times of bitcoin transactions,” ACM SIGMETRICS Performance Evaluation Review, vol. 48, no. 4, pp. 16–19, 2021.
  8. J. Hoenicke. (2022, may) Bitcoin mempool statistics. [Online]. Available: https://jochen-hoenicke.de/queue/#BTC,all,count
  9. Anchor outputs. [Online]. Available: https://bitcoinops.org/en/topics/anchor-outputs/
  10. A. Lotem, S. Azouvi, P. McCorry, and A. Zohar, “Sliding window challenge process for congestion detection,” arXiv preprint arXiv:2201.09009, 2022.
  11. J. Harris and A. Zohar, “Flood & loot: A systemic attack on the lightning network,” in Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020, pp. 202–213.
  12. A. Mizrahi and A. Zohar, “Congestion attacks in payment channel networks,” in International Conference on Financial Cryptography and Data Security.   Springer, 2021, pp. 170–188.
  13. E. Rohrer, J. Malliaris, and F. Tschorsch, “Discharged payment channels: Quantifying the lightning network’s resilience to topology-based attacks,” in 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).   IEEE, 2019, pp. 347–356.
  14. S. Mazumdar, P. Banerjee, and S. Ruj, “Griefing-penalty: Countermeasure for griefing attack in lightning network,” arXiv preprint arXiv:2005.09327, 2020.
  15. A. Riard and G. Naumenko, “Time-dilation attacks on the lightning network,” arXiv preprint arXiv:2006.01418, 2020.
  16. S. Dziembowski, G. Fabiański, S. Faust, and S. Riahi, “Lower bounds for off-chain protocols: Exploring the limits of plasma,” in 12th Innovations in Theoretical Computer Science Conference (ITCS 2021).   Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2021.
Citations (9)

Summary

We haven't generated a summary for this paper yet.

Youtube Logo Streamline Icon: https://streamlinehq.com