A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection
- URL: http://arxiv.org/abs/2403.11171v1
- Date: Sun, 17 Mar 2024 11:12:46 GMT
- Title: A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection
- Authors: Hojung Yang, Suhyeon Lee, Seungjoo Kim,
- Abstract summary: IOTA is a distributed ledger technology that uses a Directed Acyclic Graph structure called the Tangle.
In this paper, we demonstrate that tip selection can be exploited to compromise users' privacy.
We show that these types of attacks are not only viable in the current IOTA environment but also in IOTA 2.0 and the privacy improvement being studied.
- Score: 2.9904113489777826
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: IOTA is a distributed ledger technology that uses a Directed Acyclic Graph (DAG) structure called the Tangle. It is known for its efficiency and is widely used in the Internet of Things (IoT) environment. Tangle can be configured by utilizing the tip selection process. Due to performance issues with light nodes, full nodes are being asked to perform the tip selections of light nodes. However, in this paper, we demonstrate that tip selection can be exploited to compromise users' privacy. An adversary full node can associate a transaction with the identity of a light node by comparing the light node's request with its ledger. We show that these types of attacks are not only viable in the current IOTA environment but also in IOTA 2.0 and the privacy improvement being studied. We also provide solutions to mitigate these attacks and propose ways to enhance anonymity in the IOTA network while maintaining efficiency and scalability.
Related papers
- Graph Attention Network-based Block Propagation with Optimal AoI and Reputation in Web 3.0 [59.94605620983965]
We design a Graph Attention Network (GAT)-based reliable block propagation optimization framework for blockchain-enabled Web 3.0.
To achieve the reliability of block propagation, we introduce a reputation mechanism based on the subjective logic model.
Considering that the GAT possesses the excellent ability to process graph-structured data, we utilize the GAT with reinforcement learning to obtain the optimal block propagation trajectory.
arXiv Detail & Related papers (2024-03-20T01:58:38Z) - A Review on the Use of Blockchain for the Internet of Things [0.0]
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our daily objects will be interconnected and will interact with their environment.
Such a vision requires, among other things, seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance.
Such features can be brought by blockchain, a technology born with a cryptocurrency called Bitcoin.
arXiv Detail & Related papers (2024-02-01T15:48:45Z) - Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the IOTA auto-peering protocol [0.9075435445935834]
IOTA is a distributed ledger technology that relies on a peer-to-peer (P2P) network for communications.
This paper's goal is to detect potential vulnerabilities and evaluate the resilience of the P2P network generated using IOTA auto-peering algorithm against eclipse attacks.
arXiv Detail & Related papers (2024-01-23T10:30:14Z) - RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain [8.178194928962311]
We propose RecAGT, a novel identification scheme aimed at reducing communication overhead and identifying potential malicious nodes.
First, shard testable codes are designed to encode the original data in case of a leak of confidential data.
Second, a new identity proof protocol is presented as evidence against malicious behavior.
Third, adaptive group testing is chosen to identify malicious nodes.
arXiv Detail & Related papers (2023-11-05T07:43:48Z) - A Novel DID Method Leveraging the IOTA Tangle and its Integration into OpenSSL [0.0]
This paper presents a novel Decentralized IDentifier (DID) Method called Over-The-Tangle.
The results suggest the adoption of a private gateway node synchronised with the IOTA Tangle on the mainnet for efficient DID control.
A novel DID Operation and Provider is presented as a solution for building DID Method agility in OpenSSL.
arXiv Detail & Related papers (2023-10-02T11:02:01Z) - Over-The-Air Federated Learning: Status Quo, Open Challenges, and Future
Directions [78.5371215066019]
Over-the-air federated learning (OTA-FL) enables users at the network edge to share spectrum resources and achieves efficient and low-latency global model aggregation.
This paper provides a holistic review of progress in OTA-FL and points to potential future research directions.
arXiv Detail & Related papers (2023-07-03T12:44:52Z) - Jamming Attacks on Decentralized Federated Learning in General Multi-Hop
Wireless Networks [3.509171590450989]
We consider an effective attack that uses jammers to prevent the model exchanges between nodes.
We show that the DFL performance can be significantly reduced by jamming attacks launched in a wireless network.
arXiv Detail & Related papers (2023-01-12T19:03:05Z) - The Internet of Senses: Building on Semantic Communications and Edge
Intelligence [67.75406096878321]
The Internet of Senses (IoS) holds the promise of flawless telepresence-style communication for all human receptors'
We elaborate on how the emerging semantic communications and Artificial Intelligence (AI)/Machine Learning (ML) paradigms may satisfy the requirements of IoS use cases.
arXiv Detail & Related papers (2022-12-21T03:37:38Z) - Adversarial Camouflage for Node Injection Attack on Graphs [64.5888846198005]
Node injection attacks on Graph Neural Networks (GNNs) have received increasing attention recently, due to their ability to degrade GNN performance with high attack success rates.
Our study indicates that these attacks often fail in practical scenarios, since defense/detection methods can easily identify and remove the injected nodes.
To address this, we devote to camouflage node injection attack, making injected nodes appear normal and imperceptible to defense/detection methods.
arXiv Detail & Related papers (2022-08-03T02:48:23Z) - AN-GCN: An Anonymous Graph Convolutional Network Defense Against
Edge-Perturbing Attack [53.06334363586119]
Recent studies have revealed the vulnerability of graph convolutional networks (GCNs) to edge-perturbing attacks.
We first generalize the formulation of edge-perturbing attacks and strictly prove the vulnerability of GCNs to such attacks in node classification tasks.
Following this, an anonymous graph convolutional network, named AN-GCN, is proposed to counter edge-perturbing attacks.
arXiv Detail & Related papers (2020-05-06T08:15:24Z) - Byzantine-resilient Decentralized Stochastic Gradient Descent [85.15773446094576]
We present an in-depth study towards the Byzantine resilience of decentralized learning systems.
We propose UBAR, a novel algorithm to enhance decentralized learning with Byzantine Fault Tolerance.
arXiv Detail & Related papers (2020-02-20T05:11:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.