Unit 2
Unit 2
Unit II-Consensus Protocols: Proof of Work, Security Issues in Proof of Work, Proof of Stake,
Security Issues in Proof of Stake, Other Consensus Types.
Consensus Protocols
Proof of Work
Proof of Work is a decentralized consensus mechanism used to validate transactions and add
new blocks to the blockchain.
It was first introduced by Bitcoin (created by Satoshi Nakamoto in 2009) and remains one of the
most secure ways to maintain a trustless network—where parties can transact without knowing or
trusting each other.
Security Weaknesses
LONG-RANGE ATTACK
Due to the presence of Proof-of-Stake (PoS) protocols in blockchain systems it creates a loop-holes
on the limitations of the size of blockchain (Deirmentzoglou etal, 2019). Long-range attackers re-
fabricate fake blocks of transactions to overpower the original chains (Sarah etal, 2020). There are
several strategies reported by the researchers to counter these attacks by strategically deploying
Proof-of-Work (PoW) protocols into Proof-of-Stake (PoS) in the same blockchain systems (Sarah et
al,2020). This would prevent any re-construction of malicious chain.
SYBIL ATTACK
The Sybil attack deploys similar techniques as that of 51% attack. In a Sybil attack, the hackers
develop a large number of fake nodes in the network to acquire computing power (Sayeed et al,
2019). The attackers use several devices such as virtual machines, and Internet Protocol (IP)
addresses to pose as a large collection of nodes that have a huge say on smart contracts. Unlike
51% attack which require physically more power than the crypto market which economically
impossible, sybil attack would deploy fake nodes generation techniques to create more computing
power than the market. The sybil attack, eclipse attack, and majority attack can be prevented by
adopting mitigation techniques that can produce immunity to the hackers. These includes deploying
a penalty system for delayed block submission, delayed Proof of Work (dPoW), utilizing PirlGuard
Protocols, exercising Chain-Locks, and introducing Merged Mining Techniques (Sayeed et al,
2019).
Selfish Mining
• What it is: A miner finds a valid block but withholds it instead of broadcasting.
• They keep mining privately, trying to get a head start on the next block.
• If they succeed, they can release both blocks and invalidate other miners' work, gaining
more rewards.
• Impact: Creates centralization pressure, reducing fairness and network efficiency.
Fee-Based Attacks
• As block rewards decline (e.g., after halvings in Bitcoin), miners rely more on transaction
fees.
• Attackers could exploit this by spamming the mempool with tiny fee transactions or
manipulating fee incentives to game the mining system.
• Impact: Creates network congestion, delays, and unfair mining behavior.
Proof of Stake
Proof of Stake is a blockchain consensus mechanism where the right to validate new blocks is
assigned based on how much cryptocurrency (stake) a validator holds and locks up in the
network.
Main Idea: Instead of using computing power like PoW, PoS uses economic skin-in-the-game.
The more tokens you lock (stake), the higher your chances of being selected to validate the next
block.
• Every 12 seconds, a validator is pseudo-randomly chosen (via the beacon chain’s RANDAO+VDF process) to propose the next
block.
• Your chance of being picked ∝ the size of your stake (just like the “chain-based PoS” ticket-in-a-raffle model).
• All other active validators then “bet” (in Ethereum speak, attest) on which block is correct.
• These attestations are weight-voted (again ∝ your stake) in a BFT-style finality gadget called Casper FFG.
• If you attest to the block that ultimately gets finalized, you earn rewards proportional to your stake. If you attest to a losing fork,
you risk a penalty (partial slashing).
Mitigation:
• Slashing: If you’re caught validating multiple forks, your staked funds are burned.
• Finality gadgets like Ethereum’s Casper ensure finalized blocks cannot be reversed.
2. Long-Range Attacks
• Attackers buy old private keys (from long-inactive stakers) and create a fake chain starting
from far in the past.
• Since there’s little or no cost, they can recreate a long valid-looking chain to trick new
nodes.
Mitigation:
• Clients are required to checkpoint recent blocks (e.g., last 1000 blocks).
• Honest nodes will ignore very old chains without social consensus.
Impact:
• Honest users can lose funds unintentionally.
• Leads to fear in participating.
4. Validator Centralization
• Validators with more stake earn more rewards → they reinvest, gaining more power.
• Over time, a few rich validators can dominate consensus (like mining pools in PoW).
Impact:
• Weakens decentralization and opens door for cartel-like behavior or censorship.
Mitigation:
• Use of Verifiable Random Functions (VRFs) or cryptographic randomness beacons
makes it harder to predict/manipulate selection.
Real-world Risk:
• Some staking pools have approached 30–40% stake on chains like Ethereum.
Advantages of pbft:
•Energy efficiency: pBFT can achieve distributed consensus
responding to the request by the client and hence every node can
be incentivized leading to low variance in rewarding the nodes that
help in decision making.
•
4. Proof of Burn(PoB)
algorithms which chooses the next block using fair means only. It is
widely used in permissioned Blockchain networks. In this algorithm,
every validator on the network gets a fair chance to create their
own block. All the nodes do so by waiting for a random amount of
time, adding proof of their wait in the block. The created blocks are
broadcasted to the network for others’ consideration. The winner is
the validator which has the least timer value in the proof part. The
block from the winning validator node gets appended to the
Blockchain. There are additional checks in the algorithm to stop
nodes from always winning the election, and stop nodes from
generating the lowest timer value.
1. Network and Consensus Security Issues
Expanded Description
Blockchain networks operate as decentralized, peer-to-peer (P2P) systems where nodes collaborate
to validate transactions and maintain a shared ledger. Consensus mechanisms, such as Proof of
Work (PoW) or Proof of Stake (PoS), ensure agreement on the ledger’s state without a central
authority. However, the distributed nature of these networks and the reliance on consensus protocols
introduce vulnerabilities that attackers can exploit to manipulate the blockchain, disrupt operations,
or undermine trust. Network-level attacks target the communication between nodes, while
consensus attacks exploit weaknesses in the rules governing block validation. These vulnerabilities
threaten the integrity, availability, and security of the blockchain, potentially leading to double-
spending, network partitioning, or denial-of-service (DoS). The decentralized design, while a
strength, also makes it challenging to coordinate defenses against coordinated attacks, especially in
networks with low participation or concentrated resources.
2.4. Front-Running
• Description: Front-running exploits the visibility of pending transactions in the mempool,
allowing attackers to submit transactions with higher gas fees to execute first.
• How It Works:
• Attackers observe valuable transactions (e.g., DEX trades) and submit competing
transactions to profit from price changes.
• Example:
• On Uniswap, an attacker sees a large buy order, submits a buy order with higher gas
to execute first, and sells at a profit after the price rises.
• Mechanism: The attacker’s transaction is mined first, altering the market state to
their advantage.
• Mitigation:
• Use commit-reveal schemes to hide transaction details.
• Implement batch auctions or TWAP mechanisms.
• Use private transaction pools or layer-2 solutions.
Conclusion
Blockchain vulnerabilities span network, consensus, smart contract, wallet, centralization, and user
domains, each presenting unique risks due to the technology’s decentralized and immutable nature.
Network and consensus attacks threaten the blockchain’s integrity and availability, while smart
contract flaws expose funds to exploitation. Wallet vulnerabilities and centralized components
create single points of failure, and user errors amplify risks due to the lack of centralized recovery
mechanisms. Mitigating these vulnerabilities requires a combination of technical solutions (e.g.,
secure coding, decentralized governance), robust infrastructure (e.g., diverse mining, secure
wallets), and user education. Regular audits, updates, and vigilance are critical to safeguarding
blockchain systems against evolving threats.