Next Article in Journal
Characterization Method of Damage Information Based on Heterogeneous Network
Previous Article in Journal
FedADT: An Adaptive Method Based on Derivative Term for Federated Learning
Previous Article in Special Issue
Blockchain-Based Supply Chain Systems, Interoperability Model in a Pharmaceutical Case Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Trusted Reputation Management Scheme for Cross-Chain Transactions

1
ezPay Co., Ltd., Taipei 11578, Taiwan
2
Department of Information Management, National Dong Hwa University, Hualien 97401, Taiwan
3
Department of Applied Mathematics and Computer Science, Technical University of Denmark, 2800 Lyngby, Denmark
4
Division of Computer Science, University of Aizu, Fukushima 965-0006, Japan
5
Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan
6
Institute of Computer Science and Innovation, UCSI University, Kuala Lumpur 5600, Malaysia
*
Authors to whom correspondence should be addressed.
Sensors 2023, 23(13), 6033; https://doi.org/10.3390/s23136033
Submission received: 11 April 2023 / Revised: 23 June 2023 / Accepted: 26 June 2023 / Published: 29 June 2023
(This article belongs to the Special Issue Blockchain and Cloud Computing for Internet of Things)

Abstract

:
Blockchain has become a well-known, secured, decentralized datastore in many domains, including medical, industrial, and especially the financial field. However, to meet the requirements of different fields, platforms that are built on blockchain technology must provide functions and characteristics with a wide variety of options. Although they may share similar technology at the fundamental level, the differences among them make data or transaction exchange challenging. Cross-chain transactions have become a commonly utilized function, while at the same time, some have pointed out its security loopholes. It is evident that a secure transaction scheme is desperately needed. However, what about those nodes that do not behave? It is clear that not only a secure transaction scheme is necessary, but also a system that can gradually eliminate malicious players is of dire need. At the same time, integrating different blockchain systems can be difficult due to their independent architectures, and cross-chain transactions can be at risk if malicious attackers try to control the nodes in the cross-chain system. In this paper, we propose a dynamic reputation management scheme based on the past transaction behaviors of nodes. These behaviors serve as the basis for evaluating a node’s reputation to support the decision on malicious behavior and enable the system to intercept it in a timely manner. Furthermore, to establish a reputation index with high precision and flexibility, we integrate Particle Swarm Optimization (PSO) into our proposed scheme. This allows our system to meet the needs of a wide variety of blockchain platforms. Overall, the article highlights the importance of securing cross-chain transactions and proposes a method to prevent misbehavior by evaluating and managing node reputation.

1. Introduction

After Nakamoto Satoshi delivered the first well-known cryptocurrency in 2008 [1], the underlying data storage that supports the currency’s state security and integrity in a decentralized and zero-trust manner has drawn much attention, that is, blockchain. It demonstrates a feasible way of reaching secure and cohesion data storing and distribution without any trust parties. Platforms built on this technology benefit from four major strength that blockchain provides [2], leading to the widespread adoption of blockchain technology in various fields:
Decentralization: In a blockchain, there is no central authority controlling everything. Instead, all the participants work together to maintain and update the ledger. Every transaction is shared with the entire network, eliminating the need for a central entity.
Anonymity: Blockchain transactions are represented by random-looking wallet addresses, not by real identities. Without a specific system in place to connect addresses to individuals, it is difficult to know who is behind a transaction unless they reveal their identity through other means.
Non-repudiation: Each block in the blockchain contains information about the previous block, thus forming a chain. Additionally, each block is securely sealed with a proof that shows it has been agreed upon by the network. This makes it highly impractical and time-consuming to change or tamper with existing transactions. Altering one transaction would require redoing all the subsequent blocks.
Consensus: Similar to non-repudiation, consensus mechanisms ensure that all participants in the blockchain network agree on the validity and order of transactions. This agreement is reached through various methods. The consensus process makes it difficult for someone to alter transactions because they would need to redo subsequent blocks and convince the network to accept their changes.
The development of decentralized applications (DAPPs) has also been made possible by the advent of smart contracts. However, as the number of DAPPs increases, two critical issues have emerged [3,4,5,6]. Firstly, blockchain systems are not immune to vulnerabilities when operating in real-life scenarios. Secondly, the unique architecture of each blockchain system creates difficulties in cross-blockchain communication, posing a challenge for interoperability between different blockchains in various industries, such as healthcare and finance. For example, hospitals using blockchain technology to maintain health records cannot modify information from other hospitals that also use blockchain as their database.
Each block in a blockchain contains the hash value of the previous block, each secured using a consensus proof based on the underlying algorithm [3,5]. This makes it highly difficult and time-consuming to alter existing transactions. If someone wants to change a transaction, they would need to redo not only the current block but also all the blocks connected after it. However, when it comes to interacting between different blockchains, there are challenges. Jin et al. [7] have identified security issues in cross-chain operations, such as ensuring reliable data access between the source and destination chains. Data integrity must be maintained during the off-chain transfer before it reaches the destination chain. Moreover, the destination chain needs to validate and agree on the transaction in a way that both the source and destination can trust, reaching a consensus on data access and storage. However, this is not easy to achieve due to the different architectures and consensus algorithms used in various blockchain platforms. These differences create security vulnerabilities during cross-chain operations, including denial-of-service attacks [8], double-spending issues [9], and selfish mining attacks [10].
Motivation: It is crucial to find a secure solution to support and enhance the security of cross-chain interoperability processes. The presence of various blockchain platforms emphasizes the need for proposed methods to be adaptable to the diverse blockchain landscape. Since transactions occur between chains through nodes, the trustworthiness of these nodes significantly affects the integrity and security of the transactions. Hence, there is a pressing need for a decentralized and self-evaluating mechanism in cross-chain systems, which can effectively reduce misconduct by potential nodes. Similar approaches have been seen in Rodrigues et al. [11], who used smart contracts for cooperative signaling to mitigate malicious network behavior, and Chai et al. [12], who employed proof-of-reputation to enhance the security of the Internet of Vehicles. While reputation management in information security has seen progress as more systems are digitized, there is a lack of research in emerging areas where reputation management is needed. For example, the increasing popularity of decentralized exchanges and inter-chain operability due to various cryptocurrencies has not been extensively explored in the context of cross-chain reputation management. To the best of our knowledge, He et al. [13], Xiong et al. [14], and Lee and Yeh [15] are the three papers that focused on the cross-chain reputation issue. Others have proposed methods dedicated to achieving cross-chain operability.
Compared to our previous work [15], in response to the need for a reputation management system that optimizes on the fly, we aim to prevent malicious nodes and behaviors as effectively as possible. Our focus is on accurately evaluating the trustworthiness of nodes and chains. We have chosen Particle Swarm Optimization (PSO) [16] as the base algorithm for reputation evaluation optimization. PSO offers several advantages:
  • Simplicity: PSO is easy to understand and implement.
  • Agility: PSO is known for its effectiveness in optimization with low computational cost.
  • Continuity: PSO can handle optimization in discontinuous function spaces, which are often encountered in the design of separation and other networks.
Contribution: This paper presents a cross-chain reputation management scheme that aims to identify and exclude malicious attackers while evaluating the trustworthiness of nodes and chains. To address multiple threats, we utilize the Particle Swarm Optimization (PSO) heuristic algorithm [17] due to its advantages of low computing cost and optimizing discontinuity. We adopt seven indicators, identified through a survey of known attack methods, to ensure the security and accuracy of cross-chain interoperability. Each indicator corresponds to negative impacts on nodes and chains during or after a transaction and serves as a significant evaluation criterion for rating the reputation of nodes involved in cross-chain transactions. The main contributions of this paper are as follows:
  • We propose a cross-chain reputation management system operating on a relay chain that manages entity scores and reputation weights automatically and appropriately. Furthermore, we discuss the effectiveness and weighting of indicators against specific malicious attacks on blockchains.
  • The integration of the PSO algorithm allows for on-the-fly adjustments and provides flexibility and quick response without extensive computational resources. By dynamically reweighting reputation weights using the low computational consumption of the PSO algorithm, the scheme can adapt to different attack frequencies in cross-chain or single-chain transactions.
  • The scheme’s process for judging honest nodes considers the transaction’s past reputation over a period of time. We integrate multiple weighting indicators, chosen based on recognized attack techniques that pose threats during or after transactions. Consequently, the scheme ensures a high degree of honesty among nodes in the cross-chain system by minimizing the presence of misbehaving nodes during transactions.
The rest of this paper is organized as follows: Related works in Section 2, proposed scheme in Section 3, experimental setting in Section 4, experimental results in Section 5, and conclusions in Section 6.

2. Related Work

In this section, surveys concerning PSO algorithm, blockchain reputation management system, and vulnerabilities of blockchain interoperation are presented.

2.1. Particle Swarm Optimization

Particle Swarm Optimization is a heuristic algorithm for solving the optimization problem which is based on the observations of biological social behavior. This algorithm was first proposed as an analogy to the flight patterns of migratory birds, and it was inspired by self-recognition and group behavior. The individuals in the algorithm are called particles and each particle is a solution agent. In PSO, each particle will have a certain velocity which will be dynamically modified according to its own or the swarm’s performance. In summary, particles will compute the best solution using Equations (1) and (2), which means updating velocity and particle vector, where, v i d represents the velocity of particle i in optimization problem with d dimension, x i d represents the position of particle i in optimization problem with d dimension, w is the inertia weight in optimization problem, C 1 and C 2 are acceleration constants used to refine the performance about PSO, P i d means the best fitness value of particle i , P g d means the best fitness value of global swarm, and r is random number between 0 and 1.
v i d n e w = w × v i d + C 1 × r × P i d x i d + C 2 × r × P g d x g d
x i d _ n e w = x i d + v i d _ n e w

2.2. Blockchain Reputation Management System

Many reputation management systems (RMS) have been proposed to reduce or prevent attacks in blockchain. For instance, ref. [18] proposed a blockchain signaling system (BloSS) based on a reputation scheme that uses a smart contract-enabled process to automate reputation management, and it can diminish malicious behavior. BloSS presents a relatively basic and easy-to-implement RMS that uses mutual evaluation of actions to determine the credit earned after a transaction is completed. The earned credit follows a node for its lifetime, enabling other nodes to decide whether to interact with it based on its reputation score. However, BloSS only provides protection against DDoS attack and may not be sufficient for real-world implementation. In another study [12], a novel blockchain framework for resource sharing and trust establishment in the Internet of Vehicles (IoV) using a proof-of-reputation (PoR) consensus mechanism was proposed to improve the capability of security in the IoV when sharing among vehicles. The objective of PoR is to minimize the computational power required and incentivize the vehicles involved in resource sharing. This paper demonstrates that the reputation management system can be implemented in real-life scenarios. However, there is a huge cost associated with designing a specific method for each scenario. Therefore, it is necessary to design a universally applicable RMS to protect multiple blockchains and defend against multiple attack techniques. Moreover, the use of RMS in cross-chain interoperability has received relatively few academic contributions.
On the other hand, Dennis et al. [19] proposed a reputation system based on previous interactions, while RBFT [20] uses an extra data structure to determine the reputation of nodes in the Byzantine fault tolerance (BFT) consensus process. BARS [21] utilizes blockchain technology and zero-knowledge proofs for anonymous reputation management, and has demonstrated improved accuracy and resilience against attacks compared to existing approaches. In [22], a reputation method was proposed for Internet of Vehicle (IoV) scene, where the reputation of road side units (RSUs) is evaluated based on data accuracy and stability of the connection during vehicle-to-vehicle data sharing process. In [23], a decentralized IoT public fog nodes reputation system based on Ethereum blockchain and smart contracts was proposed, which can manage reputation scores for a large number of IoT devices in a transparent and tamper-proof manner. These systems have shown promising results in various scenarios, and offer potential solutions for reputation management in decentralized and secure manner.

2.3. Blockchain Transaction Vulnerabilities

Several types of attacks/vulnerabilities are detailed as follows:
  • Stale and orphaned blocks: When two miners finish mining at the same time, two blocks are created simultaneously, causing a fork in the blockchain, and only one block will be selected to continue working with, and the other would be discarded, thus causing blockchain instability [24].
  • Selfish mining: As explained in [25], certain miners opt for this strategy to increase their rewards by keeping their block private, resulting in honest miners losing their rewards, which then results in consensus delays, blockchain forks, or double-spending attacks.
  • Block withholding attacks: Miners in a pool who find a block can keep the hash value and not broadcast it, causing a loss to the mining pool. It can be detected by the delay time of consensus process or transaction [26].
  • Consensus delay: A type of attack associated with the blockchain’s network architecture, in which an attacker sends false blocks to increase or prevent peers from reaching consensus. It can be detected by examining the result of the last transaction verification and the time spent on sending blocks [3].
  • Time-jacking attack: Imprecise timestamps within the blockchain can lead to a time-jacking attack in which an adversary continuously sends blocks with false timestamps, causing the target node to reject new blocks, leading to its removal from the blockchain network [27].
  • Double spending: The infinite replication of digital assets in the blockchain network can cause an asset to be spent repeatedly. Before a transaction confirms, it can be backtracked and revalidated or even replaced by another transaction due to temporary or malicious forks in the blockchain [28].
  • DDoS attack: Attackers send a large number of useless transactions to the blockchain, disrupting network resources and reducing the success rate of transactions [29].

3. Proposed Scheme

In this section, we introduce our proposed dynamic reputation management scheme which is extended from [23]. The relay chain is responsible for the agreement of transaction and the corresponding consensus which will be uploaded and accepted in the blockchain systems.
Basically, we have a major relay chain and two sub-chains in our system scenario. Each blockchain system and each node will have a specific reputation value as the degree of trust in the next interactions (and transactions). As the proposed system is used to prevent the misbehavior in heterogeneous blockchains, the analysis of the node and the chain’s past normal transaction records is adopted to detect potential misbehaviors. In addition, the proposed system allows to dynamically modify indicator weights by nodes in the relay chain according to the frequency of current misbehaviors.
Reputation indicators in Table 1 are adopted in the proposed method.
As a candidate for reputation evaluation, algorithm has been selected out, and for the next step we look for the indicators for evaluation. After surveying the attacks on transactions among a variety of blockchain platforms, we select the indicators presented in Table 1. The implementation of reputation indicators is essential for detection of various malicious behavior prevalent in the common blockchain attack method.
  • (Node-level indicator) Hardware utilization (GPU): Abrupt changes in a node’s GPU usage or hash power may indicate potential threats, such as selfish mining, block withholding, or majority attacks. We expect nodes within the system to maintain stable mining power to ensure smooth operation. As these threats often involve anomalous use of computational resources, it can compromise the network’s stability. Therefore, we monitor the average GPU computational power of nodes over a certain period and assign negative scores when drastic changes occur.
  • (Node-level indicator) Average spending time of transaction: Unstable average transaction times could provide attackers with opportunities to initiate double-spending attacks or make consensus delay. These attacks often involve multiple verifications and confirmations of a transaction, potentially leading to transaction uncertainty or blockchain security issues. Consequently, if the transaction completion time does not meet expectations, the system will assign negative scores to the nodes involved.
  • (Node-level indicator) Transaction consequence: Attacks, such as DDoS, double-spending, or time-jacking, can directly impact the transaction result. While not all transaction failures can be attributed to these attacks, in a stable cross-chain system, it is expected that nodes will complete transactions successfully after initiation. Therefore, the system will assign negative scores to nodes when transaction failures occur and positive scores when transactions are completed successfully.
  • (Chain-level indicator) Average network hash rate: Similar to the node’s GPU usage, drastic changes in the hash rate could indicate the likelihood of various threats, such as stale and orphan blocks, selfish mining, or majority attacks. These threats can significantly impact the cross-chain system’s overall performance and stability, resulting in a negative evaluation for the involved single blockchain network.
  • (Chain-level indicator) The delay time in block propagation: Delays in block propagation can affect the speed and security of consensus, providing opportunities for various potential attacks. Delays can reveal issues, such as consensus delays, selfish mining, block withholding, stale and orphan blocks, or time-jacking attacks. Thus, when a network experiences delays in block propagation, the single blockchain responsible for the delay is assigned a negative score.
  • (Chain-level indicator) Average spending time of each transaction: Similar to the average transaction time of nodes, the system also monitors this metric for each single blockchain in the system to anticipate potential uncertainties or security issues in the transactions. Consequently, if the transaction completion time deviates from expectations, the single blockchain is assigned a negative score.
The pre-defined weights for each indicator are determined based on the number of corresponding attacks and threats. Please note that these weights may vary in different scenarios. After our proposed indicator reweight method, each indicator will obtain a weight that is most suitable for the current cross-chain scenario.

3.1. Cross-Chain Interoperation Process

As shown in Figure 1, suppose that n o d e   B j in blockchain_B wants to deploy a smart contract to exchange information with n o d e   A i in blockchain_A.
The details of the phases are presented as follows.
Phase 1
Node B j starts a request R j to a bridge node R A i B j , which is responsible for transaction exchanging between nodes A i and B j , in the relay chain. The bridge node R A i B j will establish a secure channel to blockchain_B and launch a cross-chain interoperation.
Phase 2
Node R A i B j will judge the trustworthiness of blockchain_B in terms of the reputation value through the three chain-level indicators, i.e., average network hash rate, the delay time in block propagation and average spending time of each transaction, as shown in Table 1. Meanwhile, node R A i B j will evaluate if the reputation of node B j is satisfied through the four node-level indicators, i.e., node connect status, hardware usage, average spending time of transaction and transaction consequence, presented in Table 1. If one of these seven indicators does not pass a pre-defined threshold, node R A i B j will be judged as a potentially misbehaved node. The incoming request R j will be rejected and node R A i B j will send a message to node B j as a termination command. If all of these seven indicators are passed, it will proceed to Phase 3.
Phase 3
Node R A i B j then launches a request R j and sends R j to node A i . At the same time, the trustworthiness of node A i and blockchain_A will be evaluated through the same steps in Phase 2. That is, the seven indicators presented in Table 1 will be adopted to examine whether node A i and blockchain_A is classified as misbehaved one or not.
Phase 4
Similarly, based on the indicators, node A i then evaluates if the reputation of node R A i B j is satisfied after obtaining the request R j . If it is not satisfied, node A i will send a message to node R A i B j to cancel the current transaction. Otherwise, node A i will accept the request. Next, node A i will send a reply P i to node R A i B j .
Phase 5
Node R A i B j will then check whether node A i has successfully completed the request after receiving reply P i . In case of a normal transaction (which is successfully completed), the reputation of node A i will be adjusted and reply P i will be sent back to node B j through node R A i B j . Otherwise, the reputation of node A i will be adjusted and the transaction will be terminated.
Phase 6
Node B j confirms reply P i and the cross-chain transaction will be considered as a finished one. In case of a failed transaction, the reputation of node R A i B j will be adjusted by node B j . Afterwards, the information related to the failed transaction will be reported by node B j .

3.2. Indicator Reweight Process

Through the combination of PSO, the indicator weights in cross-chain system enable to cope with different frequency of misbehavior. We assume that a single node in the blockchain is a particle in the PSO algorithm. The new indicator weight is taken from the best solution of the single node or the global best solution of the blockchain. In other words, each node in node list will propose the best indicator weight they consider. As shown in Figure 2, the indicator reweight process occurs when relay chain considers that the frequency of misbehavior in cross-chain system has exceeded the default threshold.
At this point, the relay chain launches a cross-chain transaction for the purpose of re-weighting each indicator’s weight. The details of the phases are presented as follows:
Phase 1
Node R A i B j launch cross-chain re-weighting request T w to node A i in blockchain_A and node B j in blockchain_B with secure channel at the same time. Suppose node R A i B j is responsible for this re-weighting process, which also selects node A i and node B j based on the past reputation.
Phase 2
Node A i and node B j will determine and send a list of nodes to node R A i B j after relay chain receive the request T w , and then the assignment node R A i B j lead to this indicator reweight process.
Phase 3
N o d e   R A i B j receives the list of nodes, and the calculation of the new weight will be started. This weight is computed according to fitness function (3) and Equations (4) and (5) of the standard PSO algorithm. We believe that reputation management systems should be designed to maximize the benefits of the nodes in the system than the risks. Hence, computing node which participates in the indicator reweight process will compute the best solution by the fitness function as show in (3). M S represents the number of successful computing node transactions completed in the past. M F represents the number of failed transactions in the computing node’s blockchain due to misbehavior in the past. After that, computing node will find the next round j-th indicator weight in our indicator list using Equations (4) and (5). The process will continue until all indicators have been computed; w is the weight given to the degree of the previous modify, v w [ j ] represents the range of modify of the j-th indicator in the previous round, P i d [ j ] means the best weight computed from the computing node for the j-th indicator, x i d [ j ] means the past best weight computed from the computing node for the j-th indicator, P c h a i n [ j ] represents the new global best weight of the blockchain in which the computing node is located, and x c h a i n [ j ] means the past global best weight of j-th indicator from the blockchain in which the computing node is located.
F i t n e s s = F i t n e s s + M S M S + M F M F M S + M F
v w [ j ] = w × v w [ j ] + C 1 × r × P i d [ j ] x i d [ j ] + C 2 × r × P c h a i n [ j ] x c h a i n [ j ] .
x n e w _ w e i g h t [ j ] = x c h a i n [ j ] + v w [ j ] .
Phase 4
Node R A i B j will consider the outcome as a finished one and send the result to node A i and node B j on two sub-chains. Then, node A i , node B j and node R A i B j will broadcast the new indicator weight in which the blockchain is located. After that, the reputation of the nodes involved in this indicator reweight process will be increased.

4. Experimental Implementation

Table 2 presents the detailed implementation environment of our prototype cross-blockchain system, which comprises both hardware resources and software platforms. To program our smart contract, we employed Remix and Solidity. Upon compilation via Remix, we utilized Web3j CLI to convert the application binary interface (ABI) and source code (bytecode) files to Java code. In order to monitor the state of each blockchain, we developed a decentralized application (DAPP) in Java within the Eclipse 3.8 environment, which was then integrated into Web3j CLI. The DAPP monitor provides information on the reputation of chains, transaction nodes, and mining nodes, as well as relevant indicators for each transaction. Furthermore, the DAPP serves as a trigger for the indicator reweight process, alerting the relay chain of any misbehavior or failed transactions, thus enabling prompt indicator reweighting. Additionally, the DAPP offers a PSO API to relay nodes, enabling them to make calls and assist in metrics reweighting. All of the experiment setting and corresponding code can be found at [24].
The network structure of our scheme is depicted in Figure 3. To simulate cross-blockchain interoperation, we constructed three blockchains, with each blockchain consisting of three nodes. Internal consensus protocols were implemented for proof-of-work (PoW) in the sub-chains and proof-of-authority (PoA) in the relay chain. The prototype cross-blockchain system was realized using Geth and Puppeth. The hardware resources utilized in our implementation included AMD Ryzen 5 5600X CPU, 32 GB DDR4 RAM, and 1 TB SATA Hard Drive. The software platforms employed were Windows 10, Remix, Solidity, Web3j CLI, Eclipse 3.8, Geth, and Puppeth. In summary, our prototype cross-blockchain system was implemented on a robust hardware and software platform, with the use of widely adopted tools and technologies in the blockchain field, to enable a realistic simulation of cross-blockchain interoperation.
In our experimental simulation, we utilized the aforementioned setup, establishing blockchains with different consensus protocols using Geth, and constructing three to nine nodes within the cross-chain system, evenly distributed across the individual blockchain systems. The system was pre-defined to tolerate two instances of erroneous behavior, which were randomly selected from Table 1. We designed a simple smart contract for the transactions, using Solidity as the programming language. Upon compilation in Remix, we transformed the application binary interface (ABI) and source code (bytecode) files into Java code. This was then integrated with our decentralized application (DAPP), which was written in Java. With each transaction initiation, the bridge node utilizes the designed smart contract to initiate the transaction. The reputation scoring is assessed at each stage via the DAPP. Within the system, our intention is to assign every node with a default reputation score of more than 10, and we aspire for the nodes to maintain a reputation score of above 8; otherwise, they will lose the right to initiate transactions.

5. Result and Analysis

This section mainly tests the time costs about two cross-blockchain interoperations which contain indicator reweight process and cross-chain interoperation process. The results of a number of simulations performed to measure the proposed scheme. For each interoperation, we conduct the evaluation 10 times to determine the average time cost.

5.1. Cross-Chain Interoperation Process

The cross-chain interoperation process was conducted following the procedures outlined in Section 3.1. The time cost to successfully complete a transaction has been recorded for three, six, and nine node settings, and are shown in Figure 4, Figure 5 and Figure 6, respectively. The average times of the cross-chain interoperability process for different numbers of nodes were presented in Figure 7. The experimental results show that cross-chain interoperation process in our scheme requires 63.4484 s, on average of 10 times. In the process of cross-chain interoperation, transaction nodes make reputation evaluate whenever a transaction passes through themselves, and this reputation is based on the past transaction results and behaviors of nodes. Through phases 2 and 3, we found that when nodes assess each indicator reputation value of other nodes and chains, the average time consumed is much less than other phases. Notably, the evaluation is carried out only by the information receiving node towards the information transmitting node. Consequently, the quantity of nodes does not significantly affect the system, maintaining its efficiency irrespective of the node count.
We make cross-chain interoperation through DAPP and smart contracts, which required waiting for consensus within the blockchain at each stage before proceeding to the next stage. This approach is similar to most real-world blockchain systems, and it enables us to achieve our goal of developing a system that can be practically used in most scenarios. At the same time, we observed that most of the time costs occurred in deploying smart contracts and achieving consensus in the blockchain. As a result, we can prove that our reputation management system does not have a significant impact on the execution efficiency of cross-chain systems. The majority of time costs are determined by the original cross-chain system’s execution efficiency.

5.2. Indicator Reweight Process

Our indicator reweight process was executed as depicted in Figure 8, Figure 9 and Figure 10, each figure demonstrating variations in the number of nodes. We recorded the process of a malicious node, holding fifteen reputation points, performing three malicious acts, which triggered the indicator reweighting process, as well as the time required for the adoption of the new indicator weight. Once the indicator was reweighted, the DAPP would assist in the evaluation, considering past incidents of malicious behavior and the number of tolerated occurrences. If the malicious node was successfully isolated within the number of tolerable occurrences, the reweighted indicator would be adopted. From our experimental data, we observed that, on average, the indicator reweight process under our proposed scheme takes approximately 45.6352 s over a series of 10 trials. We found that the calculation of new indicator weights during the indicator reweigh process in phase 3 is much lower than the time cost on data transmission in the other phase. This can be attributed to the following reasons. Firstly, as our reputation management system is designed to be adaptable to the majority of cross-chain scenarios, we have reduced the number of iterations in the PSO calculation process to only 10. This reduction in iterations seeks a good answer rather than the best answer. However, despite this, the newly computed indicator weights during the experimentation phase can effectively eliminate malicious nodes within the system-set rounds. Secondly, we have adopted the PoW consensus mechanism as a simulation of a private chain within the cross-chain system. During the indicator reweight process, cross-chain information transmission is facilitated through smart contracts. As discussed in the cross-chain interaction process, executing smart contracts and achieving consensus in the blockchain incurs a significant time cost. Moreover, according to Figure 7, Figure 8, Figure 9 and Figure 10, an increase in the number of nodes subtly impacts the indicator reweight process. This is primarily because, during the third stage of the indicator reweight process, the relay bridge node must await the return of node lists from all nodes in the system before proceeding.

5.3. Security Analysis

In our system, we perfectly integrate various indicators, which can effectively detect misbehaviors and potential attacks on blockchain [2,12,18,19,20,21,22]. Moreover, the system performance is dynamically adjusted and better improved through the PSO algorithm with different scenarios. In the following, we explain why our system can resist against the corresponding seven misbehaviors (or potential attacks) as mentioned in Section 2.3.
First, the blockchain system may encounter chain-fork (and produce stale and orphaned blocks) due to a significant gap among computation ability of entities. In that case, the system will require more propagation time to reconstruct the chain and achieve the next correct consensus. Thus, it is obvious that the average network hash rate among nodes and the delay time in block propagation can be effectively used to detect the chain-fork scenario [18]. If it happens, the system (or even administrator) may adopt appropriate countermeasures to conquer this problem. Second, dishonest miners may temporarily increase the usage ratio of their GPU computation ability to gain mining priority. In particular, these miners may keep their blocks secretly and publish it anytime. This will increase the time delay of block propagation and consensus agreement among network nodes. This scenario is called selfish mining. Hence, we utilize the total hash rate of target blockchain network, the average network hash rate among nodes and the delay time in block propagation as the effective indicators against selfish mining [12]. These three indicators are useful against time delay of block propagation and consensus agreement among nodes. Third, the above selfish miner may launch another so-called block withholding attack in which miner may provide partial information about blocks to the mining pool instead of full information to gain more rewards. To prevent this scenario, we use the hardware utilization (GPU) of nodes to detect the misusage of GPU utilization at node level, and the delay time in block propagation to detect block withholding attack at network level, respectively [19].
Fourth, all of the above misbehaviors (and attacks) may result in consensus delay in which the block validation and consensus agreement may require more time than usual. This will make the system vulnerable during transactions. Therefore, we exploit three indicators, i.e., average spending time of transaction, the delay time in block propagation and average spending time of each transaction to detect the abnormal situation of consumed time of this mis-scenario [2]. Fifth, a time-jacking attack may be launched through a series of counterfeited blocks with fake timestamp to reject new valid blocks from being included within the blockchain system. Attackers may manipulate the timestamp to perform the above attack. Hence, we choose two indicators, i.e., transaction consequence and the delay time in block propagation, to effectively detect the valid process and transmission time. This can prevent the above attacks [20]. Sixth, malicious attackers may re-exploit the used transaction when chain-fork temporarily emerges or intentionally created. This is called double-spending attack. It is obvious that the three indicators, i.e., average spending time of transaction, transaction consequence and average spending time of each transaction, are effective to detect the unstable transaction time, mis-order transaction sequence and unstable spending time for transactions [21]. This makes our system secure against double-spending attack. Seventh, a general DDoS (distributed denial of service) attack may be performed to the target blockchain network to exhaust the resource and interrupt the availability. In a DDoS scenario, the transaction consequence will be extremely unstable and overwhelming transactions may appear. Thus, it is effective to detect the DDoS attack through the transaction consequence indicator [22].

6. Conclusions

In this paper, we proposed a dynamic reputation management scheme used in cross-blockchain. In our scheme, we summarized several attack techniques that occur during a blockchain transaction and consider the potential factors that cause them to occur as reputation indicators. After that, we also combine the Particle Swarm Optimization (PSO) algorithm to optimize the weight of reputation indicators to better fit the different scenarios that cross-blockchain system use.
To support our research, we implement prototype cross-blockchain system with Ethereum, and each private blockchain was set as three nodes. Our proposed scheme achieved a total cost of 63.4484 s in cross-chain interoperation with nine nodes for ten times average and total cost of 47.1619 s in indicator reweight process with nine nodes for ten times average. However, the experimental results clearly show that significant time costs are consumed in phase that deploy contract or implement consensus process. Conversely, reputation judgement and the execution of the Particle Swarm Optimization (PSO) algorithm to calculate new indicator weights do not demand an excess of resources. Furthermore, these processes are not substantially influenced by the number of nodes. An increase in the number of nodes only marginally affects the efficiency of information integration by the bridge node. Hence, we consider that the time cost of cross-chain interoperation process and indicator reweight process seems to be closely connected to the performance of the adopted blockchain. The simulated cross-chain system implements the proposed dynamic reputation management scheme, integrated within the cross-chain framework, to guard against the misbehaviors and attack methodologies presently appearing in the blockchain system. Therefore, the scoring indicator for nodes have become our primary reference for effectively countering these misbehaviors.
In summary, with the aid of this dynamic reputation management scheme, we demonstrate scalability and security during cross-chain interoperation. The cross-blockchain interoperation can resist different attack techniques and frequency during real-time interoperation with dynamic indicator weights, and it also is suitable for different scenarios that the cross-blockchain system uses.

Author Contributions

Conceptualization, L.-F.L. and K.-H.Y.; implementation and experiment L.-F.L.; formal analysis, K.-H.Y.; writing—original draft preparation, K.-H.Y. and L.-F.L.; writing—review and editing, K.C., W.C., K.-H.Y. and L.-F.L.; supervision, K.C., K.-H.Y. and H.-C.C.; project administration, K.C., K.-H.Y. and C.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Science and Technology Council, Taiwan, under Grants NSTC 111-2221-E-259-006-MY3 and NSTC 111-2926-I-259-501.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We thank the anonymous reviewers’ comments for making this manuscript better.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 20 June 2023).
  2. Sultan, K.; Ruhi, U.; Lakhani, R. Conceptualizing blockchains: Characteristics & applications. arXiv 2018, arXiv:1806.03693. [Google Scholar]
  3. Saad, M.; Spaulding, J.; Njilla, L.; Kamhoua, C.; Shetty, S.; Nyang, D.; Mohaisen, D. Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1997–2008. [Google Scholar] [CrossRef]
  4. Zamani, E.; He, Y.; Phillips, M. On the security risks of the blockchain. J. Comput. Inf. Syst. 2020, 60, 495–506. [Google Scholar] [CrossRef]
  5. Hasanova, H.; Baek, U.; Shin, M.; Cho, K.; Kim, M. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. Int. J. Netw. Manag. 2019, 29, e2060. [Google Scholar] [CrossRef]
  6. Shengling, W.; Chenyu, W.; Qin, H. Corking by forking: Vulnerability analysis of blockchain. In Proceedings of the IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 829–837. [Google Scholar]
  7. Jin, H.; Dai, X.; Xiao, J. Towards A Novel Architecture for Enabling Interoperability Amongst Multiple Blockchains. In Proceedings of the 38th IEEE Conference on Distributed Computing Systems, Vienna, Austria, 2–5 July 2018; pp. 1203–1211. [Google Scholar]
  8. Mirkin, M.; Ji, Y.; Pang, J.; Klages-Mundt, A.; Eyal, I.; Juels, A. BDoS: Blockchain denial-of-service. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual, 9–13 November 2020; pp. 601–619. [Google Scholar]
  9. Karame, G.O.; Androulaki, E.; Capkun, S. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 906–917. [Google Scholar]
  10. Sapirshtein, A.; Sompolinsky, Y.; ZohaR, A. Optimal selfish mining strategies in bitcoin. In Proceedings of the Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 22–26 February 2016; Springer: Berlin/Heidelberg, Germany; pp. 515–532. [Google Scholar]
  11. Rodrigues, B.; Bocek, T.; Stiller, B. Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). In Proceedings of the 42nd IEEE Conference on Local Computer Networks 2017 (LCN 2017), Singapore, 9–12 October 2017; pp. 1–3. [Google Scholar]
  12. Chai, H.; Leng, S.; Zhang, K.; Mao, S. Proof-of-Reputation Based-Consortium Blockchain for Trust Resource Sharing in Internet of Vehicles. IEEE Access 2019, 7, 175744–175757. [Google Scholar] [CrossRef]
  13. He, Y.; Zhang, C.; Wu, B.; Yang, Y.; Xiao, K.; Li, H. A crosschain trusted reputation scheme for a shared charging platform based on blockchain. IEEE Internet Things J. 2021, 9, 7989–8000. [Google Scholar] [CrossRef]
  14. Xiong, A.; Liu, G.; Zhu, Q.; Jing, A.; Loke, S.W. A notary groupbased cross-chain mechanism. Digit. Commun. Netw. 2022, 8, 1059–1067. [Google Scholar] [CrossRef]
  15. Lee, L.-F.; Yeh, K.-H. Towards a dynamic reputation management scheme for cross-chain transactions. In Proceedings of the Science of Cyber Security-SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, 10–12 August 2022; Springer: Berlin/Heidelberg, Germany, 2023; pp. 131–134. [Google Scholar]
  16. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95-International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995; IEEE: Piscataway, NJ, USA, 1995; Volume 4, pp. 1942–1948. [Google Scholar]
  17. Swagatam, D.; Nagaratnam, S. Differential Evolution: A Survey of the State-Of-The-Art. IEEE Trans. Evol. Comput. 2010, 15, 4–31. [Google Scholar]
  18. Gruhler, A.; Rodrigues, B.; Stiller, B. A Reputation Scheme for a Blockchain-based Network Cooperative Defense. In Proceedings of the 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Arlington, VA, USA, 8–12 April 2019; pp. 8–12. [Google Scholar]
  19. Richard, D.; Gareth, O. Rep on the block: A next generation reputation system based on the blockchain. In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 14–16 December 2015; pp. 131–138. [Google Scholar]
  20. Lei, K.; Zhang, Q.; Xu, L.; Qi, Z. Reputation-based byzantine fault-tolerance for consortium blockchain. In Proceedings of the 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, 11–13 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 604–611. [Google Scholar]
  21. Lu, Z.; Wang, Q.; Qu, G.; Liu, Z. BARS: A blockchain-based anonymous reputation system for trust management in VANETs. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 98–103. [Google Scholar]
  22. Kang, J.; Zehui, X.; Dusit, N.; Dongdong, Y.; In-Dong, K. Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory. IEEE Trans. Veh. Technol. 2019, 68, 2906–2920. [Google Scholar] [CrossRef] [Green Version]
  23. Debe, M.; Salah, K.; Rehman, M.H.U.; Svetinovic, D. IoT public fog nodes reputation system: A decentralized solution using Ethereum blockchain. IEEE Access 2019, 7, 178082–178093. [Google Scholar] [CrossRef]
  24. Bhargavi, J.; Baisakhi, D. The Study of the Issues Related to Orphan Blocks. In Proceedings of the International Conference on Computational Intelligence, Data Science and Cloud Computing: IEM-ICDC 2021, Kolkata, India, 18 October 2021; Springer Nature Singapore: Singapore, 2022; pp. 355–363. [Google Scholar]
  25. Saad, M.; Njilla, L.; Kamhoua, C.; Mohaisen, A. Countering selfish mining in blockchains. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 360–364. [Google Scholar]
  26. Samiran, B.; Sushmita, R.; Kouichi, S. Bitcoin block withholding attack: Analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 2016, 12, 1967–1978. [Google Scholar]
  27. Guangkai, M.; Chunpeng, G.; Lu, Z. Achieving reliable timestamp in the bitcoin platform. Peer-Peer Netw. Appl. 2020, 13, 2251–2259. [Google Scholar]
  28. Jehyuk, J.; Heung-No, L. Profitable double-spending attacks. Appl. Sci. 2020, 10, 8477. [Google Scholar] [CrossRef]
  29. Saad, M.; Thai, M.; Mohaisen, D. POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, 4–8 June 2018; pp. 809–811. [Google Scholar]
Figure 1. The cross-chain interoperation process.
Figure 1. The cross-chain interoperation process.
Sensors 23 06033 g001
Figure 2. The example of cross-chain indicator reweight process.
Figure 2. The example of cross-chain indicator reweight process.
Sensors 23 06033 g002
Figure 3. The network structure of the implementation of prototype cross-blockchain.
Figure 3. The network structure of the implementation of prototype cross-blockchain.
Sensors 23 06033 g003
Figure 4. Time cost of cross-blockchain interoperation process with 3 nodes system.
Figure 4. Time cost of cross-blockchain interoperation process with 3 nodes system.
Sensors 23 06033 g004
Figure 5. Time cost of cross-blockchain interoperation process with 6 nodes system.
Figure 5. Time cost of cross-blockchain interoperation process with 6 nodes system.
Sensors 23 06033 g005
Figure 6. Time cost of cross-blockchain interoperation process with 9 nodes system.
Figure 6. Time cost of cross-blockchain interoperation process with 9 nodes system.
Sensors 23 06033 g006
Figure 7. Time cost of cross-blockchain interoperation process and indicator reweight process with 3 to 9 nodes system.
Figure 7. Time cost of cross-blockchain interoperation process and indicator reweight process with 3 to 9 nodes system.
Sensors 23 06033 g007
Figure 8. Time cost of indicator reweight process with 3 nodes system.
Figure 8. Time cost of indicator reweight process with 3 nodes system.
Sensors 23 06033 g008
Figure 9. Time cost of indicator reweight process with 6 nodes system.
Figure 9. Time cost of indicator reweight process with 6 nodes system.
Sensors 23 06033 g009
Figure 10. Time cost of indicator reweight process with 9 nodes system.
Figure 10. Time cost of indicator reweight process with 9 nodes system.
Sensors 23 06033 g010
Table 1. Reputation indicators and corresponding threats with condition judgement used.
Table 1. Reputation indicators and corresponding threats with condition judgement used.
Reputation IndicatorInitial ValueCondition JudgementPre-Define WeightCorresponding Attack and Threat
(Node) Node connect statusNone i f   A s y n c ,   1 i f   s y n c ,   0
1
None
(Node) Hardware usage (GPU)Average GPU computing power of a period of time. I n c r e a s e   o r   D e c r e a s e   r a p i d l y ,   1 S l o w   o r   C o n s t a n t ,   0
0.6
Selfish mining, Block withholding, Majority attack
(Node) Average spending time of transactionExpect time
E T = D i f f i c u l t y _ v a l u e H a s h _ r a t e
O v e r t i m e ,   1 O n t i m e ,   0 L e s s   t i m e   c o n s u m p t i o n ,   1
0.4
Double-spending, Consensus delay
(Node) Transaction consequenceNone S u c c e s s ,   1 F a i l u r e ,   1
1
DDoS, Double-spending, Time-jacking attack
(Chain) Average network hash rateAverage network hashing power of a period time I n c r e a s e   o r   D e c r e a s e   r a p i d l y , 1 S l o w   o r   C o n s t a n t ,   0
0.4
Stale and orphaned blocks, Selfish mining, Majority attack
(Chain) The delay time in block propagationNone D e l a y   E T 2   t i m e ,   1 O n   t i m e ,   0
1
Consensus delay, Selfish mining, Block withholding, Stale and orphaned blocks, Time-jacking attacks
(Chain) Average spending time of each transactionExpect time
E T = D i f f i c u l t y _ v a l u e H a s h _ r a t e
O v e r t i m e ,   1 O n   t i m e ,   0 L e s s   t i m e   c o n s u m p t i o n ,   1
0.4
Double-spending, Consensus delay
Table 2. Implement environment.
Table 2. Implement environment.
ItemDescription
Hardware ResourcesAMD Ryzen 5 5600X 6-Core Processor 3.70 GHz
ASUS DUAL-RTX3060TI-O8G-V2
Crucial Ballistix 32 GB 3200 MHz DDR4 RAM
WD2003FZEX-00SRLA0 1 TB SSD
Software PlatformWindows 10 64 Bit
Ethereum
GO 1.16.3
Solidity 0.4.21
Remix IDE
Web3.js
Oracle Java 17
Eclipse 3.8 with Open JDK
Geth 1.9.25 with Puppeth
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, K.; Lee, L.-F.; Chiu, W.; Su, C.; Yeh, K.-H.; Chao, H.-C. A Trusted Reputation Management Scheme for Cross-Chain Transactions. Sensors 2023, 23, 6033. https://doi.org/10.3390/s23136033

AMA Style

Chen K, Lee L-F, Chiu W, Su C, Yeh K-H, Chao H-C. A Trusted Reputation Management Scheme for Cross-Chain Transactions. Sensors. 2023; 23(13):6033. https://doi.org/10.3390/s23136033

Chicago/Turabian Style

Chen, Kuongho, Lin-Fa Lee, Wayne Chiu, Chunhua Su, Kuo-Hui Yeh, and Han-Chieh Chao. 2023. "A Trusted Reputation Management Scheme for Cross-Chain Transactions" Sensors 23, no. 13: 6033. https://doi.org/10.3390/s23136033

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop