2020
DOI: 10.1007/978-3-030-51280-4_14
|View full text |Cite
|
Sign up to set email alerts
|

LockDown: Balance Availability Attack Against Lightning Network Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
29
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(31 citation statements)
references
References 9 publications
2
29
0
Order By: Relevance
“…Among other findings, they show that the ten most central nodes can disrupt roughly 80% of all paths using their attack. Pérez-Solà et al [32] present an attack that diminishes the capacity of a node's channels, preventing it from participating in the network. Tikhomirov et al [42] show how a wormhole attack prevents honest intermediaries from participating in routing payments.…”
Section: Related Workmentioning
confidence: 99%
“…Among other findings, they show that the ten most central nodes can disrupt roughly 80% of all paths using their attack. Pérez-Solà et al [32] present an attack that diminishes the capacity of a node's channels, preventing it from participating in the network. Tikhomirov et al [42] show how a wormhole attack prevents honest intermediaries from participating in routing payments.…”
Section: Related Workmentioning
confidence: 99%
“…Tochner et al [60] analyze a DoS attack vector based on route hijacking. Pérez-Solà et al [52] introduce the LockDown attack where the adversary prevents an LN node from transacting by depleting the capacity in all its channels. In comparison, our HTLC depletion attack achieves the same result (a victim node can not forward payments), but exploits the HTLC limit at each channel rather than its capacity.…”
Section: Related Workmentioning
confidence: 99%
“…Among the 3 major implementations, LND uses the highest value of 10 blocks. Since a significant majority of nodes on the network run LND, as suggested in [20,21], most victims will publish their commitments at the same time (height). Along with the commitments, each victim will also publish many HTLC-success (local) transactions to claim the HTLC outputs from his commitment, leading to a high volume of transactions trying to enter the blockchain all at once.…”
Section: The Flood and Loot Attackmentioning
confidence: 99%
“…It describes a way to disrupt the normal operation of a channel as a bi-directional route, by pushing its entire balance to one side, making it impossible to route payments in one direction. A detailed channel exhaustion attack is described in [21].…”
Section: Related Workmentioning
confidence: 99%