Abstract
The limited size of a block in the Bitcoin blockchain produces a scaling bottleneck. The transaction scalability problem can be addressed by performing smaller transactions off-chain and periodically reporting the results to the Bitcoin blockchain. One such solution is the Lightning Network.
Bitcoin is employed by lawful users and criminals. This requires crimes against lawful users as well as the use of Bitcoin for nefarious purposes to be investigated. However, unlike Bitcoin, the Lightning Network enables collusion attacks involving intermediate nodes and recipients. In such an attack, regardless of a sender’s actions, money is received by an intermediate node that colludes with a dishonest recipient. Since the dishonest recipient does not “actually” receive the money, it does not provide the goods/service to the sender. Thus, the sender pays for the unprovided goods/service, but the recipient can prove that the payment was not received.
This chapter discusses the forensic implications of collusion attacks with regard to lawful users because no discernible traces of attacks remain, as well as for law enforcement, where the attacks can target parties as a form of forfeiture, analogous to law enforcement “sting” operations. This chapter also discusses the potential of the Lightning Network to be used for money laundering activities.
Chapter PDF
Similar content being viewed by others
References
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44(5), 1897–1905 (1998)
Bugiel, S., Davi, L., Dmitrienko, R., Fischer, T., Sadeghi, A., Shastry, B.: Towards taming privilege-escalation attacks on Android. In: Proceedings of the Nineteenth Annual Network and Distributed System Security Symposium (2012)
Gerhardt, I., Hanke, T.: Homomorphic Payment Addresses and the Pay-to-Contract Protocol, [cs.CR], Cornell University Library, Cornell University, Ithaca, New York (2012). arxiv:1212.3257v1, arxiv.org/pdf/1212.3257v1.pdf
Hay, B.: Sting operations, undercover agents and entrapment. Missouri Law Review 70(2), 387–432 (2005)
Moharrum, M., Eltoweissy, M., Mukkamala, R.: Dynamic combinatorial key management scheme for sensor networks. Wireless Communications and Mobile Computing 6(7), 1017–1035 (2006)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). bitcoin.org/bitcoin.pdf
Nowostawski, M., Frantz, C.: Blockchain: the emergence of distributed autonomous institutions. In: Proceedings of the Sixth International Conference on Social Media Technologies, Communication and Informatics, pp. 29–35 (2016)
Pacia, C.: Lightning Network skepticism, December 23, 2015. chrispacia.wordpress.com/2015/12/23/lightning-network-skepticism
Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments, Draft Version 0.5.9.2 (2016). lightning.network/lightning-network-paper.pdf
Prihodko, P., Zhigulin, S., Sahno, M., Ostrovskiy, A., Osuntokun, O.: Flare: An Approach to Routing in the Lightning Network, White Paper (2016). bitfury.com/content/5-white-papers-research/whitepaper_flare_an_approach_to_routing_in_lightning_network_7_7_2016.pdf
Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust/Social Computing/Workshop on Security and Privacy in Social Networks, pp. 1318–1326 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 IFIP International Federation for Information Processing
About this paper
Cite this paper
Piatkivskyi, D., Axelsson, S., Nowostawski, M. (2017). Digital Forensic Implications of Collusion Attacks on the Lightning Network. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XIII. DigitalForensics 2017. IFIP Advances in Information and Communication Technology, vol 511. Springer, Cham. https://doi.org/10.1007/978-3-319-67208-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-67208-3_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67207-6
Online ISBN: 978-3-319-67208-3
eBook Packages: Computer ScienceComputer Science (R0)