How to break IOTA heart by replaying?

Gerard de Roode, Ikram Ullah, Paul J.M. Havinga

Research output: Contribution to conferencePaperAcademicpeer-review

143 Downloads (Pure)

Abstract

IOTA is a novel cryptocurrency that uses distributed ledger technology based on directed acyclic graph data structure. Security of cryptocurrencies ought to be scrutinized in order to acquire esteemed security, attain trust, and accomplish indelible adoption. Although IOTA proffer resilient security controls, IOTA security is not yet well explored. Among all the propounded IOTA vulnerabilities that have been identified, we pragmatically exploit replay attack against IOTA. We further analyze the attack to perceive its impact. Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses. Distrust, and privation of balance can be some of the severe impacts of this vulnerability.
Original languageEnglish
Number of pages7
Publication statusPublished - Dec 2018
Event2018 IEEE global Communications conference, GLOBECOM 2018: Gateway to a Connected World - Abu Dhabi National Exhibition Centre (ADNEC), Abu Dhabi, United Arab Emirates
Duration: 9 Dec 201813 Dec 2018

Conference

Conference2018 IEEE global Communications conference, GLOBECOM 2018
CountryUnited Arab Emirates
CityAbu Dhabi
Period9/12/1813/12/18

Fingerprint

Data structures
Electronic money

Keywords

  • IOTA
  • Blockchain
  • cryptocurrency
  • security exploitation
  • replay attack

Cite this

de Roode, G., Ullah, I., & Havinga, P. J. M. (2018). How to break IOTA heart by replaying?. Paper presented at 2018 IEEE global Communications conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates.
de Roode, Gerard ; Ullah, Ikram ; Havinga, Paul J.M. / How to break IOTA heart by replaying?. Paper presented at 2018 IEEE global Communications conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates.7 p.
@conference{58084558cd5b4dd9a1be6ae599a9e315,
title = "How to break IOTA heart by replaying?",
abstract = "IOTA is a novel cryptocurrency that uses distributed ledger technology based on directed acyclic graph data structure. Security of cryptocurrencies ought to be scrutinized in order to acquire esteemed security, attain trust, and accomplish indelible adoption. Although IOTA proffer resilient security controls, IOTA security is not yet well explored. Among all the propounded IOTA vulnerabilities that have been identified, we pragmatically exploit replay attack against IOTA. We further analyze the attack to perceive its impact. Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses. Distrust, and privation of balance can be some of the severe impacts of this vulnerability.",
keywords = "IOTA, Blockchain, cryptocurrency, security exploitation, replay attack",
author = "{de Roode}, Gerard and Ikram Ullah and Havinga, {Paul J.M.}",
year = "2018",
month = "12",
language = "English",
note = "2018 IEEE global Communications conference, GLOBECOM 2018 : Gateway to a Connected World ; Conference date: 09-12-2018 Through 13-12-2018",

}

de Roode, G, Ullah, I & Havinga, PJM 2018, 'How to break IOTA heart by replaying?' Paper presented at 2018 IEEE global Communications conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates, 9/12/18 - 13/12/18, .

How to break IOTA heart by replaying? / de Roode, Gerard; Ullah, Ikram ; Havinga, Paul J.M.

2018. Paper presented at 2018 IEEE global Communications conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates.

Research output: Contribution to conferencePaperAcademicpeer-review

TY - CONF

T1 - How to break IOTA heart by replaying?

AU - de Roode, Gerard

AU - Ullah, Ikram

AU - Havinga, Paul J.M.

PY - 2018/12

Y1 - 2018/12

N2 - IOTA is a novel cryptocurrency that uses distributed ledger technology based on directed acyclic graph data structure. Security of cryptocurrencies ought to be scrutinized in order to acquire esteemed security, attain trust, and accomplish indelible adoption. Although IOTA proffer resilient security controls, IOTA security is not yet well explored. Among all the propounded IOTA vulnerabilities that have been identified, we pragmatically exploit replay attack against IOTA. We further analyze the attack to perceive its impact. Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses. Distrust, and privation of balance can be some of the severe impacts of this vulnerability.

AB - IOTA is a novel cryptocurrency that uses distributed ledger technology based on directed acyclic graph data structure. Security of cryptocurrencies ought to be scrutinized in order to acquire esteemed security, attain trust, and accomplish indelible adoption. Although IOTA proffer resilient security controls, IOTA security is not yet well explored. Among all the propounded IOTA vulnerabilities that have been identified, we pragmatically exploit replay attack against IOTA. We further analyze the attack to perceive its impact. Attack methodology and proof of concept for the replay attack is presented. Our proposed exploitation methodology is based upon address reuse, while IOTA in default mode does not reuse addresses. Distrust, and privation of balance can be some of the severe impacts of this vulnerability.

KW - IOTA

KW - Blockchain

KW - cryptocurrency

KW - security exploitation

KW - replay attack

M3 - Paper

ER -

de Roode G, Ullah I, Havinga PJM. How to break IOTA heart by replaying?. 2018. Paper presented at 2018 IEEE global Communications conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates.