Abstract
Ethereum 2.0 (ETH2) marks a pivotal shift in blockchain technology, transitioning from a Proof-of-Work (PoW) to a Proof-of-Stake (PoS) consensus mechanism, with Gasper at its core. While this evolution promises enhanced scalability and energy efficiency, the performance of its block proposal stage is highly sensitive to network latency and system parameters, such as slot length. This sensitivity introduces a critical trade-off between throughput and security, measured by the probability of blockchain forking. This paper reveals that network latency is not just a passive risk but an exploitable attack surface. We introduce the “adaptive latency-driven equivocation attack”, a novel adversarial strategy where an attacker deliberately creates forks while mimicking the behavior of a high-latency node, thus achieving plausible deniability. To formally analyze and quantify the impact of this threat, we develop a comprehensive theoretical model by using Markov chains to analyze the fork probability and throughput of the Gasper’s block proposal mechanism under both honest and adversarial conditions. Through extensive simulations, we validate the accuracy of our model in both normal and bursty traffic conditions. Our findings provide a systematic methodology for optimizing system parameters to achieve a robust balance between performance and security, offering a foundational guide for configuring ETH2 networks against sophisticated, latency-based threats.
| Original language | English (US) |
|---|---|
| Pages (from-to) | 1213-1227 |
| Number of pages | 15 |
| Journal | IEEE Transactions on Information Forensics and Security |
| Volume | 21 |
| DOIs | |
| State | Published - 2026 |
| Externally published | Yes |
All Science Journal Classification (ASJC) codes
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications
Keywords
- Block proposing mechanism
- ETH2
- Web3
- gasper
Fingerprint
Dive into the research topics of 'Modeling the Performance-Security Trade-Off of Gasper’s Block Proposal Mechanism Under Latency-Driven Attacks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver