Community Perspectives | Reflections on the MOV patrol officer system

In the 01 session of the ChainNode White Paper Declassified Reading Club, Liu Qiushan, a senior researcher at the original chain, led a white paper on "MOV: The Next Generation Decentralized Cross-Chain Layer 2 Value Exchange Agreement", which attracted the attention of many fans, including the reading of gentledog. "Thoughts on the MOV patrol officer system" won the first place in reading activities.

The text is as follows:

According to the white paper, there is a patrol officer in the MOV to prevent the Bytom side chain from doing evil. I was wondering if there is a loophole in this system? After some thinking, it seems that there are several ways to attack:

Copy transaction attack

The inspector found the problem and initiated a transaction on the main chain. After someone obtained the transaction, he increased the handling fee or concealed the transaction directly from the network, and then initiated a transaction of the same content, thereby stealing the labor of the inspector. Results. In this case, the benefits that the inspector can obtain are almost zero or even negative, so there is no incentive to patrol.

This kind of attack has countermeasures. There is one thing that the perpetrator can't copy: the wallet address! The model of the proposal (commitment) + evidence can be adopted, and the inspector can submit the promise (the hash value of the data + wallet address) first, and then publish the data after the block is confirmed (the wallet address can be published). This will solve this problem perfectly.

Pretending to be a bad attack

This type of attack can be taken when the reward given by the gateway node is greater than the damage suffered by the side chain stalker. The side chain sinister can pretend to be evil, and then collude with the inspector to pre-empt the evidence of evil, and defraud the reward from the gateway node. When the reward is greater than the punishment of the perpetrator, the perpetrator will profit. This kind of attack shows that the reward given by the gateway node is capped, it can't be greater than the punishment of the perpetrator, and it is not necessarily equal to the degree of evil.

DOS attack

When the side chain is evil and involves a large amount, the garbage transaction is initiated on the network, temporarily blocking the network, so that the inspection cost of the patrol officer is much greater than the reward he can obtain (due to pretending to be a bad attack, the reward is limited, it is not evil. Degree of equality), once the dispute period has passed, the perpetrator will have to smash. DOS attacks are not impossible (see etheric cats and EIDOS airdrops), and the perpetrators can choose to launch attacks to reduce costs when the network is congested.

Let's start with the DOS attack. Let's try to analyze the patrol officer system from an economic perspective. First take an observation period, which is set in this observation period. The inspection cost of the inspector is U, the reward of the gateway node is V, the loss suffered by the perpetrator is R, and the gain obtained when the evil is successful is S. The probability of doing evil is p, the average number of inspectors is q, and the probability of a single inspector is t. It is assumed here that the chances of the inspector are equal, that is, when the number of inspectors of the inspector is q, the probability of successful proof is 1/q. The game between a single inspector and the perpetrator is as follows:

The expected payment of a single patrol officer is .

Under perfect competition, the expected payment of a single inspector should be close to zero. This can be inferred .

This shows that when When q=0. Further, we can calculate the best probability of doing evil for the perpetrator. Here you may wish to set And ,then , .

The expected return of the perpetrator is

In the interval On the top, the formula is monotonically decreasing. So, at Get the maximum value. Therefore, the best chance of doing evil is At this time, no one is inspecting! The above "observation period" refers to a sufficiently small, inseparable period of time. If it is a long time period T, how to calculate the probability of doing evil? Here, the patrol officer's inspection cost per unit time is u. The time period T is equally divided into n (sufficiently large) hours. Then the probability of doing evil in each small time period is about . Then the probability of evil occurring in n time periods is about .

Therefore, in the longer time period T, the probability of evil occurring is .

in conclusion

We can draw the following conclusions:

1. The patrol officer system can reduce the probability of side chains doing evil;

2. The probability of the side chain doing evil is related to the inspection cost U of the inspector and the reward V of the gateway node. Decreasing U or increasing V can reduce the probability of doing evil;

3. The probability that the side chain will be evil is not related to the income S obtained when the evil is successful, that is to say, reducing the assets managed on the side chain does not help to reduce the probability of doing evil;

4. The probability of side chain doing evil is irrelevant to the loss R suffered by the perpetrator when it is proved (if V ≤ R is ignored), that is, only the margin of the side chain operator is increased without increasing the reward of the gateway node. Does not help to reduce the probability of doing evil;

5. Due to pretending to be a bad attack, the reward V of the gateway node cannot be increased indefinitely. The patrol officer's inspection cost U cannot be reduced indefinitely. The patrol officer system cannot prevent the occurrence of evil.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Dividends or repurchases: conspiracy and conspiracy of the exchanges

Today, there is a gap between the major exchanges such as the fire currency, the currency security, and the OK. The r...

Opinion

What happened during the first week of the SBF case in a comprehensive article?

In the first week of the trial, SBF found itself in a difficult situation with almost all the testimonies and public ...

Blockchain

IEO re-burns the ring of rich dreams, how long can the dozens of income myths go?

There is no doubt that IEO is the hottest word in the currency. Since January 3 this year, the company announced the ...

Blockchain

After FCoin's "incident", key figures from the team responded!

On the evening of February 12, an announcement on the FCoin Exchange regarding "the latest progress of system ma...

Blockchain

Data decreased slightly, rumors triggered a single-day net outflow of Binance

From the data of the past week (02.17-02.23), compared with the previous week (02.10-02.16), all the data have slight...

Blockchain

Can the combination of decentralized derivative exchanges and account abstraction open up the next incremental entry point?

How much will the target audience expand if decentralized contract exchanges can be logged in using Google accounts?