Modeling the Performance-Security Trade-off of Gasper’s Block Proposal Mechanism Under Latency-Driven Attacks

  • Shuhan Qi
  • , Qinglin Zhao*
  • , Zijie Liu
  • , Meng Chu Zhou*
  • , Meng Shen
  • , Peiyun Zhang
  • , Yi Sun
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Ethereum 2.0 (ETH2) marks a pivotal shift in blockchain technology, transitioning from a Proof-of-Work (PoW) to a Proof-of-Stake (PoS) consensus mechanism, with Gasper at its core. While this evolution promises enhanced scalability and energy efficiency, the performance of its block proposal stage is highly sensitive to network latency and system parameters, such as slot length. This sensitivity introduces a critical trade-off between throughput and security, measured by the probability of blockchain forking. This paper reveals that network latency is not just a passive risk but an exploitable attack surface. We introduce the "adaptive latency-driven equivocation attack", a novel adversarial strategy where an attacker deliberately creates forks while mimicking the behavior of a high-latency node, thus achieving plausible deniability. To formally analyze and quantify the impact of this threat, we develop a comprehensive theoretical model by using Markov chains to analyze the fork probability and throughput of the Gasper's block proposal mechanism under both honest and adversarial conditions. Through extensive simulations, we validate the accuracy of our model in both normal and bursty traffic conditions. Our findings provide a systematic methodology for optimizing system parameters to achieve a robust balance between performance and security, offering a foundational guide for configuring ETH2 networks against sophisticated, latency-based threats.

Original languageEnglish
JournalIEEE Transactions on Information Forensics and Security
DOIs
Publication statusAccepted/In press - 2026
Externally publishedYes

Keywords

  • Block proposing mechanism
  • ETH2
  • Gasper
  • Web3

Fingerprint

Dive into the research topics of 'Modeling the Performance-Security Trade-off of Gasper’s Block Proposal Mechanism Under Latency-Driven Attacks'. Together they form a unique fingerprint.

Cite this