Close Menu
Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Subscribe
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Home»Tech»How secure is the Lightning Network?
    Tech

    How secure is the Lightning Network?

    Theodore MeeksBy Theodore MeeksAugust 13, 2022No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email
    How secure is the Lightning Network?
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Researchers Cosimo Sguanci and Anastasios Sidiropoulos have published their investigations into the potential attack vectors of the Bitcoin Lightning Network.

    The paper takes a closer look at how malicious actors might be able to exploit network vulnerabilities to work around them or even tamper with them.

    The two attacks are the so-called “zombie attack” and the “mass double spending attack”.

    The Lightning Network allows the relatively slow Bitcoin blockchain to process payments quickly and keep them secure. It achieves higher transaction speeds by connecting users directly on the network through payment channels.

    The first and last transaction is sent to the Bitcoin blockchain. All other transactions between them are processed by the Lightning Network outside the Bitcoin blockchain. The number of nodes is critical to the health of the Lightning Network.

    How do attacks work?

    In “Zombie Attack” some nodes are closed, making the coins currently in the payment channel inaccessible. The researchers’ paper talks about a form of sabotage.

    The damage that can result from this is limited. For users sending legitimate payments, such an attack would only be frustrating due to the increase in transaction fees, but not fatal.

    The “mass double spending attack” may be familiar to some readers. For example, if a malicious actor is able to control 51 percent of computing power on the Proof of Work blockchain, they can process transactions and send (spend) money multiple times.

    However, what would be very expensive on the Bitcoin blockchain may be easier on the Lightning Network, according to the research. In principle, it is possible to bombard the Bitcoin blockchain with fraudulent transactions.

    Remember: only the first and last transaction is sent on the Lightning Network. Pooling master nodes can send an unlimited flood of fraudulent transactions onto the blockchain.

    If these nodes pay more validation fees than legitimate transactions, they will be able to skip the queue and send fake transactions. The consequences will be fatal.

    double spending problem

    When asked, Bitcoin Lightning developer Rene Pickhardt explained that he had already dealt with this type of double-spending attack a few years ago. Draw attention to this in an email to other developers.

    Such an attack could be more serious on the Lightning Network than on the main chain. With the latter, it is actually possible to use your money only twice. However, on the Lightning Network, as long as the payment channels are sufficient, attackers can steal a seemingly random amount of money, Beckhardt said.

    Can attacks be defended?

    Of course, the Lightning Network is not equipped without security mechanisms. This protection is provided by the so-called watchtowers, which record the state of the network and, with the support of honest nodes, are able to identify dishonest transactions. These watchtowers must sometimes fail for such a massive double-spending attack to succeed.

    Researchers at the University of Illinois were able to engineer such an attack using past congestion data on the Bitcoin blockchain. They concluded that such an attack during the backlog of transactions would have had devastating results.

    In his original assessment, Beckhardt stated that he saw no way to prevent such an attack. The researchers also summarized in their work that the vulnerabilities remain unresolved to this day. They recommend improving existing security structures and strict protection against congestion on the main chain.

    Another paper looking at more accurate modeling of attacks, taking into account transaction fees, is planned.

    Do you want to buy cryptocurrency?

    eToro offers investors, from novices to experts, a comprehensive crypto trading experience on a powerful and easy-to-use platform. We took a closer look at eToro.

    To review the eToro

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Theodore Meeks

    Lifelong foodaholic. Professional twitter expert. Organizer. Award-winning internet geek. Coffee advocate.

    Related Posts

    Neodymium Magnet Uses and Safety Tips for 2025

    October 4, 2025

    Halifax Stanfield Airport Pilots Passenger Service Robots in Bid to Boost Traveler Experience

    August 25, 2025

    Battery miracle in test – HP Omnibook X AI: If it takes longer again

    August 29, 2024
    Navigate
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Pages
    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    STAY UPTODATE

    Get the Latest News With Aviationanalysis.net

    OFFICE

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    QUERIES?

    Do you have any queries? Feel free to contact us via ourĀ Contact Form

    Visit Our Office

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.