Sybil Resistance

In the distributed Arcium Network, maintaining integrity and security requires robust mechanisms to mitigate potential Sybil attack vectors. Sybil attacks occur when a single entity creates multiple false identities to gain a disproportionate influence over a network. Resistance to this is primarily achieved through standard Proof of Stake in requiring each node to stake a certain amount in order to operate, but the Arcium Network also employs a few other strategies outlined in this section.

Intra-Cluster Sybil Resistance

Intra-Cluster Sybil resistance focuses on mitigating the risks of collusion among Nodes within the same Cluster, resulting in secrets being revealed. This is particularly important since, even if the broader network has a highly diverse Node-set, if any individual public Clusters suffer from small centralized Node-sets, they may pose intra-cluster Sybil attack risk. The integrity of an Arcium Cluster is maintained, as long as at least one honest Node exists within the Cluster. Thus, the Arcium Network addresses intra-Cluster sybil risks by requiring the inclusion of at least one randomly selected Node in all non-permissioned Clusters. This random Node, chosen from the broader network, acts as an independent counterbalance, significantly reducing the likelihood of intra-Cluster Sybil attacks. These measures collectively ensure that Clusters remain secure and secrets confidential, maintaining the integrity and trustworthiness of the Network.

Network-Wide Sybil Resistance

Network-wide Sybil attacks pose the risk of comprimising all protocol-wide concensus mechanisms, including Base Price Voting and the Non-Participation Detection mechanism. Network-wide Sybil resistance in the Arcium Network is achieved by increasing Cluster Node-set sizes, the inclusion of a random Node in each non-permissioned Cluster (see above), and using Clusters containing Nodes that optionally offer the use of TEEs. Furthermore, Network-wide Sybil resistance is improved through a combination of Node operator reputation systems, community engagement, and strategic punishments. Off-chain reputation systems enhance security by allowing Node operators to build trust based on their past performance, community interactions, and existing reputation from providing network validation services on other networks. Active community engagement plays a crucial role, as participants are encouraged to monitor and report suspicious activities, creating a social layer of defence. Additionally, to discourage the setup of multiple Nodes with similar configurations or in close proximity, the Network imposes heavier slashing punishments for concurrent Node downtimes. This incentivizes operators to diversify their setups across different jurisdictions, data centers, operating systems, and security practices, thereby increasing the Network's resilience and reducing the risk of coordinated attacks.

Last updated