{"id":"https://openalex.org/W7124143336","doi":"https://doi.org/10.1109/tifs.2026.3651978","title":"Modeling the Performance-Security Trade-Off of Gasper\u2019s Block Proposal Mechanism Under Latency-Driven Attacks","display_name":"Modeling the Performance-Security Trade-Off of Gasper\u2019s Block Proposal Mechanism Under Latency-Driven Attacks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124143336","doi":"https://doi.org/10.1109/tifs.2026.3651978"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3651978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3651978","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113971240","display_name":"Shuhan Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":true,"raw_author_name":"Shuhan Qi","raw_affiliation_strings":["School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Taipa, Macau, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Taipa, Macau, China","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123049334","display_name":"Qinglin Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Qinglin Zhao","raw_affiliation_strings":["School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Taipa, Macau, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Taipa, Macau, China","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101923342","display_name":"Zijie Liu","orcid":"https://orcid.org/0000-0001-6349-0463"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Zijie Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Taipa, Macau, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Taipa, Macau, China","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123001428","display_name":"Mengchu Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"MengChu Zhou","raw_affiliation_strings":["School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Shen","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058237674","display_name":"Peiyun Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiyun Zhang","raw_affiliation_strings":["Engineering Research Center of Digital Forensics of Ministry of Education and the School of Computer Science, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics of Ministry of Education and the School of Computer Science, Nanjing University of Information Science &#x0026; Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108048517","display_name":"Yao Sun","orcid":"https://orcid.org/0000-0002-7268-9201"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Sun","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5113971240"],"corresponding_institution_ids":["https://openalex.org/I111950717"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07389971,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1213","last_page":"1227"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.510200023651123,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.510200023651123,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.2378000020980835,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.05649999901652336,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7027999758720398},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5849999785423279},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5218999981880188},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.47600001096725464},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4747999906539917},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.47279998660087585},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4535999894142151}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9175999760627747},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7027999758720398},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5849999785423279},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5218999981880188},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.515999972820282},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.47600001096725464},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4747999906539917},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.47279998660087585},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4535999894142151},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3921999931335449},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.3887999951839447},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.34950000047683716},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2971000075340271},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2865999937057495},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26089999079704285}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3651978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3651978","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.9045286774635315,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2922401517","https://openalex.org/W2971121192","https://openalex.org/W3028385805","https://openalex.org/W3046558256","https://openalex.org/W3090500064","https://openalex.org/W3126304874","https://openalex.org/W3149239394","https://openalex.org/W3160040778","https://openalex.org/W3160590659","https://openalex.org/W3166528127","https://openalex.org/W3168751805","https://openalex.org/W3177820985","https://openalex.org/W3183447718","https://openalex.org/W3209715990","https://openalex.org/W3210789515","https://openalex.org/W4294811276","https://openalex.org/W4307837975","https://openalex.org/W4315629729","https://openalex.org/W4320015374","https://openalex.org/W4364323110","https://openalex.org/W4381786393","https://openalex.org/W4387247664","https://openalex.org/W4392309491","https://openalex.org/W4394862789","https://openalex.org/W4394966955","https://openalex.org/W4396813434","https://openalex.org/W4402263733"],"related_works":[],"abstract_inverted_index":{"Ethereum":[0],"2.0":[1],"(ETH2)":[2],"marks":[3],"a":[4,12,16,58,81,96,111,130,177,186,194],"pivotal":[5],"shift":[6],"in":[7,167],"blockchain":[8,70],"technology,":[9],"transitioning":[10],"from":[11],"Proof-of-Work":[13],"(PoW)":[14],"to":[15,45,138,184],"Proof-of-Stake":[17],"(PoS)":[18],"consensus":[19],"mechanism,":[20],"with":[21],"Gasper":[22],"at":[23],"its":[24,38],"core.":[25],"While":[26],"this":[27,126],"evolution":[28],"promises":[29],"enhanced":[30],"scalability":[31],"and":[32,48,63,121,143,154,170,191],"energy":[33],"efficiency,":[34],"the":[35,67,91,108,123,140,146,162],"performance":[36,190],"of":[37,69,110,125,145,164],"block":[39,148],"proposal":[40,149],"stage":[41],"is":[42,78],"highly":[43],"sensitive":[44],"network":[46,76],"latency":[47,77],"system":[49,182],"parameters,":[50],"such":[51],"as":[52],"slot":[53],"length.":[54],"This":[55,72],"sensitivity":[56],"introduces":[57],"critical":[59],"trade-off":[60],"between":[61,189],"throughput":[62,144],"security,":[64,192],"measured":[65],"by":[66,134],"probability":[68,142],"forking.":[71],"paper":[73],"reveals":[74],"that":[75],"not":[79],"just":[80],"passive":[82],"risk":[83],"but":[84],"an":[85,101],"exploitable":[86],"attack":[87],"surface.":[88],"We":[89],"introduce":[90],"\"adaptive":[92],"latency-driven":[93],"equivocation":[94],"attack\",":[95],"novel":[97],"adversarial":[98,155],"strategy":[99],"where":[100],"attacker":[102],"deliberately":[103],"creates":[104],"forks":[105],"while":[106],"mimicking":[107],"behavior":[109],"high-latency":[112],"node,":[113],"thus":[114],"achieving":[115],"plausible":[116],"deniability.":[117],"To":[118],"formally":[119],"analyze":[120,139],"quantify":[122],"impact":[124],"threat,":[127],"we":[128,160],"develop":[129],"comprehensive":[131],"theoretical":[132],"model":[133,166],"using":[135],"Markov":[136],"chains":[137],"fork":[141],"Gasper's":[147],"mechanism":[150],"under":[151],"both":[152,168],"honest":[153],"conditions.":[156,173],"Through":[157],"extensive":[158],"simulations,":[159],"validate":[161],"accuracy":[163],"our":[165],"normal":[169],"bursty":[171],"traffic":[172],"Our":[174],"findings":[175],"provide":[176],"systematic":[178],"methodology":[179],"for":[180,197],"optimizing":[181],"parameters":[183],"achieve":[185],"robust":[187],"balance":[188],"offering":[193],"foundational":[195],"guide":[196],"configuring":[198],"ETH2":[199],"networks":[200],"against":[201],"sophisticated,":[202],"latency-based":[203],"threats.":[204]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-15T00:00:00"}
