Occupation mechanism for eliminating double-spending attacks on trusted transaction blockchain

被引:0
作者
Zhang, Yu Yan [1 ]
Huang, Meng Yan [1 ]
Zhang, Xu [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Network Educ, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Mobile Network Secur, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021 | 2021年
关键词
Blockchain; Trusted transaction; Block grid; Double-spending; Occupation mechanism;
D O I
10.1145/3460537.3460543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using blockchain technology to build a trusted transaction foundation has become a hot topic of current research and practice. The double-spending phenomenon refers to the bifurcation of the blockchain structure. In the process of trusted transactions, the fork caused by malicious attacks will destroy the correctness, integrity, and consistency of the entire ledger, and causes serious economic losses to users. Therefore, eliminating double-spending attacks is an important issue to ensure the security of the blockchain. The current method of defending against double-spending attacks in trusted transactions mainly revolves around the Bitcoin blockchain system. In the process of researching the Nano blockchain grid project, a high-throughput trusted transaction system, we proposed a double-spending elimination solution for the system: the occupying mechanism. By using Java to reconstruct the Nano project and implement the occupying mechanism, the experimental results verify the effectiveness of the occupying mechanism, and it is superior to the Nano project's double-spending solution based on the traditional voting mechanism in terms of time performance.
引用
收藏
页码:14 / 19
页数:6
相关论文
共 8 条
  • [1] bihu, Wuqiang: Brief description of THE DAO event
  • [2] Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols
    Chou, Chi-Ning
    Lin, Yu-Jing
    Tu, I-Ping
    Liao, Shih-wei
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1456 - 1462
  • [3] Karame Ghassan O., 1970, SemanticScholar
  • [4] Lee H., 2018, 2018 IEEE International Magnetics Conference (INTERMAG), DOI 10.1109/INTMAG.2018.8508419
  • [5] LeMahieu C, Nano: A Feeless Distributed Cryptocurrency Network
  • [6] Nicolas K, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P383, DOI 10.1109/UEMCON47517.2019.8992991
  • [7] Disincentivizing Double Spend Attacks Across Interoperable Blockchains
    Sai, Kuheli
    Tipper, David
    [J]. 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 36 - 45
  • [8] Yu XJ, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P44, DOI 10.1109/DESEC.2017.8073796