Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks

被引:1
作者
Jiang, Yiming [1 ]
Zhang, Jiangfan [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Elect & Comp Engn, Rolla, MO 65409 USA
关键词
Blockchains; Task analysis; Reliability; Bitcoin; Resistance; Closed-form solutions; Security; Proof-of-work; blockchain; double-spending attack; profitability; eclipse attack; Sybil attack; BITCOIN; PROTOCOL;
D O I
10.1109/TIFS.2024.3449224
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the time-restricted double-spending attack (TR-DSA) on the Proof-of-Work-based blockchain, where an adversary conducts a DSA within a finite timeframe and simultaneously launches multiple types of attacks on the blockchain. To be specific, the adversary can conduct attacks to isolate some honest miners and cause block propagation delays among miners to enhance the success probability of the TR-DSA. We first develop the closed-form expression for the success probability of a TR-DSA with the aid of multiple types of attacks, which is leveraged to develop the closed-form expression for the expected profit of a TR-DSA. The numerical analysis reveals that in scenarios where an adversary lacks the majority of computational power in the blockchain network, it is advisable for the adversary to refrain from indefinitely conducting a DSA, and moreover, the adversary can repeatedly launch "short-time" TR-DSAs to obtain their maximum expected profit. Notably, by leveraging the closed-form expression for the expected profit of a TR-DSA, the blockchain network designer can reduce the expected profit of a TR-DSA and therefore significantly mitigate the risk of TR-DSAs by adjusting system parameters, such as the number of blocks required for transaction confirmation, mining reward, and mining cost.
引用
收藏
页码:8155 / 8171
页数:17
相关论文
共 52 条
[1]  
Antonopoulos A. M, 2014, Mastering Bitcoin:Unlocking Digital Cryptocurrencies
[2]   Hijacking Bitcoin: Routing Attacks on Cryptocurrencies [J].
Apostolaki, Maria ;
Zohar, Aviv ;
Vanbever, Laurent .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :375-392
[3]  
Bashir I., 2017, MASTERING BLOCKCHAIN
[4]  
Bitcoin, PEER TO PEER ELECT C
[5]  
blockchain, Cryptocurrency Prices
[6]   Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus [J].
Bonneau, Joseph .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 :19-26
[7]  
coindesk, Ethereum Classic Attacker Successfully Double-Spends $1.68m in Second Attack:Report
[8]  
cointelegraph, Verge of Disaster:200 Days Transactions Wiped From Blockchain
[9]   Everything is a Race and Nakamoto Always Wins [J].
Dembo, Amir ;
Kannan, Sreeram ;
Tas, Ertem Nusret ;
Tse, David ;
Viswanath, Pramod ;
Wang, Xuechao ;
Zeitouni, Ofer .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :859-878
[10]   SoK: Network-Level Attacks on the Bitcoin P2P Network [J].
Franzoni, Federico ;
Daza, Vanesa .
IEEE ACCESS, 2022, 10 :94924-94962