Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols

被引:8
作者
Schwarz-Schilling, Caspar [1 ]
Li, Sheng-Nan [2 ]
Tessone, Claudio J. [3 ]
机构
[1] Univ Zurich, Dept Econ, CH-8050 Zurich, Switzerland
[2] Univ Zurich, Blockchain & Distributed Ledger Technol, CH-8050 Zurich, Switzerland
[3] Univ Zurich, UZH Blockchain Ctr, CH-8050 Zurich, Switzerland
来源
JOURNAL OF CYBERSECURITY AND PRIVACY | 2022年 / 2卷 / 02期
关键词
blockchain; Proof-of-Work; selfish mining; agent-based model; hashing power; network latency;
D O I
10.3390/jcp2020016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In blockchain-based systems whose consensus mechanisms resort to Proof-of-Work (PoW), it is expected that a miner's share of total block revenue is proportional to their share of hashing power with respect to the rest of the network. The protocol relies on the immediate broadcast of blocks by miners, to earn precedence in peers' local blockchains. However, a deviation from this strategy named selfish mining (SM), may lead miners to earn more than their "fair share". In this paper, we introduce an agent-based model to simulate the dynamics of SM behaviour by a single miner as well as mining pools to understand the influence of (a) mining power distribution, (b) overlay network topology, (c) positioning of the selfish nodes within the peer to peer network. Our minimalistic model allows us to find that in high levels of latency, SM is always a more profitable strategy; our results are very robust to different network topologies and mining nodes' centrality in the network. Moreover, the power-law distribution of the miners' hashing power can make it harder for a selfish miner to be profitable. In addition, we analyze the effect of SM on system global efficiency and fairness. Our analysis confirms that SM is always more profitable for hashing powers representing more than one-third of the total computing power. Further, it also confirms that SM behaviour could cause a statistically significant high probability of continuously mined blocks opening the door for empirical verification of the phenomenon.
引用
收藏
页码:292 / 310
页数:19
相关论文
共 25 条
[1]   Bitcoin Block Withholding Attack: Analysis and Mitigation [J].
Bag, Samiran ;
Ruj, Sushmita ;
Sakurai, Kouichi .
IEEE Transactions on Information Forensics and Security, 2017, 12 (08) :1967-1978
[2]  
Chen H, 2004, 2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, P27
[3]   THE MEASUREMENT OF THE INEQUALITY OF INCOMES [J].
Dalton, Hugh .
ECONOMIC JOURNAL, 1920, 30 (119) :348-361
[4]   Information Propagation in the Bitcoin Network [J].
Decker, Christian ;
Wattenhofert, Roger .
13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2013,
[5]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[6]   Using Network Emulation to study Blockchain Distributed Systems: The Ethereum Case [J].
Geier, Maximiliano ;
Tessone, Claudio J. ;
Vanotti, Marco ;
Vilerino, Silvio ;
Gonzalez Marquez, David ;
Mocskos, Esteban .
2019 27TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP), 2019, :51-58
[7]   Decentralization in Bitcoin and Ethereum Networks [J].
Gencer, Adem Efe ;
Basu, Soumya ;
Eyal, Ittay ;
van Renesse, Robbert ;
Sirer, Emin Gun .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 :439-457
[8]   GENERAL METHOD FOR NUMERICALLY SIMULATING STOCHASTIC TIME EVOLUTION OF COUPLED CHEMICAL-REACTIONS [J].
GILLESPIE, DT .
JOURNAL OF COMPUTATIONAL PHYSICS, 1976, 22 (04) :403-434
[9]   EXACT STOCHASTIC SIMULATION OF COUPLED CHEMICAL-REACTIONS [J].
GILLESPIE, DT .
JOURNAL OF PHYSICAL CHEMISTRY, 1977, 81 (25) :2340-2361
[10]  
Tessone CJ, 2021, Arxiv, DOI [arXiv:2106.06465, 10.2139/ssrn.3865040, DOI 10.2139/SSRN.3865040]