Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain

被引:5
|
作者
Suliyanti, Widya Nita [1 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok, Indonesia
来源
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE | 2019年
关键词
Blockchain; Proof of Work; PoW; hash rate; double spending; NS-3lockchain; double-spending; security;
D O I
10.1109/ictc46691.2019.8939684
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Blockchain is a distributed public ledger that hold immutable data in a secure and encrypted way to ensure that a transaction is safe and cannot be altered. It is implemented based on a consensus algorithm called Proof-of-Work (PoW) which confirms transactions and produces new blocks to the chain. With PoW, miners compete against each other to complete transactions on the network and get rewarded. In this paper, we simulate bitcoin, which is a well-known example of a Blockchain, to perform tasks such as network and blockchain simulation, and being the subject of a double spending attacks using a framework established by Arthur Gervais. This framework is utilized to evaluate the double-spending behavior of bitcoin based on an average attacker's hashrate as a proxy measure of the security of processed transactions. This stimulation runs in a discrete-event network simulator called NS-3. The result of this simulation shows that an increase in attacker's hashrate is parallel with an increase in number of double-spending attacks, an increase in attacker's income and the number of stale blocks posing a threat to transaction's security. Stale blocks increase the advantage of attacker in the double spending attacks in the network.
引用
收藏
页码:169 / 174
页数:6
相关论文
共 43 条
  • [21] Trie-Hashimoto: State Trie-Based Proof-of-Work Mining for Optimizing Blockchain Storage
    Kim, Jae-Yun
    Lee, Junmo
    Moon, Soo-Mook
    IEEE ACCESS, 2024, 12 : 18315 - 18329
  • [22] Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
    Biryukov, Alex
    Khovratovich, Dmitry
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [23] Proposal of Fair Proof-of-Work System Based on Rating of User's Computing Power
    Nakahara, Ryoya
    Inaba, Hiroyuki
    2018 IEEE 7TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE 2018), 2018, : 746 - 748
  • [24] Lattice-Based Proof-of-Work for Post-Quantum Blockchains
    Behnia, Rouzbeh
    Postlethwaite, Eamonn W.
    Ozmen, Muslum Ozgur
    Yavuz, Attila Altay
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 310 - 318
  • [25] Proof-of-work based new encoding scheme for information hiding purposes
    Rajba, Pawel
    Keller, Joerg
    Mazurczyk, Wojciech
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [26] Proof-of-Work for Merkle based Access Tree in Patient Centric Data
    Reddy, B. Ravinder
    Adilakshmi, T.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (01) : 533 - 539
  • [27] A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations
    Ding, Jintai
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, 2019, 11605 : 97 - 107
  • [28] Efficient Blockchain System based on Proof of Segmented Work
    Monem, Maruf
    Ahmad, Alif
    Jumana
    Ahmed, Rashad
    Arif, Hossain
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 989 - 992
  • [29] Smart contract-based decentralized mining pools for Proof-of-Work blockchains
    Papathanasiou, A. M.
    Kyriakidou, C. D. Nassar
    Pittaras, I.
    Polyzos, G. C.
    2024 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN 2024, 2024, : 227 - 234
  • [30] An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices
    Abed, Sa'ed
    Jaffal, Reem
    Mohd, Bassam J.
    Al-Shayeji, Mohammad
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3065 - 3084