Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain

被引:5
|
作者
Suliyanti, Widya Nita [1 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok, Indonesia
来源
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE | 2019年
关键词
Blockchain; Proof of Work; PoW; hash rate; double spending; NS-3lockchain; double-spending; security;
D O I
10.1109/ictc46691.2019.8939684
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Blockchain is a distributed public ledger that hold immutable data in a secure and encrypted way to ensure that a transaction is safe and cannot be altered. It is implemented based on a consensus algorithm called Proof-of-Work (PoW) which confirms transactions and produces new blocks to the chain. With PoW, miners compete against each other to complete transactions on the network and get rewarded. In this paper, we simulate bitcoin, which is a well-known example of a Blockchain, to perform tasks such as network and blockchain simulation, and being the subject of a double spending attacks using a framework established by Arthur Gervais. This framework is utilized to evaluate the double-spending behavior of bitcoin based on an average attacker's hashrate as a proxy measure of the security of processed transactions. This stimulation runs in a discrete-event network simulator called NS-3. The result of this simulation shows that an increase in attacker's hashrate is parallel with an increase in number of double-spending attacks, an increase in attacker's income and the number of stale blocks posing a threat to transaction's security. Stale blocks increase the advantage of attacker in the double spending attacks in the network.
引用
收藏
页码:169 / 174
页数:6
相关论文
共 43 条
  • [31] ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation
    Biedermann, Sebastian
    Karvelas, Nikolaos P.
    Katzenbeisser, Stefan
    Strufe, Thorsten
    Peter, Andreas
    SOFSEM 2014: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2014, 8327 : 114 - 125
  • [32] An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices
    Sa’ed Abed
    Reem Jaffal
    Bassam J. Mohd
    Mohammad Al-Shayeji
    Cluster Computing, 2021, 24 : 3065 - 3084
  • [33] Blockchain Consensus Scheme Based on the Proof of Distributed Deep Learning Work
    Zhi, Hui
    Wu, Hongcheng
    Huang, Yu
    Tian, Changlin
    Wang, Suzhen
    IET SOFTWARE, 2025, 2025 (01)
  • [34] Tie-Breaking Rule Based on Partial Proof of Work in a Blockchain
    Sakurai, Akira
    Shudo, Kazuyuki
    IEEE ACCESS, 2024, 12 : 197999 - 198014
  • [35] Analysis of Proof-of-Work-Based Blockchains Under an Adaptive Double-Spend Attack
    Ramezan, Gholamreza
    Leung, Cyril
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7035 - 7045
  • [36] Design and Evaluation of Proof of Work Based Anti-Spam Solution
    Gavrilovic, Nadja
    Ciric, Vladimir
    2020 ZOOMING INNOVATION IN CONSUMER TECHNOLOGIES CONFERENCE (ZINC), 2020, : 286 - 289
  • [37] Coin.AI: A Proof-of-Useful-Work Scheme for Blockchain-Based Distributed Deep Learning
    Baldominos, Alejandro
    Saez, Yago
    ENTROPY, 2019, 21 (08)
  • [38] Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election
    Feng, Xiaoqin
    Ma, Jianfeng
    Liu, Shaobin
    Miao, Yinbin
    Liu, Ximeng
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [39] Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election
    Xiaoqin Feng
    Jianfeng Ma
    Shaobin Liu
    Yinbin Miao
    Ximeng Liu
    Science China Information Sciences, 2022, 65
  • [40] VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain
    Hou, Bochuan
    Xin, Yang
    Zhu, Hongliang
    Yang, Yixian
    Yang, Jianhua
    APPLIED SCIENCES-BASEL, 2023, 13 (09):