Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain

被引:5
|
作者
Suliyanti, Widya Nita [1 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok, Indonesia
来源
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE | 2019年
关键词
Blockchain; Proof of Work; PoW; hash rate; double spending; NS-3lockchain; double-spending; security;
D O I
10.1109/ictc46691.2019.8939684
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Blockchain is a distributed public ledger that hold immutable data in a secure and encrypted way to ensure that a transaction is safe and cannot be altered. It is implemented based on a consensus algorithm called Proof-of-Work (PoW) which confirms transactions and produces new blocks to the chain. With PoW, miners compete against each other to complete transactions on the network and get rewarded. In this paper, we simulate bitcoin, which is a well-known example of a Blockchain, to perform tasks such as network and blockchain simulation, and being the subject of a double spending attacks using a framework established by Arthur Gervais. This framework is utilized to evaluate the double-spending behavior of bitcoin based on an average attacker's hashrate as a proxy measure of the security of processed transactions. This stimulation runs in a discrete-event network simulator called NS-3. The result of this simulation shows that an increase in attacker's hashrate is parallel with an increase in number of double-spending attacks, an increase in attacker's income and the number of stale blocks posing a threat to transaction's security. Stale blocks increase the advantage of attacker in the double spending attacks in the network.
引用
收藏
页码:169 / 174
页数:6
相关论文
empty
未找到相关数据