Selfish Mining and Defending Strategies in the Bitcoin

被引:1
作者
Zhang, Weijian [1 ]
Wang, Hao [2 ]
Hua, Hao [3 ]
Wang, Qirun [4 ]
机构
[1] Hohai Univ, Network Secur & Informat Off, Nanjing 210098, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Nanjing 210008, Peoples R China
[3] SKEMA Business Sch, F-59777 Lille, France
[4] Univ Hertfordshire, Hertford AL10 9EU, England
基金
国家重点研发计划;
关键词
Bitcoin; blockchain; selfish mining; markov chain; DIGITAL CONTINUITY; BLOCKCHAIN; PRIVACY;
D O I
10.32604/iasc.2022.030274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a kind of distributed, decentralized and peer-to-peer transmittedtechnology, blockchain technology has gradually changed people's lifestyle.However, blockchain technology also faces many problems including selfishmining attack, which causes serious effects to the development of blockchaintechnology. Selfish mining is a kind of mining strategy where selfish minersincrease their profit by selectively publishing hidden blocks. This paper buildsthe selfish mining model from the perspective of node state conversion and utilizethe function extremum method tofigure out the optimal profit of this model.Meanwhile, based on the experimental data of honest mining, the author conductsthe simulation of selfish mining and discovers that selfish miners are able toacquire more revenue than honest miners when they account for more than1/3 computing power of the whole system. Lastly, to defend the selfish miningattack, the author also summarizes the existing defending strategies and evaluatesevery kind of strategy briefly.
引用
收藏
页码:1861 / 1875
页数:15
相关论文
共 26 条
  • [1] The economics of BitCoin price formation
    Ciaian, Pavel
    Rajcaniova, Miroslava
    Kancs, d'Artis
    [J]. APPLIED ECONOMICS, 2016, 48 (19) : 1799 - 1815
  • [2] Blockchain for Internet of Things: A Survey
    Dai, Hong-Ning
    Zheng, Zibin
    Zhang, Yan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8076 - 8094
  • [3] Di Pierro M, 2017, COMPUT SCI ENG, V19, P92, DOI 10.1109/MCSE.2017.3421554
  • [4] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [5] A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2907 - 2919
  • [6] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [7] Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Ge, Chunpeng
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1214 - 1226
  • [8] An Integrated Artificial Neural Network-based Precipitation Revision Model
    Li, Tao
    Xu, Wenduo
    Wang, Li Na
    Li, Ningpeng
    Ren, Yongjun
    Xia, Jinyue
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (05): : 1690 - 1707
  • [9] Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing
    Li, Tao
    Qian, Qi
    Ren, Yongjun
    Ren, Yongzhen
    Xia, Jinyue
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 779 - 791
  • [10] A survey on the security of blockchain systems
    Li, Xiaoqi
    Jiang, Peng
    Chen, Ting
    Luo, Xiapu
    Wen, Qiaoyan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 841 - 853