BSM-ether: Bribery selfish mining in blockchain-based healthcare systems

被引:17
作者
Wang, Yilei [1 ,2 ]
Wang, Zhaojie [1 ]
Zhao, Minghao [3 ,4 ]
Han, Xueyang [5 ]
Zhou, Huiyu [6 ]
Wang, Xiaoying [7 ]
Koe, Arthur Sandor Voundi [8 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Qufu, Shandong, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Tsinghua Univ, Sch Software, Beijing, Peoples R China
[4] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[5] Beijing Ant Cloud Financial Informat Serv Co Ltd, Beijing, Peoples R China
[6] Univ Leicester, Sch Comp & Math Sci, Leicester, Leics, England
[7] Sun Yat Sen Univ, Affiliated Hosp 3, Guangzhou, Peoples R China
[8] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Bribery selfish mining; Ethereum; Healthcare system;
D O I
10.1016/j.ins.2022.04.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain-enabled distributed networks present a new infrastructure for building reliable and privacy-preserving healthcare utilities. Among them, Ethereum networks have gained specialized attention for their high usability and security. In this paper, we raise the awareness of Ethereum's vulnerability due to selfish mining, in which ill-disposed miners are feasible to receive more rewards than honest ones. To demonstrate this, we compose a new bribery selfish mining scheme, the BSM-Ether, targeted to Ethereum. The BSM-Ether attack can be easily conducted and has higher rewards than other existing malicious attacks. Besides, we present a formal and rigorous analysis of multiple kinds of rewards from the BSM-Ether attack. Simulation experiments show the high effectiveness of BSM-Ether the attacker can get a higher revenue with few efforts. To tackle this variability, we present some implementation level proposals and suggestions for building healthcare systems on top of Ethereum to minimize the negative effect of the security deficiency of underlying systems. (C) 2022 Published by Elsevier Inc.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 47 条
[1]  
[Anonymous], 2021, Ethereum Whitepaper
[2]   MDPtoolbox: a multi-platform toolbox to solve stochastic dynamic programming problems [J].
Chades, Iadine ;
Chapron, Guillaume ;
Cros, Marie-Josee ;
Garcia, Frederick ;
Sabbadin, Regis .
ECOGRAPHY, 2014, 37 (09) :916-920
[3]   Modeling microscopic and macroscopic information diffusion for rumor detection [J].
Chen, Xueqin ;
Zhou, Fan ;
Zhang, Fengli ;
Bonsangue, Marcello .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (10) :5449-5471
[4]   PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs [J].
Chen, Yuling ;
Sun, Jing ;
Yang, Yixian ;
Li, Tao ;
Niu, Xinxin ;
Zhou, Huiyu .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) :1204-1221
[5]   On the detection of selfish mining and stalker attacks in blockchain networks [J].
Chicarino, Vanessa ;
Albuquerque, Celio ;
Jesus, Emanuel ;
Rocha, Antonio .
ANNALS OF TELECOMMUNICATIONS, 2020, 75 (3-4) :143-152
[6]   Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [J].
Dong, Changyu ;
Wang, Yilei ;
Aldweesh, Amjad ;
McCorry, Patrick ;
van Moorsel, Aad .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :211-227
[7]   The Miner's Dilemma [J].
Eyal, Ittay .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :89-103
[8]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[9]  
Gagniuc A. Paul, MARKOV CHAINS THEORY
[10]   Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System [J].
Gao, Shang ;
Li, Zecheng ;
Peng, Zhe ;
Xiao, Bin .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :833-850