Can PoW Consensus Protocol Resist the Whale Attack?

被引:0
|
作者
Sun, Xueyong [1 ]
Bao, Qihao [2 ]
Li, Bixin [2 ]
机构
[1] Southeast Univ, Coll Software Engn, Nanjing, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Proof of Work; Markov Decision Process; Whale Attack; Selfish Mining;
D O I
10.1109/QRS57517.2022.00058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Proof of Work (PoW) is the most widely used consensus protocol. However, due to the hash rate competition mechanism, longest chain principle, and transaction fee mechanism of the PoW consensus protocol, malicious nodes can launch attacks to obtain more relative revenue than honest mining, which will discourage honest miners from packing transactions into blocks and verifying blocks. As a result, the speed of the nodes reaching consensus in the network is slowed down, or even consensus cannot be reached, which ultimately affects the security of the PoW consensus protocol. In this paper, the Markov Decision Process (MDP) is used to simulate the whale attack launched by malicious nodes, and evaluate the capability of PoW consensus protocol against the whale attack. The experimental results show that the PoW consensus protocol is secure in the Bitcoin network when the transaction fee is set in the range of 0.002-0.3 block rewards and the transaction volume should not exceed 21.09 block rewards. In addition, the PoW consensus protocol will be more secure with the adjustment of parameters such as the number of block confirmations, block generation interval and block size.
引用
收藏
页码:504 / 515
页数:12
相关论文
共 50 条
  • [1] PoW-BC: A PoW Consensus Protocol Based on Block Compression
    Yu, Bin
    Li, Xiaofeng
    Zhao, He
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (04): : 1389 - 1408
  • [2] Defense Mechanism to Solve Eclipse Attack of POW Consensus
    Wei, Zizuan
    Wang, Xin
    Yu, Dan
    Ma, Yao
    Chen, Yongle
    Computer Engineering and Applications, 2023, 59 (08) : 280 - 287
  • [3] Research on PoW Protocol Security under Optimized Long Delay Attack
    Feng, Tao
    Liu, Yufeng
    CRYPTOGRAPHY, 2023, 7 (02)
  • [4] Algorithmic balancing of hashrate in a Proof-of-Work (PoW) consensus protocol
    Hobbs, Alexander
    Kessler, Andrew
    De Moliner, Richard
    2022 4TH CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2022, : 45 - 48
  • [5] An improved key exchange protocol for WLAN that can resist MITM attack which benefit from RTT
    Li, Rongsen
    Dou, Wenhua
    Li, R. (rs_li@nudt.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 7357 - 7368
  • [6] Single-Tiered Hybrid PoW Consensus Protocol to Encourage Decentralization in Bitcoin
    Kim, Gyu Chol
    Han, Gang Song
    Kim, Ryong Chol
    Jong, Yong Bok
    Kim, Nam Hyok
    Han, Il Min
    Han, Ung Il
    Security and Communication Networks, 2023, 2023
  • [7] Block size optimization for PoW consensus algorithm based blockchain applications by using whale optimization algorithm
    Aygun, Betul
    Arslan, Hilal
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2022, 30 : 406 - 419
  • [8] Consensus latency of PoW blockchains
    Wang, Ke
    Kim, Hyong S.
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2022), 2022, : 137 - 147
  • [9] A Secured Authentication Protocol Which Resist Password Reuse Attack
    Prajitha, M., V
    Rekha, P.
    George, Amrutha A.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [10] A Blockchain Consensus Protocol Based on Quantum Attack Algorithm
    Wang, Hui
    Yu, Jian
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022