Can PoW Consensus Protocol Resist the Whale Attack?

被引:0
|
作者
Sun, Xueyong [1 ]
Bao, Qihao [2 ]
Li, Bixin [2 ]
机构
[1] Southeast Univ, Coll Software Engn, Nanjing, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Proof of Work; Markov Decision Process; Whale Attack; Selfish Mining;
D O I
10.1109/QRS57517.2022.00058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Proof of Work (PoW) is the most widely used consensus protocol. However, due to the hash rate competition mechanism, longest chain principle, and transaction fee mechanism of the PoW consensus protocol, malicious nodes can launch attacks to obtain more relative revenue than honest mining, which will discourage honest miners from packing transactions into blocks and verifying blocks. As a result, the speed of the nodes reaching consensus in the network is slowed down, or even consensus cannot be reached, which ultimately affects the security of the PoW consensus protocol. In this paper, the Markov Decision Process (MDP) is used to simulate the whale attack launched by malicious nodes, and evaluate the capability of PoW consensus protocol against the whale attack. The experimental results show that the PoW consensus protocol is secure in the Bitcoin network when the transaction fee is set in the range of 0.002-0.3 block rewards and the transaction volume should not exceed 21.09 block rewards. In addition, the PoW consensus protocol will be more secure with the adjustment of parameters such as the number of block confirmations, block generation interval and block size.
引用
收藏
页码:504 / 515
页数:12
相关论文
共 50 条
  • [21] Revisiting FAW attack in an imperfect PoW blockchain system
    Haoran Zhu
    Xiaolin Chang
    Jelena Mišić
    Vojislav B. Mišić
    Runkai Yang
    Peer-to-Peer Networking and Applications, 2022, 15 : 2430 - 2443
  • [22] Revisiting FAW attack in an imperfect PoW blockchain system
    Zhu, Haoran
    Chang, Xiaolin
    Misic, Jelena
    Misic, Vojislav B.
    Yang, Runkai
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (05) : 2430 - 2443
  • [23] On Selfholding Attack Impact on Imperfect PoW Blockchain Networks
    Yang, Runkai
    Chang, Xiaolin
    Misic, Jelena
    Misic, Vojislav
    Kang, Hongyue
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04): : 3073 - 3086
  • [24] A New PoW Consensus of Blockchain Based on Legendre Sequence
    Yuan, Ye
    Zhao, Yiwen
    Su, Ming
    Wang, Gang
    Liu, Xiaoguang
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 187 - 193
  • [25] Determining the Number of Confirmation Blocks in a Two-Level Blockchain with Proof-of-Proof Consensus Protocol for Different Consensus Types in Mainchain/Sidechain to Prevent Double Spend Attack. I. PoS in Mainchain and PoW in Sidechain
    Kovalchuk, L. V.
    Kuchynska, N. V.
    Kondratenko, M. S.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2024, 60 (04) : 646 - 655
  • [26] How can we Succeed the Fault Attack on PACE Protocol
    Serrajl, Taoufik
    Azizi, Abdelmalek
    Ismaili, Moulay Chrif
    2014 5TH WORKSHOP ON CODES, CRYPTOGRAPHY AND COMMUNICATION SYSTEMS (WCCCS' 14), 2014, : 59 - 63
  • [27] Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol
    Park, Sung Bum
    Jo, Hyo Jin
    Lee, Dong Hoon
    COMPUTERS & SECURITY, 2023, 126
  • [28] Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network
    S. B. Geetha
    Venkanagouda C. Patil
    Wireless Personal Communications, 2017, 97 : 859 - 880
  • [29] A PLIOCENE SHARK ATTACK ON A CETHOTHERIID WHALE
    DEMERE, TA
    CERUTTI, RA
    JOURNAL OF PALEONTOLOGY, 1982, 56 (06) : 1480 - 1482
  • [30] Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network
    Geetha, S. B.
    Patil, Venkanagouda C.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) : 859 - 880