Selfish Mining and Defending Strategies in the Bitcoin

被引:1
|
作者
Zhang, Weijian [1 ]
Wang, Hao [2 ]
Hua, Hao [3 ]
Wang, Qirun [4 ]
机构
[1] Hohai Univ, Network Secur & Informat Off, Nanjing 210098, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Nanjing 210008, Peoples R China
[3] SKEMA Business Sch, F-59777 Lille, France
[4] Univ Hertfordshire, Hertford AL10 9EU, England
来源
基金
国家重点研发计划;
关键词
Bitcoin; blockchain; selfish mining; markov chain; DIGITAL CONTINUITY; BLOCKCHAIN; PRIVACY;
D O I
10.32604/iasc.2022.030274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a kind of distributed, decentralized and peer-to-peer transmittedtechnology, blockchain technology has gradually changed people's lifestyle.However, blockchain technology also faces many problems including selfishmining attack, which causes serious effects to the development of blockchaintechnology. Selfish mining is a kind of mining strategy where selfish minersincrease their profit by selectively publishing hidden blocks. This paper buildsthe selfish mining model from the perspective of node state conversion and utilizethe function extremum method tofigure out the optimal profit of this model.Meanwhile, based on the experimental data of honest mining, the author conductsthe simulation of selfish mining and discovers that selfish miners are able toacquire more revenue than honest miners when they account for more than1/3 computing power of the whole system. Lastly, to defend the selfish miningattack, the author also summarizes the existing defending strategies and evaluatesevery kind of strategy briefly.
引用
收藏
页码:1861 / 1875
页数:15
相关论文
共 50 条
  • [1] Optimal Selfish Mining Strategies in Bitcoin
    Sapirshtein, Ayelet
    Sompolinsky, Yonatan
    Zohar, Aviv
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 515 - 532
  • [2] Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability
    Zhou, Chencheng
    Xing, Liudong
    Liu, Qisi
    Wang, Honggang
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [3] The Impact of Selfish Mining on Bitcoin Network Performance
    Motlagh, Saeideh G.
    Misic, Jelena
    Misic, Vojislav B.
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 724 - 735
  • [4] Bitcoin Selfish Mining Modeling and Dependability Analysis
    Zhou, Chencheng
    Xing, Liudong
    Guo, Jun
    Liu, Qisi
    [J]. INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2022, 7 (01) : 16 - 27
  • [5] Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks
    Kang, Hongyue
    Chang, Xiaolin
    Yang, Runkai
    Misic, Jelena
    Misic, Vojislav B.
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3079 - 3091
  • [6] Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
    Zhang, Ren
    Preneel, Bart
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 277 - 292
  • [7] Competing (Semi-)Selfish Miners in Bitcoin
    Marmolejo-Cossio, Francisco J.
    Brigham, Eric
    Sela, Benjamin
    Katz, Jonathan
    [J]. AFT'19: PROCEEDINGS OF THE 1ST ACM CONFERENCE ON ADVANCES IN FINANCIAL TECHNOLOGIES, 2019, : 89 - 109
  • [8] Analysis of Selfish Miner Behavior in the Bitcoin Network
    Motlagh, Saeideh G.
    Misic, Jelena
    Misic, Vojislav B.
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [9] Competitive Selfish Mining
    Azimy, Hamid
    Ghorbani, Ali
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 20 - 27
  • [10] Selfish Mining in Ethereum
    Niu, Jianyu
    Feng, Chen
    [J]. 2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1306 - 1316