Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3196494.3196512acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

On the Strategy and Behavior of Bitcoin Mining with N-attackers

Published: 29 May 2018 Publication History

Abstract

Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy has been further discussed by many other works, which analyze the strategy and behavior of a single attacker. The extension of the strategy research is greatly restricted by the assumption that there is only one attacker in the blockchain network, since, in many cases, a proof of work blockchain has multiple attackers. The attackers can be independent of others instead of sharing information and attacking the blockchain as a whole. In this paper, we will establish a new model to analyze the miners' behavior in a proof of work blockchain with multiple attackers. Based on our model, we extend the attackers' strategy by proposing a new strategy set publish-n. Meanwhile, we will also review other attacking strategies such as selfish mining and stubborn mining in our model to explore whether these strategies work or not when there are multiple attackers. The performances of different strategies are compared using relative stale block rate of the attackers. In a proof of work blockchain model with two attackers, strategy publish-n can beat selfish mining by up to 26.3%.

References

[1]
Samiran Bag, Sushmita Ruj, and Kouichi Sakurai. 2017. Bitcoin block withholding attack: Analysis and mitigation. IEEE Transactions on Information Forensics and Security Vol. 12, 8 (2017), 1967--1978.
[2]
Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 1--10.
[3]
Ittay Eyal. 2015. The miner's dilemma. In Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 89--103.
[4]
Ittay Eyal and Emin Gün Sirer. 2013. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. Vol. 8437 (2013), 436--454.
[5]
Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 3--16.
[6]
Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. 2015. Tampering with the delivery of blocks and transactions in bitcoin Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 692--705.
[7]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. USENIX Security Symposium. 129--144.
[8]
Ghassan O Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 906--917.
[9]
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim. 2017. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 195--209.
[10]
Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S Rosenschein. 2015. Bitcoin mining pools: A cooperative game theoretic analysis Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 919--927.
[11]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Consulted (2008).
[12]
Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 305--320.
[13]
Meni Rosenfeld. 2014. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009 (2014).
[14]
Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 515--532.
[15]
Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in bitcoin International Conference on Financial Cryptography and Data Security. Springer, 507--527.
[16]
Economist Staff . 2016. Blockchains: The great chain of being sure about things. The Economist. Retrieved Vol. 18 (2016).

Cited By

View all
  • (2024)Statistical detection of selfish mining in proof-of-work blockchain systemsScientific Reports10.1038/s41598-024-55348-314:1Online publication date: 15-Mar-2024
  • (2023)FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tampsDistributed Ledger Technologies: Research and Practice10.1145/36163972:4(1-26)Online publication date: 14-Dec-2023
  • (2023)Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum With Multiple Mining PoolsIEEE Transactions on Network and Service Management10.1109/TNSM.2022.319529220:1(182-200)Online publication date: Mar-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications Security
May 2018
866 pages
ISBN:9781450355766
DOI:10.1145/3196494
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bitcoin
  2. mining
  3. n-attackers
  4. selfish mining

Qualifiers

  • Research-article

Funding Sources

  • Chinese National Research Fund Key Project
  • National China 973 Project
  • Chinese National Research Fund

Conference

ASIA CCS '18
Sponsor:

Acceptance Rates

ASIACCS '18 Paper Acceptance Rate 52 of 310 submissions, 17%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)2
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Statistical detection of selfish mining in proof-of-work blockchain systemsScientific Reports10.1038/s41598-024-55348-314:1Online publication date: 15-Mar-2024
  • (2023)FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tampsDistributed Ledger Technologies: Research and Practice10.1145/36163972:4(1-26)Online publication date: 14-Dec-2023
  • (2023)Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum With Multiple Mining PoolsIEEE Transactions on Network and Service Management10.1109/TNSM.2022.319529220:1(182-200)Online publication date: Mar-2023
  • (2023)Blockchain Mining With Multiple Selfish MinersIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327573618(3116-3131)Online publication date: 2023
  • (2022)Stochastic Modelling of Selfish Mining in Proof-of-Work ProtocolsJournal of Cybersecurity and Privacy10.3390/jcp20200162:2(292-310)Online publication date: 20-May-2022
  • (2022)Cyclic Arbitrage in Decentralized ExchangesCompanion Proceedings of the Web Conference 202210.1145/3487553.3524201(12-19)Online publication date: 25-Apr-2022
  • (2022)Analysis of Blockchain Selfish Mining: a Stochastic Game ApproachICC 2022 - IEEE International Conference on Communications10.1109/ICC45855.2022.9839233(4217-4222)Online publication date: 16-May-2022
  • (2022)Insightful Mining EquilibriaWeb and Internet Economics10.1007/978-3-031-22832-2_2(21-37)Online publication date: 9-Dec-2022
  • (2022)Reinforcement-Mining: Protecting Reward in Selfish MiningProvable and Practical Security10.1007/978-3-031-20917-8_14(199-209)Online publication date: 7-Nov-2022
  • (2022)Is semi‐selfish mining available without being detected?International Journal of Intelligent Systems10.1002/int.2265637:12(10576-10597)Online publication date: 29-Dec-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media