Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3326285.3329076acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwqosConference Proceedingsconference-collections
research-article

A game theoretic analysis on block withholding attacks using the zero-determinant strategy

Published: 24 June 2019 Publication History

Abstract

In Bitcoin's incentive system that supports open mining pools, block withholding attacks incur huge security threats. In this paper, we investigate the mutual attacks among pools as this determines the macroscopic utility of the whole distributed system. Existing studies on pools' interactive attacks usually employ the conventional game theory, where the strategies of the players are considered pure and equal, neglecting the existence of powerful strategies and the corresponding favorable game results. In this study, we take advantage of the Zero-Determinant (ZD) strategy to analyze the block withholding attack between any two pools, where the ZD adopter has the unilateral control on the expected payoffs of its opponent and itself. In this case, we are faced with the following questions: who can adopt the ZD strategy? individually or simultaneously? what can the ZD player achieve? In order to answer these questions, we derive the conditions under which two pools can individually or simultaneously employ the ZD strategy and demonstrate the effectiveness. To the best of our knowledge, we are the first to use the ZD strategy to analyze the block withholding attack among pools.

References

[1]
Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.
[2]
Meni Rosenfeld. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011.
[3]
Nicolas T Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718, 2014.
[4]
Samiran Bag, Sushmita Ruj, and Kouichi Sakurai. Bitcoin block withholding attack: Analysis and mitigation. IEEE Transactions on Information Forensics and Security, 12(8):1967--1978, 2017.
[5]
Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, and Aquinas Hobor. On power splitting games in distributed computation: The case of bitcoin pooled mining. In Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, pages 397--411. IEEE, 2015.
[6]
Ittay Eyal. The miner's dilemma. In Security and Privacy (SP), 2015 IEEE Symposium on, pages 89--103. IEEE, 2015.
[7]
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim. Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 195--209. ACM, 2017.
[8]
William H Press and Freeman J Dyson. Iterated prisoner's dilemma contains strategies that dominate any evolutionary opponent. Proceedings of the National Academy of Sciences, 109(26):10409--10413, 2012.
[9]
Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM, 61(7):95--102, 2018.
[10]
Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security, pages 515--532. Springer, 2016.
[11]
Deepak K Tosh, Sachin Shetty, Xueping Liang, Charles A Kamhoua, Kevin A Kwiat, and Laurent Njilla. Security implications of blockchain cloud with analysis of block withholding attack. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pages 458--467. IEEE Press, 2017.
[12]
Ghassan O Karame, Elli Androulaki, and Srdjan Capkun. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 906--917. ACM, 2012.
[13]
Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden. Incentive compatibility of bitcoin mining pool reward functions. In International Conference on Financial Cryptography and Data Security, pages 477--498. Springer, 2016.
[14]
Samiran Bag and Kouichi Sakurai. Yet another note on block withholding attack on bitcoin mining pools. In International Conference on Information Security, pages 167--180. Springer, 2016.

Cited By

View all
  • (2024)Cooperation and Optimization of Multi-Pool Mining Game With Zero Determinant AllianceIEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.340928811:5(4965-4978)Online publication date: Sep-2024
  • (2022)A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open issuesJournal of Industrial Information Integration10.1016/j.jii.2021.10031226(100312)Online publication date: Mar-2022
  • (2021)A blockchain-assisted framework for secure and reliable data sharing in distributed systemsEURASIP Journal on Wireless Communications and Networking10.1186/s13638-021-02041-y2021:1Online publication date: 19-Aug-2021
  • Show More Cited By

Index Terms

  1. A game theoretic analysis on block withholding attacks using the zero-determinant strategy

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      IWQoS '19: Proceedings of the International Symposium on Quality of Service
      June 2019
      420 pages
      ISBN:9781450367783
      DOI:10.1145/3326285
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 24 June 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Bitcoin
      2. block withholding attack
      3. blockchain
      4. game theory

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      IWQoS '19

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 08 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Cooperation and Optimization of Multi-Pool Mining Game With Zero Determinant AllianceIEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.340928811:5(4965-4978)Online publication date: Sep-2024
      • (2022)A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open issuesJournal of Industrial Information Integration10.1016/j.jii.2021.10031226(100312)Online publication date: Mar-2022
      • (2021)A blockchain-assisted framework for secure and reliable data sharing in distributed systemsEURASIP Journal on Wireless Communications and Networking10.1186/s13638-021-02041-y2021:1Online publication date: 19-Aug-2021
      • (2021)Miner revenue optimization algorithm based on Pareto artificial bee colony in blockchain networkEURASIP Journal on Wireless Communications and Networking10.1186/s13638-021-02018-x2021:1Online publication date: 6-Jul-2021
      • (2021)An access control model for the Internet of Things based on zero-knowledge token and blockchainEURASIP Journal on Wireless Communications and Networking10.1186/s13638-021-01986-42021:1Online publication date: 26-Apr-2021
      • (2021)Fee-Free Pooled Mining for Countering Pool-Hopping Attack in BlockchainIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3021686(1-1)Online publication date: 2021
      • (2021)Attacks and countermeasures on blockchains: A survey from layering perspectiveComputer Networks10.1016/j.comnet.2021.107978191(107978)Online publication date: May-2021
      • (2020)Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchainsTransactions on Emerging Telecommunications Technologies10.1002/ett.4148Online publication date: 2-Nov-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media