Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (2): 104-114.doi: 10.11959/j.issn.2096-109x.2023025
• Papers • Previous Articles Next Articles
Heli WANG, Qiao YAN
Revised:
2022-12-03
Online:
2023-04-25
Published:
2023-04-01
Supported by:
CLC Number:
Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
[1] | EYAL I , SIRER E G . Majority is not enough:bitcoin mining is vulnerable[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2014: 436-454. |
[2] | HEILMAN E , KENDLER A , ZOHAR A ,et al. Eclipse attacks on{Bitcoin’s}{peer-to-peer} network[C]// Proceedings of 24th USENIX Security Symposium (USENIX Security 15). 2015: 129-144. |
[3] | SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in bitcoin[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2016: 515-532. |
[4] | NAYAK K , KUMAR S , MILLER A ,et al. Stubborn mining:generalizing selfish mining and combining with an eclipse attack[C]// Pro- ceedings of 2016 IEEE European Symposium on Security and Privacy (EuroS&P). 2016: 305-320. |
[5] | DONG X , WU F , FAREE A ,et al. Selfholding:a combined attack model using selfish mining with block withholding attack[J]. Computers & Security, 2019,87:101584. |
[6] | ALBRECHER H , GOFFARD P O . On the profitability of selfish blockchain mining under consideration of ruin[J]. arXiv preprint arXiv:2010.12577, 2020. |
[7] | ZUR R B , EYAL I , TAMAR A . Efficient mdp analysis for selfishmining in blockchains[C]// Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. 2020: 113-131. |
[8] | MOTLAGH S G , MI?I? J , MI?I? V B . The impact of selfish mining on bitcoin network performance[J]. IEEE Transactions on Network Science and Engineering, 2021,8(1): 724-735. |
[9] | LI Q , CHANG Y , WU X ,et al. A new theoretical framework of pyramid markov processes for blockchain selfish mining[J]. Journal of Systems Science and Systems Engineering, 2021,30(6): 667-711. |
[10] | HEILMAN E , . One weird trick to stop selfish miners:Fresh bitcoins,a solution for the honest miner[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2014: 161-162. |
[11] | SOLAT S , POTOP-BUTUCARU M . Brief announcement:Zeroblock:Timestamp-free prevention of block-withholding attack in bitcoin[C]// Proceedings of International Symposium on Stabilization,Safety,and Security of Distributed Systems. 2017: 356-360. |
[12] | CHICARINO V , ALBUQUERQUE C , JESUS E ,et al. On the detection of selfish mining and stalker attacks in blockchain networks[J]. Annals of Telecommunications, 2020,75(3): 143-152. |
[13] | GERVAIS A , KARAME G O , WüST K ,et al. On the security and performance of proof of work blockchains[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 3-16. |
[14] | WANG W , HOANG D T , HU P ,et al. A survey on consensus mechanisms and mining strategy management in blockchain networks[J]. IEEE Access, 2019,7: 22328-22370. |
[15] | G?BEL J , KEELER H P , KRZESINSKI A E ,et al. Bitcoin blockchain dynamics:The selfish-mine strategy in the presence of propagation delay[J]. Performance Evaluation, 2016,104: 23-41. |
[16] | SAAD M , NJILLA L , KAMHOUA C ,et al. Countering selfish mining in blockchains[C]// Proceedings of 2019 International Conference on Computing,Networking and Communications (ICNC). 2019: 360-364. |
[17] | HOU C , ZHOU M , JI Y ,et al. Squirrl:Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning[J]. arXiv preprint arXiv:1912.01798, 2019. |
[18] | DECKER C , WATTENHOFER R . Information propagation in the bitcoin network[C]// Proceedings of IEEE P2P 2013. 2013: 1-10. |
[19] | BITCOINFEES . Bitcoinfees/feesim:model-based bitcoin fee estimation[EB]. |
[20] | YCHARTS . Bitcoin average transactions per block[EB]. |
[21] | BAG S , RUJ S , SAKURAI K . Bitcoin block withholding attack:analysis and mitigation[J]. IEEE Transactions on Information Forensics and Security, 2016,12(8): 1967-1978. |
[22] | GUTTERIDGE D . Japanese cryptocurrency monacoin hit by selfish mining attack[EB]. |
[23] | G?BEL J , KRZESINSKI A E . Increased block size and bitcoin blockchain dynamics[C]// Proceedings of 2017 27th International Telecommunication Networks and Applications Conference (ITNAC). 2017: 1-6. |
[24] | BTC.COM. Poolstate-2021[EB]. |
[25] | HAYES A S . Cryptocurrency value formation:an empirical study leading to a cost of production model for valuing bitcoin[J]. Telematics and Informatics, 2017,34(7): 1308-1321. |
[26] | COURTOIS N T , GRAJEK M , NAIK R . Optimizing SHA256 in bitcoin mining[C]// Proceedings of International Conference on Cryptography and Security Systems. 2014: 131-144. |
[27] | CORON J S , DODIS Y , MALINAUD C ,et al. Merkle-damg?rd revisited:how to construct a hash function[C]// Proceedings of Annual International Cryptology Conference. 2005: 430-448. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[3] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[4] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[5] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[6] | Fukang XING, Zheng ZHANG, Ran SUI, Sheng QU, Xinsheng JI. Qualitative modeling and analysis of attack surface for process multi-variant execution software system [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 121-128. |
[7] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[8] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[9] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[10] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[11] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[12] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[13] | Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI. Design and analysis of intelligent service chain system for network security resource pool [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 175-181. |
[14] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[15] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|