Countering Selfish Mining in Blockchains

11/25/2018
by   Muhammad Saad, et al.
0

Selfish mining is a well known vulnerability in blockchains exploited by miners to steal block rewards. In this paper, we explore a new form of selfish mining attack that guarantees high rewards with low cost. We show the feasibility of this attack facilitated by recent developments in blockchain technology opening new attack avenues. By outlining the limitations of existing countermeasures, we highlight a need for new defense strategies to counter this attack, and leverage key system parameters in blockchain applications to propose an algorithm that enforces fair mining. We use the expected transaction confirmation height and block publishing height to detect selfish mining behavior and develop a network-wide defense mechanism to disincentivize selfish miners. Our design involves a simple modifications to transactions' data structure in order to obtain a "truth state" used to catch the selfish miners and prevent honest miners from losing block rewards.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/18/2020

A Jumping Mining Attack and Solution

Mining is the important part of the blockchain used the proof of work (P...
research
02/19/2022

Dynamic Transaction Storage Strategies for a Sustainable Blockchain

As the core technology behind Bitcoin, Blockchain's decentralized, tampe...
research
01/04/2021

Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures

Blockchains and cryptocurrencies disrupted the conversion of energy into...
research
04/06/2019

Exploring the Attack Surface of Blockchain: A Systematic Overview

In this paper, we systematically explore the attack surface of the Block...
research
02/15/2023

VDHLA: Variable Depth Hybrid Learning Automaton and Its Application to Defense Against the Selfish Mining Attack in Bitcoin

Learning Automaton (LA) is an adaptive self-organized model that improve...
research
07/02/2023

New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata

In this paper, we address the critical challenges of double-spending and...
research
08/22/2022

Optimal Bootstrapping of PoW Blockchains

Proof of Work (PoW) blockchains are susceptible to adversarial majority ...

Please sign up or login with your details

Forgot password? Click here to reset