基于进化博弈论的区块链网络自私挖矿攻击建模与仿真

K. R, K. Pitchai
{"title":"基于进化博弈论的区块链网络自私挖矿攻击建模与仿真","authors":"K. R, K. Pitchai","doi":"10.1109/ICAIS56108.2023.10073670","DOIUrl":null,"url":null,"abstract":"This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory\",\"authors\":\"K. R, K. Pitchai\",\"doi\":\"10.1109/ICAIS56108.2023.10073670\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.\",\"PeriodicalId\":164345,\"journal\":{\"name\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIS56108.2023.10073670\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIS56108.2023.10073670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

提出了一种基于自私挖掘的工作量证明共识攻击方法。目前针对区块链网络自我挖矿的缓解策略,在经过一定的代数后,是不能自给自足的。此外,这些解决方案没有解决网络节点的合作和背叛行为。此外,在此开发过程中,更多来自自我中心节点的区块被添加到区块链中。本研究分析了这些风险对加密货币提取的影响程度。少数矿池通过偏离原始的采矿协议来保持一些区块的私有性。攻击集合旨在通过浪费其他矿工的计算能力来增加收入。本研究采用一种新颖的方法。以确定此类攻击是否有利可图。利用该模型中矿池之间的相互作用,利用博弈论推导出挖矿策略。通过分析相对收入而不是货币奖励,该模型模拟了比特币区块链的游戏。这说明了在讨论自私挖掘策略的潜在结果时考虑策略成本的有用性。作者强调了基于游戏中设置参数的方式,系统可能被破坏的场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory
This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Heuristics based Segmentation of Left Ventricle in Cardiac MR Images Hybrid CNNLBP using Facial Emotion Recognition based on Deep Learning Approach ANN Based Static Var Compensator For Improved Power System Security Photovoltaic System based Interleaved Converter for Grid System Effective Location-based Recommendation Systems for Holiday using RBM Machine Learning Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1