{"title":"基于进化博弈论的区块链网络自私挖矿攻击建模与仿真","authors":"K. R, K. Pitchai","doi":"10.1109/ICAIS56108.2023.10073670","DOIUrl":null,"url":null,"abstract":"This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory\",\"authors\":\"K. R, K. Pitchai\",\"doi\":\"10.1109/ICAIS56108.2023.10073670\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.\",\"PeriodicalId\":164345,\"journal\":{\"name\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIS56108.2023.10073670\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIS56108.2023.10073670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling and Simulation of Selfish Mining Attacks in Blockchain Network using Evolutionary Game Theory
This paper presents a method of attacking proof of work consensus based on selfish mining. The current mitigation strategies for the blockchain network's egotistical mining are not self-sufficient after a certain number of generations. Additionally, these solutions do not address the network nodes' cooperative and defector behavior. Additionally, more blocks from self-centered nodes are added to the blockchain in this development. This study analyzes to what extent these risks may affect cryptocurrency extraction. Minority mining pools keep some blocks private by deviating from the original mining protocol. An attacking collection aims to increase revenue by wasting other miners' computing power. By adopting a novel approach in this study. To determine whether such attacks are profitable. Using the interaction between pools in this model, mining strategies can be derived using game theory. By analyzing the relative revenue rather than the monetary award, this model simulates the game for a Bitcoin blockchain. This illustrates the usefulness of considering the cost of a strategy when discussing the potential outcomes of selfish mining strategies. The author highlights scenarios where the system might be compromised based on the way the parameters are set up in the game.