{"title":"一种新的区块链双花攻击对策","authors":"Kervins Nicolas, Yi Wang","doi":"10.1109/UEMCON47517.2019.8992991","DOIUrl":null,"url":null,"abstract":"A blockchain database containing files regarding transactions of cryptocurrency is sometime vulnerable to double spending attack. This type of attack pertains to a coin being spent more in more that one transaction in the network. This paper is motivated by a goal to create a blockchain that can withstand double spending attacks. This way, honest miners will be able to safely and securely exchange cryptocurrency. There currently lack valuable prevention methods in the network therefore we designed a novel countermeasure to combat double spending attacks on the blockchain system. We proposed the MSP (Multistage Secure Pool) framework in order to address the vulnerabilities on the blockchain. This was designed to handle both discrete and general issues that affect the overall security of the blockchain. Our evaluation using this application shows that there was a decrease in the amount of attacks propagating through the system based on our system's robustness and capabilities. We also present machine learning capabilities of the system in our study in order to enable a progressive aspect to the design. Providing our application with the ability to analyze data in order to recognize and classify distinct actions will enable for greater comprehension. An application that learns, updates and configures to meet specified defensive standards present key design features which enables for greater understanding and future analysis of the overall blockchain network.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A novel double spending attack countermeasure in blockchain\",\"authors\":\"Kervins Nicolas, Yi Wang\",\"doi\":\"10.1109/UEMCON47517.2019.8992991\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A blockchain database containing files regarding transactions of cryptocurrency is sometime vulnerable to double spending attack. This type of attack pertains to a coin being spent more in more that one transaction in the network. This paper is motivated by a goal to create a blockchain that can withstand double spending attacks. This way, honest miners will be able to safely and securely exchange cryptocurrency. There currently lack valuable prevention methods in the network therefore we designed a novel countermeasure to combat double spending attacks on the blockchain system. We proposed the MSP (Multistage Secure Pool) framework in order to address the vulnerabilities on the blockchain. This was designed to handle both discrete and general issues that affect the overall security of the blockchain. Our evaluation using this application shows that there was a decrease in the amount of attacks propagating through the system based on our system's robustness and capabilities. We also present machine learning capabilities of the system in our study in order to enable a progressive aspect to the design. Providing our application with the ability to analyze data in order to recognize and classify distinct actions will enable for greater comprehension. An application that learns, updates and configures to meet specified defensive standards present key design features which enables for greater understanding and future analysis of the overall blockchain network.\",\"PeriodicalId\":187022,\"journal\":{\"name\":\"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON47517.2019.8992991\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON47517.2019.8992991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel double spending attack countermeasure in blockchain
A blockchain database containing files regarding transactions of cryptocurrency is sometime vulnerable to double spending attack. This type of attack pertains to a coin being spent more in more that one transaction in the network. This paper is motivated by a goal to create a blockchain that can withstand double spending attacks. This way, honest miners will be able to safely and securely exchange cryptocurrency. There currently lack valuable prevention methods in the network therefore we designed a novel countermeasure to combat double spending attacks on the blockchain system. We proposed the MSP (Multistage Secure Pool) framework in order to address the vulnerabilities on the blockchain. This was designed to handle both discrete and general issues that affect the overall security of the blockchain. Our evaluation using this application shows that there was a decrease in the amount of attacks propagating through the system based on our system's robustness and capabilities. We also present machine learning capabilities of the system in our study in order to enable a progressive aspect to the design. Providing our application with the ability to analyze data in order to recognize and classify distinct actions will enable for greater comprehension. An application that learns, updates and configures to meet specified defensive standards present key design features which enables for greater understanding and future analysis of the overall blockchain network.