{"title":"区块链挖矿攻击调查","authors":"D. Swapna","doi":"10.2139/ssrn.3690116","DOIUrl":null,"url":null,"abstract":"The blockchain technology came to light in 2008 as a decentralised peer to peer network structure, with the ability to ensure security for transactions made on bitcoin cryptocurrency, without the need of any central server to validate transactions. Although it started with the advent of cryptocurrencies,it is being used in several areas to develop different projects like electronic voting, supply chain management, banking. With its vast usage, issues arise with potential attacks on mining pools of blockchain. This paper classifies the various mining pool attacks and their existing countermeasures.","PeriodicalId":14586,"journal":{"name":"IO: Productivity","volume":"6 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Survey on Mining Attacks on Blockchain\",\"authors\":\"D. Swapna\",\"doi\":\"10.2139/ssrn.3690116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The blockchain technology came to light in 2008 as a decentralised peer to peer network structure, with the ability to ensure security for transactions made on bitcoin cryptocurrency, without the need of any central server to validate transactions. Although it started with the advent of cryptocurrencies,it is being used in several areas to develop different projects like electronic voting, supply chain management, banking. With its vast usage, issues arise with potential attacks on mining pools of blockchain. This paper classifies the various mining pool attacks and their existing countermeasures.\",\"PeriodicalId\":14586,\"journal\":{\"name\":\"IO: Productivity\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IO: Productivity\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3690116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IO: Productivity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3690116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The blockchain technology came to light in 2008 as a decentralised peer to peer network structure, with the ability to ensure security for transactions made on bitcoin cryptocurrency, without the need of any central server to validate transactions. Although it started with the advent of cryptocurrencies,it is being used in several areas to develop different projects like electronic voting, supply chain management, banking. With its vast usage, issues arise with potential attacks on mining pools of blockchain. This paper classifies the various mining pool attacks and their existing countermeasures.