Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2021

19.02.2021

The impact of propagation delay to different selfish miners in proof-of-work blockchains

verfasst von: Heli Wang, Qiao Yan, Victor C. M. Leung

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Selfish mining is an attack on the integrity of a blockchain network. Inspired by J. Göbel’s selfish mining model in the presence of propagation delay, we propose a competition model based on spatial Poisson process to study how delay influences the revenue distribution when there are more than one selfish miners. Based on our model, we derive the exact expression of the revenue distribution, and prove that the difference of propagation delays between two selfish miners significantly affects the distribution of mining rewards. Additionally, we find that the required threshold of the mining power for multiple selfish miners is larger than that for a single one. Finally, we discuss how the propagation delay impacts the state transfer machine of each selfish miner.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in iiot. IEEE Transactions on Industrial Informatics Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in iiot. IEEE Transactions on Industrial Informatics
2.
Zurück zum Zitat Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020) Efficient and privacy-preserving medical research support platform against covid-19: A blockchain-based approach. IEEE Consumer Electronics Magazine Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2020) Efficient and privacy-preserving medical research support platform against covid-19: A blockchain-based approach. IEEE Consumer Electronics Magazine
3.
Zurück zum Zitat Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered aaa scheme in the large-scale hetnet. Digital Communications and Networks Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered aaa scheme in the large-scale hetnet. Digital Communications and Networks
4.
Zurück zum Zitat Feng C, Yu K, Aloqaily M, Alazab M, Lv Z, Mumtaz S (2020) Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans Veh Technol 69(11):13784–13795CrossRef Feng C, Yu K, Aloqaily M, Alazab M, Lv Z, Mumtaz S (2020) Attribute-based encryption with parallel outsourced decryption for edge intelligent iov. IEEE Trans Veh Technol 69(11):13784–13795CrossRef
5.
Zurück zum Zitat Iansiti M, Lakhani K (2017) The truth about blockchain. Harvard Business Review 95:118–127 Iansiti M, Lakhani K (2017) The truth about blockchain. Harvard Business Review 95:118–127
6.
Zurück zum Zitat Wang W, Hoang D T, Xiong Z, Niyato D, Wang P, Hu P, Wen Y (2018) A survey on consensus mechanisms and mining management in blockchain networks. CoRR arXiv:abs/1805.02707 Wang W, Hoang D T, Xiong Z, Niyato D, Wang P, Hu P, Wen Y (2018) A survey on consensus mechanisms and mining management in blockchain networks. CoRR arXiv:abs/​1805.​02707
7.
Zurück zum Zitat Nakamoto S et al (2008) Bitcoin. A peer-to-peer electronic cash system Nakamoto S et al (2008) Bitcoin. A peer-to-peer electronic cash system
8.
Zurück zum Zitat Eyal I, Sirer E G (2018) Majority is not enough: Bitcoin mining is vulnerable. Commun ACM 61(7):95–102CrossRef Eyal I, Sirer E G (2018) Majority is not enough: Bitcoin mining is vulnerable. Commun ACM 61(7):95–102CrossRef
9.
Zurück zum Zitat Göbel J, Keeler HP, Krzesinski AE, Taylor PG (2016) Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform Eval 104:23–41CrossRef Göbel J, Keeler HP, Krzesinski AE, Taylor PG (2016) Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform Eval 104:23–41CrossRef
10.
Zurück zum Zitat Kingman JFC (2005) Poisson processes. Encyclopedia of biostatistics 6 Kingman JFC (2005) Poisson processes. Encyclopedia of biostatistics 6
12.
Zurück zum Zitat Saad M, Njilla L, Kamhoua C, Mohaisen A (2019) Countering selfish mining in blockchains. In: 2019 International conference on computing, networking and communications (ICNC), IEEE, pp 360–364 Saad M, Njilla L, Kamhoua C, Mohaisen A (2019) Countering selfish mining in blockchains. In: 2019 International conference on computing, networking and communications (ICNC), IEEE, pp 360–364
13.
Zurück zum Zitat Sapirshtein A, Sompolinsky Y, Zohar A (2016) Optimal selfish mining strategies in bitcoin. In: International conference on financial cryptography and data security, Springer, pp 515–532 Sapirshtein A, Sompolinsky Y, Zohar A (2016) Optimal selfish mining strategies in bitcoin. In: International conference on financial cryptography and data security, Springer, pp 515–532
14.
Zurück zum Zitat Hou C, Zhou M, Ji Y, Daian P, Tramèr F, Fanti G, Juels A (2019) Squirrl: Automating attack discovery on blockchain incentive mechanisms with deep reinforcement learning. CoRR arXiv:abs/1912.01798 Hou C, Zhou M, Ji Y, Daian P, Tramèr F, Fanti G, Juels A (2019) Squirrl: Automating attack discovery on blockchain incentive mechanisms with deep reinforcement learning. CoRR arXiv:abs/​1912.​01798
15.
Zurück zum Zitat Baccelli F, Norros I, Mathieu F (2011) Performance of p2p networks with spatial interactions of peers. RR-771, arXiv:1108.4129: 3 Baccelli F, Norros I, Mathieu F (2011) Performance of p2p networks with spatial interactions of peers. RR-771, arXiv:1108.​4129: 3
16.
Zurück zum Zitat Decker C, Wattenhofer R (2013) Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings, IEEE, pp 1–10 Decker C, Wattenhofer R (2013) Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings, IEEE, pp 1–10
17.
Zurück zum Zitat Donet JAD, Pérez-Sola C, Herrera-Joancomartí J (2014) The bitcoin p2p network. pp 87–102 Donet JAD, Pérez-Sola C, Herrera-Joancomartí J (2014) The bitcoin p2p network. pp 87–102
18.
Zurück zum Zitat Aoki Y, Otsuki K, Kaneko T, Banno R, Shudo K (2019) Simblock: A blockchain network simulator. In: IEEE INFOCOM 2019-IEEE conference on computer communications workshops, INFOCOM WKSHPS, IEEE, pp 325–329 Aoki Y, Otsuki K, Kaneko T, Banno R, Shudo K (2019) Simblock: A blockchain network simulator. In: IEEE INFOCOM 2019-IEEE conference on computer communications workshops, INFOCOM WKSHPS, IEEE, pp 325–329
Metadaten
Titel
The impact of propagation delay to different selfish miners in proof-of-work blockchains
verfasst von
Heli Wang
Qiao Yan
Victor C. M. Leung
Publikationsdatum
19.02.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01087-5

Weitere Artikel der Ausgabe 5/2021

Peer-to-Peer Networking and Applications 5/2021 Zur Ausgabe

Premium Partner