A jumping mining attack and solution
- PDF / 3,839,828 Bytes
- 12 Pages / 595.224 x 790.955 pts Page_size
- 83 Downloads / 176 Views
A jumping mining attack and solution Muchuang Hu1 · Jiahui Chen2 · Wensheng Gan3 · Chien-Ming Chen4
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Mining is the important part of the blockchain used the proof of work (PoW) on its consensus, looking for the matching block through testing a number of hash calculations. In order to attract more hash computing power, the miner who finds the proper block can obtain some rewards. Actually, these hash calculations ensure that the data of the blockchain is not easily tampered. Thus, the incentive mechanism for mining affects the security of the blockchain directly. This paper presents an approach to attack against the difficulty adjustment algorithm (abbreviated as DAA) used in blockchain mining, which has a direct impact on miners’ earnings. In this method, the attack miner jumps between different blockchains to get more benefits than the honest miner who keep mining on only one blockchain. We build a probabilistic model to simulate the time to obtain the next block at different hash computing power called hashrate. Based on this model, we analyze the DAAs of the major cryptocurrencies, including Bitcoin, Bitcoin Cash, Zcash, and Bitcoin Gold. We further verify the effectiveness of this attack called jumping mining through simulation experiments, and also get the characters for the attack in the public block data of Bitcoin Gold. Finally, we give an improved DAA scheme against this attack. Extensive experiments are provided to support the efficiency of our designed scheme. Keywords Proof of work · Difficulty adjustment algorithm · Hashrate simulation · Jumping mining attack
1 Introduction In 2009, Nakamoto [1] firstly proposed the original concept of blockchain in the Bitcoin-based peer-to-peer Wensheng Gan
[email protected] Muchuang Hu [email protected] Jiahui Chen [email protected] Chien-Ming Chen [email protected] 1
Department of Science and Technology, People’s Bank of China Guangzhou, Guangzhou 510120, China
2
School of Computer, Guangdong University of Technology, Guangzhou 510632, China
3
College of Cyber Security, Jinan University, Guangzhou 510006, China
4
College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
electronic cash scheme. Since its release, blockchain has been extensively researched and developed globally, and its successful experience has attracted many organizational research on how to use blockchain technology in recent years. So far, there are more than 1,300 blockchain cryptocurrencies in the world, such as Bitcoin, Ethereum [2], Ripple [3], etc. According to incomplete estimates, the cryptocurrency market is currently worth more than 150 billion USD. There is no doubt that we should pay attention to the security of blockchain-based systems. How can these systems against the current or future attacks from the classical (non-quantum) and quantum adversaries is quite important. The blockchain is essentially a distributed consensus sto
Data Loading...