Abstract
The paper presents vector of attack on the mechanism of achieving a proof of work consensus, such as the application of selfish mining strategy. The aim of the work was to analyze to what extent these risks may affect the fairness of the cryptocurrency extraction process. This goal was achieved by performing simulations using appropriate models. The aim of the experiment was to check how the choice of parameters affects the distribution of block extraction between network users. We use an algorithm of persistent mining in the pursuit of a longer chain with a modified selfish extraction algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)
Zheng, Z., Xie, S., Dai, H.N., Wang, H.: Blockchain challenges and opportunities: a survey. Work Pap.–2016 (2016)
Kozlowski, P., Kedziora, M., Marianski, A., Jozwiak, I.: Implementation of Research on the Feasibility of a Sybil Attacks in Blockchain Networks, ICSAI 2019 – in review (2019)
Bitcoin Cash. Bitcoin Cash. https://www.bitcoincash.org/
Nayak, K., et al.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS P), pp. 305–320 (2016). https://doi.org/10.1109/eurosp.2016.32
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in Bitcoin. CoRR abs/1507.06183 (2015). arXiv:1507.06183
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). http://bitcoin.org/bitcoin.pdf
Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374–382 (1985). https://doi.org/10.1145/3149.214121. http://doi.acm.org/10.1145/3149.214121, ISSN 0004-5411
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982). https://doi.org/10.1145/357172.357176. http://doi.acm.org/10.1145/357172.357176, ISSN: 0164-0925
Li, W., et al.: Securing proof-of-stake blockchain protocols. In: Garcia-Alfaro, J., et al. (eds.) Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp. 297–315. Springer, Cham (2017). ISBN: 978-3-319-67816-0
Olfati-Saber, R., Fax, J.A., Murray, R.M.: Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95(1), 215–233 (2007). https://doi.org/10.1109/jproc.2006.887293, ISSN: 0018-9219
Quesnelle, J.: On the linkability of Zcash transactions. In: CoRR abs/1712.01210 (2017). arXiv:1712.01210
Zheng, Z., et al.: Blockchain challenges and opportunities: a survey, December 2017
Fanti, G., Viswanath, P.: Deanonymization in the Bitcoin P2P network. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30, pp. 1364–1373. Curran Associates, Inc. (2017). http://papersnips.cc/paper/6735-deanonymization-in-the-bitcoin-p2p-network.pdf
Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. ArXiv e-prints, July 2011. arXiv:1107.4524 [physics.soc-ph]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kędziora, M., Kozłowski, P., Szczepanik, M., Jóźwiak, P. (2020). Analysis of Blockchain Selfish Mining Attacks. In: Borzemski, L., Świątek, J., Wilimowska, Z. (eds) Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology – ISAT 2019. ISAT 2019. Advances in Intelligent Systems and Computing, vol 1050. Springer, Cham. https://doi.org/10.1007/978-3-030-30440-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-30440-9_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30439-3
Online ISBN: 978-3-030-30440-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)