Game theory attack pricing for mining pools in blockchain-based IoT

被引:1
|
作者
Chen, Yourong [1 ]
Chen, Hao [2 ]
Xiong, Zhenyu [6 ]
Liu, Banteng [1 ]
Wang, Zhangquan [1 ]
Han, Meng [3 ,4 ,5 ]
机构
[1] Zhejiang Shuren Univ, Coll Informat Sci & Technol, Hangzhou 310015, Peoples R China
[2] Hangzhou Dianzi Univ, Coll Elect & Informat, Hangzhou 310018, Peoples R China
[3] Zhejiang Univ, Binjiang Inst, Hangzhou 310053, Peoples R China
[4] Zhejiang Juntong Intelligence Co Ltd, Hangzhou 310053, Peoples R China
[5] Zhejiang Univ, Hangzhou 310027, Peoples R China
[6] Univ Southern Calif, Viterbi Sch Engn, Los Angeles, CA 90089 USA
关键词
Game theory; Blockchain; PoW; Mining pool; Employment attack; SELECTION; ALLOCATION; STRATEGIES;
D O I
10.1016/j.dcan.2022.11.014
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game between the malicious mining pool and the employee, the paper proposes an Employment Attack Pricing Algorithm (EAPA) of mining pools in blockchain based on game theory. In the EAPA, the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack, the revenue increment of malicious mining pools, and the revenue of the employee. It establishes a game model between the malicious mining pool and the employee under the employment attack. Then, the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation. In the strategy, the malicious mining pool analyzes the conditions for the employment attack, and uses the derivative method to find the optimal utilization value of computing power, employees analyze the conditions for accepting employment, and use the derivative method to find the optimal reward value of computing power. Finally, the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation. The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee. The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time. The EAPA outperforms the state-of-the-art methods such as SPSUCP, DPSACP, and FPSUCP.
引用
收藏
页码:973 / 988
页数:16
相关论文
共 50 条
  • [1] Game theory attack pricing for mining pools in blockchain-based IoT
    Yourong Chen
    Hao Chen
    Zhenyu Xiong
    Banteng Liu
    Zhangquan Wang
    Meng Han
    Digital Communications and Networks, 2024, 10 (04) : 973 - 988
  • [2] Coin Hopping Attack in Blockchain-Based IoT
    Zhu, Saide
    Li, Wei
    Li, Hong
    Tian, Ling
    Luo, Guangchun
    Cai, Zhipeng
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4614 - 4626
  • [3] On-Off Attack on a Blockchain-based IoT System
    Moradi, Fereidoun
    Sedaghatbaf, Ali
    Asadollah, Sara Abbaspour
    Causevic, Aida
    Sirjani, Marjan
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 1768 - 1773
  • [4] Blockchain-based Decentralized Reward Sharing: The Case of Mining Pools
    Gudmundsson, Jens
    Hougaard, Jens Leth
    ACM TRANSACTIONS ON ECONOMICS AND COMPUTATION, 2024, 12 (01)
  • [5] Blockchain-Based Equilibrium Anchors Game Pricing Method for Data Element
    Zhang, Jiazheng
    Li, Shouwei
    Li, Jingwei
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT V, ICIC 2024, 2024, 14879 : 229 - 241
  • [6] Data Pricing for Blockchain-based Car Sharing: A Stackelberg Game Approach
    Xu, Chengzhen
    Zhu, Kun
    Yi, Changyan
    Wang, Ran
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [7] Blockchain-based IoT: An Overview
    Raza, Muhammad Raheel
    Varol, Asaf
    Hussain, Walayat
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [8] Enhancing trust and security in IoT computing offloading through game theory and blockchain-based control strategy
    Cao, Dongzhi
    Liang, Peng
    Wu, Tongjuan
    Zhang, Shiqiang
    Zhou, Li
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 36 (15):
  • [9] Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions
    Erfan, Fatemeh
    Bellaiche, Martine
    Halabi, Talal
    2022 FOURTH IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2022), 2022, : 27 - 37
  • [10] Enabling a blockchain-basEd ioT EdgE
    Ali, Muhammad Salek
    Vecchio, Massimo
    Antonelli, Fabio
    IEEE Internet of Things Magazine, 2018, 1 (02): : 24 - 29