Lightweight blockchain approach to reduce double-spend and 51% attacks on Proof-of-Work

被引:0
|
作者
Nayancy [1 ]
Dutta, Sandip [1 ]
Chakraborty, Soubhik [2 ]
机构
[1] Birla Inst Technol, Dept Comp Sci & Engn, Mesra, Ranchi, India
[2] Birla Inst Technol, Dept Math, Mesra, Ranchi, India
关键词
Blockchain; IoT; lightweight consensus; double-spend attack; 51% attack; ALGORITHM;
D O I
10.3233/IDA-230153
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Blockchain has attracted tremendous attention in recent years due to its significant features including anonymity, security, immutability, and audibility. Blockchain technology has been used in several nonmonetary applications, including Internet-of-Things. Though blockchain has limited resources, and scalability is computationally expensive, resulting in delays and large bandwidth overhead that are unsuitable for many IoT devices. In this paper, we work on a lightweight blockchain approach that is suited for IoT needs and provides end-to-end security. Decentralization is achieved in our lightweight blockchain implementation by building a network with a lot of high-resource devices collaborate to maintain the blockchain. The nodes in the network is arranged in sorted order w.r.t execution time and count to reduce the mining overheads and is accountable for handling the public blockchain. We propose a distributed execution time-based consensus algorithm that decreases the delay and overhead of the mining process. We also propose a randomized node-selection algorithm for the selection of nodes to verify the mined blocks to eliminate the double-spend and 51% attack. The results are encouraging and significantly reduce the mining overhead and keep a check on the double-spending problem and 51% attack.
引用
收藏
页码:1309 / 1319
页数:11
相关论文
共 50 条
  • [1] Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach
    Nicolas, Kervins
    Wang, Yi
    Giakos, George C.
    Wei, Bingyang
    Shen, Hongda
    IEEE ACCESS, 2021, 9 : 3838 - 3857
  • [2] BLOCKCHAIN DOUBLE-SPEND ATTACK DURATION
    Brown, Mark
    Pekoz, Erol
    Ross, Sheldon
    PROBABILITY IN THE ENGINEERING AND INFORMATIONAL SCIENCES, 2021, 35 (04) : 858 - 866
  • [3] Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus
    Karpinski, Mikolaj
    Kovalchuk, Lyudmila
    Kochan, Roman
    Oliynykov, Roman
    Rodinko, Mariia
    Wieclaw, Lukasz
    SENSORS, 2021, 21 (19)
  • [4] Analysis of Proof-of-Work-Based Blockchains Under an Adaptive Double-Spend Attack
    Ramezan, Gholamreza
    Leung, Cyril
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7035 - 7045
  • [5] Preventing proof-of-work mining attacks
    Azimy, Hamid
    Ghorbani, Ali A.
    Bagheri, Ebrahim
    Information Sciences, 2022, 608 : 1503 - 1523
  • [6] Mitigations on Sybil-Based Double-Spend Attacks in Bitcoin
    Zhang, Shijie
    Lee, Jong-Hyouk
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2021, 10 (05) : 23 - 28
  • [7] Preventing proof-of-work mining attacks
    Azimy, Hamid
    Ghorbani, Ali A.
    Bagheri, Ebrahim
    INFORMATION SCIENCES, 2022, 608 : 1503 - 1523
  • [8] Effective scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information
    Yang, Xinle
    Chen, Yang
    Chen, Xiaohu
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 261 - 265
  • [9] Optimal mining in proof-of-work blockchain protocols
    Soria, Jorge
    Moya, Jorge
    Mohazab, Amin
    FINANCE RESEARCH LETTERS, 2023, 53
  • [10] Promoting Cooperative Strategies on Proof-of-Work Blockchain
    Yoo, Seunghyun
    Kim, Seungbae
    Joy, Joshua
    Gerla, Mario
    2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,