How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach

被引:1
|
作者
Zhu, Haorao [1 ]
Yang, Runkai [1 ]
Misic, Jelena [2 ]
Misic, Vojislav B. [2 ]
Chang, Xiaolin [1 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing, Peoples R China
[2] Ryerson Univ, Toronto, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Bitcoin; Ethereum; Fork After Withholding; Proof of Work;
D O I
10.1109/ICC45855.2022.9838837
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Malignant miners with small computing power can achieve unfair revenue and degrade system throughput through launching Fork after withholding (FAW) attack in a Proof-of-Work (PoW) blockchain system. The existing works about FAW attack have some of the following issues: (i) only studying Bitcoin blockchain, (ii) assuming that the blockchain network is perfect and then ignoring forks due to block propagation delay, and (iii) assuming that there is only one pool under attack. This paper attempts to investigate FAW attack in imperfect Bitcoin and Ethereum networks where malicious miners attack multiple victim pools. We develop a simulator to capture the chain dynamics under FAW attack in a PoW system where the longest-chain protocol is used. Two different computing power allocation strategies for malicious miners, PAS and EAS, are investigated in terms of the profitability of FAW adversaries, the loss of victims, and the blockchain throughput. The results reveal that FAW adversaries can get more revenue under PAS when more victim pools are subjected to attack in both Bitcoin and Ethereum. If FAW adversaries adopt EAS and the number of victims vary from 1 to 12, they can get maximal revenue when attack 7 victims in Bitcoin. The blockchain throughput decreases significantly under PAS while it is almost unchanged under EAS with the increasing number of victims in both Bitcoin and Ethereum. Our work helps the design of countermeasures against FAW attack.
引用
收藏
页码:4199 / 4204
页数:6
相关论文
共 50 条
  • [21] Does simulation-based training have a future in Africa?
    Burch, Vanessa
    AFRICAN JOURNAL OF HEALTH PROFESSIONS EDUCATION, 2014, 6 (02): : 117 - 118
  • [22] Impact and Implementation of Simulation-Based Training for Safety
    Bilotta, Federico F.
    Werner, Samantha M.
    Bergese, Sergio D.
    Rosa, Giovanni
    SCIENTIFIC WORLD JOURNAL, 2013,
  • [23] Simulation-based approach for avoiding external faults
    Akhtar, Naveed
    Kuestenmacher, Anastassia
    Ploeger, Paul G.
    Lakemeyer, Gerhard
    2013 16TH INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS (ICAR), 2013,
  • [24] Simulation-based Approach to Classification of Airborne Drones
    Lehmann, Lasse
    Dall, Jorgen
    2020 IEEE RADAR CONFERENCE (RADARCONF20), 2020,
  • [25] Flight Schedule Recovery: A Simulation-Based Approach
    Wang, Derui
    Wu, Yanfeng
    Hu, Jian-Qiang
    Liu, Miaomiao
    Yu, Peiwen
    Zhang, Cheng
    Wu, Yan
    ASIA-PACIFIC JOURNAL OF OPERATIONAL RESEARCH, 2019, 36 (06)
  • [26] A Simulation-Based Approach for Automated Feature Localization
    Malburg, Jan
    Finder, Alexander
    Fey, Goerschwin
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (12) : 1886 - 1899
  • [27] Training in Interventional Radiology: A Simulation-Based Approach
    Mandal, Indrajeet
    Ojha, Utkarsh
    JOURNAL OF MEDICAL EDUCATION AND CURRICULAR DEVELOPMENT, 2020, 7
  • [28] A modular approach for simulation-based optimization of MEMS
    Schneider, P
    Huck, E
    Reitz, S
    Parodat, S
    Schneider, A
    Schwarz, P
    DESIGN, MODELING AND SIMULATION IN MICROELECTRONICS, 2000, 4228 : 71 - 82
  • [29] A simulation-based approach to congestion problem in cafeteria
    Ito, Teruaki
    AMS 2007: First Asia International Conference on Modelling & Simulation Asia Modelling Symposium, Proceedings, 2007, : 465 - 470