Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain

被引:5
|
作者
Suliyanti, Widya Nita [1 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok, Indonesia
关键词
Blockchain; Proof of Work; PoW; hash rate; double spending; NS-3lockchain; double-spending; security;
D O I
10.1109/ictc46691.2019.8939684
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Blockchain is a distributed public ledger that hold immutable data in a secure and encrypted way to ensure that a transaction is safe and cannot be altered. It is implemented based on a consensus algorithm called Proof-of-Work (PoW) which confirms transactions and produces new blocks to the chain. With PoW, miners compete against each other to complete transactions on the network and get rewarded. In this paper, we simulate bitcoin, which is a well-known example of a Blockchain, to perform tasks such as network and blockchain simulation, and being the subject of a double spending attacks using a framework established by Arthur Gervais. This framework is utilized to evaluate the double-spending behavior of bitcoin based on an average attacker's hashrate as a proxy measure of the security of processed transactions. This stimulation runs in a discrete-event network simulator called NS-3. The result of this simulation shows that an increase in attacker's hashrate is parallel with an increase in number of double-spending attacks, an increase in attacker's income and the number of stale blocks posing a threat to transaction's security. Stale blocks increase the advantage of attacker in the double spending attacks in the network.
引用
收藏
页码:169 / 174
页数:6
相关论文
共 50 条
  • [21] Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune
    Liu, Zhengjun
    Zhao, Hui
    Chen, Wen
    Cao, Xiaochun
    Peng, Haipeng
    Yang, Jin
    Yang, Tao
    Lin, Ping
    THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 133 - 143
  • [22] Trie-Hashimoto: State Trie-Based Proof-of-Work Mining for Optimizing Blockchain Storage
    Kim, Jae-Yun
    Lee, Junmo
    Moon, Soo-Mook
    IEEE ACCESS, 2024, 12 : 18315 - 18329
  • [23] A GENERAL DIFFICULTY CONTROL ALGORITHM FOR PROOF-OF-WORK BASED BLOCKCHAINS
    Zhang, Shulai
    Ma, Xiaoli
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 3077 - 3081
  • [24] Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
    Biryukov, Alex
    Khovratovich, Dmitry
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [25] Partial pre-image attack on Proof-of-Work based blockchains
    Baniata, Hamza
    Kertesz, Attila
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (03):
  • [26] Blockchain Scheme Based on Evolutionary Proof of Work
    Syafruddin, Willa Ariela
    Dadkhah, Sajjad
    Koppen, Mario
    2019 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2019, : 771 - 776
  • [27] ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols (vol 6, pg 66210, 2018)
    Cho, Hyungmin
    IEEE ACCESS, 2019, 7 : 25086 - 25086
  • [28] Blockchain based Double Spending Prevention for Invoice Financing
    Patil, Pradnya
    Sangeetha, M.
    2021 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2021, : 41 - 43
  • [29] Program Error Rate-based Wear Leveling for NAND Hash Memory
    Shi, Xin
    Wu, Fei
    Wang, Shunzhuo
    Xie, Changsheng
    Lu, Zhonghai
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1241 - 1246
  • [30] Lattice-Based Proof-of-Work for Post-Quantum Blockchains
    Behnia, Rouzbeh
    Postlethwaite, Eamonn W.
    Ozmen, Muslum Ozgur
    Yavuz, Attila Altay
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 310 - 318