Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain

被引:5
|
作者
Suliyanti, Widya Nita [1 ]
Sari, Riri Fitri [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok, Indonesia
关键词
Blockchain; Proof of Work; PoW; hash rate; double spending; NS-3lockchain; double-spending; security;
D O I
10.1109/ictc46691.2019.8939684
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Blockchain is a distributed public ledger that hold immutable data in a secure and encrypted way to ensure that a transaction is safe and cannot be altered. It is implemented based on a consensus algorithm called Proof-of-Work (PoW) which confirms transactions and produces new blocks to the chain. With PoW, miners compete against each other to complete transactions on the network and get rewarded. In this paper, we simulate bitcoin, which is a well-known example of a Blockchain, to perform tasks such as network and blockchain simulation, and being the subject of a double spending attacks using a framework established by Arthur Gervais. This framework is utilized to evaluate the double-spending behavior of bitcoin based on an average attacker's hashrate as a proxy measure of the security of processed transactions. This stimulation runs in a discrete-event network simulator called NS-3. The result of this simulation shows that an increase in attacker's hashrate is parallel with an increase in number of double-spending attacks, an increase in attacker's income and the number of stale blocks posing a threat to transaction's security. Stale blocks increase the advantage of attacker in the double spending attacks in the network.
引用
收藏
页码:169 / 174
页数:6
相关论文
共 50 条
  • [31] Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach
    Benaddi, Hafsa
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Benslimane, Abderrahim
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [32] Proof-of-work based new encoding scheme for information hiding purposes
    Rajba, Pawel
    Keller, Joerg
    Mazurczyk, Wojciech
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [33] Proof-of-Work for Merkle based Access Tree in Patient Centric Data
    Reddy, B. Ravinder
    Adilakshmi, T.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (01) : 533 - 539
  • [34] Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks
    Jiang, Yiming
    Zhang, Jiangfan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8155 - 8171
  • [35] ECCPoW: Error-Correction Code based Proof-of-Work for ASIC Resistance
    Jung, Hyunjun
    Lee, Heung-No
    SYMMETRY-BASEL, 2020, 12 (06):
  • [36] Efficient Blockchain System based on Proof of Segmented Work
    Monem, Maruf
    Ahmad, Alif
    Jumana
    Ahmed, Rashad
    Arif, Hossain
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 989 - 992
  • [37] Smart contract-based decentralized mining pools for Proof-of-Work blockchains
    Papathanasiou, A. M.
    Kyriakidou, C. D. Nassar
    Pittaras, I.
    Polyzos, G. C.
    2024 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN 2024, 2024, : 227 - 234
  • [38] ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation
    Biedermann, Sebastian
    Karvelas, Nikolaos P.
    Katzenbeisser, Stefan
    Strufe, Thorsten
    Peter, Andreas
    SOFSEM 2014: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2014, 8327 : 114 - 125
  • [39] Proposal of Fair Proof-of-Work System Based on Rating of User's Computing Power
    Nakahara, Ryoya
    Inaba, Hiroyuki
    2018 IEEE 7TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE 2018), 2018, : 746 - 748
  • [40] Fork Rate-based Analysis of the Longest Chain Growth Time Interval of a PoW Blockchain
    Seike, Hirotsugu
    Aoki, Yasukazu
    Koshizuka, Noboru
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 253 - 260