Blockchain-based multi-malicious double-spending attack blacklist management model

被引:3
|
作者
Wang, JunLu [1 ]
Liu, Qiang [1 ]
Song, Baoyan [1 ]
机构
[1] Liaoning Univ, Sch Informat, Shenyang 110036, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2022年 / 78卷 / 12期
基金
中国国家自然科学基金;
关键词
Blacklist management model; Inner loop malicious game; Joint attack model; Decentralized attack model; Blacklist judgment strategy; SYSTEM;
D O I
10.1007/s11227-022-04370-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, blockchain security issues have attracted widespread attention. Especially in terms of computing power security, when nodes have sufficient computing power, they can arbitrarily tamper with blockchain ledger data. As a huge collection of computing power, the blockchain mining pool is a potential malicious node. Multiple malicious nodes jointly conduct a double-spending attack on the blockchain, which brings great security risks to the blockchain. This paper studies the different combinations of double-spending attack by potential malicious mining pools, constructs a blacklist judgment strategy based on the attack characteristics, and proposes a blockchain-based multi-malicious double-spending attack blacklist management model. Firstly, an inner loop malicious game is proposed to analyze the competition trend between a single malicious node and other malicious nodes. Secondly, according to the attack mode of multiple mining pools, a joint attack model and a decentralized attack model are proposed, and the operation rules of the two attack models are mathematically derived. Then a blacklist management model is proposed, and after the blacklist is constructed, a blacklist judgment strategy is formulated. The blacklist uses decentralize mining pool judgments and joint mining pool judgments to extract malicious mining pool nodes, which stops further malicious behavior. And finally, simulation experiments show that the blacklist management model can significantly reduce the success of attacks and resist double-spending attacks effectively.
引用
收藏
页码:14726 / 14755
页数:30
相关论文
共 50 条
  • [1] Blockchain-based multi-malicious double-spending attack blacklist management model
    JunLu Wang
    Qiang Liu
    Baoyan Song
    The Journal of Supercomputing, 2022, 78 : 14726 - 14755
  • [2] Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain
    Suliyanti, Widya Nita
    Sari, Riri Fitri
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 169 - 174
  • [3] Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids
    Xu, Ziqiang
    Salehi Shahraki, Ahmad
    Rudolph, Carsten
    SMART CITIES, 2023, 6 (05): : 3005 - 3031
  • [4] Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses
    Akbar, Nur Arifin
    Muneer, Amgad
    ElHakim, Narmine
    Fati, Suliman Mohamed
    FUTURE INTERNET, 2021, 13 (11)
  • [5] Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks
    Jiang, Yiming
    Zhang, Jiangfan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8155 - 8171
  • [6] A New Blockchain-Based trust management model
    Masmoudi, Mariam
    Zayani, Corinne Amel
    Amous, Ikram
    Sedes, Florence
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 1081 - 1091
  • [7] Research on a Blockchain-Based Medical Data Management Model
    Cao, Xudong
    Xu, Huifen
    Ma, Yuntao
    Xu, Bin
    Qi, Jin
    HEALTH INFORMATION SCIENCE, HIS 2019, 2019, 11837 : 35 - 44
  • [8] A Quantifiable Trust Model for Blockchain-based Identity Management
    Gruener, Andreas
    Muehle, Alexander
    Gayvoronskaya, Tatiana
    Meinel, Christoph
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1475 - 1482
  • [9] Reliability Management for Blockchain-Based Decentralized Multi-Cloud
    Aral, Atakan
    Uriarte, Rafael Brundo
    Simonet-Boulogne, Anthony
    Brandic, Ivona
    2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020), 2020, : 21 - 30
  • [10] A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
    Alshehri, Mohammed
    Panda, Brajendra
    Almakdi, Sultan
    Alazeb, Abdulwahab
    Halawani, Hanan
    Al Mudawi, Naif
    Khan, Riaz U.
    ELECTRONICS, 2021, 10 (24)