Bitcoin Selfish Mining Modeling and Dependability Analysis

نویسندگان

چکیده

Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this can be utilized in different aspects of industry, market, and governmental departments. Due to safety-critical security-critical nature their uses, it is pivotal model dependability blockchain-based systems. In study, we focus on Bitcoin, a peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method put forward quantify Bitcoin system under selfish mining attacks. Numerical results are provided examine influences several key parameters related miners’ computing power, attack triggering, honest recovery capability. The conclusion based research may contribute design resilience algorithms enhance self-defense robustness

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Selfish Mining Strategies in Bitcoin

Bitcoin is a decentralized crypto-currency, and an accompanying protocol, created in 2008. Bitcoin nodes continuously generate and propagate blocks—collections of newly approved transactions that are added to Bitcoin’s ledger. Block creation requires nodes to invest computational resources, but also carries a reward in the form of bitcoins that are paid to the creator. While the protocol requir...

متن کامل

Bitcoin Mining based Botnet Analysis

Bitcoin, a decentralized P2P currency in recent years has gained a tremendous attention due to its ability to create anonymous financial transactions. This leads to bitcoins being the choice of currency for users having privacy as a important issue. Bitcoin mining, a process resulting in the generation of new bitcoins, is performed by miner operators for reception of incentives in the form of B...

متن کامل

Bitcoin Mining Decentralization via Cost Analysis

Bitcoin mining presents a significant economic incentive for efficient hashing and broadcast of data, both parameters stemming from the Proofs-of-Work used to advance the network. This incentive has led to the development of Bitcoin-specific application-specific integrated circuits (ASICs) and centralized mining pools, undermining the decentralized motivations behind Bitcoin’s design. In additi...

متن کامل

Analysis of Bitcoin Pooled Mining Reward Systems

In this paper we describe the various scoring systems used to calculate rewards of participants in Bitcoin pooled mining, explain the problems each were designed to solve and analyze their respective advantages and disadvantages.

متن کامل

Broadcasting Intermediate Blocks as a Defense Mechanism against Selfish Mining in Bitcoin

Although adopted by many cryptocurrencies, the Bitcoin mining protocol is not incentive-compatible, as the selfish mining strategy enables a miner to gain unfair mining rewards. Existing defenses either demand fundamental changes to block validity rules or have little effect on an attacker with more than one third of the total mining power. This paper proposes an effective defense mechanism aga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of mathematical, engineering and management sciences

سال: 2022

ISSN: ['2455-7749']

DOI: https://doi.org/10.33889/ijmems.2022.7.1.002