2019
DOI: 10.1007/978-3-030-30440-9_22
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Blockchain Selfish Mining Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Several authors have suggested ways to detect this attack but stopped short of doing any research into it (Göbel et al, 2016;Eyal and Sirer, 2018). A few papers researched detection but only focused on a single factor or only worked on detection in a single stage (Chicarino et al, 2020;Kędziora et al, 2020;Liu et al, 2020). Blockchain developers have released patches to prevent selfish mining, but without reliable detection, it is impossible to tell if these patches were successful.…”
Section: Matthew Peterson Todd Andel and Ryan Bentonmentioning
confidence: 99%
See 1 more Smart Citation
“…Several authors have suggested ways to detect this attack but stopped short of doing any research into it (Göbel et al, 2016;Eyal and Sirer, 2018). A few papers researched detection but only focused on a single factor or only worked on detection in a single stage (Chicarino et al, 2020;Kędziora et al, 2020;Liu et al, 2020). Blockchain developers have released patches to prevent selfish mining, but without reliable detection, it is impossible to tell if these patches were successful.…”
Section: Matthew Peterson Todd Andel and Ryan Bentonmentioning
confidence: 99%
“…Another paper examined different combinations of parameters and how they influenced the vulnerability of the blockchain network (Kędziora et al, 2020). The parameters under study were the difference between the selfish miner's chain and the honest chain, the number of connections made by the selfish miners, and the total hashing power of the selfish miners.…”
Section: Matthew Peterson Todd Andel and Ryan Bentonmentioning
confidence: 99%
“…Due to the dynamic fluctuations of the network conditions of the miners in reality, the first block of a fork that is propagated to a miner in irrelevant mining pools can be arbitrary and hence the chain selection of a miner in irrelevant mining pools is modeled as a random choice. Note that similar to existing studies [11], [12], in this modeling study we do not consider the selfish mining attacks by some minority miners [19] to enable tractable analysis.…”
Section: Temporary Fork Modelingmentioning
confidence: 99%
“…Data and experiment analysis. Other research work needs to be mentioned, for example, Wright [93], Wright and Savanah [94], Eijkel and Fehnker [21] and Kedziora et al [44].…”
Section: Advances In Blockchain Selfish Miningmentioning
confidence: 99%