2019 International Conference on Computing, Networking and Communications (ICNC) 2019
DOI: 10.1109/iccnc.2019.8685577
|View full text |Cite
|
Sign up to set email alerts
|

Countering Selfish Mining in Blockchains

Abstract: Selfish mining is a well known vulnerability in blockchains exploited by miners to steal block rewards. In this paper, we explore a new form of selfish mining attack that guarantees high rewards with low cost. We show the feasibility of this attack facilitated by recent developments in blockchain technology opening new attack avenues. By outlining the limitations of existing countermeasures, we highlight a need for new defense strategies to counter this attack, and leverage key system parameters in blockchain … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(36 citation statements)
references
References 14 publications
0
35
0
1
Order By: Relevance
“…Their proposed design incorporates nonoutsourceable puzzles in PoW, in which mining pools that outsource their mining work risk losing mining rewards. Saad et al [144] leveraged the expected transaction confirmation height and the block publishing height to detect selfish mining behavior in PoW-based Blockchains. Using the relationship between the two features, they created a "truth state" for each published block in order to distinguish between a legitimate block and a selfishly mined block.…”
Section: H Countering Peer-to-peer Attacksmentioning
confidence: 99%
“…Their proposed design incorporates nonoutsourceable puzzles in PoW, in which mining pools that outsource their mining work risk losing mining rewards. Saad et al [144] leveraged the expected transaction confirmation height and the block publishing height to detect selfish mining behavior in PoW-based Blockchains. Using the relationship between the two features, they created a "truth state" for each published block in order to distinguish between a legitimate block and a selfishly mined block.…”
Section: H Countering Peer-to-peer Attacksmentioning
confidence: 99%
“…The countermeasures are categorised under six defensive strategies. The study [130] utilised the notion of "truth state" for blocks by adding the expected confirmation height parameter in each transaction data structure to recognise selfish mining in the network.…”
Section: ) Selfish Mining Attacksmentioning
confidence: 99%
“…The "truth state" is another detection method [112]. This strategy is ideally integrated for the fork instant and used to identify selfish mining attacks.…”
Section: Detectionmentioning
confidence: 99%
“…To combat against selfish mining attack, several recent proposed approaches are proved with experiment to mitigate selfish mining attack effectively, including weighted FRP (Fork-Resolving Policy) [113], truth state [112] in the detection type method, blockchain fork heights [119] in the monitoring type method, and SquirRL [116] in the inform type method and chain locks [30] in the conceptual research design type method. Some methods bring a lot of computational overhead which limits the possibility of realworld deployment, such as FruitChain [103] introduced a second mining process, counter mining [111] introduced sensor miners, and new payoff scheme [118].…”
Section: Summarizaton Of Current Researchmentioning
confidence: 99%