2020
DOI: 10.1007/s12243-019-00746-2
|View full text |Cite
|
Sign up to set email alerts
|

On the detection of selfish mining and stalker attacks in blockchain networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(25 citation statements)
references
References 11 publications
0
25
0
Order By: Relevance
“…One defense strategy is proposed recently to detect selfish mining attacks by monitoring blockchain fork heights in real time [119]. In order to get the financial reward, selfish miners secretly hold a chain and disclose it until they can get the biggest chain.…”
Section: F Monitoringmentioning
confidence: 99%
See 1 more Smart Citation
“…One defense strategy is proposed recently to detect selfish mining attacks by monitoring blockchain fork heights in real time [119]. In order to get the financial reward, selfish miners secretly hold a chain and disclose it until they can get the biggest chain.…”
Section: F Monitoringmentioning
confidence: 99%
“…To combat against selfish mining attack, several recent proposed approaches are proved with experiment to mitigate selfish mining attack effectively, including weighted FRP (Fork-Resolving Policy) [113], truth state [112] in the detection type method, blockchain fork heights [119] in the monitoring type method, and SquirRL [116] in the inform type method and chain locks [30] in the conceptual research design type method. Some methods bring a lot of computational overhead which limits the possibility of realworld deployment, such as FruitChain [103] introduced a second mining process, counter mining [111] introduced sensor miners, and new payoff scheme [118].…”
Section: Summarizaton Of Current Researchmentioning
confidence: 99%
“…Eclipse attacks refer to the P2P networks attacks where attackers monopolize all links to the genuine devices and prevent genuine devices from linking to some truthful peers. Eclipse attacks in the blockchain were initially higher in Bitcoin [80], [81] during the randomized protocol, in which a Bitcoin node-link [82] is labelled with a particular number of selected neighbours to maintain blockchain-associated functions and peer-to-peer interactions. The current Ethereum [83] label covers have been excellent against the eclipse attacks during the Kademlia peer-to-peer protocol acquired in Ethereum [84].…”
Section: Eclipse Attacksmentioning
confidence: 99%
“…However, the basic pathway of polysaccharide synthesis of fungi and bacteria has a certain similarity, which is divided into precursor supply, synthesis initiation, monosaccharide polymerization, and polysaccharide output [ 22 ]. Some researchers used the isotope tracer methods to study the pathway of polysaccharide synthesis, and others used molecular means such as gene overexpression to carry out related research [ 23 ].…”
Section: Porus Xylostensis and Drug Packaging Image Technologymentioning
confidence: 99%