On the detection of selfish mining and stalker attacks in blockchain networks

被引:4
作者
Vanessa Chicarino
Célio Albuquerque
Emanuel Jesus
Antônio Rocha
机构
[1] Directorate of Communications and Information Technology of the Brazilian Navy,
[2] Universidade Federal Fluminense (UFF),undefined
来源
Annals of Telecommunications | 2020年 / 75卷
关键词
Blockchain; Selfish mining; Stalker attack; Distributed consensus;
D O I
暂无
中图分类号
学科分类号
摘要
The blockchain technology emerged in 2008 as a distributed peer to peer network structure, capable of ensuring security for transactions made using the Bitcoin digital currency, without the need for third party intermediaries to validate them. Although its beginning was linked to cryptocurrencies, its use has diversified over the recent years. There are various projects using the blockchain technology to perform document validation, electronic voting, tokenization of non-perishable goods, and many others. With its increasing use, concern arises with possible attacks that could threaten the integrity of the consensus of the chain. One of the well-known attacks to the blockchain consensus mechanism is the selfish mining attack, in which malicious nodes can deflect their behavior from the standard pattern by not immediately disclosing their newly mined blocks. This malicious behavior can result in a disproportionate share of rewards for those nodes, especially if they have a significant processing power. The goal of this paper is to present a simple heuristic to detect the presence of selfish mining attack (and variants) in blockchain networks that use the proof-of-work (PoW) consensus algorithm. The proposal is to signal when the blockchain fork height deviates from the standard, indicating when the network is under the influence of such attacks.
引用
收藏
页码:143 / 152
页数:9
相关论文
共 2 条
  • [1] Castro M(2002)Practical byzantine fault tolerance and proactive recovery ACM Trans Comput Syst (TOCS) 20 398-461
  • [2] Liskov B(undefined)undefined undefined undefined undefined-undefined