Next Article in Journal
Performance Evaluation of Available Strains of Nile Tilapia (Oreochromis niloticus) Fed Commercial and Locally-Made Feeds in the Democratic Republic of the Congo
Next Article in Special Issue
A Knowledge Sharing and Individually Guided Evolutionary Algorithm for Multi-Task Optimization Problems
Previous Article in Journal
Special Issue on Microstructural and Mechanical Properties of Metallic Materials, Volume II
Previous Article in Special Issue
LAN Intrusion Detection Using Convolutional Neural Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability

1
Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, MA 02747, USA
2
Department of Electrical and Computer Engineering, University of Hartford, Hartford, CT 06117, USA
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(1), 422; https://doi.org/10.3390/app13010422
Submission received: 11 November 2022 / Revised: 21 December 2022 / Accepted: 23 December 2022 / Published: 29 December 2022

Abstract

:
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining protocol, the attackers are able to collect unfair mining rewards by intentionally withholding blocks. The existing works on selfish mining mostly focused on cryptography design, and malicious behavior detection based on different approaches, such as machine learning or timestamp. Most defense strategies show their effectiveness in the perspective of reward reduced. No work has been performed to design a defense strategy that aims to improve bitcoin dependability and provide a framework for quantitively evaluating the improvement. In this paper, we contribute by proposing two network-wide defensive strategies: the dynamic difficulty adjustment algorithm (DDAA) and the acceptance limitation policy (ALP). The DDAA increases the mining difficulty dynamically once a selfish mining behavior is detected, while the ALP incorporates a limitation to the acceptance rate when multiple blocks are broadcast at the same time. Both strategies are designed to disincentivize dishonest selfish miners and increase the system’s resilience to the selfish mining attack. A continuous-time Markov chain model is used to quantify the improvement in bitcoin dependability made by the proposed defense strategies. Statistical analysis is applied to evaluate the feasibility of the proposed strategies. The proposed DDAA and ALP methods are also compared to an existing timestamp-based defense strategy, revealing that the DDAA is the most effective in improving bitcoin’s dependability.

1. Introduction

Blockchain technology has attracted intensive attention from industries, academia, and governments in the past decade [1,2,3,4]. A blockchain is a distributed cryptographic ledger, which consists of a growing list of data packages called blocks. Each block contains a timestamp, the transaction record, and the hash value of the previous block [5]. Its applications span from smart contracts to financial services, from voting to energy trading, and from supply chains to the Internet of Things [6,7,8,9,10]. In this paper, we focus on bitcoin, a peer-to-peer decentralized cryptocurrency system based on blockchain technology [11,12], with a market cap of exceeding USD 1 trillion in October 2021.
Because of being business-critical, bitcoin has become the target of diverse cyber-attacks, including, for example, Sybil attacks [13], Eclipse attacks [14,15], mining pool attacks [16], re-identification attacks [17], miner attacks [18], CryptoLocker-based attacks [19], and selfish mining attacks [20]. Correspondingly, considerable studies were expended in developing mitigation and defense strategies against those attacks. For example, Gervais et al. examined multiple countermeasures (including dynamic timeouts, updating block advertisements, and penalizing nodes that do not respond) to enhance the security of bitcoin [21]. Bamert et al. put forward a hardware token for securing transactions of bitcoin [22]. Göbel et al. applied Markov chains to detect block-hiding attacks by monitoring the production rate of orphan blocks [23]. In this work, we aim to develop effective strategies to defend the selfish mining attacks, also referred to as block withholding attacks. In such attacks, a selfish miner intentionally keeps the newly mined blocks for building his/her own branch and publishes the private branch to gain unfair revenue when the private branch is longer than the main chain by a certain number of blocks.
Considerable research efforts were devoted to the defense against selfish mining attacks. For example, Heilman proposed a timestamp-based method to examine and control the acceptance of new blocks [24]. Eyal and Sirer suggested a mitigation strategy based on the modification of the bitcoin protocol to cope with collusive selfish mining attacks [20]. Saad et al. developed a network-wide defense mechanism using expected transaction confirmation height and block publishing height [25]. A notion of the “truth state” was introduced to detect potential selfish mining behaviors. Wang et al. suggested a machine learning-based system (ForkDec) for highly accurate selfish mining detection [26]. Bicer et al. proposed a selfish mining mitigation algorithm called Fortis, which does not require a trusted authority for timestamps and protects the honest miner’s benefit against any attacker with a computational power of less than 27% [27]. Solat et al. proposed a solution named ZeroBlock to prevent honest nodes from accepting chains infested with block withholding; under this solution, miners are forced to release their blocks within an expected time, otherwise, their mined blocks expire and are rejected by honest miners [28]. Chen et al. proposed a prevention method for the block-withholding attack (PMBWA) based on a credit-level classification algorithm [29]. The algorithm weighs similarity and posterior probability to detect malicious behaviors.
In addition to the defense solutions, there are also studies on the analysis of bitcoin under selfish mining attacks. For example, Wang et al. put forward a mathematical model to investigate the effectiveness of selfish mining attacks, particularly the relationship between computational power and extra mining gain [30]. Motlagh et al. suggested an analytical model to investigate the impacts of selfish mining on the node response time, connectivity of the bitcoin, block delivery time, and arrival rate [31]. Yang et al. used a Markov model to assess the mining revenue, as well as the risk of bitcoin under selfish mining attacks [32]. Xia et al. investigated the influences of multiple miners on selfish mining and the vulnerability of bitcoin under different orphan rates [33]. Zhou et al. suggested a continuous-time Markov chain-based method to estimate the dependability of bitcoin with selfish mining behavior and examined the effects of several attacking and defending parameters on bitcoin dependability, where the dependability is defined as the probability that the system can function normally, i.e., the selfish mining attack is not successful [34].
This work makes contributions by suggesting defense strategies against selfish mining attacks. Particularly, two strategies, referred to as dynamic difficulty adjustment algorithm (DDAA) and the acceptance limitation policy (ALP), are proposed. Their performance and feasibility are investigated and compared through an analytical modeling method and statistical analysis. The results show the improvement using the proposed strategies is statistically significant. The proposed DDAA and ALP methods are also compared to an existing defense strategy to show their effectiveness.
The rest of the paper is arranged as follows. Section 2 presents the state transition diagram of bitcoin under the selfish mining attack and reviews the continuous-time Markov chain (CTMC)-based method for the dependability analysis. Section 3 introduces the DDAA strategy and shows the dependability improvement under this strategy. Optimal parameter selection is also discussed. Section 4 introduces the ALP strategy. Optimal parameter selection and strategy comparison are also discussed. Section 5 compares the proposed DDAA and ALP strategies with an existing timestamp-based method. Section 6 summarizes our research results and points out future study directions.

2. CTMC-Based Dependability Analysis

Figure 1 illustrates the main states and transitions among the states for bitcoin subject to selfish mining under the three-block strategy in the CTMC model.
State 0 is the initial state, where only one main chain exists without any branches. The system may transit from state 0 to state 1 when a malicious miner (MM) finds a block but keeps it secretly, leading to a private branch that is one block longer than the main chain; the transition rate is assumed to be λ01. The system stays in state 0 with a rate of µ00 if an honest miner (HM) mines the block first.
The system may transit from state 1 to state 2 when the MM successfully mines the next block on his/her private branch; the transition rate is denoted as λ12. The system transits from state 1 to state 0′ when the HM mines the next block before the MM; the transition rate is denoted as µ10′.
The system may transit from state 0′ to state 1 when the MM finds the new block first making the private branch one block longer than the main chain; the transition rate is λ0′1. The system goes back to state 0 from state 0′ if the HM finds the new block first; the transition rate is µ020320.
The system may transit from state 2 to state 3 when the MM discovers the next block first; the transition rate is λ23. The system transits from state 2 to state 1 if the HM discovers the next block first; the transition rate is µ21.
The system may transit from state 3 to state 4 when the HM successfully discovers the next block; the transition rate is λ34. In state 4, the MM broadcasts the private branch making it the main branch, thus the selfish mining attack succeeds.
Based on the state transition diagram in Figure 1, Equation (1) gives the state equations of the CTMC with the transition rate matrix and the state probability vector on the left-hand side and the vector of the state probabilities’ derivative on the right-hand side. Specifically, P k ( t ) in Equation (1) represents the probability that the bitcoin occupies state k (k = 0, 0′, 1, 2, 3, 4), and P k ˙ ( t ) represents the derivative of P k ( t ) .
λ 01 μ 0 0 0 0 0 0 0 μ 0 0 + λ 0 1 μ 10 0 0 0 λ 01 λ 0 1 μ 10 + λ 12 μ 21 0 0 0 0 λ 12 μ 21 + λ 23 0 0 0 0 0 λ 23 λ 34 0 0 0 0 0 λ 34 0 P 0 ( t ) P 0 ( t ) P 1 ( t ) P 2 ( t ) P 3 ( t ) P 4 ( t ) = P ˙ 0 ( t ) P ˙ 0 ( t ) P ˙ 1 ( t ) P ˙ 2 ( t ) P ˙ 3 ( t ) P ˙ 4 ( t )
Applying the Laplace transform-based method using the initial state probabilities of   P 0 ( 0 ) = 1 and P k ( t ) = 0 (for k = 0 ,   1 ,   2 ,   3 ,   4 ) , as well as the condition of k = 0 , 0 4 P k ( t ) = 1 , the state probabilities P k ( t ) can be obtained. Refer to [34] for a detailed solution. The bitcoin dependability is D(t) = 1 − P4(t) since the selfish mining attack succeeds in state 4. The CTMC-based method presented in this section is applied in Section 3 and Section 4 to evaluate the performance of the proposed defense strategies.

3. Dynamic Difficulty Adjustment Algorithm (DDAA)

In the bitcoin protocol, a difficulty parameter controls the overall mining difficulty. To counter the selfish mining attack, we propose the DDAA, which increases the mining difficulty (i.e., requiring higher computing power requirements) by adjusting the difficulty parameter when a successful selfish mining attack is committed. The increasing cost of the malicious attack because of the increasing computing power requirement disincentivizes any future attacks.
Specifically, let K be the difficulty controlling parameter, H be the hash rate that is determined by the available computing power and the value of K, β be the difficulty adjustment parameter, and λ be the state transition rate. In the proposed DDAA, H is negatively correlated with K because an increase in K means a decrease in the hash rate H (H_new). More specifically, a larger K means that more computation and power resources are needed to mine a block; given the same available resources, the hash rate decreases. In other words, to maintain the same hash rate, when K increases, an MM needs to upgrade their computing hardware, which reduces his/her attack reward, thus disincentivizing the attack.
Because a too big β will heavily decelerate the new block generation speed, thus affecting the normal mining process, to control the variance and reduce the impact on the bitcoin network, in our study we set a range for parameter β as 1 < β < 2 (meaning that the increase in the computing power requirement cannot exceed the twice of the original computing power requirement). In the context of the quantitative dependability analysis, the adjustments in K and H are reflected in the decrease in all the λ transition rates. Equation (2) gives the updating formula for K, H, and λ.
K _ n e w = β × K ,   H _ n e w = H / β , and λ _ n e w = λ / β .
To analyze the effectiveness and performance of the suggested DDAA, we evaluate the bitcoin dependability before and after the difficulty adjustment. Table 1 presents the transition rates related to the MM’s computing power (λ01 ,   λ 0 1 ,  λ12 ,  λ23 ,  λ34) and the transition rates related to the HM’s recovery capability ( μ 0 0 ,   μ 10 ,   μ 21 ). The values of those transition rates are designed based on the statistics and studies from [35]. Specifically, values in sets a, b, and c are the original values corresponding to the low, medium, and high computing power of the MM. Using Equation (2) with β = 1.25 (selected for the illustration purpose), the adjusted values of all λ are presented in sets a′, b′, and c′ in Table 1.

3.1. Effects of the DDAA on Bitcoin Dependability

Table 2 presents bitcoin dependability at different mission times under the six sets of parameters (calculated using the CTMC-based method in Section 2) and the difference in the dependability values for each comparison. Figure 2, Figure 3 and Figure 4 illustrate the results graphically. It is apparent that bitcoin dependability improves after the adjustment and the improvement becomes more significant as the mission time proceeds.
We apply the paired t-test to examine the effects of the proposed DDAA algorithm. A significant result should prove the feasibility of the algorithm. Before each t-test, we run the F-test to examine the homogeneity of variance of each data pair [36]. Table 3 summarizes the results of the F-test and t-test for each comparison.
For each comparison, the p-value obtained in the F-test is greater than 0.05. So, we accept the null hypothesis. The two datasets in each comparison pass the homogeneity of the variance test. The p-value obtained in the t-test is less than 0.05. So, we reject the null hypothesis. Thus, the dependability values of the two sets in each comparison are significantly different, and the dependability after the adjustment is significantly higher than that before the adjustment.

3.2. Optimal Parameter Selection for Parameter β

In this section, we examine the optimal value selection for the key parameter β using set a. In other words, we determine the value of β that can offer the largest degree of improvement in Bitcoin dependability under the DDAA strategy. We run a series of tests with different values of β. Among the values tested, the lowest p-value is obtained at β = 1.43, as shown in Table 4 and Figure 5. Bitcoin dependability under the DDAA with β = 1.43 at t = 36 h is 0.983.

4. Acceptance Limitation Policy (ALP)

The traditional bitcoin system adopts the proof-of-work (POW) protocol as its consensus mechanism. The longest chain broadcast is accepted as the valid version of the bitcoin main chain. The selfish mining attacker takes advantage of this mechanism by intentionally withholding his/her mined blocks and publishing his/her longer private chain. The ALP intends to set a limitation to the acceptance ratio when multiple blocks are broadcast at the same time. Let γ be the limitation ratio. This process is equal to reducing the transition rate λ34 using Equation (3):
λ34_new = λ34 × γ where 0 < γ ≤ 1
To investigate the effectiveness of the ALP, we apply Equation (3) to generate the parameter set a″ based on set a, and both are presented in Table 5.
Figure 6 shows bitcoin dependability for five different values of γ, where γ = 1 corresponds to the case before the adjustment. It is observed that as the value of γ decreases, the improvement in bitcoin dependability becomes more significant.
To select the optimal value for the key parameter γ (i.e., the value that provides the largest degree of dependability improvement), we run a series of tests using different values of γ and compute the p-value. Among the values of γ tested, the lowest p-value 0.0033 is obtained at γ = 0.8, as shown in Table 6 and Figure 7.
It can be observed from the above results that the optimal p-value under the ALP is 0.0033, which is lower than the optimal p-value of 0.0145 obtained under the DDAA (Section 3.2). Therefore, in terms of the degree of improving dependability, the ALP performs better than the DDAA in defending selfish mining attacks. However, in terms of the absolute improvement in dependability, the DDAA is more effective than the ALP since the DDAA works on λ01, λ0′1, λ12, λ23, and λ34, while the ALP only reduces one of those transition rates λ34.

5. Comparative Studies

Heilman suggested a timestamp-based method (TM) to defend selfish mining [24]. The TM-based strategy applies an unforgeable timestamp to ensure that a particular block is mined no later than the timestamp. A random beacon is used as an input to a block. Any miner can act like a verifier to prove that a block has been mined recently. Thus, any block without a timestamp or with an out-of-date timestamp is dropped upon detection. This process is equal to reducing the transition rates μ 0 0 ,   μ 10 , and μ 21 using Equation (4):
μ_new = μ × ω where ω > 1
To compare the effectiveness of the proposed methods and the existing TM method, we use Equation (2) with β = 1.2, 1.4, and 1.6 (for the DDAA), Equation (3) with γ = 1/1.2, 1/1.4, and 1/1.6 (for the ALP), and Equation (4) with ω = 1.2, 1.4, and 1.6 (for the TM) to adjust the parameter set a in Table 1, as summarized in Table 7.
The results in Table 8 and Figure 8 show that for every comparison group (β = ω = 1/γ = 1.2, 1.4, and 1.6), the bitcoin system under the DDAA always has the highest dependability among the three defense strategies. Thus, we conclude that the DDAA has better defense effectiveness than the TM and ALP approaches in terms of absolute dependability improvement.

6. Conclusions and Future Directions

The bitcoin network is developed based on blockchain technology. It is considered one of the most dependable systems because of its distributed, decentralized, and unchangeable features. However, there are diverse attacks targeting bitcoin in the past few years (e.g., Eclipse attacks, Sybil attacks, and selfish mining attacks), which have caused tremendous losses. This work focuses on the selfish mining attack, where selfish miners intentionally withhold the mined block and build their own private chain. The malicious miners then publish their longer chain at a certain point in time to win all mining rewards. Most of the existing research on the selfish mining attack focused on adversary risk detection and cryptography design. There is a lack of studies on strategies that improve bitcoin system dependability and on the statistical proof of the significance of the effectiveness. Our research contributes to the state of the art by designing two defense strategies of the DDAA and ALP and verifying their effectiveness using the CTMC-based dependability analysis, as well as the t-test-based statistical analysis. The analysis results show that both strategies can greatly improve bitcoin dependability. Additionally, by comparing the optimal cases, it was found that the ALP performs better than the DDAA in the degree of dependability improvement. The two proposed strategies are also compared with the existing TM-based strategy. The comparative studies show that the DDAA is the most effective in improving bitcoin dependability.
In a future study, we will extend the defense strategies designed in this work to mitigate other types of attacks, such as Eclipse attacks and Sybil attacks. We also plan to develop a universal defense strategy to improve the resilience of the blockchain-based digital currency network.

Author Contributions

Methodology, C.Z.; Validation, Q.L. and H.W.; Investigation, C.Z.; Data curation, C.Z.; Writing—original draft, C.Z. and L.X.; Writing—review & editing, L.X., Q.L. and H.W.; Visualization, C.Z.; Supervision, L.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Cybersecurity Graduate Research Fellowship from the University of Massachusetts Dartmouth Cybersecurity Center.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bhushan, B.; Sahoo, C.; Sinha, P.; Khamparia, A. Unification of Blockchain and Internet of Things (BIoT): Requirements, working model, challenges and future directions. Wirel. Netw. 2021, 27, 55–90. [Google Scholar] [CrossRef]
  2. Dai, H.N.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A survey. IEEE Internet Things J. 2019, 6, 8076–8094. [Google Scholar] [CrossRef] [Green Version]
  3. Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet Things J. 2018, 6, 2188–2204. [Google Scholar] [CrossRef] [Green Version]
  4. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
  5. Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [Google Scholar] [CrossRef]
  6. Akbari, E.; Wu, Q.; Zhao, W.; Arabnia, H.R.; Yang, M.Q. From blockchain to internet-based Voting. In Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 14–16 December 2017; pp. 218–221. [Google Scholar]
  7. Frizzo-Barker, J.; Chow-White, P.A.; Adams, P.R.; Mentanko, J.; Ha, D.; Green, S. Blockchain as a disruptive technology for business: A systematic review. Int. J. Inf. Manag. 2020, 51, 102029. [Google Scholar] [CrossRef]
  8. Wongthongtham, P.; Marrable, D.; Abu-Salih, B.; Liu, X.; Morrison, G. Blockchain-enabled Peer-to-Peer energy trading. Comput. Electr. Eng. 2021, 94, 107299. [Google Scholar] [CrossRef]
  9. Xing, L. Reliability in Internet of Things: Current status and future perspectives. IEEE Internet Things J. 2020, 7, 6704–6721. [Google Scholar] [CrossRef]
  10. Xing, L. Cascading failures in Internet of Things: Review and perspectives on reliability and resilience. IEEE Internet Things J. 2021, 8, 44–64. [Google Scholar] [CrossRef]
  11. Satoshi, N. Bitcoin: A peer-to-peer electronic cash system. Consulted 2008, 1, 28. [Google Scholar]
  12. Tschorsch, F.; Scheuermann, B. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. IEEE Commun. Surv. Tutor. 2016, 18, 2084–2123. [Google Scholar] [CrossRef]
  13. Zhang, S.; Lee, J.H. Double-spending with a sybil attack in the Bitcoin decentralized network. IEEE Trans. Ind. Inform. 2019, 15, 5715–5722. [Google Scholar] [CrossRef]
  14. Zhou, C.; Xing, L.; Liu, Q. Dependability Analysis of Bitcoin subject to Eclipse Attacks. Int. J. Math. Eng. Manag. Sci. 2021, 6, 469–479. [Google Scholar] [CrossRef]
  15. Zhou, C.; Xing, L.; Liu, Q.; Wang, H. Semi-Markov Based Dependability Modeling of Bitcoin Nodes under Eclipse Attacks and State-Dependent Mitigation. Int. J. Math. Eng. Manag. Sci. 2021, 6, 480–492. [Google Scholar] [CrossRef]
  16. Bahack, L. Theoretical Bitcoin attacks with less than half of the computational power (draft). arXiv 2013, arXiv:1312.7013. Available online: https://eprint.iacr.org/2013/868.pdf (accessed on 3 September 2022).
  17. Meiklejohn, S.; Pomarole, M.; Jordan, G.; Levchenko, K.; McCoy, D.; Voelker, G.M.; Savage, S. A fistful of Bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement Conference, Barcelona, Spain, 23–25 October 2013; pp. 127–140. [Google Scholar]
  18. Rosenfeld, M. Analysis of Bitcoin pooled mining reward systems. arXiv 2011, arXiv:1112.4980. [Google Scholar]
  19. Liao, K.; Zhao, Z.; Doupé, A.; Ahn, G.J. Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin. In Proceedings of the 2016 APWG Symposium on Electronic Crime Research (eCrime), Toronto, ON, Canada, 1–3 June 2016; pp. 1–13. [Google Scholar]
  20. Eyal, I.; Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. In International Conference on Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2014; pp. 436–454. [Google Scholar]
  21. Gervais, A.; Ritzdorf, H.; Karame, G.O.; Capkun, S. Tampering with the delivery of blocks and transactions in Bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12 October 2015; pp. 692–705. [Google Scholar]
  22. Bamert, T.; Decker, C.; Wattenhofer, R.; Welten, S. Bluewallet: The secure Bitcoin wallet. In International Workshop on Security and Trust Management; Springer: Cham, Switzerland, 2014; pp. 65–80. [Google Scholar]
  23. Göbel, J.; Keeler, H.P.; Krzesinski, A.E.; Taylor, P.G. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform. Eval. 2016, 104, 23–41. [Google Scholar] [CrossRef] [Green Version]
  24. Heilman, E. One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In Proceedings of the Financial Cryptography Data Security, Christ Church, Barbados, 7 March 2014; pp. 161–162. [Google Scholar]
  25. Saad, M.; Njilla, L.; Kamhoua, C.; Mohaisen, A. Countering selfish mining in blockchains. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; pp. 360–364. [Google Scholar]
  26. Wang, Z.; Lv, Q.; Lu, Z.; Wang, Y.; Yue, S. ForkDec: Accurate Detection for Selfish Mining Attacks. Secur. Commun. Netw. 2021, 2021, 5959698. [Google Scholar] [CrossRef]
  27. Biçer, O.; Küpçü, A. FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S) tamps. Cryptol. Eprint Arch. 2020. Available online: https://eprint.iacr.org/2020/1290.pdf (accessed on 7 October 2022).
  28. Solat, S.; Potop-Butucaru, M. Brief announcement: Zeroblock: Timestamp-free prevention of block-withholding attack in bitcoin. In International Symposium on Stabilization, Safety, and Security of Distributed Systems; Springer: Cham, Switzerland, 2017; pp. 356–360. [Google Scholar]
  29. Chen, H.; Chen, Y.; Xiong, Z.; Han, M.; He, Z.; Liu, B.; Wang, Z.; Ma, Z. Prevention method of block withholding attack based on miner’ mining behavior in blockchain. Appl. Intell. 2022, 1–19. [Google Scholar] [CrossRef]
  30. Wang, S.; Yin, B.; Zhang, S.; Cheng, Y.; Cai, L.X.; Cao, X. A Selfish attack on chainweb blockchain. In Proceedings of the GLOBECOM 2020-2020 IEEE Global Communications Conference, Taipei, China, 7–11 December 2020; pp. 1–6. [Google Scholar]
  31. Motlagh, S.G.; Mišić, J.; Mišić, V.B. The Impact of Selfish Mining on Bitcoin Network Performance. IEEE Trans. Netw. Sci. Eng. 2021, 8, 724–735. [Google Scholar] [CrossRef]
  32. Yang, R.; Chang, X.; Mišić, J.; Mišić, V.B. Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Comput. Secur. 2020, 97, 101956. [Google Scholar] [CrossRef]
  33. Xia, Q.; Dou, W.; Xi, T.; Zeng, J.; Zhang, F.; Wei, J.; Liang, G. The Impact Analysis of Multiple Miners and Propagation Delay on Selfish Mining. In Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Taipei, China, 12–16 July 2021; pp. 694–703. [Google Scholar]
  34. Zhou, C.; Xing, L.; Guo, J.; Liu, Q. Bitcoin Selfish Mining Modeling and Dependability Analysis. Int. J. Math. Eng. Manag. Sci. 2022, 7, 16–27. [Google Scholar]
  35. Sapirshtein, A.; Sompolinsky, Y.; Zohar, A. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2016; pp. 515–532. [Google Scholar]
  36. Savin, N.E. Mutiple Hypothesis Testing. In Handbook of Econometrics; Elsevier: Amsterdam, The Netherlands, 1984; Volume 2. [Google Scholar]
Figure 1. State transition diagram (0: initial state, 0′: double branches, 1: one-block lead, 2: two-block lead, 3: three-block lead, and 4: attack success).
Figure 1. State transition diagram (0: initial state, 0′: double branches, 1: one-block lead, 2: two-block lead, 3: three-block lead, and 4: attack success).
Applsci 13 00422 g001
Figure 2. Bitcoin dependability before and after the application of the DDAA under sets a and a′.
Figure 2. Bitcoin dependability before and after the application of the DDAA under sets a and a′.
Applsci 13 00422 g002
Figure 3. Bitcoin dependability before and after application of the DDAA under sets b and b′.
Figure 3. Bitcoin dependability before and after application of the DDAA under sets b and b′.
Applsci 13 00422 g003
Figure 4. Bitcoin dependability before and after application of the DDAA under sets c and c′.
Figure 4. Bitcoin dependability before and after application of the DDAA under sets c and c′.
Applsci 13 00422 g004
Figure 5. p-value results when β varies from 1.1 to 1.6 under the DDAA.
Figure 5. p-value results when β varies from 1.1 to 1.6 under the DDAA.
Applsci 13 00422 g005
Figure 6. Bitcoin dependability before and after the application of the ALP.
Figure 6. Bitcoin dependability before and after the application of the ALP.
Applsci 13 00422 g006
Figure 7. p-value results when γ varies from 0.6 to 0.9 under the ALP.
Figure 7. p-value results when γ varies from 0.6 to 0.9 under the ALP.
Applsci 13 00422 g007
Figure 8. Bitcoin dependability under the DDAA, ALP, and TM.
Figure 8. Bitcoin dependability under the DDAA, ALP, and TM.
Applsci 13 00422 g008
Table 1. State transition rate (per hour) values used for numerical analysis.
Table 1. State transition rate (per hour) values used for numerical analysis.
RateSet aSet bSet cSet aSet bSet c
λ010.030.120.340.0240.0960.272
λ0′10.110.110.110.0880.0880.088
λ120.060.180.560.0480.1440.448
λ230.040.040.040.0320.0320.032
λ340.360.360.360.2880.2880.288
μ 0 0 0.240.240.240.240.240.24
μ 10 0.120.120.120.120.120.12
μ 21 0.310.310.310.310.310.31
Table 2. Bitcoin dependability and comparisons.
Table 2. Bitcoin dependability and comparisons.
t (hrs)Set aSet aaaSet bSet bbbSet cSet ccc
60.99950.99980.00030.99500.99770.00270.97450.98680.0123
120.99640.99830.00190.97050.98470.01420.88870.93350.0448
180.99070.99540.00470.93340.96310.02970.79110.86460.0735
240.98350.99150.00800.89240.93790.04550.70070.79610.0954
300.97550.98720.01170.85150.91170.06020.62020.73190.1117
360.96700.98260.01560.81190.88550.07360.54890.67260.1237
Table 3. The p-value in F-test and t-test.
Table 3. The p-value in F-test and t-test.
Set a vs. Set aSet b vs. Set bSet c vs. Set c
F-test0.19140.30900.5277
t-test0.01640.00970.0034
Table 4. The results of the p-value when β varies from 1.1 to 1.6 under the DDAA.
Table 4. The results of the p-value when β varies from 1.1 to 1.6 under the DDAA.
β1.11.251.431.6
p-value0.01910.01640.01450.0173
Table 5. State transition rate (per hour) values used for numerical analysis of the ALP.
Table 5. State transition rate (per hour) values used for numerical analysis of the ALP.
Rateλ01λ0′1λ12λ23λ34 μ 0 0 μ 10 μ 21
Set a0.030.110.060.040.360.240.120.31
Set a0.030.110.060.040.36 × γ0.240.120.31
Table 6. The results of the p-value under the ALP.
Table 6. The results of the p-value under the ALP.
γ0.60.70.80.9
p-value0.00490.00440.00330.0057
Table 7. State transition rate (per hour) adjustments under the DDAA, ALP, and TM.
Table 7. State transition rate (per hour) adjustments under the DDAA, ALP, and TM.
Setλ01λ0′1λ12λ23λ34 μ 0 0 μ 10 μ 21
DDAA-a0.03/β0.11/β0.06/β0.04/β0.36/β0.240.120.31
ALP-a0.030.110.060.040.36×γ0.240.120.31
TM-a0.030.110.060.040.360.24×ω0.12×ω0.31×ω
Table 8. Bitcoin dependability under the DDAA, ALP, and TM.
Table 8. Bitcoin dependability under the DDAA, ALP, and TM.
t (hrs)β = 1.2γ = 1/1.2ω = 1.2β = 1.4γ = 1/1.4ω = 1.4β = 1.6γ = 1/1.6ω = 1.6
60.99970.99950.99950.99980.99960.99960.99990.99960.9996
120.99800.99670.99690.99880.99690.99720.99920.99710.9976
180.99480.99120.99220.99680.99170.99340.99790.99210.9944
240.99050.98420.98660.99400.98480.98890.99600.98540.9907
300.98570.97620.98040.99090.97690.98400.99380.97760.9868
360.98050.96780.97390.98750.96780.97900.99140.96930.9828
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, C.; Xing, L.; Liu, Q.; Wang, H. Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability. Appl. Sci. 2023, 13, 422. https://doi.org/10.3390/app13010422

AMA Style

Zhou C, Xing L, Liu Q, Wang H. Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability. Applied Sciences. 2023; 13(1):422. https://doi.org/10.3390/app13010422

Chicago/Turabian Style

Zhou, Chencheng, Liudong Xing, Qisi Liu, and Honggang Wang. 2023. "Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability" Applied Sciences 13, no. 1: 422. https://doi.org/10.3390/app13010422

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop