4.6 Article

Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Prevention method of block withholding attack based on miners' mining behavior in blockchain

Hao Chen et al.

Summary: This paper proposes a method to prevent block withholding attack based on miners' mining behavior, which effectively detects malicious miners and allocates income weights to miners of different credit levels using data pre-processing, credit model, and miner credit level classification algorithm.

APPLIED INTELLIGENCE (2023)

Article Computer Science, Information Systems

Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

Bharat Bhushan et al.

Summary: The Internet of Things (IoTs) connects digital and physical objects using blockchain technology to ensure security, data privacy, and resistance against attacks. Remodeling blockchain to meet IoT needs can establish trusted data exchange and auditability.

WIRELESS NETWORKS (2021)

Review Computer Science, Information Systems

Cascading Failures in Internet of Things: Review and Perspectives on Reliability and Resilience

Liudong Xing

Summary: In the Internet of Things, devices collaborate in collecting and processing data, but cascading failures can lead to catastrophic issues. Understanding the causes of cascading failures and modeling them is crucial for ensuring the reliability of IoT systems.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

ForkDec: Accurate Detection for Selfish Mining Attacks

Zhaojie Wang et al.

Summary: The incentive mechanism of Bitcoin is crucial for its success, but selfish mining attacks may cause loss of mining power, posing great security challenges. Existing studies against selfish mining have limitations, either requiring protocol modification or unsatisfactory attack detection.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Hardware & Architecture

Blockchain-enabled Peer-to-Peer energy trading

Pornpit Wongthongtham et al.

Summary: This paper explores the application of blockchain technology in Peer-to-Peer energy trading and its impact on scalability, security, and decentralization, introducing a blockchain scalability solution.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

The Impact Analysis of Multiple Miners and Propagation Delay on Selfish Mining

Qing Xia et al.

Summary: This study explores the impact of multiple miners and propagation delay on selfish mining in Bitcoin. A new selfish mining strategy is proposed to address these factors, and a simulation approach is designed to analyze its performance. Empirical findings show that blockchain systems with higher orphan rates are more vulnerable to selfish mining attacks.

2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021) (2021)

Article Engineering, Multidisciplinary

The Impact of Selfish Mining on Bitcoin Network Performance

Saeideh G. Motlagh et al.

Summary: Selfish mining strategy can provide unfair advantage and excess revenue for miners in the Bitcoin network, but it can also disrupt the normal operation of the network. The impact of selfish behavior on network performance is significant, sometimes disproportionate to the number of selfish miners or their hash power compared to honest nodes.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Review Computer Science, Information Systems

Reliability in Internet of Things: Current Status and Future Perspectives

Liudong Xing

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views

Runkai Yang et al.

COMPUTERS & SECURITY (2020)

Proceedings Paper Computer Science, Artificial Intelligence

A Selfish Attack on Chainweb Blockchain

Suyang Wang et al.

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)

Review Information Science & Library Science

Blockchain as a disruptive technology for business: A systematic review

Julie Frizzo-Barker et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)

Article Computer Science, Information Systems

Blockchain Technologies for the Internet of Things: Research Issues and Challenges

Mohamed Amine Ferrag et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks

Jiawen Kang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Automation & Control Systems

Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network

Shijie Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Review Computer Science, Information Systems

Blockchain for Internet of Things: A Survey

Hong-Ning Dai et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Countering Selfish Mining in Blockchains

Muhammad Saad et al.

2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

From Blockchain to Internet-Based Voting

Elham Akbari et al.

PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI) (2017)

Article Computer Science, Information Systems

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

Florian Tschorsch et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Hardware & Architecture

Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay

J. Goebel et al.

PERFORMANCE EVALUATION (2016)

Proceedings Paper Computer Science, Information Systems

Tampering with the Delivery of Blocks and Transactions in Bitcoin

Arthur Gervais et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner

Ethan Heilman

FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014 (2014)