Selfish Mining and Defending Strategies in the Bitcoin br
【Author】 Zhang, Weijian; Wang, Hao; Hua, Hao; Wang, Qirun
【Source】INTELLIGENT AUTOMATION AND SOFT COMPUTING
【影响因子】3.401
【Abstract】As a kind of distributed, decentralized and peer-to-peer transmittedtechnology, blockchain technology has gradually changed people's lifestyle.However, blockchain technology also faces many problems including selfishmining attack, which causes serious effects to the development of blockchaintechnology. Selfish mining is a kind of mining strategy where selfish minersincrease their profit by selectively publishing hidden blocks. This paper buildsthe selfish mining model from the perspective of node state conversion and utilizethe function extremum method tofigure out the optimal profit of this model.Meanwhile, based on the experimental data of honest mining, the author conductsthe simulation of selfish mining and discovers that selfish miners are able toacquire more revenue than honest miners when they account for more than1/3 computing power of the whole system. Lastly, to defend the selfish miningattack, the author also summarizes the existing defending strategies and evaluatesevery kind of strategy briefly.
【Keywords】Bitcoin; blockchain; selfish mining; markov chain
【发表时间】2022
【收录时间】2022-06-26
【文献类型】实证性文章
【主题类别】
区块链技术-核心技术-挖矿策略
评论