ESM: Selfish mining under ecological footprint
【Author】 Ai, Shan; Yang, Guoyu; Chen, Chang; Mo, Kanghua; Lv, Wangyong; Koe, Arthur Sandor Voundi
【Source】INFORMATION SCIENCES
【影响因子】8.233
【Abstract】By deviating from an honest mining strategy, attackers can obtain additional rewards through mining attacks. Selfish mining is the most well-known mining attack. It includes selfish mining (SM1), optimal selfish mining (E-optimal), and bribed selfish mining (BSM), etc. The mining models addressed in prior studies, however, are based on the Nakamoto consensus. Therefore, this paper proposes the ESM model (Selfish Mining under Ecological model). Our new model is fully compatible with fewer resource expenditure requirements. Meanwhile, we also describe a novel selfish mining attack that allows the malicious pool to gain additional revenue by using an ESM attack rather than SM1 when its power is less than 25%. Furthermore, we present an EBSM (Bribery Selfish Mining under Ecological) attack that combines ESM together with the bribery attack. As a result, under EBSM, the malicious solo miner has a chance to gain additional revenue. Finally, we undertake quantitative analyses and simulations to assess the effectiveness of our attacks. (c) 2022 Elsevier Inc. All rights reserved.
【Keywords】Blockchain; Bitcoin; Selfish mining; Bitcoin security
【发表时间】2022 AUG
【收录时间】2022-07-17
【文献类型】理论性文章
【主题类别】
区块链技术-核心技术-挖矿策略
评论