2022
DOI: 10.3390/s22239125
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Data-Driven Evaluation Framework for Fork after Withholding Attack in Blockchain Systems

Abstract: In the blockchain system, mining pools are popular for miners to work collectively and obtain more revenue. Nowadays, there are consensus attacks that threaten the efficiency and security of mining pools. As a new type of consensus attack, the Fork After Withholding (FAW) attack can cause huge economic losses to mining pools. Currently, there are a few evaluation tools for FAW attacks, but it is still difficult to evaluate the FAW attack protection capability of target mining pools. To address the above proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 22 publications
1
4
0
Order By: Relevance
“…Therefore, the pool's returns first increase with w and then decrease as w increases to an extreme value. In the results of the mixed strategy experiments, the returns of the mining pool also increase with w finally reaching an extreme value at approximately equal to 0.43, and finally, gradually the returns decrease with w. This is consistent with the change in returns embodied in Equation (5). Finally, we find that the mining pool is in a good network state when w is approximately equal to 0.83.…”
Section: Spe Experiments For Solving Finite Repeated Gamessupporting
confidence: 82%
See 2 more Smart Citations
“…Therefore, the pool's returns first increase with w and then decrease as w increases to an extreme value. In the results of the mixed strategy experiments, the returns of the mining pool also increase with w finally reaching an extreme value at approximately equal to 0.43, and finally, gradually the returns decrease with w. This is consistent with the change in returns embodied in Equation (5). Finally, we find that the mining pool is in a good network state when w is approximately equal to 0.83.…”
Section: Spe Experiments For Solving Finite Repeated Gamessupporting
confidence: 82%
“…This suggests that the optimal mixing probability multiplied by the optimal gain for all attack scenarios is the optimal total gain for the medium network. Then, we substitute the specific expression of p 1 in Equation ( 3) to obtain the specific value R M of the optimal return of the mixed strategy, as described in Equation (5).…”
Section: Optimal Mining Strategy For Finite Repetition Gamesmentioning
confidence: 99%
See 1 more Smart Citation
“…Attackers can use public data to analyze sensitive personal information, which may result in privacy disclosure. It is necessary for both data owners and data publishers to protect privacy in data publication and data use [ 5 , 6 , 7 ]. Thus, a publicly published privacy protection method for multi-dimensional data is needed to prevent the privacy disclosure of multiple sensitive attributes.…”
Section: Introductionmentioning
confidence: 99%
“…Some studies focused on traditional security measures to secure communication across devices, such as authentication, privacy, and trust management [16][17][18]. They are, however, insufficient since data must be safely transmitted to the correct location, at the proper time, and in a valid format [19][20][21]. Others focus on the literature surrounding the use of blockchains.…”
Section: Introductionmentioning
confidence: 99%