2022
DOI: 10.3390/s22135032
|View full text |Cite
|
Sign up to set email alerts
|

FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners

Abstract: Blockchain has become one of the key techniques for the security of the industrial internet. However, the blockchain is vulnerable to FAW (Fork after Withholding) attacks. To protect the industrial internet from FAW attacks, this paper proposes a novel FAW attack protection algorithm (FAWPA) based on the behavior of blockchain miners. Firstly, FAWPA performs miner data preprocessing based on the behavior of the miners. Then, FAWPA proposes a behavioral reward and punishment mechanism and a credit scoring model… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…Therefore, KAPP considers clustering multi-dimensional data based on sensitive data. At the same time, the fuzzy C-means clustering algorithm can realize a flexible partition of sample points by calculating the membership degree of each sample point to all cluster centers [ 32 ]. Compared with the hard partition of other clusters, this clustering algorithm is more suitable for multi-dimensional data clustering.…”
Section: Algorithm Principlementioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, KAPP considers clustering multi-dimensional data based on sensitive data. At the same time, the fuzzy C-means clustering algorithm can realize a flexible partition of sample points by calculating the membership degree of each sample point to all cluster centers [ 32 ]. Compared with the hard partition of other clusters, this clustering algorithm is more suitable for multi-dimensional data clustering.…”
Section: Algorithm Principlementioning
confidence: 99%
“…The probability parameters and weight parameters are determined by experiments. The fuzzy weight e is determined by relevant literature [ 32 ], and other parameters are consistent with AVOA [ 33 ]. We replicate skewness and similarity attacks in the experiment and attack the anonymized data.…”
Section: Experimental Simulationmentioning
confidence: 99%
“…It is part of a public chain of blockchain systems [8] using the PoW consensus algorithm to maintain data consistency in decentralized distributed systems [9]. The public chain faces four kinds of attacks: BWH [10], fork after block withholding (FAW) [11], selfish mining [12] and 51% computing power [12]. A BWH attack is an attack mode in which malicious nodes obtain illegal gains by satisfying partial proof of work by honest miners.…”
Section: Introductionmentioning
confidence: 99%