2018 10th Computer Science and Electronic Engineering (CEEC) 2018
DOI: 10.1109/ceec.2018.8674185
|View full text |Cite
|
Sign up to set email alerts
|

Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory: A Proof of Work

Abstract: Recently we could see several institutions coming together to create consortium based blockchain networks such as Hyperledger. Although for applications of blockchain such as Bitcoin, Litcoin, etc. the majority-attack might not be a great threat but for consortium based blockchain networks where we could see several institutions such as public, private, government, etc. are collaborating, the majority-attack might just prove to be a prevalent threat if collusion among these institutions takes place. This paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 73 publications
(34 citation statements)
references
References 19 publications
(1 reference statement)
0
30
0
Order By: Relevance
“…On the one hand, a significant amount of research is devoted to the security of blockchain-based systems. This is mainly due to the fact that in many cases, the well-known 51% majority attack still poses a risk to the integrity of the whole ecosystem [10], [11], [23]. Another important research direction in terms of security is the fork problem, which is leading to the emergence of a rivalling sibling of a given blockchain [25].…”
Section: Related Researchmentioning
confidence: 99%
“…On the one hand, a significant amount of research is devoted to the security of blockchain-based systems. This is mainly due to the fact that in many cases, the well-known 51% majority attack still poses a risk to the integrity of the whole ecosystem [10], [11], [23]. Another important research direction in terms of security is the fork problem, which is leading to the emergence of a rivalling sibling of a given blockchain [25].…”
Section: Related Researchmentioning
confidence: 99%
“…A common case consists in trying to apply machine learning for crypto-trading, or extensively trying to predict the price of a cryptocurrency using machine learning [ 22 , 23 ]. Other works have focused on the application of artificial intelligence to blockchain security [ 24 ]. From a more philosophical perspective, Swan commented about “blockchain thinking”, the possibility of formulating thinking as a blockchain process [ 25 ].…”
Section: Related Workmentioning
confidence: 99%
“…Although there are standards available such as General Food Law in EU [4], Food Safety Modernization Act (FSMA) in US [5], which try to standardize traceability of digital information of food production in some of the stages of food supply chain, these standards are regional and currently there is no holistic standardization of tracking and recording data for food traceability purposes in all stages of food supply chain across the globe. Henceforth, in order to deal with such a challenge related to food safety, Blockchain Technology (BT) [6,7] may play a vital role in the traceability of food ingredients in recent times such that the consumers can trace the source of the food ingredients that they are buying/consuming. Traditionally many producers still record data of their production on papers, whereas, some producers digitize the production data, which doesn't enable interaction with other parties in the food system.…”
Section: Introductionmentioning
confidence: 99%