2021
DOI: 10.1002/int.22428
|View full text |Cite|
|
Sign up to set email alerts
|

Semi‐selfish mining based on hidden Markov decision process

Abstract: Selfish mining attacks sabotage the blockchain systems by utilizing the vulnerabilities of consensus mechanism. The attackers' main target is to obtain higher revenues compared with honest parties. More specifically, the essence of selfish mining is to waste the power of honest parties by generating a private chain. However, these attacks are not practical due to high forking rate. The honest parties may quit the blockchain system once they detect the abnormal forking rate, which impairs their revenues. While … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
81
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
8

Relationship

5
3

Authors

Journals

citations
Cited by 93 publications
(83 citation statements)
references
References 21 publications
0
81
0
Order By: Relevance
“…These studies considered geographically distributed cloud data centers and applied workload migration techniques to minimize the energy of running tasks inside the system. Dynamic application partitioning with failure and resource constraint-enabled schemes were suggested in these studies [21][22][23][24][25][26][27]. The studies considered fine-grained and coarse-grained healthcare workloads in their models.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
See 2 more Smart Citations
“…These studies considered geographically distributed cloud data centers and applied workload migration techniques to minimize the energy of running tasks inside the system. Dynamic application partitioning with failure and resource constraint-enabled schemes were suggested in these studies [21][22][23][24][25][26][27]. The studies considered fine-grained and coarse-grained healthcare workloads in their models.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
“…To the best of our knowledge, dynamic application partitioning and task scheduling of biosensor healthcare workflow in secure mobile edge clouds has not been studied yet. Closely related studies [1,3,5,9,[21][22][23][24][25][26][27] have focused on dynamic application partitioning and minimizing the energy use of mobile devices. These studies only considered bandwidth and resource constraints.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2008, Bitcoin was proposed by Satoshi Nakamoto in "Bitcoin: A Peer-to-Peer Electronic Cash System" [14], marking the emergence of blockchain technology. As the *Correspondence: ylchen3@gzu.edu.cn 1 State Key Laboratory of Public Big Data,College of Computer Science and Technology, Guizhou University, Guiyang 550025, China 4 Blockchain Laboratory of Agricultural Vegetables, Weifang University of Science and Technology, Weifang 262700, China Full list of author information is available at the end of the article underlying technology of Bitcoin, blockchain has received extensive attention [15][16][17][18]. Blockchain is a distributed database technology that has the characteristics of decentralization [19][20][21], traceability, tamper-proof, collective maintenance, etc.…”
Section: Introductionmentioning
confidence: 99%
“…The lowest delegation overhead achieved by this scheme is only n/(2n − 2) of that achieved by Dong's scheme [22], where n means the number of servers. Besides, many scholars have studied the application of game theory in smart contracts [24][25][26], and discussed the security of data and models in detail [27]. However, in the process of delegation computation, different tasks or utilities have different impacts on the strategies of the computing parties, leading the client to get a different result.…”
Section: Introductionmentioning
confidence: 99%