2019
DOI: 10.1007/978-3-030-21568-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…The permissionless requirement, enabling anonymity and censorless transactions for cryptocurrency applications, allows and even encourages constructing new accounts for different transactions [12]. Using an identifier-based attack (e.g., Sybil and spoofing), however, an attacker can manipulate the victim node's peer selections [6], [14] and control the timing of the block deliveries for selfish mining [3], [14] and block withholding [2], [8]. Such threats highlight the unreliability of using the identifiers for connectivity estimation and motivates us to use the networking traffic information to build a reliable connectivity estimation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The permissionless requirement, enabling anonymity and censorless transactions for cryptocurrency applications, allows and even encourages constructing new accounts for different transactions [12]. Using an identifier-based attack (e.g., Sybil and spoofing), however, an attacker can manipulate the victim node's peer selections [6], [14] and control the timing of the block deliveries for selfish mining [3], [14] and block withholding [2], [8]. Such threats highlight the unreliability of using the identifiers for connectivity estimation and motivates us to use the networking traffic information to build a reliable connectivity estimation.…”
Section: Related Workmentioning
confidence: 99%
“…The main contributions are trifold: (1) We present our data collection scheme with the definition of traffic variables and the introduction of our prototype system collecting blockchain traffic ( §II); (2) We also present our connection estimation scheme to infer peer connectivity by analyzing collected traffic data using an ML methodology ( §III); (3) We show the feasibility of our ML-based approach to connectivity estimation with respect to the prediction accuracy and time complexity through our experiments ( §IV).…”
Section: Introductionmentioning
confidence: 99%
“…These types of blocks are not accepted into the blockchain network. In the case of bitcoin, these types of blocks are called orphan block [31] and in the case of ethereum, we call it uncle block [32]. As shown in Fig.…”
Section: A Concusses In the Blockchainmentioning
confidence: 99%
“…Considering the revenue of the mining pool and miner selection, A. T. Haghighat et al [27] analyze the mining pool profitability with mining pool attractiveness and miner migration rate. Considering the uncle reward, S. Y. Chang et al [28] propose computing power allocation strategy of mining pools to improve the revenues of mining pools. But the works [11,15,[25][26][27][28] do not consider the cost of mining and the dynamic attack among multiple mining pools.…”
Section: Related Workmentioning
confidence: 99%