Selfish mining detection scheme based on the characters of transactions

Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studie...

Full description

Saved in:
Bibliographic Details
Main Authors: Heli WANG, Qiao YAN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023025
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529677808664576
author Heli WANG
Qiao YAN
author_facet Heli WANG
Qiao YAN
author_sort Heli WANG
collection DOAJ
description Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.
format Article
id doaj-art-1a9e5a22615642c698547cbd2351554c
institution Kabale University
issn 2096-109X
language English
publishDate 2023-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-1a9e5a22615642c698547cbd2351554c2025-01-15T03:16:21ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-04-01910411459576224Selfish mining detection scheme based on the characters of transactionsHeli WANGQiao YANSelfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023025blockchainselfish miningnetwork securityBitcoin
spellingShingle Heli WANG
Qiao YAN
Selfish mining detection scheme based on the characters of transactions
网络与信息安全学报
blockchain
selfish mining
network security
Bitcoin
title Selfish mining detection scheme based on the characters of transactions
title_full Selfish mining detection scheme based on the characters of transactions
title_fullStr Selfish mining detection scheme based on the characters of transactions
title_full_unstemmed Selfish mining detection scheme based on the characters of transactions
title_short Selfish mining detection scheme based on the characters of transactions
title_sort selfish mining detection scheme based on the characters of transactions
topic blockchain
selfish mining
network security
Bitcoin
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023025
work_keys_str_mv AT heliwang selfishminingdetectionschemebasedonthecharactersoftransactions
AT qiaoyan selfishminingdetectionschemebasedonthecharactersoftransactions