Research on Malicious Attack Model of Blockchain Multi-mining Pools
The double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools can double-spend transactions through different at...
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
2023-07-01
|
Series: | Jisuanji kexue yu tansuo |
Subjects: | |
Online Access: | http://fcst.ceaj.org/fileup/1673-9418/PDF/2111107.pdf |
_version_ | 1827907615998345216 |
---|---|
author | LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu |
author_facet | LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu |
author_sort | LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu |
collection | DOAJ |
description | The double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools can double-spend transactions through different attack forms, which brings huge security risks to the blockchain. Based on the combination of malicious attacks in multiple mining pools, this paper proposes two malicious attack models in multiple mining pools. Firstly, in the multi-mining pool centralized attack model, the computing power of multiple mining pools is aggregated into a malicious computing power set, which focuses on double-spending attacks on the blockchain. Secondly, in the multi-mining pool decentralized attack model, each mining pool is independent malicious computing power set, and the malicious computing power is distributed and synchronized among the blockchain computing power attacks. In addition, combining the number of mining pools, the percentage of computing power and other parameters, the internal operating mechanism of two multi-mining pool models is simulated and derived. Based on this mechanism, the security constraints of the two attack models are constructed. The experiment verifies the effectiveness of the two mining pool attack models, and digitization shows the attack laws in two multi-mining pool attack models, as well as the similarities and differences between the two models. Finally, combining with theoretical models and experimental results, this paper puts forward the prevention and control strategies. |
first_indexed | 2024-03-13T01:10:37Z |
format | Article |
id | doaj.art-5cda3ac49561425997ef18702133c287 |
institution | Directory Open Access Journal |
issn | 1673-9418 |
language | zho |
last_indexed | 2024-03-13T01:10:37Z |
publishDate | 2023-07-01 |
publisher | Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press |
record_format | Article |
series | Jisuanji kexue yu tansuo |
spelling | doaj.art-5cda3ac49561425997ef18702133c2872023-07-06T01:16:32ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182023-07-011771719172810.3778/j.issn.1673-9418.2111107Research on Malicious Attack Model of Blockchain Multi-mining PoolsLIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu0School of Information, Liaoning University, Shenyang 110036, ChinaThe double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools can double-spend transactions through different attack forms, which brings huge security risks to the blockchain. Based on the combination of malicious attacks in multiple mining pools, this paper proposes two malicious attack models in multiple mining pools. Firstly, in the multi-mining pool centralized attack model, the computing power of multiple mining pools is aggregated into a malicious computing power set, which focuses on double-spending attacks on the blockchain. Secondly, in the multi-mining pool decentralized attack model, each mining pool is independent malicious computing power set, and the malicious computing power is distributed and synchronized among the blockchain computing power attacks. In addition, combining the number of mining pools, the percentage of computing power and other parameters, the internal operating mechanism of two multi-mining pool models is simulated and derived. Based on this mechanism, the security constraints of the two attack models are constructed. The experiment verifies the effectiveness of the two mining pool attack models, and digitization shows the attack laws in two multi-mining pool attack models, as well as the similarities and differences between the two models. Finally, combining with theoretical models and experimental results, this paper puts forward the prevention and control strategies.http://fcst.ceaj.org/fileup/1673-9418/PDF/2111107.pdfblockchain security; multi-mining pool centralized attack model; multi-mining pool decentralized attack model; security constraint; mining pool security prevention and control |
spellingShingle | LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu Research on Malicious Attack Model of Blockchain Multi-mining Pools Jisuanji kexue yu tansuo blockchain security; multi-mining pool centralized attack model; multi-mining pool decentralized attack model; security constraint; mining pool security prevention and control |
title | Research on Malicious Attack Model of Blockchain Multi-mining Pools |
title_full | Research on Malicious Attack Model of Blockchain Multi-mining Pools |
title_fullStr | Research on Malicious Attack Model of Blockchain Multi-mining Pools |
title_full_unstemmed | Research on Malicious Attack Model of Blockchain Multi-mining Pools |
title_short | Research on Malicious Attack Model of Blockchain Multi-mining Pools |
title_sort | research on malicious attack model of blockchain multi mining pools |
topic | blockchain security; multi-mining pool centralized attack model; multi-mining pool decentralized attack model; security constraint; mining pool security prevention and control |
url | http://fcst.ceaj.org/fileup/1673-9418/PDF/2111107.pdf |
work_keys_str_mv | AT liuqiangsongbaoyanjiwantingwangjunlu researchonmaliciousattackmodelofblockchainmultiminingpools |