Research on Malicious Attack Model of Blockchain Multi-mining Pools

The double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools can double-spend transactions through different at...

Full description

Bibliographic Details
Main Author: LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu
Format: Article
Language:zho
Published: Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press 2023-07-01
Series:Jisuanji kexue yu tansuo
Subjects:
Online Access:http://fcst.ceaj.org/fileup/1673-9418/PDF/2111107.pdf
_version_ 1827907615998345216
author LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu
author_facet LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu
author_sort LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu
collection DOAJ
description The double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools can double-spend transactions through different attack forms, which brings huge security risks to the blockchain. Based on the combination of malicious attacks in multiple mining pools, this paper proposes two malicious attack models in multiple mining pools. Firstly, in the multi-mining pool centralized attack model, the computing power of multiple mining pools is aggregated into a malicious computing power set, which focuses on double-spending attacks on the blockchain. Secondly, in the multi-mining pool decentralized attack model, each mining pool is independent malicious computing power set, and the malicious computing power is distributed and synchronized among the blockchain computing power attacks. In addition, combining the number of mining pools, the percentage of computing power and other parameters, the internal operating mechanism of two multi-mining pool models is simulated and derived. Based on this mechanism, the security constraints of the two attack models are constructed. The experiment verifies the effectiveness of the two mining pool attack models, and digitization shows the attack laws in two multi-mining pool attack models, as well as the similarities and differences between the two models. Finally, combining with theoretical models and experimental results, this paper puts forward the prevention and control strategies.
first_indexed 2024-03-13T01:10:37Z
format Article
id doaj.art-5cda3ac49561425997ef18702133c287
institution Directory Open Access Journal
issn 1673-9418
language zho
last_indexed 2024-03-13T01:10:37Z
publishDate 2023-07-01
publisher Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
record_format Article
series Jisuanji kexue yu tansuo
spelling doaj.art-5cda3ac49561425997ef18702133c2872023-07-06T01:16:32ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182023-07-011771719172810.3778/j.issn.1673-9418.2111107Research on Malicious Attack Model of Blockchain Multi-mining PoolsLIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu0School of Information, Liaoning University, Shenyang 110036, ChinaThe double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools can double-spend transactions through different attack forms, which brings huge security risks to the blockchain. Based on the combination of malicious attacks in multiple mining pools, this paper proposes two malicious attack models in multiple mining pools. Firstly, in the multi-mining pool centralized attack model, the computing power of multiple mining pools is aggregated into a malicious computing power set, which focuses on double-spending attacks on the blockchain. Secondly, in the multi-mining pool decentralized attack model, each mining pool is independent malicious computing power set, and the malicious computing power is distributed and synchronized among the blockchain computing power attacks. In addition, combining the number of mining pools, the percentage of computing power and other parameters, the internal operating mechanism of two multi-mining pool models is simulated and derived. Based on this mechanism, the security constraints of the two attack models are constructed. The experiment verifies the effectiveness of the two mining pool attack models, and digitization shows the attack laws in two multi-mining pool attack models, as well as the similarities and differences between the two models. Finally, combining with theoretical models and experimental results, this paper puts forward the prevention and control strategies.http://fcst.ceaj.org/fileup/1673-9418/PDF/2111107.pdfblockchain security; multi-mining pool centralized attack model; multi-mining pool decentralized attack model; security constraint; mining pool security prevention and control
spellingShingle LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu
Research on Malicious Attack Model of Blockchain Multi-mining Pools
Jisuanji kexue yu tansuo
blockchain security; multi-mining pool centralized attack model; multi-mining pool decentralized attack model; security constraint; mining pool security prevention and control
title Research on Malicious Attack Model of Blockchain Multi-mining Pools
title_full Research on Malicious Attack Model of Blockchain Multi-mining Pools
title_fullStr Research on Malicious Attack Model of Blockchain Multi-mining Pools
title_full_unstemmed Research on Malicious Attack Model of Blockchain Multi-mining Pools
title_short Research on Malicious Attack Model of Blockchain Multi-mining Pools
title_sort research on malicious attack model of blockchain multi mining pools
topic blockchain security; multi-mining pool centralized attack model; multi-mining pool decentralized attack model; security constraint; mining pool security prevention and control
url http://fcst.ceaj.org/fileup/1673-9418/PDF/2111107.pdf
work_keys_str_mv AT liuqiangsongbaoyanjiwantingwangjunlu researchonmaliciousattackmodelofblockchainmultiminingpools