Contact Us Search Paper

GenSelfHolding: Fusing Selfish Mining and Block Withholding Attacks on Bitcoin Revisited

Xuewen Dong1,*, Sheng Gao2

Corresponding Author:

Xuewen Dong

Affiliation(s):

1 School of Computer Science & Technology, Xidian University, Xi’an 710071, China

2 School of Information, Central University of Finance and Economics, Beijing 1008, China

*Corresponding author

Abstract:

Due to the monetary value of Bitcoin, the most influential digital cryptocurrency in the world, Bitcoin has naturally become a valuable target of attacks, resulting in the emergence of many attack strategies on it. Among those attack strategies, selfish mining and block withholding attacks are two typical ones and attackers can obtain higher revenues under certain conditions than with an honest mining strategy. However, the combination of them will be a new type and more serious attack, which has not been analyzed in depth. In this paper, we propose GenSelfHolding, a general combined attack model with one selfish mining pool and random multiple honest pools on Bitcoin. Based on Markov chain, a general state transition graph and a general state distribution probability are presented to describe the internal features of our model. A general principle is then provided to calculate the attacker’s revenue. In addition, we give a detailed proof of the unique stable distribution of state transition probabilities. Such proof is an essential prerequisite for us to further present stable attacker revenue expressions under two specific scenarios, the GenSelfHolding model with two/three honest mining pools. Simulation results validate that the revenues of the attacker in these two specific models can reach up to 40% higher than those of classic selfish attackers in some cases.

Keywords:

Bitcoin, Selfish mining attack, Block withholding attack, Combined attack, Markov chain

Downloads: 105 Views: 856
Cite This Paper:

Xuewen Dong, Sheng Gao (2022). GenSelfHolding: Fusing Selfish Mining and Block Withholding Attacks on Bitcoin Revisited. Journal of Networking and Network Applications, Volume 2, Issue 1, pp. 23–35. https://doi.org/10.33969/J-NaNA.2022.020102.

References:

[1] Reuben Grinberg. Bitcoin: An innovative alternative digital currency. Hastings Sci. & Tech. LJ, 4:159, 2012.

[2] Lam Pak Nian and David LEE Kuo Chuen. Introduction to bitcoin. In Handbook of Digital Currency, pages 5–30. Elsevier, 2015.

[3] Jun Zou, Bin Ye, Lie Qu, Wang Yan, Mehmet A. Orgun, and Li Lei. A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services. IEEE Transactions on Services Computing, PP(99):1–1, 1939.

[4] Fergal Reid and Martin Harrigan. An analysis of anonymity in the bitcoin system. In Security and privacy in social networks, pages 197–223. Springer, 2013.

[5] Yinghui Zhang, Robert Deng, Ximeng Liu, and Zheng Dong. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing, PP(99):1–1, 1939.

[6] Ruinian Li, Tianyi Song, Mei Bo, Li Hong, Xiuzhen Cheng, and Limin Sun. Blockchain for large-scale internet of things data storage and protection. IEEE Transactions on Services Computing, PP(99):1–1, 1939.

[7] Zhu Xinghui, Zheng Jiawei, Ren Baoquan, Dong Xuewen, and Yulong Shen. Microthingschain: Blockchain-based controlled data sharing platform in multi-domain iot. Journal of Networking and Network Applicationst, 1(1):19–27, 2021.

[8] Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. An overview of blockchain technology: Architecture, consensus, and future trends. In Big Data (BigData Congress), 2017 IEEE International Congress on, pages 557–564. IEEE, 2017.

[9] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. whitepaper, 2009, 2009.

[10] Alireza Beikverdi and JooSeok Song. Trend of centralization in bitcoin’s distributed network. In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015 16th IEEE/ACIS International Conference on, pages 1–6. IEEE, 2015.

[11] Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S Rosenschein. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pages 919–927. International Foundation for Autonomous Agents and Multiagent Systems, 2015.

[12] Meni Rosenfeld. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011.

[13] Chinmay A Vyas and Munindra Lunagaria. Security concerns and issues for bitcoin. In the proceedings of National Conference cum Workshop on Bioinformatics and Computational Biology, NCWBCB-2014, 2014.

[14] Yujuan Wen, Fengyuan Lu, Yufei Liu, and Xinli Huang. Attacks and countermeasures on blockchains: A survey from layering perspective. Computer Networks, 191:107978, 2021.

[15] Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, and Min Suk Kang. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. In Proceedings of IEEE Symposium on Security and Privacy (IEEE S&P), 2020.

[16] S. Zhang and J. Lee. Double-spending with a sybil attack in the bitcoin decentralized network. IEEE Transactions on Industrial Informatics, 15(10):5715–5722, 2019.

[17] Ittay Eyal and Emin G¨un Sirer. Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM, 61(7):95–102, 2018.

[18] Hongyue Kang, Xiaolin Chang, Runkai Yang, Jelena Miˇsi´c, and Vojislav B. Miˇsi´c. Understanding selfish mining in imperfect bitcoin and ethereum networks with extended forks. IEEE Transactions on Network and Service Management, pages 1–1, 2021.

[19] Alireza Toroghi Haghighat and Mehdi Shajari. Block withholding game among bitcoin mining pools. Future Generation Computer Systems, 97:482–491, 2019.

[20] Shuya Feng, Jia He, and Maggie X. Cheng. Security analysis of block withholding attacks in blockchain. In ICC 2021 - IEEE International Conference on Communications, pages 1–6, 2021.

[21] Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. Security implications of blockchain cloud with analysis of block withholding attack. In IEEE/ACM International Symposium on Cluster, 2017.

[22] Ittay Eyal. The miner’s dilemma. In Security and Privacy (SP), 2015 IEEE Symposium on, pages 89–103. IEEE, 2015.

[23] Xuewen Dong, Feng Wu, Anter Faree, Deke Guo, Yulong Shen, and Jianfeng Ma. Selfholding: A combined attack model using selfish mining with block withholding attack. Computers&Security, 87:101584, 2019.

[24] Jennifer J. Xu. Are blockchains immune to all malicious attacks? Financial Innovation, 2(1):25, 2016.

[25] Danny Bradbury. The problem with bitcoin. Computer Fraud & Security, 2013(11):5–8, 2013.

[26] Joan Antoni Donet Donet, Cristina P´erez-Sola, and Jordi Herrera-Joancomart´ı. The bitcoin p2p network. In International Conference on Financial Cryptography and Data Security, pages 87–102. Springer, 2014.

[27] Ghassan Karame. On the security and scalability of bitcoin’s blockchain. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 1861–1862. ACM, 2016.

[28] Amir Feder, Neil Gandal, JT Hamrick, and Tyler Moore. The impact of ddos and other security shocks on bitcoin currency exchanges: Evidence from mt. gox. Journal of  Cybersecurity, 3(2):137–144, 2018.

[29] Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. Eclipse attacks on bitcoin’s peer-to-peer network. In USENIX Security Symposium, pages 129–144, 2015.

[30] Shaohan Feng, Wenbo Wang, Zehui Xiong, Dusit Niyato, Wang Ping, and Shaun Shuxun Wang. On cyber risk management of blockchain networks: A game theoretic approach. IEEE Transactions on Services Computing, PP(99):1–1, 2018.

[31] Muoi Tran, In Sang Choi, Gi Jun Moon, Anh V. Vu, and Min Suk Kang. A stealthier partitioning attack against bitcoin peer-to-peer network. pages 894–909, 2020.

[32] Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, pages 305–320. IEEE, 2016.

[33] S. Bag, S. Ruj, and K. Sakurai. Bitcoin block withholding attack: Analysis and mitigation. IEEE Transactions on Information Forensics and Security, 12(8):1967–1978, Aug 2017.

[34] Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim. Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 195–209. ACM, 2017.

[35] Nicolas T Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718, 2014.

[36] Meni Rosenfeld. Analysis of bitcoin pooled mining reward systems. CoRR, abs/1112.4980, 2011.

[37] Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security, pages 515–532. Springer, 2016.

[38] Rick Durrett. Probability: Theory and examples. Cambridge U Press, 39(5):320–353, 2005.

[39] Christian Decker and Roger Wattenhofer. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on, pages 1–10. IEEE, 2013.