Abstract

Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critical and security-critical nature of their uses, it is pivotal to model the dependability of blockchain-based systems. In this study, we focus on Bitcoin, a blockchain-based peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method is put forward to model and quantify the dependability of the Bitcoin system under selfish mining attacks. Numerical results are provided to examine the influences of several key parameters related to selfish miners’ computing power, attack triggering, and honest miners’ recovery capability. The conclusion made based on this research may contribute to the design of resilience algorithms to enhance the self-defense and robustness of cryptocurrency systems.

Highlights

  • Intensive research and development efforts from academia, industries and governments have been devoted to blockchain technology in the last decade (Ferrag et al, 2018; Kang et al, 2018; Dai et al, 2019; Bhushan et al, 2021)

  • Numerical Results and Impacts of Model Parameters the effects of several key parameters on the Bitcoin dependability are investigated through numerical results

  • Directions The Bitcoin network is vulnerable to selfish mining attacks, during which a malicious miner withholds the mined block and mines on its own private chain secretly

Read more

Summary

Introduction

Intensive research and development efforts from academia, industries and governments have been devoted to blockchain technology in the last decade (Ferrag et al, 2018; Kang et al, 2018; Dai et al, 2019; Bhushan et al, 2021). In Zhou et al (2021a), a continuous-time Markov Chain-based approach was suggested for assessing the dependability of a Bitcoin node subject to Eclipse attacks; this work was extended in Zhou et al (2021b) through semi-Markov models for accommodating non-exponential state transition time distributions. Under state 1, if the malicious miner successfully finds the block on their private branch, the system transits to state 2 with transition rate of λ12. Under state 0’ (the chain has two branches of length one), if the malicious miner finds the new block with rate λ0’1, the system transits to state 1 where the selfish miner’s private branch is one block longer.

CTMC-based Dependability Evaluation
Impacts of Selfish Miner’s Computing Power Parameters λ01, λ12
Impacts of Trigger Parameter λ34 In
Impacts of Recovery Capability Parameters μ10′, μ21
Conclusion and Future Directions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call