Abstract
Natural forking is tantamount to the “black swan” event in blockchain since it emerges unexpectedly with a small probability, and may incur low resource utilization and costly economic loss. The ongoing literature analyzes natural forking mainly from the macroscopic perspective, which is insufficient to further understand this phenomenon since it roots in the <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">instantaneous difference</i> between block creation and propagation microscopically. Hence, in this paper, we fill this gap by leveraging the large deviation theory to conduct the first micro study of natural forking, aiming to reveal its inherent mechanism substantially. Our work is featured by 1) <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">conceptual innovation</i> . We creatively abstract the blockchain overlay network as a “service system”. This allows us to investigate natural forking from the perspective of “supply and demand”. Based on this, we can identify the competitive dynamics of blockchain and construct a queuing model to characterize natural forking; 2) <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">progressiveness</i> . We scrutinize the natural forking probability as well as its decay rate via a three-step scheme from simple to complex, which are the single-source i.i.d. scheme, the single-source non-i.i.d. scheme, and the many-source non-i.i.d. scheme. By doing so, we can answer <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">when</i> and <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">how fast</i> should we take actions and <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">what</i> actions should we take against natural forking. Our valuable findings can not only put forward decisive guidelines theoretically from the top level, but also engineer optimal countermeasures operationally on a practical level to thwart natural forking.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: IEEE Transactions on Dependable and Secure Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.