Exploration of Mined Block Temporarily Holding and Enforce Fork Attacks by Selfish Mining Pool in Proof-of-Work Blockchain Systems

We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of selfish mining on winning rate and fairness from the pool operation perspective. The temporary holding time of the current mined block provide...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 10; pp. 61159 - 61174
Main Authors Wen, Yean-Fu, Huang, Chun-Yu
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of selfish mining on winning rate and fairness from the pool operation perspective. The temporary holding time of the current mined block provides a pool additional time to begin mining the next block early with MBTH attack. In this situation, the winning probability increases for the next block, but the pool may risk losing the mined block. One enhanced method to maintain the winning probability of the held block is to ensure the holding pool sends out the mined block once it receives the mined block message from the other pools with the MBTH-EF attack. The explored MBTH attacks differ from the existing selfish miner and pool attacks. The operations and effects of the MBTH-EF attack are different from stubborn mining strategies and a self-holding attack integrates selfish and stubborn mining attacks. We propose a mining competition solution that does not involve actual hash calculation. It entails using one stochastic target hash value for batch racing simulation to evaluate the holding threshold, holding periods, mining time, mining difficulty, pool sizes, and the rate of fork occurrences according to the operation data of the Bitcoin system. Accordingly, the dynamic time-by-time, block-by-block, and pool-by-pool simulations are adopted to study these attacks. We analyzed MBTH and MBTH-EF attacks as well as evaluated the effects of the win rate on when and how long a block is held. Because the periodic adjustment of mining difficulty reduces the holding effect, we further evaluated how an intermittent MBTH-EF (iMBTH-EF) attack model balance the average mining time and mining difficulty according to the mining difficulty adjustment of a stage. The effect of intermittent holding is examined on the mining game win rate for a long-term competition. We also identified suitable attack detection methods for the future work according to the simulation results.
AbstractList We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of selfish mining on winning rate and fairness from the pool operation perspective. The temporary holding time of the current mined block provides a pool additional time to begin mining the next block early with MBTH attack. In this situation, the winning probability increases for the next block, but the pool may risk losing the mined block. One enhanced method to maintain the winning probability of the held block is to ensure the holding pool sends out the mined block once it receives the mined block message from the other pools with the MBTH-EF attack. The explored MBTH attacks differ from the existing selfish miner and pool attacks. The operations and effects of the MBTH-EF attack are different from stubborn mining strategies and a self-holding attack integrates selfish and stubborn mining attacks. We propose a mining competition solution that does not involve actual hash calculation. It entails using one stochastic target hash value for batch racing simulation to evaluate the holding threshold, holding periods, mining time, mining difficulty, pool sizes, and the rate of fork occurrences according to the operation data of the Bitcoin system. Accordingly, the dynamic time-by-time, block-by-block, and pool-by-pool simulations are adopted to study these attacks. We analyzed MBTH and MBTH-EF attacks as well as evaluated the effects of the win rate on when and how long a block is held. Because the periodic adjustment of mining difficulty reduces the holding effect, we further evaluated how an intermittent MBTH-EF (iMBTH-EF) attack model balance the average mining time and mining difficulty according to the mining difficulty adjustment of a stage. The effect of intermittent holding is examined on the mining game win rate for a long-term competition. We also identified suitable attack detection methods for the future work according to the simulation results.
Author Wen, Yean-Fu
Huang, Chun-Yu
Author_xml – sequence: 1
  givenname: Yean-Fu
  orcidid: 0000-0002-5441-1767
  surname: Wen
  fullname: Wen, Yean-Fu
  email: yeanfu@mail.ntpu.edu.tw
  organization: Graduate Institute of Information Management, National Taipei University, New Taipei City, Taiwan
– sequence: 2
  givenname: Chun-Yu
  surname: Huang
  fullname: Huang, Chun-Yu
  organization: Graduate Institute of Information Management, National Taipei University, New Taipei City, Taiwan
BookMark eNp9UU1vEzEQXaEiUUp_QS-WOG_wx_rrGKKUViqiUoo4Wl7vuHXirIO9lciVX85utiDEAWskj2beezP2e1ud9amHqroieEEI1h-Wq9V6s1lQTOmCEUWIEq-qc0qErhln4uyv_E11WcoWj0eNJS7Pq5_rH4eYsh1C6lHy6HPooUMfY3I79AD7w9jKIR7RTYpd6B-R7Tu07n3KDtB1yju0HAbrdgW1R7SB6EN5mjQm6H1KEYUe3eeUfD3Gtwl_knZPdmxsjmWAfXlXvfY2Frh8uS-qr9frh9VNfffl0-1qeVe7Bquh9sRhqrHysqFWcKW5Z9Y713Douo6Pz7NW8kYBaR0jQrWS88ZC6xrrdUsUu6huZ90u2a055LC3-WiSDeZUSPnR2DwEF8F04LhuJXAGtMFNqzwVruMeE0sFU3rUej9rHXL6_gxlMNv0nPtxfUOFFFI27DRRzyiXUykZvHFhOH31kG2IhmAzOWhmB83koHlxcOSyf7i_N_4_62pmBQD4w9BSEyYk-wUttKnk
CODEN IAECCG
CitedBy_id crossref_primary_10_1007_s11227_023_05425_7
crossref_primary_10_1002_cpe_8224
crossref_primary_10_1109_ACCESS_2024_3522962
crossref_primary_10_1002_ett_4824
crossref_primary_10_1007_s11227_022_04762_3
crossref_primary_10_1109_ACCESS_2025_3551627
Cites_doi 10.1109/ACCESS.2020.3017716
10.1016/j.cose.2019.101584
10.1007/978-3-030-30215-3_1
10.1007/978-3-662-54970-4_30
10.1109/ACCESS.2019.2945600
10.1109/SP.2015.13
10.1109/EuroSP.2016.32
10.1109/TNSM.2021.3073414
10.1109/ICSSA45270.2018.00014
10.1109/ACCESS.2019.2956168
10.1109/SP.2019.00086
10.1109/TNSE.2021.3050034
10.1109/ICBC48266.2020.9169436
10.1109/Blockchain.2019.00033
10.1109/ACCESS.2019.2909924
10.1109/ICCSP.2019.8697996
10.1109/JSYST.2021.3087798
10.1145/3133956.3134019
10.1145/2976749.2978341
10.1109/TIFS.2016.2623588
10.1109/ACCESS.2020.3000571
10.1109/TCSS.2020.2991097
10.1109/TNSE.2020.3038943
10.1007/978-3-030-51280-4_5
10.2139/ssrn.3399742
10.1109/CAC.2018.8623140
10.1109/TNSE.2021.3103558
10.1109/ACCESS.2020.2967861
10.1109/JSYST.2019.2927707
10.5195/LEDGER.2016.13
10.1109/JSYST.2020.3004468
10.1109/COMST.2020.2975999
10.1109/TCSS.2018.2861423
10.1109/TDSC.2021.3104465
10.1007/s12083-015-0347-x
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2022.3181186
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Materials Research Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 61174
ExternalDocumentID oai_doaj_org_article_dec59b7e53e2404b8f26cd5f01a26389
10_1109_ACCESS_2022_3181186
9791367
Genre orig-research
GrantInformation_xml – fundername: University System of Taipei, Taiwan
  grantid: USTP-NTUT-NTPU-111-02
– fundername: Ministry of Science and Technology (MOST), Taiwan
  grantid: 107-2221-E-305-003-MY2
  funderid: 10.13039/501100004663
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-f1c02908f742a65895f3afcc45eddd5353aa7548e1bc3168b7554aebc4af9b183
IEDL.DBID DOA
ISSN 2169-3536
IngestDate Wed Aug 27 01:30:08 EDT 2025
Mon Jun 30 06:38:57 EDT 2025
Thu Apr 24 23:02:57 EDT 2025
Tue Jul 01 04:21:13 EDT 2025
Wed Aug 27 02:28:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-f1c02908f742a65895f3afcc45eddd5353aa7548e1bc3168b7554aebc4af9b183
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5441-1767
OpenAccessLink https://doaj.org/article/dec59b7e53e2404b8f26cd5f01a26389
PQID 2676774318
PQPubID 4845423
PageCount 16
ParticipantIDs ieee_primary_9791367
doaj_primary_oai_doaj_org_article_dec59b7e53e2404b8f26cd5f01a26389
crossref_citationtrail_10_1109_ACCESS_2022_3181186
crossref_primary_10_1109_ACCESS_2022_3181186
proquest_journals_2676774318
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20220000
2022-00-00
20220101
2022-01-01
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 20220000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
Ittay (ref3); 8437
ref30
ref11
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
Nakamoto (ref4) 2008
ref24
ref26
ref25
ref20
ref22
Davidson (ref33) 2020
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref6
ref40
References_xml – ident: ref14
  doi: 10.1109/ACCESS.2020.3017716
– year: 2020
  ident: ref33
  article-title: On the profitability of selfish mining against multiple difficulty adjustment algorithms
– ident: ref32
  doi: 10.1016/j.cose.2019.101584
– ident: ref34
  doi: 10.1007/978-3-030-30215-3_1
– ident: ref29
  doi: 10.1007/978-3-662-54970-4_30
– ident: ref13
  doi: 10.1109/ACCESS.2019.2945600
– ident: ref16
  doi: 10.1109/SP.2015.13
– ident: ref30
  doi: 10.1109/EuroSP.2016.32
– ident: ref18
  doi: 10.1109/TNSM.2021.3073414
– year: 2008
  ident: ref4
  article-title: Bitcoin: A peer-to-peer electronic cash system
  publication-title: Bitcoin Whitepaper
– ident: ref27
  doi: 10.1109/ICSSA45270.2018.00014
– ident: ref40
  doi: 10.1109/ACCESS.2019.2956168
– volume: 8437
  start-page: 436
  volume-title: Proc. Int. Conf. Financial Cryptogr. Data Secur.
  ident: ref3
  article-title: Majority is not enough: Bitcoin mining is vulnerable
– ident: ref28
  doi: 10.1109/SP.2019.00086
– ident: ref10
  doi: 10.1109/TNSE.2021.3050034
– ident: ref12
  doi: 10.1109/ICBC48266.2020.9169436
– ident: ref35
  doi: 10.1109/Blockchain.2019.00033
– ident: ref21
  doi: 10.1109/ACCESS.2019.2909924
– ident: ref15
  doi: 10.1109/ICCSP.2019.8697996
– ident: ref2
  doi: 10.1109/JSYST.2021.3087798
– ident: ref11
  doi: 10.1145/3133956.3134019
– ident: ref38
  doi: 10.1145/2976749.2978341
– ident: ref20
  doi: 10.1109/TIFS.2016.2623588
– ident: ref25
  doi: 10.1109/ACCESS.2020.3000571
– ident: ref26
  doi: 10.1109/TCSS.2020.2991097
– ident: ref6
  doi: 10.1109/TNSE.2020.3038943
– ident: ref24
  doi: 10.1007/978-3-030-51280-4_5
– ident: ref39
  doi: 10.2139/ssrn.3399742
– ident: ref36
  doi: 10.1109/CAC.2018.8623140
– ident: ref17
  doi: 10.1109/TNSE.2021.3103558
– ident: ref31
  doi: 10.1109/ACCESS.2020.2967861
– ident: ref9
  doi: 10.1109/JSYST.2019.2927707
– ident: ref7
  doi: 10.5195/LEDGER.2016.13
– ident: ref8
  doi: 10.1109/JSYST.2020.3004468
– ident: ref19
  doi: 10.1109/COMST.2020.2975999
– ident: ref1
  doi: 10.1109/TCSS.2018.2861423
– ident: ref22
  doi: 10.1109/TDSC.2021.3104465
– ident: ref37
  doi: 10.1007/s12083-015-0347-x
SSID ssj0000816957
Score 2.293538
Snippet We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 61159
SubjectTerms Attack model
Bitcoin
blockchain
Blockchains
Competition
consensus
Cryptography
Data mining
Evaluation
fork
Games
Racing
selfish mining
Simulation
temporarily holding
SummonAdditionalLinks – databaseName: IEEE/IET Electronic Library
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La9wwEBZJTu2hbZqWbpsGHXKMN5YsrazjZsmyFLYEmkBuRk-y7GKHxHtIj_3lnbG1pmlLKfhg9EJmxtI3I803hJzy6IVkqshkEDYTgrMMT2uyvFS89MExJzFQePl1srgRX27l7R45G2JhQgjd5bMwxtfuLN83bouusnOtNDKM7ZN9MNz6WK3Bn4IJJLRUiViI5fp8OpvBN4AJyDlYpiUg6cmzzafj6E9JVf5YibvtZf6aLHcT62-VrMfb1o7d9984G_935m_Iq4Qz6bRXjEOyF-q35OUv7INH5Ed__64TDW0iXUKVpxewu63pdWKsWm2e6KI_oKKm9vQSo5dcoPPmYU2nbYsR-tQ-0W9hE1ePdzgGNr1qmg1d1fQKcHnM4EGffD-0uzNQkYjS35Gb-eX1bJGllAyZE3nZZpG5nOu8jGBRGwAvWsbCROeEDN57WcjCGAVGUGDWYUosqwCumGCdMFFbWD7ek4O6qcMHQpmOAB6UxX7C58oojOKVWFoyEeWI8J2sKpf4yjFtxqbq7JZcV72AKxRwlQQ8ImdDp_ueruPfzS9QCYamyLXdFYDwqvTrVqCxUlsVZBEA_ghbRj5xXsacGY54b0SOUODDIEnWI3K8U6kqrQuPFUd-PARt5ce_9_pEXuAEeyfPMTloH7bhM8Ce1p50-v4TIX_-xg
  priority: 102
  providerName: IEEE
Title Exploration of Mined Block Temporarily Holding and Enforce Fork Attacks by Selfish Mining Pool in Proof-of-Work Blockchain Systems
URI https://ieeexplore.ieee.org/document/9791367
https://www.proquest.com/docview/2676774318
https://doaj.org/article/dec59b7e53e2404b8f26cd5f01a26389
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxQxFA_Skx5EreJqLTl4dOgkk2yS43bpsgiVgi30FvJJly4z0k4PvfqX-94kXVYEvQhzyrxkJnkvee8leb9HyGeeo5BMdY1MwjdCcNbgaU3TasV1TIEFiYHC59_m6yvx9Vpe76X6wjthBR64DNwJ0EvjVZJdAuUjvM58HqLMLXMctS2uvqDz9pypaQ3WbG6kqjBDrDUni-USegQOIefgp2qwq-e_qaIJsb-mWPljXZ6UzeoVeVmtRLoof_eaPEv9G_JiDzvwkPwst-emgaVDpufwKtJT0E239LLiTW22j3Rdjpeo6yM9w9ijkOhquLuli3HE-HrqH-n3tM2b-xtsA0kvhmFLNz29AKs6N_DgjnppOtw4eFFhzt-Sq9XZ5XLd1IQKTRCtHpvMQstNqzP4ww5MDyNz53IIQqYYo-xk55wCFyYxHzChlVdgbLjkg3DZeJj878hBP_TpPaHMZFD9ymM9EVvlFMbgSizVTGQ5I_xpbG2oaOOY9GJrJ6-jNbYwxCJDbGXIjHzZVfpRwDb-Tn6KTNuRIlL2VADyY6v82H_Jz4wcIst3jRhlEMVuRo6eRMDWWX1vOaLbocmlP_yPT38kz7E7ZUPniByMdw_pE5g4oz-epPl4ikb8Beo89kw
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxELZKOQAHXgURKOADx26669jx-phGjQI0VSVSqTfLTzVKtIvazaEc-eXM7DorXkJIe1j5Ja9m1v5m7PmGkA8sei4KOcpE4DbjnBUZntZkeSlZ6YMrnMBA4cX5eH7JP12Jqz1y1MfChBDay2dhiK_tWb6v3RZdZcdKKmQYu0fuw74vWBet1XtUMIWEEjJRCxW5Op5Mp_AVYAQyBrZpCVh6_Mv207L0p7Qqf6zF7QYze0IWu6l190rWw21jh-7bb6yN_zv3p-RxQpp00qnGM7IXqufk0U_8gwfke3cDrxUOrSNdQJWnJ7C_rekycVatNnd03h1RUVN5eorxSy7QWX2zppOmwRh9au_ol7CJq9trHAObXtT1hq4qegHIPGbwoFe-G9pdG6hIVOkvyOXsdDmdZykpQ-Z4XjZZLFzOVF5GsKkNwBcl4shE57gI3nsxEiNjJJhBobAOk2JZCYDFBOu4icrCAvKS7Fd1FV4RWqgI8EFa7Md9Lo3EOF6BpWXBoxgQtpOVdomxHBNnbHRrueRKdwLWKGCdBDwgR32nrx1hx7-bn6AS9E2RbbstAOHp9PNq0FmhrAxiFAAAcVtGNnZexLwwDBHfgBygwPtBkqwH5HCnUjqtDLeaIUMewrby9d97vScP5svFmT77eP75DXmIk-1cPodkv7nZhrcAghr7rtX9H447Ah8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploration+of+Mined+Block+Temporarily+Holding+and+Enforce+Fork+Attacks+by+Selfish+Mining+Pool+in+Proof-of-Work+Blockchain+Systems&rft.jtitle=IEEE+access&rft.au=Wen%2C+Yean-Fu&rft.au=Huang%2C+Chun-Yu&rft.date=2022&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=10&rft.spage=61159&rft.epage=61174&rft_id=info:doi/10.1109%2FACCESS.2022.3181186&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2022_3181186
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon