Exploration of Mined Block Temporarily Holding and Enforce Fork Attacks by Selfish Mining Pool in Proof-of-Work Blockchain Systems
We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of selfish mining on winning rate and fairness from the pool operation perspective. The temporary holding time of the current mined block provide...
Saved in:
Published in | IEEE access Vol. 10; pp. 61159 - 61174 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of selfish mining on winning rate and fairness from the pool operation perspective. The temporary holding time of the current mined block provides a pool additional time to begin mining the next block early with MBTH attack. In this situation, the winning probability increases for the next block, but the pool may risk losing the mined block. One enhanced method to maintain the winning probability of the held block is to ensure the holding pool sends out the mined block once it receives the mined block message from the other pools with the MBTH-EF attack. The explored MBTH attacks differ from the existing selfish miner and pool attacks. The operations and effects of the MBTH-EF attack are different from stubborn mining strategies and a self-holding attack integrates selfish and stubborn mining attacks. We propose a mining competition solution that does not involve actual hash calculation. It entails using one stochastic target hash value for batch racing simulation to evaluate the holding threshold, holding periods, mining time, mining difficulty, pool sizes, and the rate of fork occurrences according to the operation data of the Bitcoin system. Accordingly, the dynamic time-by-time, block-by-block, and pool-by-pool simulations are adopted to study these attacks. We analyzed MBTH and MBTH-EF attacks as well as evaluated the effects of the win rate on when and how long a block is held. Because the periodic adjustment of mining difficulty reduces the holding effect, we further evaluated how an intermittent MBTH-EF (iMBTH-EF) attack model balance the average mining time and mining difficulty according to the mining difficulty adjustment of a stage. The effect of intermittent holding is examined on the mining game win rate for a long-term competition. We also identified suitable attack detection methods for the future work according to the simulation results. |
---|---|
AbstractList | We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of selfish mining on winning rate and fairness from the pool operation perspective. The temporary holding time of the current mined block provides a pool additional time to begin mining the next block early with MBTH attack. In this situation, the winning probability increases for the next block, but the pool may risk losing the mined block. One enhanced method to maintain the winning probability of the held block is to ensure the holding pool sends out the mined block once it receives the mined block message from the other pools with the MBTH-EF attack. The explored MBTH attacks differ from the existing selfish miner and pool attacks. The operations and effects of the MBTH-EF attack are different from stubborn mining strategies and a self-holding attack integrates selfish and stubborn mining attacks. We propose a mining competition solution that does not involve actual hash calculation. It entails using one stochastic target hash value for batch racing simulation to evaluate the holding threshold, holding periods, mining time, mining difficulty, pool sizes, and the rate of fork occurrences according to the operation data of the Bitcoin system. Accordingly, the dynamic time-by-time, block-by-block, and pool-by-pool simulations are adopted to study these attacks. We analyzed MBTH and MBTH-EF attacks as well as evaluated the effects of the win rate on when and how long a block is held. Because the periodic adjustment of mining difficulty reduces the holding effect, we further evaluated how an intermittent MBTH-EF (iMBTH-EF) attack model balance the average mining time and mining difficulty according to the mining difficulty adjustment of a stage. The effect of intermittent holding is examined on the mining game win rate for a long-term competition. We also identified suitable attack detection methods for the future work according to the simulation results. |
Author | Wen, Yean-Fu Huang, Chun-Yu |
Author_xml | – sequence: 1 givenname: Yean-Fu orcidid: 0000-0002-5441-1767 surname: Wen fullname: Wen, Yean-Fu email: yeanfu@mail.ntpu.edu.tw organization: Graduate Institute of Information Management, National Taipei University, New Taipei City, Taiwan – sequence: 2 givenname: Chun-Yu surname: Huang fullname: Huang, Chun-Yu organization: Graduate Institute of Information Management, National Taipei University, New Taipei City, Taiwan |
BookMark | eNp9UU1vEzEQXaEiUUp_QS-WOG_wx_rrGKKUViqiUoo4Wl7vuHXirIO9lciVX85utiDEAWskj2beezP2e1ud9amHqroieEEI1h-Wq9V6s1lQTOmCEUWIEq-qc0qErhln4uyv_E11WcoWj0eNJS7Pq5_rH4eYsh1C6lHy6HPooUMfY3I79AD7w9jKIR7RTYpd6B-R7Tu07n3KDtB1yju0HAbrdgW1R7SB6EN5mjQm6H1KEYUe3eeUfD3Gtwl_knZPdmxsjmWAfXlXvfY2Frh8uS-qr9frh9VNfffl0-1qeVe7Bquh9sRhqrHysqFWcKW5Z9Y713Douo6Pz7NW8kYBaR0jQrWS88ZC6xrrdUsUu6huZ90u2a055LC3-WiSDeZUSPnR2DwEF8F04LhuJXAGtMFNqzwVruMeE0sFU3rUej9rHXL6_gxlMNv0nPtxfUOFFFI27DRRzyiXUykZvHFhOH31kG2IhmAzOWhmB83koHlxcOSyf7i_N_4_62pmBQD4w9BSEyYk-wUttKnk |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1007_s11227_023_05425_7 crossref_primary_10_1002_cpe_8224 crossref_primary_10_1109_ACCESS_2024_3522962 crossref_primary_10_1002_ett_4824 crossref_primary_10_1007_s11227_022_04762_3 crossref_primary_10_1109_ACCESS_2025_3551627 |
Cites_doi | 10.1109/ACCESS.2020.3017716 10.1016/j.cose.2019.101584 10.1007/978-3-030-30215-3_1 10.1007/978-3-662-54970-4_30 10.1109/ACCESS.2019.2945600 10.1109/SP.2015.13 10.1109/EuroSP.2016.32 10.1109/TNSM.2021.3073414 10.1109/ICSSA45270.2018.00014 10.1109/ACCESS.2019.2956168 10.1109/SP.2019.00086 10.1109/TNSE.2021.3050034 10.1109/ICBC48266.2020.9169436 10.1109/Blockchain.2019.00033 10.1109/ACCESS.2019.2909924 10.1109/ICCSP.2019.8697996 10.1109/JSYST.2021.3087798 10.1145/3133956.3134019 10.1145/2976749.2978341 10.1109/TIFS.2016.2623588 10.1109/ACCESS.2020.3000571 10.1109/TCSS.2020.2991097 10.1109/TNSE.2020.3038943 10.1007/978-3-030-51280-4_5 10.2139/ssrn.3399742 10.1109/CAC.2018.8623140 10.1109/TNSE.2021.3103558 10.1109/ACCESS.2020.2967861 10.1109/JSYST.2019.2927707 10.5195/LEDGER.2016.13 10.1109/JSYST.2020.3004468 10.1109/COMST.2020.2975999 10.1109/TCSS.2018.2861423 10.1109/TDSC.2021.3104465 10.1007/s12083-015-0347-x |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2022.3181186 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 61174 |
ExternalDocumentID | oai_doaj_org_article_dec59b7e53e2404b8f26cd5f01a26389 10_1109_ACCESS_2022_3181186 9791367 |
Genre | orig-research |
GrantInformation_xml | – fundername: University System of Taipei, Taiwan grantid: USTP-NTUT-NTPU-111-02 – fundername: Ministry of Science and Technology (MOST), Taiwan grantid: 107-2221-E-305-003-MY2 funderid: 10.13039/501100004663 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-f1c02908f742a65895f3afcc45eddd5353aa7548e1bc3168b7554aebc4af9b183 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:30:08 EDT 2025 Mon Jun 30 06:38:57 EDT 2025 Thu Apr 24 23:02:57 EDT 2025 Tue Jul 01 04:21:13 EDT 2025 Wed Aug 27 02:28:04 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-f1c02908f742a65895f3afcc45eddd5353aa7548e1bc3168b7554aebc4af9b183 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-5441-1767 |
OpenAccessLink | https://doaj.org/article/dec59b7e53e2404b8f26cd5f01a26389 |
PQID | 2676774318 |
PQPubID | 4845423 |
PageCount | 16 |
ParticipantIDs | ieee_primary_9791367 doaj_primary_oai_doaj_org_article_dec59b7e53e2404b8f26cd5f01a26389 crossref_citationtrail_10_1109_ACCESS_2022_3181186 crossref_primary_10_1109_ACCESS_2022_3181186 proquest_journals_2676774318 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20220000 2022-00-00 20220101 2022-01-01 |
PublicationDateYYYYMMDD | 2022-01-01 |
PublicationDate_xml | – year: 2022 text: 20220000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 Ittay (ref3); 8437 ref30 ref11 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 Nakamoto (ref4) 2008 ref24 ref26 ref25 ref20 ref22 Davidson (ref33) 2020 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref6 ref40 |
References_xml | – ident: ref14 doi: 10.1109/ACCESS.2020.3017716 – year: 2020 ident: ref33 article-title: On the profitability of selfish mining against multiple difficulty adjustment algorithms – ident: ref32 doi: 10.1016/j.cose.2019.101584 – ident: ref34 doi: 10.1007/978-3-030-30215-3_1 – ident: ref29 doi: 10.1007/978-3-662-54970-4_30 – ident: ref13 doi: 10.1109/ACCESS.2019.2945600 – ident: ref16 doi: 10.1109/SP.2015.13 – ident: ref30 doi: 10.1109/EuroSP.2016.32 – ident: ref18 doi: 10.1109/TNSM.2021.3073414 – year: 2008 ident: ref4 article-title: Bitcoin: A peer-to-peer electronic cash system publication-title: Bitcoin Whitepaper – ident: ref27 doi: 10.1109/ICSSA45270.2018.00014 – ident: ref40 doi: 10.1109/ACCESS.2019.2956168 – volume: 8437 start-page: 436 volume-title: Proc. Int. Conf. Financial Cryptogr. Data Secur. ident: ref3 article-title: Majority is not enough: Bitcoin mining is vulnerable – ident: ref28 doi: 10.1109/SP.2019.00086 – ident: ref10 doi: 10.1109/TNSE.2021.3050034 – ident: ref12 doi: 10.1109/ICBC48266.2020.9169436 – ident: ref35 doi: 10.1109/Blockchain.2019.00033 – ident: ref21 doi: 10.1109/ACCESS.2019.2909924 – ident: ref15 doi: 10.1109/ICCSP.2019.8697996 – ident: ref2 doi: 10.1109/JSYST.2021.3087798 – ident: ref11 doi: 10.1145/3133956.3134019 – ident: ref38 doi: 10.1145/2976749.2978341 – ident: ref20 doi: 10.1109/TIFS.2016.2623588 – ident: ref25 doi: 10.1109/ACCESS.2020.3000571 – ident: ref26 doi: 10.1109/TCSS.2020.2991097 – ident: ref6 doi: 10.1109/TNSE.2020.3038943 – ident: ref24 doi: 10.1007/978-3-030-51280-4_5 – ident: ref39 doi: 10.2139/ssrn.3399742 – ident: ref36 doi: 10.1109/CAC.2018.8623140 – ident: ref17 doi: 10.1109/TNSE.2021.3103558 – ident: ref31 doi: 10.1109/ACCESS.2020.2967861 – ident: ref9 doi: 10.1109/JSYST.2019.2927707 – ident: ref7 doi: 10.5195/LEDGER.2016.13 – ident: ref8 doi: 10.1109/JSYST.2020.3004468 – ident: ref19 doi: 10.1109/COMST.2020.2975999 – ident: ref1 doi: 10.1109/TCSS.2018.2861423 – ident: ref22 doi: 10.1109/TDSC.2021.3104465 – ident: ref37 doi: 10.1007/s12083-015-0347-x |
SSID | ssj0000816957 |
Score | 2.293538 |
Snippet | We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 61159 |
SubjectTerms | Attack model Bitcoin blockchain Blockchains Competition consensus Cryptography Data mining Evaluation fork Games Racing selfish mining Simulation temporarily holding |
SummonAdditionalLinks | – databaseName: IEEE/IET Electronic Library dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La9wwEBZJTu2hbZqWbpsGHXKMN5YsrazjZsmyFLYEmkBuRk-y7GKHxHtIj_3lnbG1pmlLKfhg9EJmxtI3I803hJzy6IVkqshkEDYTgrMMT2uyvFS89MExJzFQePl1srgRX27l7R45G2JhQgjd5bMwxtfuLN83bouusnOtNDKM7ZN9MNz6WK3Bn4IJJLRUiViI5fp8OpvBN4AJyDlYpiUg6cmzzafj6E9JVf5YibvtZf6aLHcT62-VrMfb1o7d9984G_935m_Iq4Qz6bRXjEOyF-q35OUv7INH5Ed__64TDW0iXUKVpxewu63pdWKsWm2e6KI_oKKm9vQSo5dcoPPmYU2nbYsR-tQ-0W9hE1ePdzgGNr1qmg1d1fQKcHnM4EGffD-0uzNQkYjS35Gb-eX1bJGllAyZE3nZZpG5nOu8jGBRGwAvWsbCROeEDN57WcjCGAVGUGDWYUosqwCumGCdMFFbWD7ek4O6qcMHQpmOAB6UxX7C58oojOKVWFoyEeWI8J2sKpf4yjFtxqbq7JZcV72AKxRwlQQ8ImdDp_ueruPfzS9QCYamyLXdFYDwqvTrVqCxUlsVZBEA_ghbRj5xXsacGY54b0SOUODDIEnWI3K8U6kqrQuPFUd-PARt5ce_9_pEXuAEeyfPMTloH7bhM8Ce1p50-v4TIX_-xg priority: 102 providerName: IEEE |
Title | Exploration of Mined Block Temporarily Holding and Enforce Fork Attacks by Selfish Mining Pool in Proof-of-Work Blockchain Systems |
URI | https://ieeexplore.ieee.org/document/9791367 https://www.proquest.com/docview/2676774318 https://doaj.org/article/dec59b7e53e2404b8f26cd5f01a26389 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxQxFA_Skx5EreJqLTl4dOgkk2yS43bpsgiVgi30FvJJly4z0k4PvfqX-94kXVYEvQhzyrxkJnkvee8leb9HyGeeo5BMdY1MwjdCcNbgaU3TasV1TIEFiYHC59_m6yvx9Vpe76X6wjthBR64DNwJ0EvjVZJdAuUjvM58HqLMLXMctS2uvqDz9pypaQ3WbG6kqjBDrDUni-USegQOIefgp2qwq-e_qaIJsb-mWPljXZ6UzeoVeVmtRLoof_eaPEv9G_JiDzvwkPwst-emgaVDpufwKtJT0E239LLiTW22j3Rdjpeo6yM9w9ijkOhquLuli3HE-HrqH-n3tM2b-xtsA0kvhmFLNz29AKs6N_DgjnppOtw4eFFhzt-Sq9XZ5XLd1IQKTRCtHpvMQstNqzP4ww5MDyNz53IIQqYYo-xk55wCFyYxHzChlVdgbLjkg3DZeJj878hBP_TpPaHMZFD9ymM9EVvlFMbgSizVTGQ5I_xpbG2oaOOY9GJrJ6-jNbYwxCJDbGXIjHzZVfpRwDb-Tn6KTNuRIlL2VADyY6v82H_Jz4wcIst3jRhlEMVuRo6eRMDWWX1vOaLbocmlP_yPT38kz7E7ZUPniByMdw_pE5g4oz-epPl4ikb8Beo89kw |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxELZKOQAHXgURKOADx26669jx-phGjQI0VSVSqTfLTzVKtIvazaEc-eXM7DorXkJIe1j5Ja9m1v5m7PmGkA8sei4KOcpE4DbjnBUZntZkeSlZ6YMrnMBA4cX5eH7JP12Jqz1y1MfChBDay2dhiK_tWb6v3RZdZcdKKmQYu0fuw74vWBet1XtUMIWEEjJRCxW5Op5Mp_AVYAQyBrZpCVh6_Mv207L0p7Qqf6zF7QYze0IWu6l190rWw21jh-7bb6yN_zv3p-RxQpp00qnGM7IXqufk0U_8gwfke3cDrxUOrSNdQJWnJ7C_rekycVatNnd03h1RUVN5eorxSy7QWX2zppOmwRh9au_ol7CJq9trHAObXtT1hq4qegHIPGbwoFe-G9pdG6hIVOkvyOXsdDmdZykpQ-Z4XjZZLFzOVF5GsKkNwBcl4shE57gI3nsxEiNjJJhBobAOk2JZCYDFBOu4icrCAvKS7Fd1FV4RWqgI8EFa7Md9Lo3EOF6BpWXBoxgQtpOVdomxHBNnbHRrueRKdwLWKGCdBDwgR32nrx1hx7-bn6AS9E2RbbstAOHp9PNq0FmhrAxiFAAAcVtGNnZexLwwDBHfgBygwPtBkqwH5HCnUjqtDLeaIUMewrby9d97vScP5svFmT77eP75DXmIk-1cPodkv7nZhrcAghr7rtX9H447Ah8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploration+of+Mined+Block+Temporarily+Holding+and+Enforce+Fork+Attacks+by+Selfish+Mining+Pool+in+Proof-of-Work+Blockchain+Systems&rft.jtitle=IEEE+access&rft.au=Wen%2C+Yean-Fu&rft.au=Huang%2C+Chun-Yu&rft.date=2022&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=10&rft.spage=61159&rft.epage=61174&rft_id=info:doi/10.1109%2FACCESS.2022.3181186&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2022_3181186 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |