Blockchain-based multi-malicious double-spending attack blacklist management model

The Journal of Supercomputing(2022)

引用 1|浏览5
暂无评分
摘要
In recent years, blockchain security issues have attracted widespread attention. Especially in terms of computing power security, when nodes have sufficient computing power, they can arbitrarily tamper with blockchain ledger data. As a huge collection of computing power, the blockchain mining pool is a potential malicious node. Multiple malicious nodes jointly conduct a double-spending attack on the blockchain, which brings great security risks to the blockchain. This paper studies the different combinations of double-spending attack by potential malicious mining pools, constructs a blacklist judgment strategy based on the attack characteristics, and proposes a blockchain-based multi-malicious double-spending attack blacklist management model. Firstly, an inner loop malicious game is proposed to analyze the competition trend between a single malicious node and other malicious nodes. Secondly, according to the attack mode of multiple mining pools, a joint attack model and a decentralized attack model are proposed, and the operation rules of the two attack models are mathematically derived. Then a blacklist management model is proposed, and after the blacklist is constructed, a blacklist judgment strategy is formulated. The blacklist uses decentralize mining pool judgments and joint mining pool judgments to extract malicious mining pool nodes, which stops further malicious behavior. And finally, simulation experiments show that the blacklist management model can significantly reduce the success of attacks and resist double-spending attacks effectively.
更多
查看译文
关键词
Blacklist management model, Inner loop malicious game, Joint attack model, Decentralized attack model, Blacklist judgment strategy
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要