Nik Defense: An Artificial Intelligence Based Defense Mechanism against
Selfish Mining in Bitcoin
- URL: http://arxiv.org/abs/2301.11463v1
- Date: Thu, 26 Jan 2023 23:30:44 GMT
- Title: Nik Defense: An Artificial Intelligence Based Defense Mechanism against
Selfish Mining in Bitcoin
- Authors: Ali Nikhalat Jahromi, Ali Mohammad Saghiri, Mohammad Reza Meybodi
- Abstract summary: Bitcoin mining's protocol is not incentive-compatible.
Some nodes with high computational power can obtain more revenue than their fair share.
We propose an artificial intelligence-based defense against selfish mining attacks.
- Score: 1.160208922584163
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Bitcoin cryptocurrency has received much attention recently. In the
network of Bitcoin, transactions are recorded in a ledger. In this network, the
process of recording transactions depends on some nodes called miners that
execute a protocol known as mining protocol. One of the significant aspects of
mining protocol is incentive compatibility. However, literature has shown that
Bitcoin mining's protocol is not incentive-compatible. Some nodes with high
computational power can obtain more revenue than their fair share by adopting a
type of attack called the selfish mining attack. In this paper, we propose an
artificial intelligence-based defense against selfish mining attacks by
applying the theory of learning automata. The proposed defense mechanism
ignores private blocks by assigning weight based on block discovery time and
changes current Bitcoin's fork resolving policy by evaluating branches' height
difference in a self-adaptive manner utilizing learning automata. To the best
of our knowledge, the proposed protocol is the literature's first
learning-based defense mechanism. Simulation results have shown the superiority
of the proposed mechanism against tie-breaking mechanism, which is a well-known
defense. The simulation results have shown that the suggested defense mechanism
increases the profit threshold up to 40\% and decreases the revenue of selfish
attackers.
Related papers
- Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining [5.893888881448058]
As Bitcoin experiences more halving events, the protocol reward converges to zero, making transaction fees the primary source of miner rewards.
Previous security analyses of Bitcoin have either considered a fixed block reward model or a highly simplified volatile model.
We present a reinforcement learning-based tool designed to analyze mining strategies under a more realistic volatile model.
arXiv Detail & Related papers (2024-11-18T16:29:20Z) - Examining Attacks on Consensus and Incentive Systems in Proof-of-Work Blockchains: A Systematic Literature Review [0.0]
Bitcoin's security relies on a decentralized ledger consisting of a consensus and an incentive mechanism.
As Bitcoin's acceptance grows, it faces increasing threats from attacks targeting these mechanisms.
This paper begins by examining individual attacks executed in isolation and their profitability.
It then explores how combining these attacks with each other or with other malicious and non-malicious strategies can enhance their overall effectiveness and profitability.
arXiv Detail & Related papers (2024-11-01T04:18:42Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains [5.864854777864723]
We study selfish mining attacks in longest-chain blockchains like Bitcoin, but where the proof of work is replaced with efficient proof systems.
We propose a novel selfish mining attack that aims to maximize expected relative revenue of the adversary.
We present a formal analysis procedure which computes an $epsilon$-tight lower bound on the optimal expected relative revenue in the MDP.
arXiv Detail & Related papers (2024-05-07T15:44:39Z) - Parallel Proof-of-Work with DAG-Style Voting and Targeted Reward Discounting [0.0]
We present parallel proof-of-work with DAG-style voting, a novel proof-of-work cryptocurrency protocol.
It provides better consistency guarantees, higher transaction throughput, lower transaction confirmation latency, and higher resilience against incentive attacks.
An interesting by-product of our analysis is that parallel proof-of-work without reward discounting is less resilient to incentive attacks than Bitcoin in some realistic network scenarios.
arXiv Detail & Related papers (2023-12-05T20:14:33Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Transferable Sparse Adversarial Attack [62.134905824604104]
We introduce a generator architecture to alleviate the overfitting issue and thus efficiently craft transferable sparse adversarial examples.
Our method achieves superior inference speed, 700$times$ faster than other optimization-based methods.
arXiv Detail & Related papers (2021-05-31T06:44:58Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Composite Adversarial Attacks [57.293211764569996]
Adversarial attack is a technique for deceiving Machine Learning (ML) models.
In this paper, a new procedure called Composite Adrial Attack (CAA) is proposed for automatically searching the best combination of attack algorithms.
CAA beats 10 top attackers on 11 diverse defenses with less elapsed time.
arXiv Detail & Related papers (2020-12-10T03:21:16Z) - Adversarial Example Games [51.92698856933169]
Adrial Example Games (AEG) is a framework that models the crafting of adversarial examples.
AEG provides a new way to design adversarial examples by adversarially training a generator and aversa from a given hypothesis class.
We demonstrate the efficacy of AEG on the MNIST and CIFAR-10 datasets.
arXiv Detail & Related papers (2020-07-01T19:47:23Z) - A Proof of Useful Work for Artificial Intelligence on the Blockchain [0.3599866690398789]
We describe a novel 'proof of useful work' (PoUW) protocol based on training a machine learning model on the blockchain.
Miners get a chance to create new coins after performing honest ML training work.
We outline mechanisms to reward useful work and punish malicious actors.
arXiv Detail & Related papers (2020-01-25T01:10:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.