FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners
Abstract
:1. Introduction
- The current protection algorithms only set a simple protection strategy based on a single attack feature. They do not consider the multi-dimensional behavior characteristics of FAW attacks such as block withholding attacks and selfish mining attacks, and do not conduct reasonable miner credit evaluation.
- The current protection algorithms difficultly detect malicious miners who carry out FAW attacks effectively, and the detection precision rate is low.
- The current protection algorithms lack a mining revenue model and difficultly evaluate the effect of protection revenues.
- We propose a behavioral reward and punishment mechanism and credit value scoring model. Namely, according to honest mining or FAW attacks on target mining pools by the tasks of malicious mining pools, we extract mining behavior characteristics such as offline times, delay time, and current network forks, and propose reward and punishment mechanisms, including PoW reward and block mining failure punishment. Then, by calculating the cumulative performance value of a miner in block mining, we propose the miner’s credit value scoring model to calculate the current credit value. It can mobilize the enthusiasm of miners to participate in mining as the basis for credit ratings.
- We propose a miner’s credit classification mechanism based on fuzzy C-means (FCM), which combines the improved Aquila optimizer (AO). Namely, according to the evaluation elements of credit rating classification in miner behavior data, the mechanism considers the distance inside and outside of the cluster, and improves the fitness calculation method. It also introduces multiple weight parameters to improve the distance calculation method. It optimizes cluster center selection by simulating Aquila predation behavior, and improves the solution update mechanism in different optimization stages. Then, mining pool administrators obtain the distribution of malicious miners in the mining pool and give the corresponding revenues distribution weights to the detected malicious miners to improve detection speed.
- We propose the revenue model of the mining pool under FAW attack and the revenue model of each miner. Namely, we extract mathematical formulas such as the effective computing power, mining cost, and revenue of malicious mining pools. Then. the model calculates the revenue of the target mining pool, and quickly evaluates the malicious miner protection effect of the target mining pool. It is conducive to the rapid simulation verification of the algorithm.
2. Related Work
3. Algorithm Principle
3.1. Algorithmic Assumptions and Problem Solving
3.2. Basic Principles
3.2.1. Miner Data Preprocessing
3.2.2. Malicious Miner Detection
Behavioral Reward and Punishment Mechanism and Credit Value Scoring Model
Credit Rating Classification
3.2.3. Mining Pool Revenue Distribution and Evaluation
4. Algorithm Implementation
Algorithm 1: FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners (FAWPA) |
Input: behavior information of miners in target mining pool 1: = 3; = 1000; lstep = 1.5; = 30; = 60; The mining pool manager starts timing; 2: while(1) 3: The mining pool manager of the target mining pool receives the behavior information of each miner; 4: if the target mining pool knows the number of mines and blocks mined by any mining pool in the network, then 5: The target mining pool selects the behavior data of miners when the block is mined; 6: if miner behavior data exceeds the threshold of the boxplot analysis algorithm, then 7: The target pool managers perform data preprocessing and flag malicious miners; 8: end 9: The target pool manager implements a reward and punishment mechanism; 10: The target pool manager implements the credit value scoring model and updates the cumulative credit value of each miner; 11: The target pool manager implements the credit rating mechanism MCCM to classify miners’ credit ratings; 12: The target pool manager sets revenue distribution weight according to credit rating result; 13: if time > T 14: The target pool manager clears cumulative performance value and cumulative credit value for all miners, ; 15: end 16: end 17: if the target pool manager successfully mines blocks, then 18: The target pool manager distributes mining pool revenue according to the revenue distribution weight of each miner; 19: else 20: Return to line 3; 21: end 22: The network synchronizes the block information and starts to mine the next block; 23: end |
5. Experimental Simulation
5.1. Simulation Parameters and Performance Parameters
5.2. Simulation Analysis
5.2.1. Miner Data Preprocessing
5.2.2. Performance Analysis
5.2.3. Performance Comparison
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Yu, K.; Tan, L.; Aloqaily, M.; Yang, H.; Jararweh, Y. Blockchain-enhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans. Ind. Inform. 2021, 17, 7669–7678. [Google Scholar] [CrossRef]
- Yuan, Y.; Wang, F.Y. Blockchain and cryptocurrencies: Model, techniques, and applications. IEEE Trans. Syst. Man Cybern. Syst. 2018, 4, 1421–1428. [Google Scholar] [CrossRef]
- Joshi, A.P.; Han, M.; Wang, Y. A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 2018, 1, 121–147. [Google Scholar] [CrossRef] [Green Version]
- Ferreira, M.V.; Weinberg, S.M. Proof-of-Stake Mining Games with Perfect Randomness. In Proceedings of the 22nd ACM Conference on Economics and Computation, Budapest, Hungary, 18–23 July 2021; pp. 433–453. [Google Scholar]
- Chen, Y.; Chen, H.; Zhang, Y.; Han, M.; Siddula, M.; Cai, Z. A survey on blockchain systems: Attacks, defenses, and privacy preservation. High-Confid. Comput. 2022, 2, 100048. [Google Scholar] [CrossRef]
- Eyal, I. The miner’s dilemma. In Proceedings of the 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 18 May 2015; pp. 89–103. [Google Scholar]
- Shalini, S.; Santhi, H. A survey on various attacks in bitcoin and cryptocurrency. In Proceedings of the 2019 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 4–6 April 2019; pp. 220–224. [Google Scholar]
- Haghighat, A.T.; Shajari, M. Block withholding game among bitcoin mining pools. Future Gener. Comput. Syst. 2019, 97, 482–491. [Google Scholar] [CrossRef]
- Chen, Y.; Chen, H.; Han, M.; Liu, B.; Chen, Q.; Ma, Z.; Wang, Z. Miner revenue optimization algorithm based on Pareto artificial bee colony in blockchain network. EURASIP J. Wirel. Commun. Netw. 2021, 1, 1–28. [Google Scholar] [CrossRef]
- Motlagh, S.G.; Mišić, J.; Mišić, V.B. The impact of selfish mining on bitcoin network performance. IEEE Trans. Netw. Sci. Eng. 2021, 8, 724–735. [Google Scholar] [CrossRef]
- Kwon, Y.; Kim, D.; Son, Y.; Vasserman, E.; Kim, Y. Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 195–209. [Google Scholar]
- Chang, S.Y.; Park, Y. Silent timestamping for blockchain mining pool security. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2015; pp. 1–5. [Google Scholar]
- Ke, J.; Jiang, H.; Song, X.; Zhao, S.; Wang, H.; Xu, Q. Analysis on the block reward of fork after withholding (FAW). In Proceedings of the International Conference on Network and System Security, Hong Kong, China, 27–29 August 2020; pp. 16–31. [Google Scholar]
- Sarker, A.; Wuthier, S.; Chang, S.Y. Anti-withholding reward system to secure blockchain mining pools. In Proceedings of the 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), Rotkreuz, Switzerland, 24–26 June 2019; pp. 43–46. [Google Scholar]
- Bag, S.; Sakurai, K. Yet another note on block withholding attack on bitcoin mining pools. In Proceedings of the International Conference on Information Security, Honolulu, HI, USA, 3–6 September 2016; pp. 167–180. [Google Scholar]
- Schrijvers, O.; Bonneau, J.; Boneh, D.; Roughgarden, T. Incentive compatibility of bitcoin mining pool reward functions. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 22–26 February 2016; pp. 477–498. [Google Scholar]
- Wang, Y.; Yang, G.; Li, T.; Zhang, L.; Wang, Y.; Ke, L.; Dou, Y.; Li, S.; Yu, X. Optimal mixed block withholding attacks based on reinforcement learning. Int. J. Intell. Syst. 2020, 35, 2032–2048. [Google Scholar] [CrossRef]
- Gao, S.; Li, Z.; Peng, Z.; Xiao, B. Power adjusting and bribery racing: Novel mining attacks in the bitcoin system. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 833–850. [Google Scholar]
- Vinue, G.; Epifanio, I. Robust archetypoids for anomaly detection in big functional data. Adv. Data Anal. Classif. 2021, 15, 437–462. [Google Scholar] [CrossRef]
- AlZu’bi, S.; Shehab, M.; Al-Ayyoub, M.; Jararweh, Y.; Gupta, B. Parallel implementation for 3d medical volume fuzzy segmentation. Pattern Recognit. Lett. 2020, 130, 312–318. [Google Scholar] [CrossRef]
- Cohen-Addad, V.; Kanade, V.; Mallmann-Trenn, F.; Mathieu, C. Hierarchical clustering: Objective functions and algorithms. J. ACM 2019, 66, 1–42. [Google Scholar] [CrossRef]
- Capó, M.; Pérez, A.; Lozano, J.A. A cheap feature selection approach for the k-means algorithm. IEEE Trans. Neural Netw. Learn. Syst. 2020, 32, 2195–2208. [Google Scholar] [CrossRef] [PubMed]
- Chacko, A.; Antonidoss, A.; Sebastain, A. Optimized algorithm for credit scoring. Int. J. 2020, 9, 361–365. [Google Scholar] [CrossRef]
- Abualigah, L.; Yousri, D.; Abd Elaziz, M.; Ewees, A.A.; Al-Qaness, M.A.; Gandomi, A.H. Aquila optimizer: A novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
- Wu, D.; Liu, X.D.; Yan, X.B.; Peng, R.; Li, G. Equilibrium analysis of bitcoin block withholding attack: A generalized model. Reliab. Eng. Syst. Saf. 2019, 185, 318–328. [Google Scholar] [CrossRef]
- Huang, J.; Kong, L.; Chen, G.; Wu, M.Y.; Liu, X.; Zeng, P. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Ind. Inform. 2019, 15, 3680–3689. [Google Scholar] [CrossRef]
- Han, M.; Li, Z.; He, J.; Wu, D.; Xie, Y.; Baba, A. A novel blockchain-based education records verification solution. In Proceedings of the 19th Annual SIG Conference on Information Technology Education, Fort Lauderdale, FL, USA, 3–6 October 2018; pp. 178–183. [Google Scholar]
Name | Explanation |
---|---|
Current credit value | Miner’s current credit value for working in the block |
Cumulative credit value | Miner’s cumulative credit value before credit rating classification |
Offline times | Number of miner’s offline in the current mining pool |
Delay time | Delay time of miner in communication process |
Current number of network forks | Number of network forks caused by miner before credit rating classification |
Rankings | Mining Pool | Computing Power | Proportion |
---|---|---|---|
1 | Foundry USA | 48,209.44 PH/s | 21.51% |
2 | F2Pool | 32,305.30 PH/s | 14.41% |
3 | Binance Pool | 30,814.28 PH/s | 13.75% |
4 | Poolin | 30,317.28 PH/s | 13.53% |
5 | AntPool | 21,371.20 PH/s | 9.53% |
6 | ViaBTC | 20,377.19 PH/s | 9.09% |
7 | SlushPool | 10,934.10 PH/s | 4.88% |
8 | btc.com | 10,437.10 PH/s | 4.66% |
9 | SBI Crypto | 6461.06 PH/s | 2.88% |
10 | Luxor | 5467.05 PH/s | 2.44% |
11 | unknown | 2982.03 PH/s | 1.33% |
12 | MARA Pool | 2982.03 PH/s | 1.33% |
13 | Others | 1490.99 PH/s | 0.66% |
Parameter | Number | Parameter | Number |
---|---|---|---|
Number of miners | 1000 | Similarity threshold | 0.5 |
Number of blocks | 100 | Similarity threshold | 0.5 |
Number of cluster centers | 2 | Credit model parameter | 50 |
Initial credit value | 60 | Credit model parameter | 500 |
Weight value of current credit Value | 5 | Weight value of offline times | 10 |
Cumulative credit value | 5 | Weight value of delay times | 10 |
Network fork punishment | 50 | Weight value of fork times | 10 |
Block mining failure punishment | 30 | Proportion of computing power per unit of miners to the computing power of the entire network | 0.1% |
Performance value of FPoW reward | 200 | Performance value of PPoW reward | 30 |
Honest mining cost per unit of computing | 10−3 | FAW attack cost per unit of computing power | 10−4 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, Y.; Lv, X.; Chen, Y.; Ren, T.; Yang, C.; Han, M. FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners. Sensors 2022, 22, 5032. https://doi.org/10.3390/s22135032
Zhang Y, Lv X, Chen Y, Ren T, Yang C, Han M. FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners. Sensors. 2022; 22(13):5032. https://doi.org/10.3390/s22135032
Chicago/Turabian StyleZhang, Yang, Xiaowen Lv, Yourong Chen, Tiaojuan Ren, Changchun Yang, and Meng Han. 2022. "FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners" Sensors 22, no. 13: 5032. https://doi.org/10.3390/s22135032
APA StyleZhang, Y., Lv, X., Chen, Y., Ren, T., Yang, C., & Han, M. (2022). FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners. Sensors, 22(13), 5032. https://doi.org/10.3390/s22135032