- Yiting Zhang12,
- Ming Liu12,
- Jianan Guo12,
- Zhaojie Wang12,
- Yilei Wang12,
- Tiancai Liang13 &
- …
- Sunil Kumar Singh14
Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 13656))
Included in the following conference series:
1041Accesses
Abstract
As one of the most popular cryptocurrencies, Bitcoin is essentially a decentralized ledger. Each node maintains the security of the blockchain through the workload proof mechanism, and the block that obtains the accounting right will receive a block reward in the form of Bitcoin. Because the Bitcoin system follows the “longest legal chain” principle, when a fork occurs, orphan blocks will inevitably be generated, and some miners’ computing power will be a waste. In recent years, researchers have discovered that miners can obtain profits disproportionate to their own computing power by deviating from Bitcoin’s honest mining. Selfish Mining (SM1) is a case in dishonest mining strategy, and dishonest miners (attackers) can obtain higher returns by retaining the blocks they create and selectively delaying their release. The stubborn mining strategy is a generalized form of selfish mining. It increases the revenue of the stubborn miner by adopting a wider range of parameters. Its three mining strategies are: Lead-Stubborn, Equal Fork stubborn and Trail stubborn.
The mining problem can be formulated as a Markov Decision Process (MDP), which can be resolved to give the optimal mining strategy. This work describes the three mining strategies of stubborn mining as a Markov decision process, solves it and gives the lower bound of the highest return under the optimal stubborn mining strategy. Our experimental results demonstrate that the revenue of the optimal stubborn mining strategy is higher than SM1 under certain circumstances, and this strategy allows dishonest miners (stubborn miners) to obtain revenue that does not match the actual computing power paid.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 11439
- Price includes VAT (Japan)
- Softcover Book
- JPY 14299
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
LNCS Homepage.http://www.springer.com/lncs. Accessed 21 Nov 2016
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review 21260 (2008)
Böhme, R., Christin, N., Edelman, B., et al.: Bitcoin: economics, technology, and governance. J. Econ. Perspectives29(2), 213–238 (2015)
Tang, C., Wu, L., Wen, G., et al.: Incentivizing honest mining in blockchain networks: a reputation approach. IEEE Trans. Circuits Syst. II Express Briefs67(1), 117–121 (2019)
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp. 436–454 (2014).https://doi.org/10.1007/978-3-662-45472-5_28
Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Communications Surveys Tutorials18(3), 2084–2123 (2016)
Wang, W., Hoang, D.T., Hu, P., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access7, 22328–22370 (2019)
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp. 515–532 (2016).https://doi.org/10.1007/978-3-662-54970-4_30
Nayak, K., Kumar, S., Miller, A., et al.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, pp. 305–320 (2016)
Li, T., Wang, Z., Chen, Y., et al.: Is semi‐selfish mining available without being detected?. International Journal of Intelligent Systems (2021).https://doi.org/10.1002/int.22656
Li, T., Wang, Z., Yang, G., et al.: Semi-selfish mining based on hidden Markov decision process. Int. J. Intell. Syst.36(7), 3596–3612 (2021)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc.; (2015)
Yang, G., Wang, Y., Wang, Z., et al.: IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers. Int. J. Intell. Syst.35(11), 1735–1748 (2020)
Bonneau, J., Felten, E.W., Goldfeder, S., Kroll, J.A., Narayanan, A.: Why Buy When You Can Rent? Bribery Attacks on Bitcoin Consensus (2016)
Gao, S., Li, Z., Peng, Z., et al.: Power adjusting and bribery racing: novel mining attacks in the bitcoin system. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 833-850 (2019)
Dong, X., Wu, F., Faree, A., et al.: Selfholding: a combined attack model using selfish mining with block withholding attack. Comput. Secur.87, 101584 (2019)
Wang, T., Liew, S.C., Zhang, S.: When blockchain meets AI: optimal mining strategy achieved by machine learning. Int. J. Intell. Syst.36(5), 2183–2207 (2021)
Zheng, Z., Xie, S., Dai, H.N., et al.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv.14(4), 352–375 (2018)
Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings. IEEE, pp. 1-10 (2013).
Wang, Y., Wang, Z., Zhao, M., et al.: BSM-ether: bribery selfish mining in blockchain-based healthcare systems. Inf. Sci.601, 1–17 (2022)
Zhang, X., Wang, Y., Geng, G., Yu, J.: Delay-optimized multicast tree packing in software-defined networks. IEEE Transactions on Services Computing, Early Access, pp. 1–14 (2021).https://doi.org/10.1109/TSC.2021.3106264
Yuan, F., Chen, S., Liang, K., Xu, L.: Research on the coordination mechanism of traditional Chinese medicine medical record data standardization and characteristic protection under big data environment. Shandong:Shandong People’s Publishing House (2021)
Acknowledgement
This study is supported by the Foundation of National Natural Science Foundation of China (Grant No.: 62072273, 72111530206, 61962009, 61873117, 61832012, 61771231, 61771289); The Major Basic Research Project of Natural Science Foundation of Shandong Province of China (ZR2019ZD10); Natural Science Foundation of Shandong Province (ZR2019MF062); Shandong University Science and Technology Program Project (J18A326); Guangxi Key Laboratory of Cryptography and Information Security (No: GCIS202112); The Major Basic Research Project of Natural Science Foundation of Shandong Province of China (ZR2018ZC0438); Major Scientific and Technological Special Project of Guizhou Province (20183001), Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No. 2019BD-KFJJ009), Talent project of Guizhou Big Data Academy. Guizhou Provincial Key Laboratory of Public Big Data. ([2018]01).
Author information
Authors and Affiliations
School of Computer Science, Qufu Normal University, Rizhao, China
Yiting Zhang, Ming Liu, Jianan Guo, Zhaojie Wang & Yilei Wang
China Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China
Tiancai Liang
CCET, Panjab University, Chandigarh, India
Sunil Kumar Singh
- Yiting Zhang
You can also search for this author inPubMed Google Scholar
- Ming Liu
You can also search for this author inPubMed Google Scholar
- Jianan Guo
You can also search for this author inPubMed Google Scholar
- Zhaojie Wang
You can also search for this author inPubMed Google Scholar
- Yilei Wang
You can also search for this author inPubMed Google Scholar
- Tiancai Liang
You can also search for this author inPubMed Google Scholar
- Sunil Kumar Singh
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toYilei Wang.
Editor information
Editors and Affiliations
School of Computing and Informatics, University of Louisiana at Lafayette, Lafayette, IN, USA
Yuan Xu
Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China
Hongyang Yan
Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China
Huang Teng
Guangdong Polytechnic Normal University, Guangzhou, China
Jun Cai
Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China
Jin Li
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, Y.et al. (2023). Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process. In: Xu, Y., Yan, H., Teng, H., Cai, J., Li, J. (eds) Machine Learning for Cyber Security. ML4CS 2022. Lecture Notes in Computer Science, vol 13656. Springer, Cham. https://doi.org/10.1007/978-3-031-20099-1_25
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-031-20098-4
Online ISBN:978-3-031-20099-1
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative