Skip to main content

Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune

  • Conference paper
  • First Online:
Theoretical Computer Science (NCTCS 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 768))

Included in the following conference series:

Abstract

With the rapid development of Bitcoin, it is frequently used in the scene of fast payment. But the strategy which Bitcoin takes to prevent the double-spending attack is waiting for six confirmations (about one hour), this is not suitable for the fast payment scenarios where service time is about tens of seconds. The default strategy in fast payment is that do not offer the service until a payment transaction is added to the wallet of vendor, which is useless for the detection of double-spending attack. In this paper, an immune-based model is proposed to detect the double-spending attack in the fast Bitcoin payment. This model is composed of many immune-based Bitcoin nodes which include a detection modula and a traditional node. Antigen character is first extracted from a transaction by the detection modula, and initial detectors (mature detectors) are generated based on these antigens. Then, memory detectors and mature detectors are used to detect the double-spending attack, and a mature detector which matches an attack will evolve into a memory detector and be delivered to other immune-based nodes in the Bitcoin network, in order to rapidly detect the double-spending attack. Experimental result shows that this model can efficiently detect double-spending attacks in fast Bitcoin payment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2009)

    Google Scholar 

  2. Currency transactions monitoring report of bitcoin, 18 April 2017. http://if.cert.org.cn/jsp/activitiesDetail2.jsp?id=49

  3. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutorials, 1 (2016)

    Google Scholar 

  4. Rosenfeld, M.: Analysis of hashrate-based double spending. Eprint Arxiv (2014)

    Google Scholar 

  5. Sompolinsky, Y., Zohar, A.: Secure High-rate transaction processing in bitcoin. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 507–527. Springer, Heidelberg (2015). doi:10.1007/978-3-662-47854-7_32

    Chapter  Google Scholar 

  6. Sompolinsky, Y., Zohar, A.: Bitcoins security model revisited, May 2016. https://arxiv.org/abs/1605.09193

  7. Cnn: Bitcoin’s uncertain future as currency, 4 April 2011. http://www.youtube.com/watch?v=75VaRGdzMM0

  8. Karame, G.O., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin. In: Conference on Computer & Communication Security (2012)

    Google Scholar 

  9. Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., Apkun, S.: Misbehavior in bitcoin: a study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1), 1–32 (2015)

    Article  Google Scholar 

  10. Bamert, T., Decker, C., Elsen, L., Wattenhofer, R.: Have a snack, pay with bitcoins. In: IEEE Thirteenth International Conference on Peer-To-Peer Computing, pp. 1–5 (2013)

    Google Scholar 

  11. Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer immunology. Immunol. Rev. 216(1), 176–197 (2007)

    Article  Google Scholar 

  12. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212 (1994)

    Google Scholar 

  13. A portal of bitcoin, luxembourg s.a., April 2017. https://blockchain.info/

  14. Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evol. Comput. 13(2), 179–212 (2005)

    Article  Google Scholar 

Download references

Acknowledgment

This research is supported by National key research and development program of China (Grant No. 2016YFB0800604 and Grant No. 2016YFB0800605) and Natural Science Foundation of China (Grant No. 61402308 and No. 61572334).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Liu, Z. et al. (2017). Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune. In: Du, D., Li, L., Zhu, E., He, K. (eds) Theoretical Computer Science. NCTCS 2017. Communications in Computer and Information Science, vol 768. Springer, Singapore. https://doi.org/10.1007/978-981-10-6893-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6893-5_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6892-8

  • Online ISBN: 978-981-10-6893-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics