Abstract
This paper proposes a prevention method of block withholding attack (PMBWA) based on miners’ mining behavior in blockchain to prevent the block withholding attack. The PMBWA first performs the data pre-processing based on the box chart detection algorithm for data cleaning and preliminary verification. Then the PMBWA uses the behavior reward, punishment mechanism, and credit model to comprehensively evaluate the contribution of miners. The PMBWA proposes a credit level classification algorithm (CLCA) of miners that weighs posterior probability and similarity to detect the malicious miners. Finally, the PMBWA allocates the corresponding income weight for miners of different credit levels. The simulation results show that regardless of how the numbers of blocks and malicious computing power change, the PMBWA can allocate low-income weight to the corresponding malicious computing power, and significantly improve the precision rate and recall rate of malicious computing power detection in the defensive mining pool. The PMBWA can largely reduce the average cumulative income of malicious computing power and improve the average cumulative income of non-malicious computing power. The PMBWA outperforms the state-of-the-art methods such as ICIAS, SRIAS, and IASCM.
Similar content being viewed by others
Data Availability
The data that support the findings of this study are available from Zhejiang Shuren University but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of Zhejiang Shuren University.
References
Wang T, Liew SC, Zhang S (2021) When blockchain meets ai: optimal mining strategy achieved by machine learning. Int J Intell Syst 36(5):2183–2207
Du M, Chen Q, Xiao J, Yang H, Ma X (2020) Supply chain finance innovation using blockchain. IEEE Trans Eng Manag 67(4):1045–1058
Mamoona H, NZ J, Bushra H, Ghufran A (2020) Emerging smart logistics and transportation using iot and blockchain. IEEE Internet Things Mag 3(2):58–62
Chen Y, Zhang Y, Chen H, Han M, Liu B, Ren T (2022) Efficient consistency consensus algorithm of blockchain for heterogeneous nodes in the internet of vehicles. J Electron Info Tech 44(1):314–323
Cheng J, Xie L, Tang X, Xiong N, Liu B (2020) A survey of security threats and defense on blockchain. Multimed Tools Appl 8(7):1–30
Han X, Yuan Y, Wang F (2019) Security problems on blockchain: The state of the art and future trends. Acta Automat Sin 45(01):206–225
Liu L, Han M, Zhou Y, Parizi RM (2019) E2c-chain: A two-stage incentive education employment and skill certification blockchain. In: In proceedings of the 2nd IEEE International conference on blockchain (Blockchain-2019)
Liu X, Wang W, Niyato D, Zhao N, Wang P (2018) Evolutionary game for mining pool selection in blockchain networks. IEEE Wirel Commun Lett 7(5):760–763
Zhou Y, Han M, Liu L, Wang Y, Liang Y, Tian L (2018) Improving iot services in smart-home using blockchain smart contract. In: In proceedings of the 2018 IEEE International conference on internet of things (iThings). IEEE, pp 81–87
Qin R, Yuan Y, Wang F-Y (2018) Research on the selection strategies of blockchain mining pools. IEEE Trans Comput Soc Syst 5(3):748–757
Cao S, Cong LW, Han M, Hou Q, Yang B (2020) Blockchain architecture for auditing automation and trust building in public markets. Computer 53(7):20–28
Han J, Zou J, Jiang H, Xu Q (2018) Research on mining attacks in bitcoin. J Cryptologic Res 5(5):470–483
Joshi AP, Han M, Wang Y (2018) A survey on security and privacy issues of blockchain technology. Math Found Comput 1(2):121–147
Wu M, Wang K, Cai X, Guo SGM, Rong C (2019) A comprehensive survey of blockchain: From theory to iot applications and beyond. IEEE Internet Things J 6(5):8114–8154
Kausar F, Senan FM, Asif HM, Raahemifar k (2022) 6g technology and taxonomy of attacks on blockchain technology. A Eng J 61(6):4295–4306
Yang R, Chang X, Mišić J, Mišić VB, Kang H (2021) On selfholding attack impact on imperfect pow blockchain networks. IEEE Trans Netw Sci Eng 8(4):3073–3086
Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7 (7):22328–22370
Dong X, Wu F, Faree A, Guo D, Shen Y, Ma J (2019) Selfholding: A combined attack model using selfish mining with block withholding attack. Comput Secur 87(87):1–11
So J (2019) A new attack scheme on the bitcoin reward system. IEICE Trans Fundam Electron Commun Comput Sci 102(1):300–302
Gao S, Li Z, Peng Z, Xiao B (2019) Power adjusting and bribery racing: novel mining attacks in the bitcoin system
Wang Y, Yang G, Li T, Zhang L, Wang Y, Ke L, Dou Y, Li S, Yu X (2020) Optimal mixed block withholding attacks based on reinforcement learning. Int J Intell Syst 35(12):2032– 2048
Ke J, Szalachowski P, Zhou J, Xu Q, Yang Z (2019) Ibwh: An intermittent block withholding attack with optimal mining reward rate. In: Proceedings of the international conference on information security, pp 3–24
Samiran B, Sushmita R, Kouichi S (2017) Bitcoin block withholding attack: analysis and mitigation. IEEE Trans Inf Forensics Secur 12(8):1967–1978
Chen Z, Sun X, Shan X, Zhang J (2020) Decentralized mining pool games in blockchain. In: Proceedings of the 2020 IEEE International conference on knowledge graph (ICKG), pp 426–432
Chen Z, Li B, Shan X, Sun X, Zhang J (2021) Discouraging pool block withholding attacks in bitcoin. J Comb Optim 7(7):1–16
Liu L, Chen W, Zhang L, Liu J, Qin J (2019) A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. Math Biosci Eng 17(1):309–327
Arijet S, Simeon W, Chang S (2019) Anti-withholding reward system to secure blockchain mining pools. In: Proceedings of the 2019 Crypto valley conference on blockchain technology (CVCBT), pp 43–46
Cheng Y, Xu Z (2020) Study on the block withholding attack based on the evolutionary game. Journal of Xidian University 47(05):77–85102
Zhang F, Zhen Y, Wang X (2018) Blockexchain: A method of resisting block withholding attack of blockchain. In: Proceedings of the basic & clinical pharmacology & toxicology, pp 54–55
Lee S, Kim S (2019) Countering block withholding attack efficiently. In: Proceedings of the IEEE INFOCOM 2019-IEEE Conference on computer communications workshops (INFOCOM WKSHPS), pp 1–8
Siamak S, Maria PB (2017) Zeroblock: timestamp-free prevention of block-withholding attack in bitcoin. In: Proceedings of the SSS 2017: stabilization, safety, and security of distributed systems, pp 356–360
Chang S, Park Y (2019) Silent timestamping for blockchain mining pool security. In: Proceedings of the 2019 International conference on computing, networking and communications (ICNC), pp 1–5
Bou Abdo J, El Sibai R, Demerjian J (2021) Permissionless proof-of-reputation-x: a hybrid reputation-based consensus algorithm for permissionless blockchains. Trans Emerg Telecom Technol 32(1):1–28
Tang C, Wu L, Wen G, Zheng Z (2019) Incentivizing honest mining in blockchain networks: a reputation approach. IEEE Trans Circuits Syst II: Express Briefs 67(1):117–121
Kaci A, Rachedi A (2020) Toward a machine learning and software defined network approaches to manage miners’ reputation in blockchain. J Netw Syst Manag 28(3):478–501
Mehrdad N, Arash G, Laurent N, Kevin K, Charles K (2018) Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm. In: Proceedings of the science and information conference, pp 1118–1134
Xie W, Chkrebtii O, Kurtek S (2019) Visualization and outlier detection for multivariate elastic curve data. IEEE Trans Vis Comput Graph 26(11):3353–3364
Wang M, Ku H (2021) Utilizing historical data for corporate credit rating assessment. Expert Syst Appl 165(165):1–12
Zhang X, Zhu S, He J, Yang B, Guan X (2019) Credit rating based real-time energy trading in microgrids. Appl Energy 236(236):985–996
Chen X, Yang Y (2021) Cutoff for exact recovery of gaussian mixture models. IEEE Trans Inf Theory 67(6):4223–4238
Sun Q, Jiang L, Xu H (2021) Expectation-maximization algorithm of gaussian mixture model for vehicle-commodity matching in logistics supply chain. Complexity 2021(2021):1–11
Balfaqih M, Alharbi SA, Alzain M, Alqurashi F, Almilad S (2022) An accident detection and classification system using internet of things and machine learning towards smart city. Sustainability 14(1):1–13
Ray PP, Chowhan B, Kumar N, Almogren A (2021) Biothr: electronic health record servicing scheme in iot-blockchain ecosystem. IEEE Internet of Things J 8(13):10857–10872
Eranga B, Deepak T, Peter F, Sachin S, Nalin R, Kasun DZ (2021) Tikiri—towards a lightweight blockchain for iot. Futur Gener Comput Syst 119(119):154–165
Funding
This work was supported by the “Ling Yan” Research and Development Project of Science and Technology Department in Zhejiang Province of China under Grants No. 2022C03122, Public Welfare Technology Application and Research Projects in Zhejiang Province of China under Grants No. LGF22F020006 and LGF21F010004, and Project Intelligentization and Digitization for Airline Revolution No. 2018R02008.
Author information
Authors and Affiliations
Contributions
HC, YC and ZY wrote the entire paper. MH, ZH and BL are responsible for the algorithm principles. ZW and ZM are responsible for algorithm implementation.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent for Publication
All authors agree to submit this version and claim that no part of this manuscript has been published or submitted elsewhere.
Conflict of Interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, H., Chen, Y., Xiong, Z. et al. Prevention method of block withholding attack based on miners’ mining behavior in blockchain. Appl Intell 53, 9878–9896 (2023). https://doi.org/10.1007/s10489-022-03889-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-022-03889-3