Skip to main content
Log in

Prevention method of block withholding attack based on miners’ mining behavior in blockchain

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

This paper proposes a prevention method of block withholding attack (PMBWA) based on miners’ mining behavior in blockchain to prevent the block withholding attack. The PMBWA first performs the data pre-processing based on the box chart detection algorithm for data cleaning and preliminary verification. Then the PMBWA uses the behavior reward, punishment mechanism, and credit model to comprehensively evaluate the contribution of miners. The PMBWA proposes a credit level classification algorithm (CLCA) of miners that weighs posterior probability and similarity to detect the malicious miners. Finally, the PMBWA allocates the corresponding income weight for miners of different credit levels. The simulation results show that regardless of how the numbers of blocks and malicious computing power change, the PMBWA can allocate low-income weight to the corresponding malicious computing power, and significantly improve the precision rate and recall rate of malicious computing power detection in the defensive mining pool. The PMBWA can largely reduce the average cumulative income of malicious computing power and improve the average cumulative income of non-malicious computing power. The PMBWA outperforms the state-of-the-art methods such as ICIAS, SRIAS, and IASCM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data Availability

The data that support the findings of this study are available from Zhejiang Shuren University but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of Zhejiang Shuren University.

References

  1. Wang T, Liew SC, Zhang S (2021) When blockchain meets ai: optimal mining strategy achieved by machine learning. Int J Intell Syst 36(5):2183–2207

    Article  Google Scholar 

  2. Du M, Chen Q, Xiao J, Yang H, Ma X (2020) Supply chain finance innovation using blockchain. IEEE Trans Eng Manag 67(4):1045–1058

    Article  Google Scholar 

  3. Mamoona H, NZ J, Bushra H, Ghufran A (2020) Emerging smart logistics and transportation using iot and blockchain. IEEE Internet Things Mag 3(2):58–62

    Article  Google Scholar 

  4. Chen Y, Zhang Y, Chen H, Han M, Liu B, Ren T (2022) Efficient consistency consensus algorithm of blockchain for heterogeneous nodes in the internet of vehicles. J Electron Info Tech 44(1):314–323

    Google Scholar 

  5. Cheng J, Xie L, Tang X, Xiong N, Liu B (2020) A survey of security threats and defense on blockchain. Multimed Tools Appl 8(7):1–30

    Google Scholar 

  6. Han X, Yuan Y, Wang F (2019) Security problems on blockchain: The state of the art and future trends. Acta Automat Sin 45(01):206–225

    Google Scholar 

  7. Liu L, Han M, Zhou Y, Parizi RM (2019) E2c-chain: A two-stage incentive education employment and skill certification blockchain. In: In proceedings of the 2nd IEEE International conference on blockchain (Blockchain-2019)

  8. Liu X, Wang W, Niyato D, Zhao N, Wang P (2018) Evolutionary game for mining pool selection in blockchain networks. IEEE Wirel Commun Lett 7(5):760–763

    Article  Google Scholar 

  9. Zhou Y, Han M, Liu L, Wang Y, Liang Y, Tian L (2018) Improving iot services in smart-home using blockchain smart contract. In: In proceedings of the 2018 IEEE International conference on internet of things (iThings). IEEE, pp 81–87

  10. Qin R, Yuan Y, Wang F-Y (2018) Research on the selection strategies of blockchain mining pools. IEEE Trans Comput Soc Syst 5(3):748–757

    Article  Google Scholar 

  11. Cao S, Cong LW, Han M, Hou Q, Yang B (2020) Blockchain architecture for auditing automation and trust building in public markets. Computer 53(7):20–28

    Article  Google Scholar 

  12. Han J, Zou J, Jiang H, Xu Q (2018) Research on mining attacks in bitcoin. J Cryptologic Res 5(5):470–483

    Google Scholar 

  13. Joshi AP, Han M, Wang Y (2018) A survey on security and privacy issues of blockchain technology. Math Found Comput 1(2):121–147

    Article  Google Scholar 

  14. Wu M, Wang K, Cai X, Guo SGM, Rong C (2019) A comprehensive survey of blockchain: From theory to iot applications and beyond. IEEE Internet Things J 6(5):8114–8154

    Article  Google Scholar 

  15. Kausar F, Senan FM, Asif HM, Raahemifar k (2022) 6g technology and taxonomy of attacks on blockchain technology. A Eng J 61(6):4295–4306

    Google Scholar 

  16. Yang R, Chang X, Mišić J, Mišić VB, Kang H (2021) On selfholding attack impact on imperfect pow blockchain networks. IEEE Trans Netw Sci Eng 8(4):3073–3086

    Article  MathSciNet  Google Scholar 

  17. Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7 (7):22328–22370

    Article  Google Scholar 

  18. Dong X, Wu F, Faree A, Guo D, Shen Y, Ma J (2019) Selfholding: A combined attack model using selfish mining with block withholding attack. Comput Secur 87(87):1–11

    Google Scholar 

  19. So J (2019) A new attack scheme on the bitcoin reward system. IEICE Trans Fundam Electron Commun Comput Sci 102(1):300–302

    Article  Google Scholar 

  20. Gao S, Li Z, Peng Z, Xiao B (2019) Power adjusting and bribery racing: novel mining attacks in the bitcoin system

  21. Wang Y, Yang G, Li T, Zhang L, Wang Y, Ke L, Dou Y, Li S, Yu X (2020) Optimal mixed block withholding attacks based on reinforcement learning. Int J Intell Syst 35(12):2032– 2048

    Article  Google Scholar 

  22. Ke J, Szalachowski P, Zhou J, Xu Q, Yang Z (2019) Ibwh: An intermittent block withholding attack with optimal mining reward rate. In: Proceedings of the international conference on information security, pp 3–24

  23. Samiran B, Sushmita R, Kouichi S (2017) Bitcoin block withholding attack: analysis and mitigation. IEEE Trans Inf Forensics Secur 12(8):1967–1978

    Article  Google Scholar 

  24. Chen Z, Sun X, Shan X, Zhang J (2020) Decentralized mining pool games in blockchain. In: Proceedings of the 2020 IEEE International conference on knowledge graph (ICKG), pp 426–432

  25. Chen Z, Li B, Shan X, Sun X, Zhang J (2021) Discouraging pool block withholding attacks in bitcoin. J Comb Optim 7(7):1–16

    MATH  Google Scholar 

  26. Liu L, Chen W, Zhang L, Liu J, Qin J (2019) A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. Math Biosci Eng 17(1):309–327

    Article  MathSciNet  Google Scholar 

  27. Arijet S, Simeon W, Chang S (2019) Anti-withholding reward system to secure blockchain mining pools. In: Proceedings of the 2019 Crypto valley conference on blockchain technology (CVCBT), pp 43–46

  28. Cheng Y, Xu Z (2020) Study on the block withholding attack based on the evolutionary game. Journal of Xidian University 47(05):77–85102

    Google Scholar 

  29. Zhang F, Zhen Y, Wang X (2018) Blockexchain: A method of resisting block withholding attack of blockchain. In: Proceedings of the basic & clinical pharmacology & toxicology, pp 54–55

  30. Lee S, Kim S (2019) Countering block withholding attack efficiently. In: Proceedings of the IEEE INFOCOM 2019-IEEE Conference on computer communications workshops (INFOCOM WKSHPS), pp 1–8

  31. Siamak S, Maria PB (2017) Zeroblock: timestamp-free prevention of block-withholding attack in bitcoin. In: Proceedings of the SSS 2017: stabilization, safety, and security of distributed systems, pp 356–360

  32. Chang S, Park Y (2019) Silent timestamping for blockchain mining pool security. In: Proceedings of the 2019 International conference on computing, networking and communications (ICNC), pp 1–5

  33. Bou Abdo J, El Sibai R, Demerjian J (2021) Permissionless proof-of-reputation-x: a hybrid reputation-based consensus algorithm for permissionless blockchains. Trans Emerg Telecom Technol 32(1):1–28

    Google Scholar 

  34. Tang C, Wu L, Wen G, Zheng Z (2019) Incentivizing honest mining in blockchain networks: a reputation approach. IEEE Trans Circuits Syst II: Express Briefs 67(1):117–121

    Google Scholar 

  35. Kaci A, Rachedi A (2020) Toward a machine learning and software defined network approaches to manage miners’ reputation in blockchain. J Netw Syst Manag 28(3):478–501

    Article  Google Scholar 

  36. Mehrdad N, Arash G, Laurent N, Kevin K, Charles K (2018) Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm. In: Proceedings of the science and information conference, pp 1118–1134

  37. Xie W, Chkrebtii O, Kurtek S (2019) Visualization and outlier detection for multivariate elastic curve data. IEEE Trans Vis Comput Graph 26(11):3353–3364

    Article  Google Scholar 

  38. Wang M, Ku H (2021) Utilizing historical data for corporate credit rating assessment. Expert Syst Appl 165(165):1–12

    Google Scholar 

  39. Zhang X, Zhu S, He J, Yang B, Guan X (2019) Credit rating based real-time energy trading in microgrids. Appl Energy 236(236):985–996

    Article  Google Scholar 

  40. Chen X, Yang Y (2021) Cutoff for exact recovery of gaussian mixture models. IEEE Trans Inf Theory 67(6):4223–4238

    Article  MathSciNet  MATH  Google Scholar 

  41. Sun Q, Jiang L, Xu H (2021) Expectation-maximization algorithm of gaussian mixture model for vehicle-commodity matching in logistics supply chain. Complexity 2021(2021):1–11

    Google Scholar 

  42. Balfaqih M, Alharbi SA, Alzain M, Alqurashi F, Almilad S (2022) An accident detection and classification system using internet of things and machine learning towards smart city. Sustainability 14(1):1–13

    Google Scholar 

  43. Ray PP, Chowhan B, Kumar N, Almogren A (2021) Biothr: electronic health record servicing scheme in iot-blockchain ecosystem. IEEE Internet of Things J 8(13):10857–10872

    Article  Google Scholar 

  44. Eranga B, Deepak T, Peter F, Sachin S, Nalin R, Kasun DZ (2021) Tikiri—towards a lightweight blockchain for iot. Futur Gener Comput Syst 119(119):154–165

    Google Scholar 

Download references

Funding

This work was supported by the “Ling Yan” Research and Development Project of Science and Technology Department in Zhejiang Province of China under Grants No. 2022C03122, Public Welfare Technology Application and Research Projects in Zhejiang Province of China under Grants No. LGF22F020006 and LGF21F010004, and Project Intelligentization and Digitization for Airline Revolution No. 2018R02008.

Author information

Authors and Affiliations

Authors

Contributions

HC, YC and ZY wrote the entire paper. MH, ZH and BL are responsible for the algorithm principles. ZW and ZM are responsible for algorithm implementation.

Corresponding author

Correspondence to Yourong Chen.

Ethics declarations

Ethics approval and consent to participate

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent for Publication

All authors agree to submit this version and claim that no part of this manuscript has been published or submitted elsewhere.

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, H., Chen, Y., Xiong, Z. et al. Prevention method of block withholding attack based on miners’ mining behavior in blockchain. Appl Intell 53, 9878–9896 (2023). https://doi.org/10.1007/s10489-022-03889-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-022-03889-3

Keywords

Navigation