Abstract
The mining process in the Blockchain is very resource intensive, therefore, miners form coalitions to verify each block of transactions in return for a reward where only the first coalition that accomplishes the proof-of-work will be rewarded. This leads to intense competitions among miners and consequently dishonest mining strategies, such as block withholding attack, selfish mining, eclipse attack and stubborn mining, to name a few. As a result, it is necessary to regulate the mining process to make miners accountable for any dishonest mining behavior. We therefore propose a new reputation-based framework for the proof-of-work computation in the Blockchain in which miners not only are incentivized to conduct honest mining but also disincentivized to commit to any malicious activities against other mining pools. We first illustrate the architecture of our reputation-based paradigm, explain how the miners are rewarded or penalized in our model, and subsequently, we provide game theoretical analyses to show how this new framework encourages the miners to avoid dishonest mining strategies. In our setting, a mining game is repeatedly played among a set of pool managers and miners where the reputation of each miner or mining ally is continuously measured. At each round of the game, the pool managers send invitations only to a subset of miners based on a non-uniform probability distribution defined by the miners’ reputation values. We show that by using our proposed solution concept, honest mining becomes Nash Equilibrium in our setting. In other words, it will not be in the best interest of the miners to employ dishonest mining strategies even by gaining a short-term utility. This is due to the consideration of a long-term utility in our model and its impact on the miners’ utilities overtime.
DISTRIBUTION A. Approved for public release: distribution unlimited. Case Number: 88ABW-2017-4327, Dated 08 Sept 2017.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
The proofs of both theorems and the related mathematical analyses will be provided in the complete version of this paper.
References
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 43rd Hawaii International Conference on System Sciences (HICSS). IEEE, pp. 1–10 (2010)
Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472–486 (2013)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: International Conference on Financial Crypto and Data Security, pp. 436–454. Springer (2014)
Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against bitcoin mining pools. In: International Conference on Financial Cryptography and Data Security, pp. 72–86. Springer (2014)
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security Symposium, pp. 129–144 (2015)
Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: First European Symposium on Security and Privacy (EuroS&P), pp. 305–320. IEEE (2016)
Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT press, Cambridge (1994)
Satoshi, N.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin. org, [cit. 2014-11-13] (2008). https://bitcoin.org/bitcoin.pdf
Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In: International Conference on Financial Cryptography and Data Security, pp. 57–71. Springer (2014)
Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: 13th ACM Conference on Electronic Commerce, pp. 56–73. ACM (2012)
Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media Inc, Sebastopol (2014)
Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013 (2013)
Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better-how to make bitcoin a better currency. In: International Conference on Financial Crypto and Data Security, pp. 399–414. Springer (2012)
Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154–167. ACM (2016)
Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, pp. 397–411. IEEE (2015)
Eyal, I.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 89–103. IEEE (2015)
Lewenberg, Y., Sompolinsky, Y. Zohar, A.: Inclusive block chain protocols. In: International Conference on Financial Crypto and Data Security, pp. 528–547. Springer (2015)
Nojoumian, M.: Rational trust modeling. Arxiv, 2017, p. 12 https://arxiv.org/abs/1706.09861
Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: 3rd International Conference on Decision and Game Theory for Security (GameSec), LNCS, vol. 7638, pp. 18–37. Springer (2012)
Nojoumian, M.: Generalization of socio-rational secret sharing with a new utility function. In: 12th IEEE Annual International Conference on Privacy, Security and Trust, pp. 338–341 (2014)
Nojoumian, M., Lethbridge, T.C.: A new approach for the trust calculation in social networks. In: E-business and Telecommunication Networks: 3rd International Conference on E-Business, Best Papers. CCIS, vol. 9, pp. 64–77. Springer (2008)
Nojoumian, M.: Novel secret sharing and commitment schemes for cryptographic applications. Ph.D. dissertation, Department of Computer Science, UWaterloo, Canada (2012)
Nojoumian, M., Golchubian, A., Saputro, N., Akkaya, K.: Preventing collusion between SDN defenders and attackers using a game theoretical approach. In: Infocom: Adv in Software Defined & Context Aware Cognitive Radio Net. IEEE (2017). p. 6
Acknowledgment
Research was sponsored by the Army Research Office and was accomplished under Grant Number W911NF-18-1-0483. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Office or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Nojoumian, M., Golchubian, A., Njilla, L., Kwiat, K., Kamhoua, C. (2019). Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies by a Reputation-Based Paradigm. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol 857. Springer, Cham. https://doi.org/10.1007/978-3-030-01177-2_81
Download citation
DOI: https://doi.org/10.1007/978-3-030-01177-2_81
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01176-5
Online ISBN: 978-3-030-01177-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)