Skip to main content

Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies by a Reputation-Based Paradigm

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 857))

Included in the following conference series:

Abstract

The mining process in the Blockchain is very resource intensive, therefore, miners form coalitions to verify each block of transactions in return for a reward where only the first coalition that accomplishes the proof-of-work will be rewarded. This leads to intense competitions among miners and consequently dishonest mining strategies, such as block withholding attack, selfish mining, eclipse attack and stubborn mining, to name a few. As a result, it is necessary to regulate the mining process to make miners accountable for any dishonest mining behavior. We therefore propose a new reputation-based framework for the proof-of-work computation in the Blockchain in which miners not only are incentivized to conduct honest mining but also disincentivized to commit to any malicious activities against other mining pools. We first illustrate the architecture of our reputation-based paradigm, explain how the miners are rewarded or penalized in our model, and subsequently, we provide game theoretical analyses to show how this new framework encourages the miners to avoid dishonest mining strategies. In our setting, a mining game is repeatedly played among a set of pool managers and miners where the reputation of each miner or mining ally is continuously measured. At each round of the game, the pool managers send invitations only to a subset of miners based on a non-uniform probability distribution defined by the miners’ reputation values. We show that by using our proposed solution concept, honest mining becomes Nash Equilibrium in our setting. In other words, it will not be in the best interest of the miners to employ dishonest mining strategies even by gaining a short-term utility. This is due to the consideration of a long-term utility in our model and its impact on the miners’ utilities overtime.

DISTRIBUTION A. Approved for public release: distribution unlimited. Case Number: 88ABW-2017-4327, Dated 08 Sept 2017.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://scienceblogs.com/builtonfacts/2014/01/11/is-bitcoin-currently-experiencing-a-selfish-miner-attack/.

  2. 2.

    The proofs of both theorems and the related mathematical analyses will be provided in the complete version of this paper.

References

  1. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 43rd Hawaii International Conference on System Sciences (HICSS). IEEE, pp. 1–10 (2010)

    Google Scholar 

  2. Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472–486 (2013)

    Article  Google Scholar 

  3. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  4. Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)

  5. Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: International Conference on Financial Crypto and Data Security, pp. 436–454. Springer (2014)

    Google Scholar 

  6. Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against bitcoin mining pools. In: International Conference on Financial Cryptography and Data Security, pp. 72–86. Springer (2014)

    Google Scholar 

  7. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security Symposium, pp. 129–144 (2015)

    Google Scholar 

  8. Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: First European Symposium on Security and Privacy (EuroS&P), pp. 305–320. IEEE (2016)

    Google Scholar 

  9. Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT press, Cambridge (1994)

    MATH  Google Scholar 

  10. Satoshi, N.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin. org, [cit. 2014-11-13] (2008). https://bitcoin.org/bitcoin.pdf

  11. Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In: International Conference on Financial Cryptography and Data Security, pp. 57–71. Springer (2014)

    Google Scholar 

  12. Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: 13th ACM Conference on Electronic Commerce, pp. 56–73. ACM (2012)

    Google Scholar 

  13. Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media Inc, Sebastopol (2014)

    Google Scholar 

  14. Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013 (2013)

    Google Scholar 

  15. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better-how to make bitcoin a better currency. In: International Conference on Financial Crypto and Data Security, pp. 399–414. Springer (2012)

    Google Scholar 

  16. Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154–167. ACM (2016)

    Google Scholar 

  17. Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, pp. 397–411. IEEE (2015)

    Google Scholar 

  18. Eyal, I.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 89–103. IEEE (2015)

    Google Scholar 

  19. Lewenberg, Y., Sompolinsky, Y. Zohar, A.: Inclusive block chain protocols. In: International Conference on Financial Crypto and Data Security, pp. 528–547. Springer (2015)

    Google Scholar 

  20. Nojoumian, M.: Rational trust modeling. Arxiv, 2017, p. 12 https://arxiv.org/abs/1706.09861

  21. Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: 3rd International Conference on Decision and Game Theory for Security (GameSec), LNCS, vol. 7638, pp. 18–37. Springer (2012)

    Google Scholar 

  22. Nojoumian, M.: Generalization of socio-rational secret sharing with a new utility function. In: 12th IEEE Annual International Conference on Privacy, Security and Trust, pp. 338–341 (2014)

    Google Scholar 

  23. Nojoumian, M., Lethbridge, T.C.: A new approach for the trust calculation in social networks. In: E-business and Telecommunication Networks: 3rd International Conference on E-Business, Best Papers. CCIS, vol. 9, pp. 64–77. Springer (2008)

    Google Scholar 

  24. Nojoumian, M.: Novel secret sharing and commitment schemes for cryptographic applications. Ph.D. dissertation, Department of Computer Science, UWaterloo, Canada (2012)

    Google Scholar 

  25. Nojoumian, M., Golchubian, A., Saputro, N., Akkaya, K.: Preventing collusion between SDN defenders and attackers using a game theoretical approach. In: Infocom: Adv in Software Defined & Context Aware Cognitive Radio Net. IEEE (2017). p. 6

    Google Scholar 

Download references

Acknowledgment

Research was sponsored by the Army Research Office and was accomplished under Grant Number W911NF-18-1-0483. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Office or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Nojoumian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nojoumian, M., Golchubian, A., Njilla, L., Kwiat, K., Kamhoua, C. (2019). Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies by a Reputation-Based Paradigm. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol 857. Springer, Cham. https://doi.org/10.1007/978-3-030-01177-2_81

Download citation

Publish with us

Policies and ethics