Advertisement

Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies by a Reputation-Based Paradigm

  • M. NojoumianEmail author
  • A. Golchubian
  • L. Njilla
  • K. Kwiat
  • C. Kamhoua
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 857)

Abstract

The mining process in the Blockchain is very resource intensive, therefore, miners form coalitions to verify each block of transactions in return for a reward where only the first coalition that accomplishes the proof-of-work will be rewarded. This leads to intense competitions among miners and consequently dishonest mining strategies, such as block withholding attack, selfish mining, eclipse attack and stubborn mining, to name a few. As a result, it is necessary to regulate the mining process to make miners accountable for any dishonest mining behavior. We therefore propose a new reputation-based framework for the proof-of-work computation in the Blockchain in which miners not only are incentivized to conduct honest mining but also disincentivized to commit to any malicious activities against other mining pools. We first illustrate the architecture of our reputation-based paradigm, explain how the miners are rewarded or penalized in our model, and subsequently, we provide game theoretical analyses to show how this new framework encourages the miners to avoid dishonest mining strategies. In our setting, a mining game is repeatedly played among a set of pool managers and miners where the reputation of each miner or mining ally is continuously measured. At each round of the game, the pool managers send invitations only to a subset of miners based on a non-uniform probability distribution defined by the miners’ reputation values. We show that by using our proposed solution concept, honest mining becomes Nash Equilibrium in our setting. In other words, it will not be in the best interest of the miners to employ dishonest mining strategies even by gaining a short-term utility. This is due to the consideration of a long-term utility in our model and its impact on the miners’ utilities overtime.

Keywords

Proof-of-work Reputation systems Game theory 

Notes

Acknowledgment

Research was sponsored by the Army Research Office and was accomplished under Grant Number W911NF-18-1-0483. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Office or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.

References

  1. 1.
    Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 43rd Hawaii International Conference on System Sciences (HICSS). IEEE, pp. 1–10 (2010)Google Scholar
  2. 2.
    Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472–486 (2013)CrossRefGoogle Scholar
  3. 3.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  4. 4.
    Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)
  5. 5.
    Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: International Conference on Financial Crypto and Data Security, pp. 436–454. Springer (2014)Google Scholar
  6. 6.
    Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against bitcoin mining pools. In: International Conference on Financial Cryptography and Data Security, pp. 72–86. Springer (2014)Google Scholar
  7. 7.
    Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security Symposium, pp. 129–144 (2015)Google Scholar
  8. 8.
    Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: First European Symposium on Security and Privacy (EuroS&P), pp. 305–320. IEEE (2016)Google Scholar
  9. 9.
    Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT press, Cambridge (1994)zbMATHGoogle Scholar
  10. 10.
    Satoshi, N.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin. org, [cit. 2014-11-13] (2008). https://bitcoin.org/bitcoin.pdf
  11. 11.
    Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In: International Conference on Financial Cryptography and Data Security, pp. 57–71. Springer (2014)Google Scholar
  12. 12.
    Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: 13th ACM Conference on Electronic Commerce, pp. 56–73. ACM (2012)Google Scholar
  13. 13.
    Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media Inc, Sebastopol (2014)Google Scholar
  14. 14.
    Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013 (2013)Google Scholar
  15. 15.
    Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better-how to make bitcoin a better currency. In: International Conference on Financial Crypto and Data Security, pp. 399–414. Springer (2012)Google Scholar
  16. 16.
    Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154–167. ACM (2016)Google Scholar
  17. 17.
    Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, pp. 397–411. IEEE (2015)Google Scholar
  18. 18.
    Eyal, I.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 89–103. IEEE (2015)Google Scholar
  19. 19.
    Lewenberg, Y., Sompolinsky, Y. Zohar, A.: Inclusive block chain protocols. In: International Conference on Financial Crypto and Data Security, pp. 528–547. Springer (2015)Google Scholar
  20. 20.
    Nojoumian, M.: Rational trust modeling. Arxiv, 2017, p. 12 https://arxiv.org/abs/1706.09861
  21. 21.
    Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: 3rd International Conference on Decision and Game Theory for Security (GameSec), LNCS, vol. 7638, pp. 18–37. Springer (2012)Google Scholar
  22. 22.
    Nojoumian, M.: Generalization of socio-rational secret sharing with a new utility function. In: 12th IEEE Annual International Conference on Privacy, Security and Trust, pp. 338–341 (2014)Google Scholar
  23. 23.
    Nojoumian, M., Lethbridge, T.C.: A new approach for the trust calculation in social networks. In: E-business and Telecommunication Networks: 3rd International Conference on E-Business, Best Papers. CCIS, vol. 9, pp. 64–77. Springer (2008)Google Scholar
  24. 24.
    Nojoumian, M.: Novel secret sharing and commitment schemes for cryptographic applications. Ph.D. dissertation, Department of Computer Science, UWaterloo, Canada (2012)Google Scholar
  25. 25.
    Nojoumian, M., Golchubian, A., Saputro, N., Akkaya, K.: Preventing collusion between SDN defenders and attackers using a game theoretical approach. In: Infocom: Adv in Software Defined & Context Aware Cognitive Radio Net. IEEE (2017). p. 6Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • M. Nojoumian
    • 1
    Email author
  • A. Golchubian
    • 1
  • L. Njilla
    • 2
  • K. Kwiat
    • 2
  • C. Kamhoua
    • 3
  1. 1.Department of CEECSFlorida Atlantic UniversityBoca RatonUSA
  2. 2.Cyber Assurance Branch, Air Force Research LabRomeUSA
  3. 3.Network Security Branch, Army Research LabAdelphiUSA

Personalised recommendations