Open Access
ARTICLE
Selfish Mining and Defending Strategies in the Bitcoin
1 Network Security and Information Office, Hohai University, Nanjing, 210098, China
2 Nanjing University of Aeronautics and Astronautics, Nanjing, 210008, China
3 SKEMA Business School, Lille, 59777, France
4 University of Hertfordshire, Hertford, AL10 9EU, UK
* Corresponding Author: Weijian Zhang. Email:
Intelligent Automation & Soft Computing 2022, 34(3), 1861-1875. https://doi.org/10.32604/iasc.2022.030274
Received 22 March 2022; Accepted 29 April 2022; Issue published 25 May 2022
Abstract
As a kind of distributed, decentralized and peer-to-peer transmitted technology, blockchain technology has gradually changed people’s lifestyle. However, blockchain technology also faces many problems including selfish mining attack, which causes serious effects to the development of blockchain technology. Selfish mining is a kind of mining strategy where selfish miners increase their profit by selectively publishing hidden blocks. This paper builds the selfish mining model from the perspective of node state conversion and utilize the function extremum method to figure out the optimal profit of this model. Meanwhile, based on the experimental data of honest mining, the author conducts the simulation of selfish mining and discovers that selfish miners are able to acquire more revenue than honest miners when they account for more than 1/3 computing power of the whole system. Lastly, to defend the selfish mining attack, the author also summarizes the existing defending strategies and evaluates every kind of strategy briefly.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.