How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach

Hao-Nan Zhu, Runkai Yang, J. Misic, V. Mišić, Xiaolin Chang
{"title":"How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach","authors":"Hao-Nan Zhu, Runkai Yang, J. Misic, V. Mišić, Xiaolin Chang","doi":"10.1109/ICC45855.2022.9838837","DOIUrl":null,"url":null,"abstract":"Malignant miners with small computing power can achieve unfair revenue and degrade system throughput through launching Fork after withholding (FAW) attack in a Proof-of-Work (PoW) blockchain system. The existing works about FAW attack have some of the following issues: (i) only studying Bitcoin blockchain, (ii) assuming that the blockchain network is perfect and then ignoring forks due to block propagation delay, and (iii) assuming that there is only one pool under attack. This paper attempts to investigate FAW attack in imperfect Bitcoin and Ethereum networks where malicious miners attack multiple victim pools. We develop a simulator to capture the chain dynamics under FAW attack in a PoW system where the longest-chain protocol is used. Two different computing power allocation strategies for malicious miners, PAS and EAS, are investigated in terms of the profitability of FAW adversaries, the loss of victims, and the blockchain throughput. The results reveal that FAW adversaries can get more revenue under PAS when more victim pools are subjected to attack in both Bitcoin and Ethereum. If FAW adversaries adopt EAS and the number of victims vary from 1 to 12, they can get maximal revenue when attack 7 victims in Bitcoin. The blockchain throughput decreases significantly under PAS while it is almost unchanged under EAS with the increasing number of victims in both Bitcoin and Ethereum. Our work helps the design of countermeasures against FAW attack.","PeriodicalId":193890,"journal":{"name":"ICC 2022 - IEEE International Conference on Communications","volume":"30 12","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICC 2022 - IEEE International Conference on Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC45855.2022.9838837","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Malignant miners with small computing power can achieve unfair revenue and degrade system throughput through launching Fork after withholding (FAW) attack in a Proof-of-Work (PoW) blockchain system. The existing works about FAW attack have some of the following issues: (i) only studying Bitcoin blockchain, (ii) assuming that the blockchain network is perfect and then ignoring forks due to block propagation delay, and (iii) assuming that there is only one pool under attack. This paper attempts to investigate FAW attack in imperfect Bitcoin and Ethereum networks where malicious miners attack multiple victim pools. We develop a simulator to capture the chain dynamics under FAW attack in a PoW system where the longest-chain protocol is used. Two different computing power allocation strategies for malicious miners, PAS and EAS, are investigated in terms of the profitability of FAW adversaries, the loss of victims, and the blockchain throughput. The results reveal that FAW adversaries can get more revenue under PAS when more victim pools are subjected to attack in both Bitcoin and Ethereum. If FAW adversaries adopt EAS and the number of victims vary from 1 to 12, they can get maximal revenue when attack 7 victims in Bitcoin. The blockchain throughput decreases significantly under PAS while it is almost unchanged under EAS with the increasing number of victims in both Bitcoin and Ethereum. Our work helps the design of countermeasures against FAW attack.
一汽攻击如何影响不完善的PoW区块链:基于模拟的方法
在工作量证明(PoW)区块链系统中,计算能力较小的恶意矿工可以通过发起FAW (Fork after withholding)攻击来获得不公平的收入,降低系统吞吐量。现有关于FAW攻击的工作存在以下一些问题:(i)只研究比特币区块链,(ii)假设区块链网络是完美的,然后忽略了由于块传播延迟而产生的分叉,(iii)假设只有一个池受到攻击。本文试图研究不完美比特币和以太坊网络中的FAW攻击,恶意矿工攻击多个受害者池。在使用最长链协议的PoW系统中,我们开发了一个模拟器来捕捉FAW攻击下的链动态。针对恶意矿工的两种不同的计算能力分配策略,PAS和EAS,根据FAW对手的盈利能力,受害者的损失和区块链吞吐量进行了研究。结果表明,当更多的受害者池在比特币和以太坊中受到攻击时,FAW对手可以在PAS下获得更多的收入。如果FAW攻击者采用EAS,受害者数量从1到12不等,攻击7个比特币受害者即可获得最大收益。在PAS下,区块链吞吐量显著下降,而在EAS下,随着比特币和以太坊受害者数量的增加,区块链吞吐量几乎没有变化。我们的工作有助于设计针对FAW攻击的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信