{"title":"A Protecting Mechanism Against Double Spending Attack in Blockchain Systems","authors":"Zexi Xing, Zhengxin Chen","doi":"10.1109/AIIoT52608.2021.9454224","DOIUrl":null,"url":null,"abstract":"In this research we focus on how to prevent Double Spending Attack (also called 51 % hash rate attack), a particular security issue related to blockchain technology in the current cryptocurrency world. We describe the main idea of our proposed Block Access Restriction (BAR) mechanism, which controls the actual block requests and detects malicious behaviors while transactions have been recorded into a specific block, to protect general miner's privileges and provide fairness in the blockchain network environment. We propose an effective way to prevent this to happen (with detailed steps), discuss how to deploy BAR switch into blockchain networks and how the BAR switch can prevent DSA while the hacker bypasses it. We also present general idea of implementing BAR switch, and point out the importance of dealing with security threat at post-quantum computing era.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE World AI IoT Congress (AIIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AIIoT52608.2021.9454224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this research we focus on how to prevent Double Spending Attack (also called 51 % hash rate attack), a particular security issue related to blockchain technology in the current cryptocurrency world. We describe the main idea of our proposed Block Access Restriction (BAR) mechanism, which controls the actual block requests and detects malicious behaviors while transactions have been recorded into a specific block, to protect general miner's privileges and provide fairness in the blockchain network environment. We propose an effective way to prevent this to happen (with detailed steps), discuss how to deploy BAR switch into blockchain networks and how the BAR switch can prevent DSA while the hacker bypasses it. We also present general idea of implementing BAR switch, and point out the importance of dealing with security threat at post-quantum computing era.