Abstract
With the advancement of blockchain technology, blockchain-based digital cryptocurrencies, like Bitcoin, have received broad interest. Due to the permissionless environment, the blockchain is vulnerable to different kinds of attacks, such as the block withholding (BWH) attack. BWH attack is one common selfish mining attack, by which the attacking pool infiltrates the attacked pool, and the infiltrating miners withhold all the blocks newly discovered in the attacked pool. Therefore, the attacking pool benefit by withholding blocks, damaging the benefits of victim pools. In this paper, we introduce the reward reallocation mechanism by paying additional rewards to the miners who successfully mine blocks, and propose an evolutionary game model for BWH attack among pools to study the strategy selection of pools. By constructing the replicator dynamic equations, the evolutionary stable strategies of pools are explored based on different levels of additional rewards. Our results provide enlightening significance to mitigate the negative influence from BWH attacks in practice.
This research is supported by the National Nature Science Foundation of China (No. 11871366).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Tschorsch, F., Scheuermann, B. Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016)
Liu, Y., Chen, X., Zhang, L., et al.: An intelligent strategy to gain profit for bitcoin mining pools. In: 2017 10th International Symposium on Computational Intelligence and Design (ISCID), vol. 2, pp. 427–430. IEEE (2017)
Eyal, I.: The miner’s dilemma. In 2015 IEEE Symposium on Security and Privacy, pp. 89–103. IEEE (2015)
Rosenfeld, M. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)
Courtois, N. T., Bahack, L. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)
Luu, L., Saha, R., Parameshwaran, I., et al.: On power splitting games in distributed computation: The case of bitcoin pooled mining. In 2015 IEEE 28th Computer Security Foundations Symposium, pp. 397–411. IEEE (2015)
Alkalay-Houlihan, C., Shah, N.: The pure price of anarchy of pool block withholding attacks in bitcoin mining. Proc. AAAI Conf. Artif. Intell. 33(01), 1724–1731 (2019)
Wang, Q., Chen, Y. The tight bound for pure price of anarchy in an extended miner’s dilemma game. arXiv preprint arXiv:2101.11855 (2021)
Chen, Z., Li, B., Shan, X. Discouraging pool block withholding attacks in Bitcoin. J. Combinat. Optim. 43, 444–459 (2021)
Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12(8), 1967–1978 (2016)
Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 477–498. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_28
Kim, S., Hahn, S.G.: Mining pool manipulation in blockchain network over evolutionary block withholding attack. IEEE Access 7, 144230–144244 (2019)
Friedman, D.: On economic applications of evolutionary game theory. J. Evol. Econ. 8(1), 15–43 (1998)
Gong, H., Jin, W. Analysis of urban car owners commute mode choice based on evolutionary game model. J. Control Sci. Eng. 2015(6), 1–5 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yao, Z., Cheng, Y., Xu, Z. (2022). Equilibrium Analysis of Block Withholding Attack: An Evolutionary Game Perspective. In: Li, M., Sun, X. (eds) Frontiers of Algorithmic Wisdom. IJTCS-FAW 2022. Lecture Notes in Computer Science, vol 13461. Springer, Cham. https://doi.org/10.1007/978-3-031-20796-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-20796-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20795-2
Online ISBN: 978-3-031-20796-9
eBook Packages: Computer ScienceComputer Science (R0)