skip to main content
10.1145/3460537.3460543acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbctConference Proceedingsconference-collections
research-article

Occupation mechanism for eliminating double-spending attacks on trusted transaction blockchain

Authors Info & Claims
Published:20 July 2021Publication History

ABSTRACT

Using blockchain technology to build a trusted transaction foundation has become a hot topic of current research and practice. The double-spending phenomenon refers to the bifurcation of the blockchain structure. In the process of trusted transactions, the fork caused by malicious attacks will destroy the correctness, integrity, and consistency of the entire ledger, and causes serious economic losses to users. Therefore, eliminating double-spending attacks is an important issue to ensure the security of the blockchain. The current method of defending against double-spending attacks in trusted transactions mainly revolves around the Bitcoin blockchain system. In the process of researching the Nano blockchain grid project, a high-throughput trusted transaction system, we proposed a double-spending elimination solution for the system: the occupying mechanism. By using Java to reconstruct the Nano project and implement the occupying mechanism, the experimental results verify the effectiveness of the occupying mechanism, and it is superior to the Nano project's double-spending solution based on the traditional voting mechanism in terms of time performance.

References

  1. Colin LeMahieu. Nano: A Feeless Distributed Cryptocurrency Network. https://nano.org/en/whitepaperGoogle ScholarGoogle Scholar
  2. Wuqiang: Brief description of THE DAO event. https://bihu.com/article/1996238787Google ScholarGoogle Scholar
  3. X. Yu, M. T. Shiwen, Y. Li and R. Deng Huijie, "Fair deposits against double-spending for Bitcoin transactions," 2017 IEEE Conference on Dependable and Secure Computing, Taipei, 2017, pp. 44-51, doi: 10.1109/DESEC.2017.8073796.Google ScholarGoogle Scholar
  4. C. Chou, Y. Lin, R. Chen, H. Chang, I. Tu and S. Liao, "Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols," 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018, pp. 1456-1462, doi: 10.1109/Cybermatics_2018.2018.00247.Google ScholarGoogle Scholar
  5. H. Lee, M. Shin, K. S. Kim, Y. Kang and J. Kim, "Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain," 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Hong Kong, 2018, pp. 1-2, doi: 10.1109/SAHCN.2018.8397151.Google ScholarGoogle Scholar
  6. Karame, Ghassan O., Two Bitcoins at the Price of One? DoubleSpending Attacks on Fast Payments in Bitcoin - Semantic Scholar. SemanticScholar, 1 Jan. 1970, www.semanticscholar.org/paper/TwoBitcoins-at-the-Price-of-One-Double-Spending-on-KarameAndroulaki/1345c39bea4802e20cc7e3adbc3e3287c1839c8aGoogle ScholarGoogle Scholar
  7. K. Nicolas and Y. Wang, "A novel double spending attack countermeasure in blockchain," 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA, 2019, pp. 0383-0388, doi: 10.1109/UEMCON47517.2019.8992991.Google ScholarGoogle Scholar
  8. K. Sai and D. Tipper, "Disincentivizing Double Spend Attacks Across Interoperable Blockchains," 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Los Angeles, CA, USA, 2019, pp. 36-45, doi: 10.1109/TPS-ISA48467.2019.00014.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology
    March 2021
    216 pages
    ISBN:9781450389624
    DOI:10.1145/3460537

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 July 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format