IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers

Blockchain is a “decentralized” system, where the security heavily depends on that of the consensus protocols. For instance, attackers gain illegal revenues by leveraging the vulnerabilities of the consensus protocols. Such attacks consist of selfish mining (SM1), optimal selfish mining ( ϵ ‐optimal), bribery selfish mining (BSM), and so forth. In existing works, the attacks only consider the circumstances, where part of miners are rational. However, miners are hardly nonrational in the blockchain system since they hope to maximize their revenues. Furthermore, attackers prefer intelligent tools to increase their power for more additional revenues. Therefore, new models are urgently needed to formulate the scenarios, where attackers are purely rational and intelligent. In this paper, we propose a new BSM model, where all miners are rational. Moreover, rational attackers are intelligent such that they optimize their strategies by utilizing reinforcement learning to boost their revenues. More specifically, we propose a new selfish mining algorithm: intelligent bribery selfish mining (IPBSM), where attackers choose optimal strategies resorting to reinforcement learning when they interact with the external environment. The external environment can be further modeled as a Markov decision process to facilitate the construction of reinforcement learning. The simulation results manifest that IPBSM, compared with SM1 and ϵ ‐optimal, has lower power thresholds and higher revenues. Therefore, IPBSM is a threat no to be neglected to the blockchain system.

[1]  Zoe L. Jiang,et al.  Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing , 2020, Inf. Sci..

[2]  Tao Li,et al.  Randomness invalidates criminal smart contracts , 2019, Inf. Sci..

[3]  Jing Chen,et al.  PAN: Pipeline assisted neural networks model for data-to-text generation in social internet of things , 2020, Inf. Sci..

[4]  Hong Wang,et al.  Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments , 2016, Int. J. Ad Hoc Ubiquitous Comput..

[5]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[6]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[7]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[8]  Elaine Shi,et al.  Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.

[9]  Deepak Puthal,et al.  Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems , 2018, IEEE Consumer Electronics Magazine.

[10]  Soung Chang Liew,et al.  When blockchain meets AI: Optimal mining strategy achieved by machine learning , 2019, Int. J. Intell. Syst..

[11]  Marie-Josée Cros,et al.  MDPtoolbox: a multi-platform toolbox to solve stochastic dynamic programming problems , 2014 .

[12]  Aleksander Berentsen Aleksander Berentsen Recommends “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto , 2019, 21st Century Economics.

[13]  Bin Xiao,et al.  Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System , 2019, CCS.

[14]  Fengyin Li,et al.  A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..

[15]  Sarah Meiklejohn,et al.  Smart contracts for bribing miners , 2018, IACR Cryptol. ePrint Arch..

[16]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[17]  Joseph Bonneau,et al.  Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.

[18]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[19]  Joshua A. Kroll,et al.  Why buy when you can rent ? Bribery attacks on Bitcoin consensus , 2015 .

[20]  Holger Paul Keeler,et al.  Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.

[21]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[22]  Lei Guo,et al.  Containment control of heterogeneous fractional-order multi-agent systems , 2017, J. Frankl. Inst..

[23]  Jiaqi Zheng,et al.  Toward optimal participant decisions with voting-based incentive model for crowd sensing , 2020, Inf. Sci..

[24]  Ho-fung Leung,et al.  Incentive compatible and anti-compounding of wealth in proof-of-stake , 2020, Inf. Sci..

[25]  Hong Liu,et al.  A scalable coevolutionary multi-objective particle swarm optimizer , 2010, Int. J. Comput. Intell. Syst..

[26]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[27]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[28]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[29]  Jeffrey S. Rosenschein,et al.  Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.