Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach

Blockchain is a technology that ensures data security by verifying database of records established in a decentralized and distributed network. Blockchain-based approaches have been applied to secure data in the fields of the Internet of Things, software engineering, healthcare systems, financial services, and smart power grids. However, the security of the blockchain system is still a major concern. We took the initiative to present a systematic study which sheds light on what defensive strategies are used to secure the blockchain system effectively. Specifically, we focus on blockchain data security that aims to mitigate the two data consistency attacks: double-spend attack and selfish mining attack. We employed the systematic approach to analyze a total of 40 selected studies using the proposed taxonomy of defensive strategies: monitoring, alert forwarding, alert broadcasting, inform, detection, and conceptual research design. It presents a comparison framework for existing and future research on blockchain security. Finally, some recommendations are proposed for blockchain researchers and developers.

[1]  Ethan Heilman,et al.  One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.

[2]  Vijay Janapa Reddi,et al.  Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[3]  Hokey Min,et al.  Blockchain technology for enhancing supply chain resilience , 2019, Business Horizons.

[4]  A. Juels,et al.  SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning , 2021, NDSS.

[5]  Kai Petersen,et al.  Systematic Mapping Studies in Software Engineering , 2008, EASE.

[6]  Miguel P Caldas,et al.  Research design: qualitative, quantitative, and mixed methods approaches , 2003 .

[7]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[8]  A Survey on Attacks of Bitcoin , 2018 .

[9]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[10]  Joseph Sarkis,et al.  Blockchain technology and its relationships to sustainable supply chain management , 2018, Int. J. Prod. Res..

[11]  Jiong Jin,et al.  Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.

[12]  Ivan Porres,et al.  Distributed virtual machine consolidation: A systematic mapping study , 2018, Comput. Sci. Rev..

[13]  Johan Pouwelse,et al.  TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..

[14]  S. Matthew Weinberg,et al.  On the Instability of Bitcoin Without the Block Reward , 2016, CCS.

[15]  Daniel Reijsbergen,et al.  Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients , 2020, 2020 IEEE International Conference on Blockchain (Blockchain).

[16]  Lin Chen,et al.  Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices , 2020, IEEE Consumer Electronics Magazine.

[17]  Meng Shen,et al.  Data Security and Privacy in Bitcoin System: A Survey , 2020, Journal of Computer Science and Technology.

[18]  Qi Zhang,et al.  Sidechain technologies in blockchain networks: An examination and state-of-the-art review , 2020, J. Netw. Comput. Appl..

[19]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[20]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[21]  Yanjiao Chen,et al.  Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools , 2020, IEEE/ACM Transactions on Networking.

[22]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[23]  Mohamed Amine Ferrag,et al.  DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.

[24]  Ren Zhang Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[25]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[26]  Jonathan Katz,et al.  Competing (Semi-)Selfish Miners in Bitcoin , 2019, AFT.

[27]  Deke Guo,et al.  Selfholding: A combined attack model using selfish mining with block withholding attack , 2019, Comput. Secur..

[28]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[29]  Wei-Chiang Hong,et al.  Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward , 2020, IEEE Access.

[30]  James J. Cordeiro,et al.  Blockchain technology: Business, strategy, the environment, and sustainability , 2019 .

[31]  Bart Preneel,et al.  Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.

[32]  Zhuming Bi,et al.  Blockchain and Internet of Things for Modern Business Process in Digital Economy—the State of the Art , 2019, IEEE Transactions on Computational Social Systems.

[33]  Zhiniang Peng,et al.  All roads lead to Rome: Many ways to double spend your cryptocurrency , 2018, ArXiv.

[34]  Célio Vinicius N. de Albuquerque,et al.  On the detection of selfish mining and stalker attacks in blockchain networks , 2020, Ann. des Télécommunications.

[35]  Josep M. Guerrero,et al.  Blockchain for power systems: Current trends and future applications , 2020 .

[36]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[37]  R. Monfared,et al.  Blockchain ready manufacturing supply chain using distributed ledger , 2016 .

[38]  Jong-Hyouk Lee,et al.  Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.

[39]  Emin Gün Sirer,et al.  Selfish Mining Re-Examined , 2020, Financial Cryptography.

[40]  Zhen Liu,et al.  Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol , 2018, IACR Cryptol. ePrint Arch..

[41]  Guillermo Navarro-Arribas,et al.  Double-spending prevention for Bitcoin zero-confirmation transactions , 2018, International Journal of Information Security.

[42]  Tongtong Li,et al.  Bitcoin and Blockchain: Security and Privacy , 2019, IEEE Internet of Things Journal.

[43]  P. Sanjeevikumar,et al.  Enhancement of Security and Handling the Inconspicuousness in IoT Using a Simple Size Extensible Blockchain , 2020 .

[44]  Camilo Rocha,et al.  Double-spend Attack Models with Time Advantange for Bitcoin , 2016, CLEI Selected Papers.

[45]  Maria Gradinariu Potop-Butucaru,et al.  ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin , 2016 .

[46]  Chen Feng,et al.  Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[47]  Maria Domenica Di Benedetto,et al.  Cyber-Physical Systems Security: a Systematic Mapping Study , 2016, J. Syst. Softw..

[48]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[49]  Nicolas Mayer,et al.  A Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology , 2017, ER Forum/Demos.

[50]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[51]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[52]  Rui Zhang,et al.  Security and Privacy on Blockchain , 2019, ACM Comput. Surv..

[53]  Ghassan O. Karame,et al.  Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..

[54]  Samuel Fosso Wamba,et al.  Bitcoin, Blockchain and Fintech: a systematic review and case studies in the supply chain , 2018 .

[55]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[56]  Jamal N. Al-Karaki,et al.  Towards building a blockchain framework for IoT , 2020, Cluster Computing.

[57]  Elaine Shi,et al.  FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..

[58]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[59]  Xiaojiang Du,et al.  Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering , 2020, Science China Information Sciences.

[60]  Gavin Andresen,et al.  An Analysis of Attacks on Blockchain Consensus , 2016, ArXiv.

[61]  Marko Hölbl,et al.  A Systematic Review of the Use of Blockchain in Healthcare , 2018, Symmetry.

[62]  Sherali Zeadally,et al.  A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..

[63]  Keke Gai,et al.  Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[64]  Xinying Yu,et al.  A Security Detection Model for Selfish Mining Attack , 2019, BlockSys.

[65]  Ghassan O. Karame,et al.  Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.

[66]  Cyril Grunspan,et al.  On profitability of selfish mining , 2018, ArXiv.

[67]  Hongbo Zhu,et al.  Blockchain for the IoT and industrial IoT: A review , 2020, Internet Things.

[68]  Kyungbaek Kim,et al.  A Survey about Consensus Algorithms Used in Blockchain , 2018, J. Inf. Process. Syst..

[69]  Mayank Vatsa,et al.  DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[70]  Mohamed Aymen Chalouf,et al.  Survey on blockchain-based applications in internet of vehicles , 2020, Comput. Electr. Eng..

[71]  Aziz Mohaisen,et al.  Countering Selfish Mining in Blockchains , 2018, 2019 International Conference on Computing, Networking and Communications (ICNC).

[72]  Chirag Modi,et al.  Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[73]  Bhaskar Krishnamachari,et al.  A Survey of Blockchain-Based Strategies for Healthcare , 2020, ACM Comput. Surv..

[74]  Ahmed Ben Ayed,et al.  A Conceptual Secure Blockchain Based Electronic Voting System , 2017 .

[75]  Usman W. Chohan The Double Spending Problem and Cryptocurrencies , 2017 .

[76]  Eklas Hossain,et al.  Authentication Protocol for Cloud Databases Using Blockchain Mechanism , 2019, Sensors.

[77]  Nidhee Rathod,et al.  Security threats on Blockchain and its countermeasures , 2018 .

[78]  Lin Zhong,et al.  A secure versatile light payment system based on blockchain , 2019, Future Gener. Comput. Syst..

[79]  Dongming Xu,et al.  A maturity model for blockchain adoption , 2016, Financial Innovation.

[80]  Alexander Kogan,et al.  Designing confidentiality-preserving Blockchain-based transaction processing systems , 2018, Int. J. Account. Inf. Syst..

[81]  Yi Wang,et al.  Comprehensive Overview of Selfish Mining and Double Spending Attack Countermeasures , 2019, 2019 IEEE 40th Sarnoff Symposium.

[82]  Yan Wang,et al.  A survey on security and privacy issues of blockchain technology , 2018, Math. Found. Comput..

[83]  Alf Zugenmaier,et al.  The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[84]  Yuanyuan Yang,et al.  A Survey of IoT Applications in Blockchain Systems , 2020, ACM Comput. Surv..

[85]  Jonathan Katz,et al.  Incentivizing Double-Spend Collusion in Bitcoin , 2017 .

[86]  Liang Liu,et al.  A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. , 2019, Mathematical biosciences and engineering : MBE.

[87]  Mohsen Guizani,et al.  MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.

[88]  Karen A. Scarfone,et al.  Blockchain Technology Overview , 2018, ArXiv.

[89]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[90]  Vasisht Duddu,et al.  A Survey of Adversarial Machine Learning in Cyber Warfare , 2018, Defence Science Journal.

[91]  Daniel S. Berman,et al.  A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..

[92]  Brian Neil Levine,et al.  An Explanation of Nakamoto's Analysis of Double-spend Attacks , 2017, ArXiv.

[93]  Jing Liu,et al.  A Survey on Security Verification of Blockchain Smart Contracts , 2019, IEEE Access.

[94]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[95]  Heung-No Lee,et al.  Profitable Double-Spending Attacks , 2019, Applied Sciences.

[96]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[97]  Mahdi H. Miraz,et al.  Application of Blockchain in Booking and Registration Systems of Securities Exchanges , 2018, 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE).

[98]  Roman Beck,et al.  Blockchain to Rule the Waves - Nascent Design Principles for Reducing Risk and Uncertainty in Decentralized Environments , 2017, ICIS.

[99]  Vincent Gramoli,et al.  Router RouterRouter Router Router Attacker Stratum 2 Stratum 1 Stratum 7 Stratum 8 Stratum 6 Stratum 5 Stratum 3 Stratum , 2018 .

[100]  Tooska Dargahi,et al.  A systematic , 2022 .

[101]  Yongdae Kim,et al.  Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.

[102]  S. M. Muyeen,et al.  Blockchain Applications in Smart Grid–Review and Frameworks , 2019, IEEE Access.

[103]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[104]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[105]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[106]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[107]  Nicholas Hopper,et al.  Combating Double-Spending Using Cooperative P2P Systems , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[108]  Feng Gao,et al.  A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.

[109]  David Silver,et al.  Deep Reinforcement Learning with Double Q-Learning , 2015, AAAI.

[110]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[111]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.

[112]  John P. Podolanko,et al.  Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions , 2017 .

[113]  Kim-Kwang Raymond Choo,et al.  Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..

[114]  Keke Gai,et al.  Research on the Security of Blockchain Data: A Survey , 2018, ArXiv.

[115]  Hector Marco-Gisbert,et al.  Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack , 2019, Applied Sciences.

[116]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[117]  Cyril Grunspan,et al.  Double spend races , 2017, International Journal of Theoretical and Applied Finance.

[118]  Jong Hyuk Park,et al.  Blockchain Technology Toward Green IoT: Opportunities and Challenges , 2020, IEEE Network.

[119]  Mohsen Guizani,et al.  Applications of blockchain in unmanned aerial vehicles: A review , 2020, Veh. Commun..

[120]  Ari Juels,et al.  BDoS: Blockchain Denial-of-Service , 2020, CCS.

[121]  Alec Radford,et al.  Proximal Policy Optimization Algorithms , 2017, ArXiv.

[122]  Z. Jane Wang,et al.  A Strong Adaptive, Strategic Double-Spending Attack on Blockchains , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[123]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[124]  Seungjoo Kim,et al.  Pooled Mining Makes Selfish Mining Tricky , 2018, IACR Cryptol. ePrint Arch..

[125]  Pan He,et al.  Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[126]  Cyril Grunspan,et al.  Selfish Mining and Dyck Words in Bitcoin and Ethereum Networks , 2019, Tokenomics.

[127]  The Fallacy of Selfish Mining in Bitcoin: A Mathematical Critique , 2017 .

[128]  Long Tran-Thanh,et al.  On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners , 2018, ArXiv.

[129]  Asif Karim,et al.  An Overview of Blockchain Applications and Attacks , 2019, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).

[130]  Hannes Hartenstein,et al.  Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin , 2018, Financial Cryptography Workshops.

[131]  Seungjoo Kim,et al.  Countering Block Withholding Attack Efficiently , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[132]  Mohammad A. Hoque,et al.  Blockchain Consensus Algorithms: A Survey , 2020, 2001.07091.

[133]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..