Pool Strategies Selection in PoW-Based Blockchain Networks: Game-Theoretic Analysis

In proof-of-work-based (PoW-based) blockchain networks, the miners participate in a crypto-puzzle solving competition to win the reward by publishing a new block. Open mining pools attract a large number of miners for solving difficult problems together. Although the open strategy is likely to be more efficient, it makes pools susceptible to attack at the same time. In this paper, we present a game-theoretic analysis of mining pool strategy selection in order to explore the trade-off between the efficiency of openness and the vulnerability of attacks in a PoW-based blockchain network. We first model the pool mining process as a two-stage game, wherein the pools might decide whether to open or not and to attack or not. Based on the two-stage game model, we analyze the Nash equilibrium and the evolutionary stability of the mining games among pools, which uncovers the pool selection dynamics of PoW-based blockchain networks. In particular, we find that the attack behavior is the norm for a weak pool and triggers lower expected utilities when punishing the attacks more severely. Numerical simulations also support our theoretical findings as well as demonstrate the stability of the pools’ strategy selection.

[1]  T. D. Smith The blockchain litmus test , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[2]  Xiang Li,et al.  When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs , 2014, IEEE Transactions on Cybernetics.

[3]  Dong Hao,et al.  Diversity of timescale promotes the maintenance of extortioners in a spatial prisoner’s dilemma game , 2015 .

[4]  Josef Hofbauer,et al.  Evolutionary Games and Population Dynamics , 1998 .

[5]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[6]  Esteban Moro,et al.  Impact of human activity patterns on the dynamics of information diffusion. , 2009, Physical review letters.

[7]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[8]  Sushmita Ruj,et al.  Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.

[9]  Matthew O Jackson,et al.  Using selection bias to explain the observed structure of Internet diffusions , 2010, Proceedings of the National Academy of Sciences.

[10]  Jeffrey S. Rosenschein,et al.  Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.

[11]  K. Sigmund The Calculus of Selfishness , 2010 .

[12]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[13]  Xinyang Deng,et al.  Evidence Combination From an Evolutionary Game Theory Perspective , 2015, IEEE Transactions on Cybernetics.

[14]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[15]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[16]  Robert H. Deng,et al.  TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain , 2018, IEEE Access.

[17]  Yongdae Kim,et al.  Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.

[18]  Zhu Han,et al.  Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.

[19]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[20]  Y. Moreno,et al.  Dynamic instability of cooperation due to diverse activity patterns in evolutionary social dilemmas , 2015, 1502.07724.

[21]  Anastas Mishev,et al.  Blockchain solutions for big data challenges: A literature review , 2017, IEEE EUROCON 2017 -17th International Conference on Smart Technologies.

[22]  Robert H. Deng,et al.  Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..

[23]  Li Xiang,et al.  Game Dilemma Analysis and Optimization of PoW Consensus Algorithm , 2017 .

[24]  Yong Yu,et al.  Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems , 2018, IEEE Access.

[25]  Pin Lv,et al.  BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.

[26]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[27]  Dusit Niyato,et al.  Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.

[28]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[29]  Joshua A. Kroll,et al.  The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .

[30]  Kun Wang,et al.  Intelligent Resource Management in Blockchain-Based Cloud Datacenters , 2018, IEEE Cloud Computing.

[31]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[32]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[33]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[34]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[35]  Wei Yu,et al.  A Survey of Blockchain: Techniques, Applications, and Challenges , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[36]  John Domingue,et al.  The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward , 2016, EC-TEL.

[37]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[38]  Kun Zhu,et al.  An Evolutionary Game for Distributed Resource Allocation in Self-Organizing Small Cells , 2015, IEEE Transactions on Mobile Computing.

[39]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[40]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.