Mining Pool Manipulation in Blockchain Network Over Evolutionary Block Withholding Attack

In the current blockchain network, many participants rationally migrate the pool to receive a better compensation according to their contribution in situations where the pools they engage encounter undesirable attacks. The Nash equilibria of attacked pool has been widely analyzed, but the analysis of practical methodology for obtaining it is still inadequate. In this paper, we propose an evolutionary game theoretic analysis of Proof-of-Work (PoW) based blockchain network in order to investigate the mining pool dynamics affected by malicious infiltrators and the feasibility of autonomous migration among individual miners. We formulate a revenue model for mining pools which are implicitly allowed to launch a block withholding attack. Under our mining game, we analyze the evolutionary stability of Nash equilibrium with replicator dynamics, which can explain the population change with time between participated pools. Further, we explore the statistical approximation of successful mining events to show the necessity of artificial manipulation for migrating. Finally, we construct a better response learning based on the required block size which can lead to our evolutionarily stable strategy (ESS) with numerical results that support our theoretical discoveries.

[1]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[2]  R. Cressman Evolutionary Dynamics and Extensive Form Games , 2003 .

[3]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[4]  Christof Weinhardt,et al.  A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.

[5]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[6]  Idit Keidar,et al.  Game of Coins , 2018, 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS).

[7]  Nicolas Houy,et al.  The Bitcoin Mining Game , 2014, Ledger.

[8]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[9]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[10]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[11]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[12]  Aiqing Zhang,et al.  Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain , 2018, Journal of Medical Systems.

[13]  Fei-Yue Wang,et al.  Research on the Selection Strategies of Blockchain Mining Pools , 2018, IEEE Transactions on Computational Social Systems.

[14]  Hannes Hartenstein,et al.  Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin , 2019, Financial Cryptography.

[15]  P. Rizun A Transaction Fee Market Exists Without a Block Size Limit , 2016 .

[16]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[17]  Emin Gün Sirer,et al.  Majority is not enough , 2013, Financial Cryptography.

[18]  Mohsen Guizani,et al.  MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.

[19]  Anastas Mishev,et al.  Blockchain solutions for big data challenges: A literature review , 2017, IEEE EUROCON 2017 -17th International Conference on Smart Technologies.

[20]  J. Hofbauer,et al.  Evolutionary game dynamics , 2011 .

[21]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[22]  Dusit Niyato,et al.  Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.

[23]  Christophe Bisière,et al.  The Blockchain Folk Theorem , 2018, The Review of Financial Studies.

[24]  Aron Laszka,et al.  When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.

[25]  S. Gourisetti,et al.  Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security , 2017, 2017 Resilience Week (RWS).

[26]  Pin Lv,et al.  BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.

[27]  Zhu Han,et al.  When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.

[28]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[29]  Alexandru Stanciu,et al.  Blockchain Based Distributed Control System for Edge Computing , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).

[30]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[31]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[32]  Xueying Ding,et al.  Robust Consensus of Networked Evolutionary Games with Attackers and Forbidden Profiles † , 2017, Entropy.

[33]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[34]  Yue Chen,et al.  Adaptive Blockchain-Based Electric Vehicle Participation Scheme in Smart Grid Platform , 2018, IEEE Access.

[35]  Hong Liu,et al.  Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.

[36]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[37]  Hiroki Watanabe,et al.  Blockchain contract: Securing a blockchain applied to smart contracts , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).

[38]  Xinghuo Yu,et al.  Cooperative Mining in Blockchain Networks With Zero-Determinant Strategies , 2020, IEEE Transactions on Cybernetics.

[39]  Yongdae Kim,et al.  Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.

[40]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).