The Impact of Selfish Mining on Bitcoin Network Performance

Selfish mining strategy allows miners to gain unfair advantage and excess revenue in Bitcoin network, but it also disrupts the normal operation of the network. In this work, we analyze the impact of selfish behavior on the Bitcoin network through a number of performance indicators such as network connectivity, block arrival rate, node response time, and block delivery time for selfish and honest blocks, respectively. We also discuss the probability of unintentional as well as intentional forks. We have found that the impact of selfish mining on network performance is noticeable, and in extreme cases, disproportional to the number of selfish miners or their hash power compared to honest nodes. Our analysis has also found that forking probability is dominated by intentional forking resulting from selfish behavior, which has the potential to increase the ledger inconsistency time and open the door to security attacks.

[1]  Ittay Eyal,et al.  Efficient MDP Analysis for Selfish-Mining in Blockchains , 2020, AFT.

[2]  Quan-Lin Li,et al.  A New Theoretical Framework of Pyramid Markov Processes for Blockchain Selfish Mining , 2020, Journal of Systems Science and Systems Engineering.

[3]  Xiaolin Chang,et al.  Modeling of Bitcoin's Blockchain Delivery Network , 2020, IEEE Transactions on Network Science and Engineering.

[4]  Emin Gün Sirer,et al.  Selfish Mining Re-Examined , 2020, Financial Cryptography.

[5]  Michael Davidson,et al.  On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms , 2020, IACR Cryptol. ePrint Arch..

[6]  Vojislav B. Misic,et al.  On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[7]  Jelena Mišić,et al.  On Forks and Fork Characteristics in a Bitcoin-Like Distribution Network , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[8]  Qin Hu,et al.  A Game Theoretic Analysis on Block Withholding Attacks Using the Zero-Determinant Strategy , 2019, 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS).

[9]  Cristina Pérez-Solà,et al.  TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions , 2018, Financial Cryptography.

[10]  Xing Wang,et al.  A Deep Dive Into Blockchain Selfish Mining , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[11]  R. Sarpong,et al.  Bio-inspired synthesis of xishacorenes A, B, and C, and a new congener from fuscol† †Electronic supplementary information (ESI) available. See DOI: 10.1039/c9sc02572c , 2019, Chemical science.

[12]  Jake A. Gober The Dynamics of a "Selfish Mining" Infested Bitcoin Network: How the Presence of Adversaries Can Alter the Profitability Framework of Bitcoin Mining , 2018 .

[13]  Cyril Grunspan,et al.  On profitability of selfish mining , 2018, ArXiv.

[14]  Guillermo Navarro-Arribas,et al.  Cryptocurrency Networks: A New P2P Paradigm , 2018, Mob. Inf. Syst..

[15]  Emin Gün Sirer,et al.  Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.

[16]  Guillermo Navarro-Arribas,et al.  A Fair Protocol for Data Trading Based on Bitcoin Transactions , 2017, IACR Cryptol. ePrint Arch..

[17]  Sushmita Ruj,et al.  Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[19]  Bart Preneel,et al.  Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.

[20]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[21]  Benjamin Fabian,et al.  Analyzing the Bitcoin Network: The First Four Years , 2016, Future Internet.

[22]  Ethan Heilman,et al.  One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.

[23]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[24]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[25]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[26]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[27]  W. Hager,et al.  and s , 2019, Shallow Water Hydraulics.

[28]  Andrew Miller,et al.  Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .

[29]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .