Abstract
Pool hopping attack is the result of miners leaving the pool when it offers fewer financial rewards and joining back when the rewards of mining yield higher rewards in blockchain networks. This act of leaving and rejoining the pool only during the good times results in the miner receiving more rewards than the computational power they contribute. Miners exiting the pool deprive it of its collective hash power, which leaves the pool unable to mine the block successfully. This results in its competitors mining the block before they can finish mining. Existing research shows pool hopping resistant measures and detection strategies; however, they do not offer any robust preventive solution to discourage miners from leaving the mining pool. To prevent pool hopping attacks, a smart contract-based pool hopping attack prevention model is proposed. The main objective of our research is maintaining the symmetrical relationship between the miners by requiring them all to continually contribute their computational power to successfully mine a block. We implement a ledger containing records of all miners, in the form of a miner certificate, which tracks the history of the miner’s earlier behavior. The certificate enables a pool manager to better initiate terms of the smart contract, which safeguards the interests of existing mining pool members. The model prevents frequent mine hoppers from pool hopping as they submit coins in the form of an escrow and risk losing them if they abandon the pool before completing mining of the block. The key critical factors that every pool hopping attack prevention solution must address and a study of comparative analysis with existing solutions are presented in the paper.
Funder
Institute for Information and communications Technology Promotion
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference21 articles.
1. Bitcoin: A Peer-to-Peer Electronic Cash Systemhttps://bitcoin.org/bitcoin.pdf
2. Blockchain: A Tale of Two Applications
3. A Survey about Consensus Algorithms Used in Blockchain;Nguyen;J. Inf. Process. Syst.,2018
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Byzantine fault-tolerant consensus algorithm based on local temporary consensus and global confirmation;2024 6th International Conference on Communications, Information System and Computer Engineering (CISCE);2024-05-10
2. OC-Detector: Detecting Smart Contract Vulnerabilities Based on Clustering Opcode Instructions;International Journal of Software Engineering and Knowledge Engineering;2023-11-20
3. A Tree-Mapped Taxonomy of Blockchain Attacks;2023 7th Cyber Security in Networking Conference (CSNet);2023-10-16
4. Impact of endorsement policy on the performance of blockchain‐based VANET;Transactions on Emerging Telecommunications Technologies;2023-07-16
5. Smart Contracts in Blockchain Technology: A Critical Review;Information;2023-02-13