Selfish Mining in Multi-Attacker Scenarios: An Empirical Evaluation of Nakamoto, Fruitchain, and Strongchain
By: Martin Perešíni , Tomáš Hladký , Jakub Kubík and more
Potential Business Impact:
Makes online money systems safer from cheaters.
The aim of this work is to enhance blockchain security by deepening the understanding of selfish mining attacks in various consensus protocols, especially the ones that have the potential to mitigate selfish mining. Previous research was mainly focused on a particular protocol with a single selfish miner, while only limited studies have been conducted on two or more attackers. To address this gap, we proposed a stochastic simulation framework that enables analysis of selfish mining with multiple attackers across various consensus protocols. We created the model of Proof-of-Work (PoW) Nakamoto consensus (serving as the baseline) as well as models of two additional consensus protocols designed to mitigate selfish mining: Fruitchain and Strongchain. Using our framework, thresholds reported in the literature were verified, and several novel thresholds were discovered for 2 and more attackers. We made the source code of our framework available, enabling researchers to evaluate any newly added protocol with one or more selfish miners and cross-compare it with already modeled protocols.
Similar Papers
Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols
Cryptography and Security
Finds new ways to cheat online money systems.
When Should Selfish Miners Double-Spend?
Cryptography and Security
Makes stealing digital money easier and harder to catch.
When Should Selfish Miners Double-Spend?
Cryptography and Security
Lets hackers steal money twice from digital coins.