[go: up one dir, main page]

skip to main content
10.1145/3289166.3289171acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

Attack Incentive and Security of Exchanging Tokens on Proof-of-Work Blockchain

Published: 12 November 2018 Publication History

Abstract

In a consensus algorithm based on Proof-of-Work, miners are motivated by crypto rewards. Furthermore, security is guaranteed because a cost of a 50% attack chance is higher than the potential rewards. However, because of the sudden price jump of cryptocurrencies and cheap prices of mining machines like ASICs, the cost and profit were on equilibrium for Bitcoin in 2017. In this situation, attackers are motivated by the balance between hash power and profits. In this paper, we describe that there is relevance between mining power on the network and price of tokens that can be taken securely on a blockchain. Users who exchange tokens on the PoW blockchain should monitor mining power and exchange tokens cheaper than the attack cost so that profit and cost of the attacker are not in equilibrium.

References

[1]
U.S. Energy Information Administration. 2018. Average Price of Electricity to Ultimate Customers by End-Use Sector. https://www.eia.gov/electricity/monthly/epm_table_grapher.php?t=epmt_5_06_a
[2]
Adam Back et al. 2002. Hashcash-a denial of service counter-measure.
[3]
Samiran Bag, Sushmita Ruj, and Kouichi Sakurai. 2017. Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Transactions on Information Forensics and Security 12, 8 (aug 2017), 1967--1978.
[4]
BITMAIN. 2018. Antminer S9i. (2018). https://www.asicminervalue.com/miners/bitmain/antminer-s9i-14th
[5]
Blockchain.com. 2018. blockchain.com. https://www.blockchain.com/explorer
[6]
Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, and Arvind Narayanan. 2016. On the Instability of Bitcoin Without the Block Reward. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16 (2016).
[7]
Nicolas T. Courtois and Lear Bahack. 2014. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. (jan 2014). arXiv:1402.1718 http://arxiv.org/abs/1402.1718
[8]
Dexaran. 2017. ERC223 token standard. https://github.com/ethereum/EIPs/issues/223
[9]
Ethereum. 2016. Solidity. https://solidity.readthedocs.io/en/v0.4.24/
[10]
Ittay Eyal. 2015. The Miner's Dilemma. In 2015 IEEE Symposium on Security and Privacy. IEEE, 89--103.
[11]
Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough. Commun. ACM 61, 7 (jun 2018), 95--102.
[12]
Vogelsteller Fabian and Buterin Vitalik. 2015. ERC-20 Token Standard. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20.md
[13]
Shigeru Fujimura, Hiroki Watanabe, Atsushi Nakadaira, Tomokazu Yamada, Akihito Akutsu, and Jay Junichi Kishigami. 2015. BRIGHT: A concept for a decentralized rights management system based on blockchain. In 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin). IEEE, 345--346.
[14]
Nicolas Houy. 2014. The Bitcoin Mining Game. SSRN Electronic Journal (mar 2014).
[15]
Mitsuru Iwamura, Yukinobu Kitamura, Tsutomu Matsumoto, and Kenji Saito. 2014. Can We Stabilize the Price of a Cryptocurrency?: Understanding the Design of Bitcoin and Its Potential to Compete with Central Bank Money. SSRN Electronic Journal (oct 2014).
[16]
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, and Yiannis Tselekounis. 2016. Blockchain Mining Games. (2016). arXiv:1607.02420
[17]
Junichi Kishigami, Shigeru Fujimura, Hiroki Watanabe, Atsushi Nakadaira, and Akihiko Akutsu. 2015. The Blockchain-Based Digital Content Distribution System. In 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. IEEE, 187--190.
[18]
Ben Laurie and Richard Clayton. 2004. Proof-of-Work Proves Not to Work. In Third Workshop on the Economics of Information Security. Minneapolis, MN., http://infosecon.net/workshop/downloads/2004/pdf/clayton.pdf
[19]
Debin Liu and Jean Camp. 2006. Proof of Work can Work. In The Fifth Workshop on the Economics of Information Security (WEIS 2006). England. https://www.econinfosec.org/archive/weis2006/docs/50.pdf
[20]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[21]
Meni Rosenfeld. 2014. Analysis of Hashrate-Based Double Spending. (feb 2014). arXiv:1402.2009 https://arxiv.org/abs/1402.2009
[22]
Kenji Saito and Mitsuru Iwamura. 2018. How to Make a Digital Currency on a Blockchain Stable. (jan 2018). arXiv:1801.06771 http://arxiv.org/abs/1801.06771
[23]
Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2017. Optimal Selfish Mining Strategies in Bitcoin. Springer, Berlin, Heidelberg, 515--532.
[24]
Nathan Shedroff. 2018. Self-Managing Real Estate. Computer 51, 1 (jan 2018), 104--104.
[25]
Kazuyuki Shudo, Reiki Kanda, and Kenji Saito. 2018. Towards Application Portability on Blockchains. (jan 2018). arXiv:1801.01421 http://arxiv.org/abs/1801.01421
[26]
Entriken William, Shirley Dieter, Jacob Evans, and Sachs Nastassia. 2018. ERC-721 Non-Fungible Token Standard. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-721.md
[27]
Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1--32.

Cited By

View all
  • (2022)Function Virtualization Can Play a Great Role in Blockchain ConsensusIEEE Access10.1109/ACCESS.2022.317634910(59862-59877)Online publication date: 2022
  • (2021)Blockchain for Cybersecurity in Smart Grid: A Comprehensive SurveyIEEE Transactions on Industrial Informatics10.1109/TII.2020.299847917:1(3-19)Online publication date: Jan-2021
  • (2020)A PoL Protocol for Spatiotemporal BlockchainSecurity and Privacy in Digital Economy10.1007/978-981-15-9129-7_41(591-605)Online publication date: 22-Oct-2020

Index Terms

  1. Attack Incentive and Security of Exchanging Tokens on Proof-of-Work Blockchain

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      AINTEC '18: Proceedings of the 14th Asian Internet Engineering Conference
      November 2018
      69 pages
      ISBN:9781450361316
      DOI:10.1145/3289166
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 November 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Blockchain
      2. Proof-of-Work
      3. Token exchange

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      AINTEC '18
      AINTEC '18: ASIAN INTERNET ENGINEERING CONFERENCE
      November 12 - 14, 2018
      Bangkok, Thailand

      Acceptance Rates

      AINTEC '18 Paper Acceptance Rate 8 of 21 submissions, 38%;
      Overall Acceptance Rate 15 of 38 submissions, 39%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 10 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Function Virtualization Can Play a Great Role in Blockchain ConsensusIEEE Access10.1109/ACCESS.2022.317634910(59862-59877)Online publication date: 2022
      • (2021)Blockchain for Cybersecurity in Smart Grid: A Comprehensive SurveyIEEE Transactions on Industrial Informatics10.1109/TII.2020.299847917:1(3-19)Online publication date: Jan-2021
      • (2020)A PoL Protocol for Spatiotemporal BlockchainSecurity and Privacy in Digital Economy10.1007/978-981-15-9129-7_41(591-605)Online publication date: 22-Oct-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media