Jisuanji kexue yu tansuo (Jul 2023)

Research on Malicious Attack Model of Blockchain Multi-mining Pools

  • LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu

DOI
https://doi.org/10.3778/j.issn.1673-9418.2111107
Journal volume & issue
Vol. 17, no. 7
pp. 1719 – 1728

Abstract

Read online

The double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools can double-spend transactions through different attack forms, which brings huge security risks to the blockchain. Based on the combination of malicious attacks in multiple mining pools, this paper proposes two malicious attack models in multiple mining pools. Firstly, in the multi-mining pool centralized attack model, the computing power of multiple mining pools is aggregated into a malicious computing power set, which focuses on double-spending attacks on the blockchain. Secondly, in the multi-mining pool decentralized attack model, each mining pool is independent malicious computing power set, and the malicious computing power is distributed and synchronized among the blockchain computing power attacks. In addition, combining the number of mining pools, the percentage of computing power and other parameters, the internal operating mechanism of two multi-mining pool models is simulated and derived. Based on this mechanism, the security constraints of the two attack models are constructed. The experiment verifies the effectiveness of the two mining pool attack models, and digitization shows the attack laws in two multi-mining pool attack models, as well as the similarities and differences between the two models. Finally, combining with theoretical models and experimental results, this paper puts forward the prevention and control strategies.

Keywords