Citation: Liang Liu, Wen Chen, Lei Zhang, JiaYong Liu, Jian Qin. A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference[J]. Mathematical Biosciences and Engineering, 2020, 17(1): 309-327. doi: 10.3934/mbe.2020017
[1] | S. Nakamoto, bitcoin: A peer-to-peer electronic cash systemTech, 2008(2008). Available from: https://bitcoin.org/bitcoin.pdf. |
[2] | M. K. M. Ly, Coining bitcoin's Legal-Bits: Examining the regulatory framework for bitcoin and virtual Currencies, Harv. J. L. Tech., 27 (2014), 587-608. |
[3] | A. Zohar, bitcoin: Under the Hood, Communicat. ACM, 58 (2015), 104-113. |
[4] | V. Savvas, P. Perikles, R. Maria, bitcoin value analysis based on cross-correlations, J. Int. Bank. Commerce, 22 (2017), 1-12. |
[5] | S. Higgins. $300 Billion: Bitcoin price boosts crypto market value to record high, 2018. Available from: https://www.coindesk.com/. |
[6] | M. A. Khan and K. Salah, IoT security: Review, blockchain solutions, and open challenges, Future Generat. Comput. Syst., 82 (2018), 395-411. |
[7] | A. Suliman, Z. Husain, M. Abououf, et al., Monetization of IoT Data using Smart Contracts, IET Networks, 8 (2019), 32-37. |
[8] | M. Conti, C. Lal and S. Ruj, A Survey on Security and Privacy Issues of bitcoin., 2017. Available from: https://arxiv.org/abs/1706.00916. |
[9] | Y. X. WANG and J. T. Gao, A Regulation Scheme Based on the CiphertextPolicy Hierarchical Attribute-Based Encryption in Bitcoin System, IEEE Access, 6 (2018), 16267-16278. |
[10] | A. Miller, A. Kosba, J. Katz, et al., Nonoutsourceable Scratch-Off Puzzles to Discourage bitcoin Mining Coalitions, Proc. 22nd ACM SIGSAC Conf. Comput. Comm. Secur. (CCS), Denver, Colorado, USA, October, 2015 (2015), 680-691. |
[11] | G. O. Karame, E. Androulaki, M. Roeschlin, et al., Misbehavior in bitcoin: A study of doublespending and accountability, ACM T. Ioform. Syst. SE., 18 (2015), 1-32. |
[12] | G. O. Karame, E. Androulaki, M. Roeschlin, et al., Misbehavior in Bitcoin: A Study of DoubleSpending and Accountability ACM Transact. Inform. Syst. Secur., 18 (2015), 1-32. |
[13] | Khaled Salah, M. H. U. Rehman, N. Nizamuddin, Blockchain for AI: Review and open research challenges, IEEE Access, 7 (2019), 10127-10148. |
[14] | I. Eyal and E. G. Sirer, Majority is not enough: Bitcoin mining is vulnerable, Proc. Int. Conf. Fina. Cryptol. Secur., Christ Church, Barbados, March, 2014 (2014), 436- 454. |
[15] | H. R. HASAN and K. Salah, Combating deepfake videos using blockchain and smart contracts, IEEE Access, 7 (2019), 41596-41606. |
[16] | B. Johnson, A. Laszka, J. Grossklags, et al., Game-Theoretic analysis of DDoS attacks against bitcoin mining pools, Proc. Int. Conf. Fina. Cryptol. Secur., Christ Church, Barbados, March, 2014 (2014), 72-86. |
[17] | E. Heilman, A. Kendler, A. Zohar, et al., Eclipse attacks on bitcoin's peer-to-peer network, Porc. 24th USENIX Symp. Secur., Washington, D.C., USA, 2015 (2015), 129-144. |
[18] | K. Nayak, S. Kumar, A. Miller, et al., Stubborn mining: Generalizing selfish mining and combining with an eclipse attack, Proc. IEEE Euro. Symp. Secur Privacy (Euro S&P), Saarbrucken, Germany, March, 2016 (2016), 1-16. |
[19] | N. T. Courtois and L. Bahack, On subversive miner strategies and block withholding attack in bitcoin digital currency, 2014. Available from: https://arxiv.org/abs/1402.1718. |
[20] | M. Rosenfeld, Analysis of bitcoin pooled mining reward systems. Accessed: Nov.30, 2018, 2011. Available from: https://arxiv.org/abs/1112.4980. |
[21] | D. Wu, X. D. Liu, X. B. Yan, et al., Equilibrium analysis of bitcoin block withholding attack: A generalized model, Reliabil. Eng. Syst. Safety, 5 (2019), 1-32. |
[22] | L. Luu, R. Saha, I. Parameshwaran, et al., On power splitting games in distributed computation: The case of bitcoin pooled mining, Proc. IEEE Symp. 28th Comput. Secur. Found (CSF), Verona, Italy, July, 2015 (2015), 1-18. |
[23] | I. Eyal, The miner's dilemma, Proc. IEEE Symp. Secur. Privacy (SP), San Jose, CA, USA, July, 2015 (2015), 89-103. |
[24] | S. Bag, S. Ruj and K. Sakurai, Bitcoin block withholding attack: Analysis and mitigation, IEEE Trans. Inf. Forensic Secur., 12 (2017), 1967-1978. |
[25] | N. T. Courtois and L. Bahack, On subversive miner strategies and block withholding attack in bitcoin digital currency, 2014. Available from: Available:https://arxiv.org/abs/1402.1718. |
[26] | A. Laszka, B. Johnson and J. Grossklags, When bitcoin mining pools run dry, Proc. Int. Conf. Fina. Cryptol Secur., San Juan, Puerto Rico, January, 2015 (2015), 63-77. |
[27] | S. Shen, H. Li, R. Han, et al., Differential game-based strategies for preventing malware propagation in wireless sensor networks, IEEE Trans. Inf. Forensic Secur., 9 (2014), 1962-1973. |
[28] | J. Tuwiner, Bitcoin Mining Pools, 2018. Available from: https://www.buybitcoinworldwide.com. |
[29] | O. Schrijvers, J. Bonneau, D. Boneh, et al., Incentive compatibility of bitcoin mining pool reward functions, Proc. Int. Conf. Fina. Cryptol.Secur., Christ Church, Barbados, 2016 (2016), 477- 498. |
[30] | S. Bag and K. Sakurai, Yet another note on block withholding attack on bitcoin mining pools, Proc. Int. Conf. Inf. Secur.(ISC), Honolulu, HI, USA, 2016 (2016), 167-180. |
[31] | J. S. R. Jangn and C. T. Sun, Neuro-fuzzy and soft computing: A computational approach to learning and machine intelligence, Prentice-Hall Inc., Upper Saddle River, NJ, 1996 (1996). |
[32] | M. Mizumoto and K. Tanaka, Some properties of fuzzy sets of type-2, Inform. Control, 31 (1976), 312-340. |