skip to main content
10.1145/3289166.3289171acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

Attack Incentive and Security of Exchanging Tokens on Proof-of-Work Blockchain

Authors Info & Claims
Published:12 November 2018Publication History

ABSTRACT

In a consensus algorithm based on Proof-of-Work, miners are motivated by crypto rewards. Furthermore, security is guaranteed because a cost of a 50% attack chance is higher than the potential rewards. However, because of the sudden price jump of cryptocurrencies and cheap prices of mining machines like ASICs, the cost and profit were on equilibrium for Bitcoin in 2017. In this situation, attackers are motivated by the balance between hash power and profits. In this paper, we describe that there is relevance between mining power on the network and price of tokens that can be taken securely on a blockchain. Users who exchange tokens on the PoW blockchain should monitor mining power and exchange tokens cheaper than the attack cost so that profit and cost of the attacker are not in equilibrium.

References

  1. U.S. Energy Information Administration. 2018. Average Price of Electricity to Ultimate Customers by End-Use Sector. https://www.eia.gov/electricity/monthly/epm_table_grapher.php?t=epmt_5_06_aGoogle ScholarGoogle Scholar
  2. Adam Back et al. 2002. Hashcash-a denial of service counter-measure.Google ScholarGoogle Scholar
  3. Samiran Bag, Sushmita Ruj, and Kouichi Sakurai. 2017. Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Transactions on Information Forensics and Security 12, 8 (aug 2017), 1967--1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. BITMAIN. 2018. Antminer S9i. (2018). https://www.asicminervalue.com/miners/bitmain/antminer-s9i-14thGoogle ScholarGoogle Scholar
  5. Blockchain.com. 2018. blockchain.com. https://www.blockchain.com/explorerGoogle ScholarGoogle Scholar
  6. Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, and Arvind Narayanan. 2016. On the Instability of Bitcoin Without the Block Reward. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16 (2016). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Nicolas T. Courtois and Lear Bahack. 2014. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. (jan 2014). arXiv:1402.1718 http://arxiv.org/abs/1402.1718Google ScholarGoogle Scholar
  8. Dexaran. 2017. ERC223 token standard. https://github.com/ethereum/EIPs/issues/223Google ScholarGoogle Scholar
  9. Ethereum. 2016. Solidity. https://solidity.readthedocs.io/en/v0.4.24/Google ScholarGoogle Scholar
  10. Ittay Eyal. 2015. The Miner's Dilemma. In 2015 IEEE Symposium on Security and Privacy. IEEE, 89--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough. Commun. ACM 61, 7 (jun 2018), 95--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Vogelsteller Fabian and Buterin Vitalik. 2015. ERC-20 Token Standard. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20.mdGoogle ScholarGoogle Scholar
  13. Shigeru Fujimura, Hiroki Watanabe, Atsushi Nakadaira, Tomokazu Yamada, Akihito Akutsu, and Jay Junichi Kishigami. 2015. BRIGHT: A concept for a decentralized rights management system based on blockchain. In 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin). IEEE, 345--346.Google ScholarGoogle ScholarCross RefCross Ref
  14. Nicolas Houy. 2014. The Bitcoin Mining Game. SSRN Electronic Journal (mar 2014).Google ScholarGoogle Scholar
  15. Mitsuru Iwamura, Yukinobu Kitamura, Tsutomu Matsumoto, and Kenji Saito. 2014. Can We Stabilize the Price of a Cryptocurrency?: Understanding the Design of Bitcoin and Its Potential to Compete with Central Bank Money. SSRN Electronic Journal (oct 2014).Google ScholarGoogle Scholar
  16. Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, and Yiannis Tselekounis. 2016. Blockchain Mining Games. (2016). arXiv:1607.02420 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Junichi Kishigami, Shigeru Fujimura, Hiroki Watanabe, Atsushi Nakadaira, and Akihiko Akutsu. 2015. The Blockchain-Based Digital Content Distribution System. In 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. IEEE, 187--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ben Laurie and Richard Clayton. 2004. Proof-of-Work Proves Not to Work. In Third Workshop on the Economics of Information Security. Minneapolis, MN., http://infosecon.net/workshop/downloads/2004/pdf/clayton.pdfGoogle ScholarGoogle Scholar
  19. Debin Liu and Jean Camp. 2006. Proof of Work can Work. In The Fifth Workshop on the Economics of Information Security (WEIS 2006). England. https://www.econinfosec.org/archive/weis2006/docs/50.pdfGoogle ScholarGoogle Scholar
  20. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  21. Meni Rosenfeld. 2014. Analysis of Hashrate-Based Double Spending. (feb 2014). arXiv:1402.2009 https://arxiv.org/abs/1402.2009Google ScholarGoogle Scholar
  22. Kenji Saito and Mitsuru Iwamura. 2018. How to Make a Digital Currency on a Blockchain Stable. (jan 2018). arXiv:1801.06771 http://arxiv.org/abs/1801.06771Google ScholarGoogle Scholar
  23. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2017. Optimal Selfish Mining Strategies in Bitcoin. Springer, Berlin, Heidelberg, 515--532.Google ScholarGoogle Scholar
  24. Nathan Shedroff. 2018. Self-Managing Real Estate. Computer 51, 1 (jan 2018), 104--104.Google ScholarGoogle ScholarCross RefCross Ref
  25. Kazuyuki Shudo, Reiki Kanda, and Kenji Saito. 2018. Towards Application Portability on Blockchains. (jan 2018). arXiv:1801.01421 http://arxiv.org/abs/1801.01421Google ScholarGoogle Scholar
  26. Entriken William, Shirley Dieter, Jacob Evans, and Sachs Nastassia. 2018. ERC-721 Non-Fungible Token Standard. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-721.mdGoogle ScholarGoogle Scholar
  27. Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1--32.Google ScholarGoogle Scholar

Index Terms

  1. Attack Incentive and Security of Exchanging Tokens on Proof-of-Work Blockchain

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        AINTEC '18: Proceedings of the 14th Asian Internet Engineering Conference
        November 2018
        69 pages
        ISBN:9781450361316
        DOI:10.1145/3289166

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 November 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        AINTEC '18 Paper Acceptance Rate8of21submissions,38%Overall Acceptance Rate15of38submissions,39%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader