Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach

Kervins Nicolas,Yi Wang,George C. Giakos,Bingyang Wei,Hongda Shen
DOI: https://doi.org/10.1109/access.2020.3047365
IF: 3.9
2021-01-01
IEEE Access
Abstract:Blockchain is a technology that ensures data security by verifying database of records established in a decentralized and distributed network. Blockchain-based approaches have been applied to secure data in the fields of the Internet of Things, software engineering, healthcare systems, financial services, and smart power grids. However, the security of the blockchain system is still a major concern. We took the initiative to present a systematic study which sheds light on what defensive strategies are used to secure the blockchain system effectively. Specifically, we focus on blockchain data security that aims to mitigate the two data consistency attacks: double-spend attack and selfish mining attack. We employed the systematic approach to analyze a total of 40 selected studies using the proposed taxonomy of defensive strategies: monitoring, alert forwarding, alert broadcasting, inform, detection, and conceptual research design. It presents a comparison framework for existing and future research on blockchain security. Finally, some recommendations are proposed for blockchain researchers and developers.
computer science, information systems,telecommunications,engineering, electrical & electronic
What problem does this paper attempt to address?
### What Problem Does the Paper Attempt to Solve? The paper primarily focuses on two types of data consistency attacks in blockchain systems—double-spend attacks and selfish mining attacks—and proposes a systematic approach to analyze and evaluate defense strategies against these two attacks. #### Research Background - **Blockchain Technology**: Blockchain is a technology that ensures data security by verifying and recording databases through decentralized and distributed networks. It has been widely applied in fields such as the Internet of Things, software engineering, healthcare systems, financial services, and smart grids. - **Security Issues**: Despite the success of blockchain technology in many areas, its security remains a major concern. This paper focuses on data consistency attacks, specifically double-spend attacks and selfish mining attacks. #### Main Objectives - Propose a systematic approach to analyze and evaluate existing defense strategies. - Based on design parameters and proposed solutions, classify six types of defense strategies: monitoring, alert forwarding, alert broadcasting, informing, detection, and conceptual research design. - Provide suggestions for future research directions. #### Specific Contributions 1. **Systematic Approach**: Adopt a systematic approach to summarize and analyze defense strategies against double-spend attacks and selfish mining attacks. 2. **Classification of Defense Strategies**: Propose a classification of defense strategies based on design parameters and security solutions. 3. **Future Research Directions**: Provide suggestions for future research directions in defense strategies. #### Methodology - **Systematic Review**: Identify, analyze, and classify relevant studies through a systematic review method. - **Classification of Defense Strategies**: Propose six types of defense strategies: monitoring, alert forwarding, alert broadcasting, informing, detection, and conceptual research design. #### Main Findings - **Defense Strategies Against Double-Spend Attacks**: - **Alert Broadcasting**: Disclose the attacker's private key through special outputs to penalize the attacker. - **Alert Forwarding**: Calculate the probability of attack success based on the attacker's hash rate. #### Conclusion The paper provides a comprehensive analysis of defense strategies against double-spend attacks and selfish mining attacks through a systematic approach and proposes directions for future improvements. This helps researchers and developers better understand and address the security issues in blockchain systems.