Cargando…
FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners
Blockchain has become one of the key techniques for the security of the industrial internet. However, the blockchain is vulnerable to FAW (Fork after Withholding) attacks. To protect the industrial internet from FAW attacks, this paper proposes a novel FAW attack protection algorithm (FAWPA) based o...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9269683/ https://www.ncbi.nlm.nih.gov/pubmed/35808527 http://dx.doi.org/10.3390/s22135032 |
_version_ | 1784744280765497344 |
---|---|
author | Zhang, Yang Lv, Xiaowen Chen, Yourong Ren, Tiaojuan Yang, Changchun Han, Meng |
author_facet | Zhang, Yang Lv, Xiaowen Chen, Yourong Ren, Tiaojuan Yang, Changchun Han, Meng |
author_sort | Zhang, Yang |
collection | PubMed |
description | Blockchain has become one of the key techniques for the security of the industrial internet. However, the blockchain is vulnerable to FAW (Fork after Withholding) attacks. To protect the industrial internet from FAW attacks, this paper proposes a novel FAW attack protection algorithm (FAWPA) based on the behavior of blockchain miners. Firstly, FAWPA performs miner data preprocessing based on the behavior of the miners. Then, FAWPA proposes a behavioral reward and punishment mechanism and a credit scoring model to obtain cumulative credit value with the processed data. Moreover, we propose a miner’s credit classification mechanism based on fuzzy C-means (FCM), which combines the improved Aquila optimizer (AO) with strong solving ability. That is, FAWPA combines the miner’s accumulated credit value and multiple attack features as the basis for classification, and optimizes cluster center selection by simulating Aquila’s predation behavior. It can improve the solution update mechanism in different optimization stages. FAWPA can realize the rapid classification of miners’ credit levels by improving the speed of identifying malicious miners. To evaluate the protective effect of the target mining pool, FAWPA finally establishes a mining pool and miner revenue model under FAW attack. The simulation results show that FAWPA can thoroughly and efficiently detect malicious miners in the target mining pool. FAWPA also improves the recall rate and precision rate of malicious miner detection, and it improves the cumulative revenue of the target mining pool. The proposed algorithm performs better than ND, RSCM, AWRS, and ICRDS. |
format | Online Article Text |
id | pubmed-9269683 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-92696832022-07-09 FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners Zhang, Yang Lv, Xiaowen Chen, Yourong Ren, Tiaojuan Yang, Changchun Han, Meng Sensors (Basel) Article Blockchain has become one of the key techniques for the security of the industrial internet. However, the blockchain is vulnerable to FAW (Fork after Withholding) attacks. To protect the industrial internet from FAW attacks, this paper proposes a novel FAW attack protection algorithm (FAWPA) based on the behavior of blockchain miners. Firstly, FAWPA performs miner data preprocessing based on the behavior of the miners. Then, FAWPA proposes a behavioral reward and punishment mechanism and a credit scoring model to obtain cumulative credit value with the processed data. Moreover, we propose a miner’s credit classification mechanism based on fuzzy C-means (FCM), which combines the improved Aquila optimizer (AO) with strong solving ability. That is, FAWPA combines the miner’s accumulated credit value and multiple attack features as the basis for classification, and optimizes cluster center selection by simulating Aquila’s predation behavior. It can improve the solution update mechanism in different optimization stages. FAWPA can realize the rapid classification of miners’ credit levels by improving the speed of identifying malicious miners. To evaluate the protective effect of the target mining pool, FAWPA finally establishes a mining pool and miner revenue model under FAW attack. The simulation results show that FAWPA can thoroughly and efficiently detect malicious miners in the target mining pool. FAWPA also improves the recall rate and precision rate of malicious miner detection, and it improves the cumulative revenue of the target mining pool. The proposed algorithm performs better than ND, RSCM, AWRS, and ICRDS. MDPI 2022-07-04 /pmc/articles/PMC9269683/ /pubmed/35808527 http://dx.doi.org/10.3390/s22135032 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zhang, Yang Lv, Xiaowen Chen, Yourong Ren, Tiaojuan Yang, Changchun Han, Meng FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners |
title | FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners |
title_full | FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners |
title_fullStr | FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners |
title_full_unstemmed | FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners |
title_short | FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners |
title_sort | fawpa: a faw attack protection algorithm based on the behavior of blockchain miners |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9269683/ https://www.ncbi.nlm.nih.gov/pubmed/35808527 http://dx.doi.org/10.3390/s22135032 |
work_keys_str_mv | AT zhangyang fawpaafawattackprotectionalgorithmbasedonthebehaviorofblockchainminers AT lvxiaowen fawpaafawattackprotectionalgorithmbasedonthebehaviorofblockchainminers AT chenyourong fawpaafawattackprotectionalgorithmbasedonthebehaviorofblockchainminers AT rentiaojuan fawpaafawattackprotectionalgorithmbasedonthebehaviorofblockchainminers AT yangchangchun fawpaafawattackprotectionalgorithmbasedonthebehaviorofblockchainminers AT hanmeng fawpaafawattackprotectionalgorithmbasedonthebehaviorofblockchainminers |