Dynamic Network Configuration: An Effective Defensive Protocol for Public Blockchain

0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To earning unfair profits, adversaries can attack the legitimate nodes in the Bitcoin network with selfish mining, the eclipse attack and the information delaying attack. In this paper, we study the patterns of the above attacks and then present a scheme to enhance the security of the Bitcoin network. First, we propose a new structure for the Bitcoin network called double-layer dynamic network, which improves the defense capability of Bitcoin against several attacks. Second, we design a new structure for the blocks in the Bitcoin network, which provides a way to store the IP addresses in the blocks. Third, we present a novel network protocol named dynamic network configuration for public blockchain. Our protocol pushes the updating of IP addresses in the blocks and changes the construction of the network periodically. From theoretical analysis and simulated evaluation, we find that under our protocol, the Bitcoin network can defend against the selfish mining, the eclipse attack and the information delaying attack effectively.

Author supplied keywords

Cite

CITATION STYLE

APA

Jiang, Z., Lv, C., Zhang, B., Zhang, C., Lu, W., & Ji, S. (2020). Dynamic Network Configuration: An Effective Defensive Protocol for Public Blockchain. In Advances in Intelligent Systems and Computing (Vol. 895, pp. 398–413). Springer Verlag. https://doi.org/10.1007/978-3-030-16946-6_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free