INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.8, No.5, Sep. 2018

A Proof of Work: Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory

Full Text (PDF, 533KB), PP.1-9


Views:27   Downloads:1

Author(s)

Somdip Dey

Index Terms

Computer Security;network;blockchain;machine learning;algorithmic game theory;majority attack;anomaly detection

Abstract

Blockchain’s vast applications in different industries have drawn several researchers to pursue extensive research in securing blockchain technologies. In recent times we could see several institutions coming together to create consortium based blockchain networks such as Hyperledger. Although for applications of blockchain such as Bitcoin, Litcoin, etc. the majority-attack might not be a great threat but for consortium based blockchain networks where we could see several institutions such as public, private, government, etc. are collaborating, the majority-attack might just prove to be a prevalent threat if collusion among these institutions takes place. This paper proposes a methodology where we can use intelligent software agents to monitor the activity of stakeholders in the blockchain networks to detect anomaly such as collusion, using supervised machine learning algorithm and algorithmic game theory and stop the majority attack from taking place.

Cite This Paper

Somdip Dey, " A Proof of Work: Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory ", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.8, No.5, pp. 1-9, 2018.DOI: 10.5815/ijwmt.2018.05.01

Reference

[1]Nisan et al. (2007), Algorithmic Game Theory. Cambridge University Press. 

[2]S. Nakamoto, ‘Bitcoin: A Peer-to-Peer Electronic Cash System’. Available at https://bitcoin.org/bitcoin.pdf (Accessed: 30th January, 2018).

[3]M. Staples, (2016) ‘Blockchain is useful for a lot more than Bitcoin’, The Conversation. Available at http://theconversation.com/blockchain-is-useful-fora-lot-more-than-just-bitcoin-58921 (Accessed: 30th January, 2018).

[4](2018) ‘How could blockchain be used in the enterprise’, Computer World UK. Available at https://www.computerworlduk.com/galleries/securit y/how-could-blockchain-be-used-the-enterprise3628558/ (Accessed: 30th January, 2018).

[5]I. Lin, T. Liao, (2017) ‘A Survey of Blockchain Security Issues and Challenges’, International Journal of Network Security, Vol. 19, No. 5, pp. 653-659.

[6]M. Rosenfeld, (2014) ‘Analysis of hashrate-based double-spending’, ArXiv CoRR. Available at https://arxiv.org/pdf/1402.2009.pdf (Accessed: 30th January, 2018).

[7]N. T. Courtois, (2014) ‘On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies’, ArXiv CoRR. Available at https://arxiv.org/pdf/1405.0534.pdf (Accessed: 30th January, 2018).

[8]I. Eyal, E. G. Sirer, (2013) ‘Majority is not Enough: Bitcoin Mining is Vulnerable’, ArXiv CoRR. Available at https://arxiv.org/pdf/1311.0243.pdf (Accessed: 30th January, 2018).

[9]T. Gopal, M. Subbaraju, R. v. Joshi, S. Dey, “MAR(S)2: Methodology to Articulate the Requirements for Security In SCADA”, Proceedings of IEEE 2014 - Fourth International Conference on Innovative Computing Communication Technology (INTECH 2014), pp. 103-108.

[10]S. Dey, S. S. Ayyar, SB Subin, P.K. A. Asis, “SD-IES: An Advanced Image Encryption Standard”, IEEE 2013 7th International Conference on Intelligent Systems and Control, Coimbatore, India, January 2013 

[11]S. Dey, “New Generation of Digital Academic-Transcripts using encrypted QR CodeTM”, IEEE 2013 International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing (iMac4s 2013), Kerala, India, March 2013 

[12]S. Dey, S. Agarwal, A. Nath, “Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System”, IEEE International Conference On Communication System and Network Technologies 2013 (CSNT-2013), Gwalior, India, April 2013

[13]S. Dey, “SD-EQR: A New Technique to Use QR CodesTM in Cryptography”, International Conference on Emerging Trends in Computer and Information Technology (ICETCIT 2012), Coimbatore, India, May 2012

[14]S. Dey, “SD-REE: A Cryptographic Method To Exclude Repetition From a Message”, The International Conference on Informatics & Applications (ICIA 2012), Kuala Terengganu, Malaysia, June 2012

[15]S. Dey, “SD-EI: A Cryptographic Technique To Encrypt Image”, IEEE 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012), Kuala Lumpur, Malaysia, June 2012

[16]S. Dey, “SD-AEI: An Advanced Encryption Technique For Images”, IEEE 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC2012), Klaipeda City, Lithuania, July 2012

[17]S. Dey, J. Nath, A. Nath, “Modified Caesar Cipher method applied on Generalized Modified Vernam Cipher method with feedback, MSA method and NJJSA method: STJA Algorithm”, 8th International Conference on Foundations of Computer Science (FCS12), Las Vegas, USA, July 2012

[18]S. Dey, Joyshree Nath, Asoke Nath, “A New Technique to Hide Encrypted Data in QR CodesTM”, 3th International Conference on Internet Computing (ICOMP12), Las Vegas, USA, July 2012

[19]S. Dey, “SD-MARC: A New Multi-Processor Architecture”, 12th International Conference on Computer Design (CDES12), Las Vegas, USA, July 2012

[20]S. Dey, “A New Technique to Use a Parallel Compiler for Multi-core Microcontrollers”, 12th International Conference on Computer Design (CDES12), Las Vegas, USA, July 2012

[21]S. Dey, “SD-AREE: A New Simple Cryptographic Method to Exclude Repetition from a Message to be Encrypted”, IEEE 2012 Third International Conference on Computing, Communication and Networking technologies (ICCCNT12), Karur, India, July 2012

[22]S. Dey, A. Nath, “Modern Encryption Standard (MES) version-I: An Advanced Cryptographic Method”, IEEE 2012 2nd World Congress on Information and Communication Technologies (WICT-2012), Trivandrum, India, October 2012

[23]S. Dey, “SD-C1BBR: SD-Count-1-Byte-Bit Randomization: A New Advanced Cryptographic Randomization Technique”, IEEE 2012 2nd World Congress on Information and Communication Technologies (WICT- 2012), Trivandrum, India, October 2012.

[24]S. Dey, M. S Nair. “Design and Implementation of a Simple Cache Simulator in Java to Investigate MESI and MOESI Coherency Protocols”. International Journal of Computer Applications 87(11): 6-13, February 2014. Published by Foundation of Computer Science, New York, USA.

[25]S. Dey, “SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message”, International Journal of Information and Network Security (IJINS), Volume 1, Issue 2, pp. 67-76, 2012.

[26]S. Dey, K. Mondal, J. Nath, A. Nath, “Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm”, IJMECS (International Journal on Modern Education and Computer Science), 2012.

[27]S. Dey, J. Nath, A. Nath, “An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm”, International Journal of Computer Applications 46 (20): 46-53, May 2012. Published by Foundation of Computer Science, New York, USA.

[28]S. Dey, J. Nath, A. Nath, “An Integrated Symmetric Key Cryptographic Method Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm”, IJMECS, vol.4, no.5, pp.1-9, 2012.

[29]S. Dey, “SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)”, IJMECS, vol.4, no.6, pp.43-49, 2012.

[30]S. Dey, “An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES”, International Journal of Cyber-Security and Digital Forensics (IJCSDF), Volume 1, Issue 2, pp. 82-88, 2012.

[31]S. Dey, “Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2”, International Journal of Cyber-Security and Digital Forensics (IJCSDF), Volume 1, Issue 3, pp. 221-225, 2012.

[32]S. Dey, 2014. “A beginner’s guide to computer science research”. ACM XRDS 20, 4 (June 2014), pp. 14-14.

[33]S. Dey, A. K. Singh, K. McDonald-Maier, “Energy Efficiency and Reliability of Computer Vision Applications on Heterogeneous Multi-Processor Systems-on-Chips (MPSoCs)”, presented at Adaptive Many-Core Architectures and Systems workshop, York, UK, 13-15th June, 2018.

[34]S. Dey, J. Li, S. Cheng, “Web Scrapping: How Companies Can Use ’Big-Data’ generated by Facebook?”, presented at IET Data Analytics held on 5th December, 2013 at IET, London, United Kingdom.

[35]S. Dey, S. Sen, “Privacy Issues in Social Networking Websites: Is Facebook Revealing Our Social Life?”. Presented at Symposium on Information Security, Securing Networks, Devices and Applications 2013 (SIS SNDA 2013) held on 15th and 16th November, 2013 at BITS Pilani, Hyderabad, India.

[36]S. Dey, 2014, “Efficient Data Input/Output (I/O) for Finite Difference Time Domain (FDTD) Computation on Graphics Processing Unit (GPU)”.  Available at https://www.escholar.manchester.ac.uk/item/?pid=uk-ac-man-scw:234111 

[37]J. Garay, A. Kiayias, and N. Leonardos, The Bitcoin Backbone Protocol: Analysis and Applications, pp. 281–310, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015.

[38]A. Gervais, G. O. Karame, V. Capkun, and S. Capkun, “Is bitcoin a decentralized currency?” IEEE Security Privacy, vol. 12, pp. 54–60, May 2014.

[39]A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in 2016 IEEE Symposium on Security and Privacy (SP’16), pp. 839–858, May 2016.

[40]L. Luu, V. Narayanan, C. Zheng, K. Baweja, S. Gilbert, and P. Saxena, “A secure sharding protocol for open blockchains,” in Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS’16), pp. 17–30, New York, NY, USA, 2016.

[41]W. T. Tsai, R. Blower, Y. Zhu, and L. Yu, “A system view of financial blockchains,” in IEEE Symposium on Service-Oriented System Engineering (SOSE’16), pp. 450–457, Mar. 2016.

[42]H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, “Blockchain contract: Securing a blockchain applied to smart contracts,” in IEEE International Conference on Consumer Electronics (ICCE’16), pp. 467–468, Jan. 2016.