TY - GEN
T1 - Evaluation of Decision Matrix, Hash Rate and Attacker Regions Effects in Bitcoin Network Securities
AU - Winarno, Agus
AU - Angraini, Novita
AU - Hardani, Muhammad Salmon
AU - Harwahyu, Ruki
AU - Sari, Riri Fitri
N1 - Funding Information:
ACKNOWLEDGMENT This work is supported by Universitas Indonesia under PUTI Q2 Grant with contract number NKB-710/UN2.RST/HKP.05.00/2022.
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Bitcoin is a famously decentralized cryptocurrency. Bitcoin is excellent because it is a digital currency that provides convenience and security in transactions. Transaction security in Bitcoin uses a consensus involving a distributed system, the security of this system generates a hash sequence with a Proof of Work (PoW) mechanism. However, in its implementation, various attacks appear that are used to generate profits from the existing system. Attackers can use various types of methods to get an unfair portion of the mining income. Such attacks are commonly referred to as Mining attacks. Among which the famous is the Selfish Mining attack. In this study, we simulate the effect of changing decision matrix, attacker region, attacker hash rate on selfish miner attacks by using the opensource NS3 platform. The experiment aims to see the effect of using 1%, 10%, and 20% decision matrices with different attacker regions and different attacker hash rates on Bitcoin selfish mining income. The result of this study shows that regional North America and Europe have the advantage in doing selfish mining attacks. This advantage is also supported by increasing the decision matrix from 1%, 10%, 20%. The highest attacker income, when using decision matrix 20% in North America using 16 nodes on 0.3 hash rate with income 129 BTC. For the hash rate, the best result for a selfish mining attack is between 27% to 30% hash rate.
AB - Bitcoin is a famously decentralized cryptocurrency. Bitcoin is excellent because it is a digital currency that provides convenience and security in transactions. Transaction security in Bitcoin uses a consensus involving a distributed system, the security of this system generates a hash sequence with a Proof of Work (PoW) mechanism. However, in its implementation, various attacks appear that are used to generate profits from the existing system. Attackers can use various types of methods to get an unfair portion of the mining income. Such attacks are commonly referred to as Mining attacks. Among which the famous is the Selfish Mining attack. In this study, we simulate the effect of changing decision matrix, attacker region, attacker hash rate on selfish miner attacks by using the opensource NS3 platform. The experiment aims to see the effect of using 1%, 10%, and 20% decision matrices with different attacker regions and different attacker hash rates on Bitcoin selfish mining income. The result of this study shows that regional North America and Europe have the advantage in doing selfish mining attacks. This advantage is also supported by increasing the decision matrix from 1%, 10%, 20%. The highest attacker income, when using decision matrix 20% in North America using 16 nodes on 0.3 hash rate with income 129 BTC. For the hash rate, the best result for a selfish mining attack is between 27% to 30% hash rate.
KW - attacker region
KW - bitcoin
KW - decision matrix
KW - hash rate
KW - selfish mining
UR - http://www.scopus.com/inward/record.url?scp=85138421085&partnerID=8YFLogxK
U2 - 10.1109/CyberneticsCom55287.2022.9865472
DO - 10.1109/CyberneticsCom55287.2022.9865472
M3 - Conference contribution
AN - SCOPUS:85138421085
T3 - Proceedings - 2022 IEEE International Conference on Cybernetics and Computational Intelligence, CyberneticsCom 2022
SP - 72
EP - 77
BT - Proceedings - 2022 IEEE International Conference on Cybernetics and Computational Intelligence, CyberneticsCom 2022
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th IEEE International Conference on Cybernetics and Computational Intelligence, CyberneticsCom 2022
Y2 - 16 June 2022 through 18 June 2022
ER -