首页|区块链矿池网络及典型攻击方式综述

区块链矿池网络及典型攻击方式综述

扫码查看
区块链网络是构建在TCP/IP体系之上的一类覆盖网络,在不依赖可信中心服务节点和可信信道的前提下,为分布式环境中互不信任的节点之间就账本数据达成一致性提供通信保障。随着区块链挖矿技术的发展,尤其是基于ASIC、GPU等硬件的工作量证明共识挖矿技术在比特币(BTC)、以太坊(ETH)、莱特币等主流加密货币中的应用,支撑矿池挖矿方式的矿池网络引起了研究者的广泛关注,因此归纳并总结区块链矿池网络及其安全方面的研究成果对于追踪区块链技术研究进展和拓展区块链应用范围具有重要价值。首先,结合传统对等(P2P)网络组网模式,针对BTC、ETH和超级账本等典型应用场景,梳理区块链P2P网络运行机制和特点。然后,介绍矿池、矿场以及矿池网络概念,分析矿池网络的组成要素以及GetWork、GetBlockTemplate和Stratum典型矿池网络协议的工作原理。接着,重点讨论针对矿池网络的自私挖矿、跳池、扣块、空块等典型攻击方式的实现过程,并提出相应的防范方法。最后,对矿池网络的未来发展方向进行展望。
Overview of Blockchain Mining Pool Networks and Typical Attack Modes
The blockchain network is a type of overlay network constructed on a Transmission Control Protocol/Internet Protocol(TCP/IP)system.It provides communication support to ensure the consistency of ledger data between mutual distrust nodes in a distributed environment without relying on trusted central-service nodes and trusted channels.Owing to the development of blockchain mining technology,particularly the application of Proof of Work(PoW)consensus mining technology based on Application-Specific Integrated Circuit(ASIC),Graphics Processing Unit(GPU),and other hardware used in mainstream cryptocurrencies such as Bitcoin(BTC),Ethereum(ETH),and Litecoin(LTC),researchers have extensively investigated the mining pool network,which supports the mining pool mode.However,results pertaining to the mining pool network and its security are scarce.Therefore,the abovementioned results must be summarized and synthesized to monitor the progress of blockchain technology research and expand blockchain application research.First,based on the networking mode of the classical Peer-to-Peer(P2P)network,this study reviews the operating mechanism and characteristics of the blockchain P2P network based on typical application scenarios such as BTC,ETH,and Hyperledger.Second,this study introduces the concept of mining pool,mining field,and mining pool network,as well as analyzes the components of the mining pool network and the operating principle of typical mining pool network protocols such as GetWork,GetBlockTemplate,and Stratum.Subsequently,the implementation process of typical attack modes such as selfish mining,pool hopping,block withholding,and empty block attacks against the mining pool network is discussed,and the corresponding prevention methods are proposed.Finally,future developments for the mining pool network are recommended.

blockchainPeer-to-Peer(P2P)networkmining pool networkconsensus mechanismnetwork attack

倪雪莉、马卓、王群

展开 >

江苏警官学院计算机信息与网络安全系,江苏 南京 210031

江苏省电子数据取证分析工程研究中心,江苏 南京 210031

南京信息工程大学计算机学院、网络空间安全学院,江苏 南京 210044

区块链 对等网络 矿池网络 共识机制 网络攻击

国家自然科学基金江苏省市场监督管理局科技计划项目

62272203KJ21125027

2024

计算机工程
华东计算技术研究所 上海市计算机学会

计算机工程

CSTPCD北大核心
影响因子:0.581
ISSN:1000-3428
年,卷(期):2024.50(1)
  • 10