首站-论文投稿智能助手
典型文献
Generous or Selfish?Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks
文献摘要:
Scalability has long been a major challenge of cryptocurrency systems,which is mainly caused by the delay in reaching consensus when processing transactions on-chain.As an effective mitigation approach,the payment channel networks(PCNs)enable private channels among blockchain nodes to process transactions off-chain,relieving long-time waiting for the online transaction confirmation.The state-of-the-art studies of PCN focus on improving the efficiency and availability via optimizing routing,scheduling,and initial deposits,as well as preventing the system from security and privacy attacks.However,the behavioral decision dynamics of blockchain nodes under potential malicious attacks is largely neglected.To fill this gap,we employ the game theory to study the characteristics of channel interactions from both the micro and macro perspectives under the situation of channel depletion attacks.Our study is progressive,as we conduct the game-theoretic analysis of node behavioral characteristics from individuals to the whole population of PCN.Our analysis is complementary,since we utilize not only the classic game theory with the complete rationality assumption,but also the evolutionary game theory considering the limited rationality of players to portray the evolution of PCN.The results of numerous simulation experiments verify the effectiveness of our analysis.
文献关键词:
作者姓名:
Yi Qin;Qin Hu;Dong-Xiao Yu;Xiu-Zhen Cheng
作者机构:
School of Computer Science and Technology,Shandong University,Qingdao 266237,China;Department of Computer and Information Science,Indiana University-Purdue University Indianapolis Indianapolis 46202,U.S.A.
引用格式:
[1]Yi Qin;Qin Hu;Dong-Xiao Yu;Xiu-Zhen Cheng-.Generous or Selfish?Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks)[J].计算机科学技术学报(英文版),2022(04):888-905
A类:
Generous,Selfish,Weighing,Scalability,cryptocurrency
B类:
Transaction,Forwarding,Against,Malicious,Attacks,Payment,Channel,Networks,has,long,been,major,challenge,systems,which,mainly,caused,by,delay,reaching,consensus,when,processing,transactions,mitigation,approach,payment,networks,PCNs,enable,private,channels,among,blockchain,nodes,off,relieving,waiting,online,confirmation,state,art,studies,focus,improving,efficiency,availability,via,optimizing,routing,scheduling,initial,deposits,well,preventing,from,security,privacy,attacks,However,behavioral,decision,dynamics,under,potential,malicious,largely,neglected,To,fill,this,gap,employ,game,theory,study,characteristics,interactions,both,micro,macro,perspectives,situation,depletion,Our,progressive,conduct,theoretic,analysis,individuals,whole,population,complementary,since,utilize,not,only,classic,complete,rationality,assumption,but,also,evolutionary,considering,limited,players,portray,results,numerous,simulation,experiments,verify,effectiveness,our
AB值:
0.615016
相似文献
Energy Theft Detection in Smart Grids:Taxonomy,Comparative Analysis,Challenges,and Future Research Directions
Mohsin Ahmed;Abid Khan;Mansoor Ahmed;Mouzna Tahir;Gwanggil Jeon;Giancarlo Fortino;Francesco Piccialli-Department of Computer Science,COMSATS University Islamabad,Islamabad 44000,Pakistan;Department of Computer Science,School of Computing,Engineering and Digital Technologies,Teesside University,Tees Valley TS1 3BX,United Kingdom;Innovative Value Institute,Maynooth University,Maynooth W23 F2K8,Ireland;Department of Computer Science,Bahria University,Lahore 54782,Pakistan;School of Electronic Engineering,Xidian University,Xi'an 710071,China;Department of Embedded Systems Engineering,Incheon National University,Incheon 22012,Korea;Department of Informatics,Modeling,Electronics and Systems,University of Calabria,Rende,CS 87036,Italy;Department of Mathematics and Applications"R.Caccioppoli",University of Naples Federico Ⅱ,Napoli 80138,Italy
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。