Various Selfish Mining Strategies & A New Proposed Defense Mechanism
This repository contains various strategies for the selfish mining attack in proof-of-work based consensus algorithms including:
- The strategy we refer to as SelfishMining1 was originally published in 2013 by Eyal and Sierer under the name Majority is not Enough.
- The next strategy we implemented is called Optimal Selfish Mining. It was originally published in 2013 by Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar.
Additionally, it presents our newly proposed defense mechanism against this attack, named "Nik Defense." Compared to previous defense mechanisms, Nik Defense utilizes a novel reinforcement-based mechanism to strengthen the consensus mechanism and prevent such attacks. It is worth mentioning that this is the first defense mechanism in literature to use an AI algorithm against the selfish mining attack. The repository offers a complete implementation of Nik Defense, and the draft paper can be found on arXiv:
https://arxiv.org/abs/2301.11463
If you find Nik defense to be useful in your research, we kindly request that you cite it as a reference in the following form:
@article{Nikhalat2023Nik,
title={Nik Defense: An Artificial Intelligence Based Defense Mechanism against Selfish Mining in Bitcoin},
author={Nikhalat-Jahromi, Ali and Saghiri, Ali Mohammad and Meybodi, Mohammad Reza},
journal={arXiv e-prints},
pages={arXiv--2301},
year={2023}
}
We always welcome new brilliant ideas and appreciate your contributions.