TY - GEN
T1 - A hybrid POW-POS implementation against 51% attack in cryptocurrency system
AU - Gupta, Kishor Datta
AU - Rahman, Abdur
AU - Poudyal, Subash
AU - Huda, Mohammad Nurul
AU - Mahmud, M. A. Parvez
PY - 2019
Y1 - 2019
N2 - The success and popularity of Bitcoin mainly focuses the underlying blockchain technology which is totally immutable distributed ledger, highly secured by its P2P network consensus named Proof of Work (PoW). One of the worst threats to a Proof-of-Work based cryptocurrency is 51% attack. If one or more dishonest network peer gains more than 50% of resource such as processing power, then they will become the majority decision maker in the network. It is already proved that mixing of two or more existing protocol that is called hybrid protocol can make the network enough resistive to this attack. The recent implementations of hybrid protocols have other limitations and problems that they are facing and striving to resolve. But their main weakness is in distribution of block mining reward to the investors. From the perspective of an investor, an investor invests his hard-earned money in a cryptocurrency for making proper profit from his investment. The main source of this profit is the block reward which is generated and given to the miner on successful mining of a block. So, to ensure this profit is given to proper user on proper time interval, the consistency of block generation time interval is a vital factor. The voting system, ticket system etc. are not time controlled and over all block reward generation interval will not show a uniform distribution of profit. Another big issue is diversifying the peers by creating special committee and groups of validators the concept of P2P network is violated. In this paper we will describe a step by step process to implement a Hybrid PoW-PoS based consensus protocol. In our proposed system, the PoW mining process is only used to regulate the block generation time. The actual block generation is done by the same user with PoS consensus mechanism. There is no voting or validating committee. The entire network will validate each block. This is the major difference with other discussed system. The system will not only be able to tackle the 51% attack, it provides a uniform distribution of mining reward to the stake holders and investors by maintaining a precise block generation interval with difficulty adjustment in PoW mining and probability calculation for stake holders according to their matured staking balance. We will not only show how to make the system non-vulnerable to this attack but also describe in detail about how to validate the transactions and blocks in different stage of creating the block chain.
AB - The success and popularity of Bitcoin mainly focuses the underlying blockchain technology which is totally immutable distributed ledger, highly secured by its P2P network consensus named Proof of Work (PoW). One of the worst threats to a Proof-of-Work based cryptocurrency is 51% attack. If one or more dishonest network peer gains more than 50% of resource such as processing power, then they will become the majority decision maker in the network. It is already proved that mixing of two or more existing protocol that is called hybrid protocol can make the network enough resistive to this attack. The recent implementations of hybrid protocols have other limitations and problems that they are facing and striving to resolve. But their main weakness is in distribution of block mining reward to the investors. From the perspective of an investor, an investor invests his hard-earned money in a cryptocurrency for making proper profit from his investment. The main source of this profit is the block reward which is generated and given to the miner on successful mining of a block. So, to ensure this profit is given to proper user on proper time interval, the consistency of block generation time interval is a vital factor. The voting system, ticket system etc. are not time controlled and over all block reward generation interval will not show a uniform distribution of profit. Another big issue is diversifying the peers by creating special committee and groups of validators the concept of P2P network is violated. In this paper we will describe a step by step process to implement a Hybrid PoW-PoS based consensus protocol. In our proposed system, the PoW mining process is only used to regulate the block generation time. The actual block generation is done by the same user with PoS consensus mechanism. There is no voting or validating committee. The entire network will validate each block. This is the major difference with other discussed system. The system will not only be able to tackle the 51% attack, it provides a uniform distribution of mining reward to the stake holders and investors by maintaining a precise block generation interval with difficulty adjustment in PoW mining and probability calculation for stake holders according to their matured staking balance. We will not only show how to make the system non-vulnerable to this attack but also describe in detail about how to validate the transactions and blocks in different stage of creating the block chain.
UR - http://www.scopus.com/inward/record.url?scp=85079074270&partnerID=8YFLogxK
U2 - 10.1109/CloudCom.2019.00068
DO - 10.1109/CloudCom.2019.00068
M3 - Conference proceeding contribution
AN - SCOPUS:85079074270
SN - 9781728150123
SP - 396
EP - 403
BT - Proceedings
A2 - Chen, Jinjun
A2 - Yang, Laurence T.
PB - Institute of Electrical and Electronics Engineers (IEEE)
CY - Piscataway, NJ
T2 - 11th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2019, 19th IEEE International Conference on Computer and Information Technology, CIT 2019, 2019 International Workshop on Resource Brokering with Blockchain, RBchain 2019 and 2019 Asia-Pacific Services Computing Conference, APSCC 2019
Y2 - 11 December 2019 through 13 December 2019
ER -