TY - JOUR
T1 - Coin hopping attack in blockchain-based IoT
AU - Zhu, Saide
AU - Li, Wei
AU - Li, Hong
AU - Tian, Ling
AU - Luo, Guangchun
AU - Cai, Zhipeng
N1 - Funding Information:
Manuscript received May 30, 2018; revised August 30, 2018; accepted September 17, 2018. Date of publication September 27, 2018; date of current version June 19, 2019. This work was supported in part by the NSF under Grant 1704287, Grant 1252292, Grant 1741277, and Grant 1829674, in part by the National Natural Science Foundation of China under Grant 61702503, in part by the Science and Technology Innovation Seed Project of Sichuan Province under Grant 2017RZ0008, in part by the International Cooperation and Exchange Project of Sichuan Province under Grant 2017HH0075, in part by the Chinese Scholarship Council under Grant 20173109, and in part by the International Cooperation Project of Institute of Information Engineering, CAS under Grant Y7Z0461104. (Corresponding authors: Wei Li; Hong Li.) S. Zhu, W. Li, and Z. Cai are with the Department of Computer Science, Georgia State University, Atlanta, GA 30302 USA (e-mail: szhu5@student.gsu.edu; wli28@gsu.edu; zcai@gsu.edu).
Funding Information:
Dr. Cai was a recipient of the NSF CAREER Award.
Publisher Copyright:
© 2014 IEEE.
PY - 2019/6
Y1 - 2019/6
N2 - With dramatic developments of blockchain technology, a number of blockchain-based applications emerge rapidly, among which the incorporation of blockchain into Internet of Things is one of the most valued research direction. Such powerful incorporation is a double-sided sword, i.e., it can benefit both individuals and society but has the vulnerability to coin hopping attack that is a new type of pool mining attack and hard to happen in traditional blockchain networks. In this paper, we theoretically prove the feasibility of coin hopping attack, deeply analyze the conditions of attack implementation, and comprehensively investigate the impacts of coin hopping attack. Moreover, some defense strategies are addressed. To our best knowledge, this paper is the first work targeting coin hopping attack.
AB - With dramatic developments of blockchain technology, a number of blockchain-based applications emerge rapidly, among which the incorporation of blockchain into Internet of Things is one of the most valued research direction. Such powerful incorporation is a double-sided sword, i.e., it can benefit both individuals and society but has the vulnerability to coin hopping attack that is a new type of pool mining attack and hard to happen in traditional blockchain networks. In this paper, we theoretically prove the feasibility of coin hopping attack, deeply analyze the conditions of attack implementation, and comprehensively investigate the impacts of coin hopping attack. Moreover, some defense strategies are addressed. To our best knowledge, this paper is the first work targeting coin hopping attack.
UR - http://www.scopus.com/inward/record.url?scp=85054218429&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85054218429&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2018.2872458
DO - 10.1109/JIOT.2018.2872458
M3 - Article
AN - SCOPUS:85054218429
VL - 6
SP - 4614
EP - 4626
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
SN - 2327-4662
IS - 3
M1 - 8473692
ER -