Abstract
Bitcoin is the most popular cryptocurrency and it uses proof of work protocol for consensus of all transactions in a block. The blocks are to be appended to the digital ledger, the blockchain. The miners compete for the mining of blocks in the main canonical blockchain. A miner can participate in block mining either individually with his computational power or join a mining pool. Here, the classification of crypto address, whether it belongs to a mining pool or an individual miner, is done with a deep learning Keras framework. The classification accuracy of 99.47% is obtained with 100,000 addresses which is higher than the machine learning random forest classification obtained by Kaggle with 22,000 addresses. The miners in mining pools deploy selfish mining or honest mining to mine a block and get the reward accordingly. In block mining, both honest and selfish miners expose the blocks produced by them. The default protocol of the main canonical blockchain leads to the selection of the longest branch of blocks of the selfish miner, discarding the honest miner’s block. To alleviate this, we deploy a reinforcement learning algorithm to choose the block with high upper confidence bound value. This selection explores the branch exposed by honest miners. The algorithm is deployed after the first difficulty adjustment algorithm, where there is more selfish mining activity. Our promising results show that the main blockchain exhibits less regret by selecting the honest miner’s branch.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Albrecher H, Goffard PO (2020) On the profitability of selfish blockchain mining under consideration of ruin. Working paper or preprint. https://hal.archives-ouvertes.fr/hal-02649025
Bai Q, Zhou X, Wang X, Xu Y, Wang X, Kong Q (2019) ICC-2019 IEEE international conference on communications (ICC), pp 1–6. https://doi.org/10.1109/ICC.2019.8761240
Boverman A (2011) Timejacking & bitcoin. http://culubas.blogspot.com/2011/05/timejacking-bitcoin_802.html. Accessed 24 May 2021
Brunjes L, Kiayias A, Koutsoupias E, Stouka AP (2020) 2020 IEEE European symposium on security and privacy (EuroS P), pp 256–275. https://doi.org/10.1109/EuroSP48549.2020.00024
Chang X, Mišić J, Misic V, Yang R (2020) Assessing blockchain selfish mining in an imperfect network: honest and selfish miner views. Comput Secur. https://doi.org/10.1016/j.cose.2020.101956
Chicarino V, Albuquerque C, Jesus E, Rocha A (2020) On the detection of selfish mining and stalker attacks in blockchain networks. Ann Telecommun. https://doi.org/10.1007/s12243-019-00746-2
Cointelegraph (2021) How to mine bitcoin: everything you need to know. https://cointelegraph.com/bitcoin-for-beginners/how-to-mine-bitcoin-everything-you-need-to-know. Accessed 24 May 2021
Davidson M, Diamond T (2020) On the profitability of selfish mining against multiple difficulty adjustment algorithms. https://www.nist.gov/publications/profitability-selfish-mining-against-multiple-difficulty-adjustment-algorithms. Accessed 24 May 2021
Day A (2020) Mining pool. https://gist.github.com/allenday/16cf63fb6b3ed59b78903b2d414fe75b. Accessed 24 May 2021
Day A, Medvedev E, Nirmal A, Price W (2019) Introducing six new cryptocurrencies in bigquery public datasets—and how to analyze them. https://cloud.google.com/blog/products/data-analytics/introducing-six-new-cryptocurrencies-in-bigquery-public-datasets-and-how-to-analyze-them. Accessed 24 May 2021
Eyal I (2015) Proceedings of the 2015 IEEE symposium on security and privacy (IEEE Computer Society, USA, 2015), SP ’15, pp 89–103. https://doi.org/10.1109/SP.2015.13
Eyal I, Sirer E (2013) vol 8437. https://doi.org/10.1007/978-3-662-45472-528
Grunspan C, Pérez-Marco R (2018) On profitability of selfish mining. arXiv:1805.08281 [CoRR abs]
Jeyasheelarakkini (2021) Classification of pool of miners with deep learning. https://github.com/jeyasheelarakkini344/Classificationofpoolofminerswithdeeplearning. Accessed 24 May 2021
Kędziora M, Kozłowski P, Szczepanik M, Jóźwiak P (2020) Borzemski L, Świątek J, Wilimowska Z (eds) Information systems architecture and technology: proceedings of 40th anniversary international conference on information systems architecture and technology—ISAT 2019. Springer International Publishing, Cham, pp 231–240
Liu X, Wang W, Niyato D, Zhao N, Wang P (2018) Evolutionary Game for Mining Pool Selection in Blockchain Networks. IEEE Wirel Commun Lett 7(5):760. https://doi.org/10.1109/LWC.2018.2820009
Liu Z, Luong NC, Wang W, Niyato D, Wang P, Liang Y, Kim DI (2019) A survey on applications of game theory in blockchain. arXiv:1902.10865 [CoRR]
Liu Z, Yang G, Yu X, Li F (2020) A security detection model for selfish mining attack, pp 185–195. https://doi.org/10.1007/978-981-15-2777-716
Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed 24 May 2021
Nayak K, Kumar S, Miller A, Shi E (2016) 2016 IEEE European symposium on security and privacy (EuroS&P). IEEE, pp 305–320
Negy KA, Rizun PR, Sirer EG (2020) Bonneau J, Heninger N (eds) Cryptography financial, security data. Springer International Publishing, Cham, pp 61–78
Nicolas K, Wang Y, Giakos G (2019) pp 1–6. https://doi.org/10.1109/Sarnoff47838.2019.9067821
Price W (2019) Bitcoin mining pool classifier. https://www.kaggle.com/wprice/bitcoin-mining-pool-classifier. Accessed 24 May 2021
Qin R, Yuan Y, Wang F (2018) Research on the selection strategies of blockchain mining pools. IEEE Trans Comput Soc Syst 5(3):748. https://doi.org/10.1109/TCSS.2018.2861423
Romiti M, Judmayer A, Zamyatin A, Haslhofer B (2019) A deep dive into bitcoin mining pools: an empirical analysis of mining shares. arXiv:1905.05999 [CoRR abs]
Saad M, Njilla L, Kamhoua CA, Mohaisen A (2018) Countering selfish mining in blockchains. arXiv:1811.09943 [CoRR abs]
Sapirshtein A, Sompolinsky Y, Zohar A (2015) Optimal selfish mining strategies in bitcoin. arXiv:1507.06183 [CoRR abs]
Vimal S, Subbulakshmi P (2016) Secure data packet transmission in MANET using enhanced identity-based cryptography. Int J New Technol Sci Eng 3(12):35
Xu C, Zhu K, Wang R, Xu Y (2020) ICC—2020 IEEE international conference on communications (ICC), pp 1–6. https://doi.org/10.1109/ICC40277.2020.9149279
Yang G, Wang Y, Wang Z, Tian Y, Yu X, Li S (2020) IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers. Int J Intell Syst 35(11):1735. https://doi.org/10.1002/int.22270
Zhang R, Preneel B, Handschuh H (2017) vol 10159. Springer-Verlag, pp 277–292. https://doi.org/10.1007/978-3-319-52153-4
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rakkini, M.J.J., Geetha, K. Deep learning classification of bitcoin miners and exploration of upper confidence bound algorithm with less regret for the selection of honest mining. J Ambient Intell Human Comput 14, 6545–6561 (2023). https://doi.org/10.1007/s12652-021-03527-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03527-9