作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2024, Vol. 50 ›› Issue (1): 17-29. doi: 10.19678/j.issn.1000-3428.0068203

• 热点与综述 • 上一篇    下一篇

区块链矿池网络及典型攻击方式综述

倪雪莉1,2,3,*(), 马卓1,2, 王群1,2   

  1. 1. 江苏警官学院计算机信息与网络安全系, 江苏 南京 210031
    2. 江苏省电子数据取证分析工程研究中心, 江苏 南京 210031
    3. 南京信息工程大学计算机学院、网络空间安全学院, 江苏 南京 210044
  • 收稿日期:2023-08-10 出版日期:2024-01-15 发布日期:2023-11-14
  • 通讯作者: 倪雪莉
  • 基金资助:
    国家自然科学基金(62272203); 江苏省市场监督管理局科技计划项目(KJ21125027)

Overview of Blockchain Mining Pool Networks and Typical Attack Modes

Xueli NI1,2,3,*(), Zhuo MA1,2, Qun WANG1,2   

  1. 1. Department of Computer Information and Cybersecurity, Jiangsu Police Institute, Nanjing 210031, Jiangsu, China
    2. Jiangsu Electronic Data Forensics and Analysis Engineering Research Center, Nanjing 210031, Jiangsu, China
    3. School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, Jiangsu, China
  • Received:2023-08-10 Online:2024-01-15 Published:2023-11-14
  • Contact: Xueli NI

摘要:

区块链网络是构建在TCP/IP体系之上的一类覆盖网络,在不依赖可信中心服务节点和可信信道的前提下,为分布式环境中互不信任的节点之间就账本数据达成一致性提供通信保障。随着区块链挖矿技术的发展,尤其是基于ASIC、GPU等硬件的工作量证明共识挖矿技术在比特币(BTC)、以太坊(ETH)、莱特币等主流加密货币中的应用,支撑矿池挖矿方式的矿池网络引起了研究者的广泛关注,因此归纳并总结区块链矿池网络及其安全方面的研究成果对于追踪区块链技术研究进展和拓展区块链应用范围具有重要价值。首先,结合传统对等(P2P)网络组网模式,针对BTC、ETH和超级账本等典型应用场景,梳理区块链P2P网络运行机制和特点。然后,介绍矿池、矿场以及矿池网络概念,分析矿池网络的组成要素以及GetWork、GetBlockTemplate和Stratum典型矿池网络协议的工作原理。接着,重点讨论针对矿池网络的自私挖矿、跳池、扣块、空块等典型攻击方式的实现过程,并提出相应的防范方法。最后,对矿池网络的未来发展方向进行展望。

关键词: 区块链, 对等网络, 矿池网络, 共识机制, 网络攻击

Abstract:

The blockchain network is a type of overlay network constructed on a Transmission Control Protocol/Internet Protocol(TCP/IP) system. It provides communication support to ensure the consistency of ledger data between mutual distrust nodes in a distributed environment without relying on trusted central-service nodes and trusted channels. Owing to the development of blockchain mining technology, particularly the application of Proof of Work(PoW) consensus mining technology based on Application-Specific Integrated Circuit(ASIC), Graphics Processing Unit(GPU), and other hardware used in mainstream cryptocurrencies such as Bitcoin(BTC), Ethereum(ETH), and Litecoin(LTC), researchers have extensively investigated the mining pool network, which supports the mining pool mode.However, results pertaining to the mining pool network and its security are scarce. Therefore, the abovementioned results must be summarized and synthesized to monitor the progress of blockchain technology research and expand blockchain application research. First, based on the networking mode of the classical Peer-to-Peer(P2P) network, this study reviews the operating mechanism and characteristics of the blockchain P2P network based on typical application scenarios such as BTC, ETH, and Hyperledger. Second, this study introduces the concept of mining pool, mining field, and mining pool network, as well as analyzes the components of the mining pool network and the operating principle of typical mining pool network protocols such as GetWork, GetBlockTemplate, and Stratum.Subsequently, the implementation process of typical attack modes such as selfish mining, pool hopping, block withholding, and empty block attacks against the mining pool network is discussed, and the corresponding prevention methods are proposed. Finally, future developments for the mining pool network are recommended.

Key words: blockchain, Peer-to-Peer(P2P) network, mining pool network, consensus mechanism, network attack