Efficient and Secure Data Storage for Future Networks: Review and Future Opportunities

AS Alsalim, MA Javed - IEEE Access, 2024 - ieeexplore.ieee.org
With the increase in the number of Internet of Things (IoT) applications, the reliance on
robust networking, reliable communications, and efficient and secure data storage is …

How to rationally select your delegatee in pos

Y Zhang, Q Wang, S Chen, C Wang - arXiv preprint arXiv:2310.08895, 2023 - arxiv.org
This paper centers around a simple yet crucial question for everyday users: How should one
choose their delegated validators within proof-of-stake (PoS) protocols, particularly in the …

Performance evaluation, optimization and dynamic decision in blockchain systems: a recent overview

QL Li, YX Chang, Q Wang - arXiv preprint arXiv:2211.15907, 2022 - arxiv.org
With rapid development of blockchain technology as well as integration of various
application areas, performance evaluation, performance optimization, and dynamic decision …

A Detection Method Against Selfish Mining-Like Attacks Based On Ensemble Deep Learning in IoT

Y Wang, C Li, Y Zhang, T Li, J Ning… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Cryptojacking is a new type of Internet of Things (IoT) attack, where an attacker hijacks the
computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or …

Fairness matters: A tit-for-tat strategy against selfish mining

W Sun, Z Xu, L Chen - Proceedings of the VLDB Endowment, 2022 - dl.acm.org
The proof-of-work (PoW) based blockchains are more secure nowadays since profit-oriented
miners contribute more computing powers in exchange for fair revenues. This virtuous circle …

Maximizing NFT Incentives: References Make You Rich

G Yu, Q Wang, C Sun, LD Nguyen… - arXiv preprint arXiv …, 2024 - arxiv.org
In this paper, we study how to optimize existing Non-Fungible Token (NFT) incentives. Upon
exploring a large number of NFT-related standards and real-world projects, we come across …

A quantitative analysis of the security of PoW-based blockchains

M Alharby, A Alssaiari, S Alateef, N Thomas… - Cluster Computing, 2024 - Springer
This study analyzes the security implications of Proof-of-Work blockchains with respect to the
stale block rate and the lack of a block verification process. The stale block rate is a crucial …

SIM: Achieving High Profit through Integration of Selfish Strategy into Innocent Mining

J Shang, T Lu, P Zhao - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
Selfish mining, one of the most renowned attack in Bitcoin, involves a selfish miner
withholding discovered blocks and broadcasting them at an opportune moment to gain …

An Accurate Analytical Model for A Proof-of-Work Blockchain with Multiple Selfish Miners

SW Wang, SS Tzeng - ICC 2024-IEEE International …, 2024 - ieeexplore.ieee.org
In a Proof-of-Work blockchain with multiple selfish miners, can we accurately and efficiently
calculate the reward earned by each miner? The problem is fundamental but difficult to be …

A Game Theory Based Rational Mining Strategy in Blockchains With Multiple Rational Miners

SW Wang - 2024 International Conference on Computing …, 2024 - ieeexplore.ieee.org
Previous researches have shown that a miner using selfish mining strategy is not
necessarily profitable if the selfish mining rate is not large enough. In such situation, a miner …