SlideShare a Scribd company logo
A Hybrid POW-POS Implementation Against 51%
Attack in Cryptocurrency System
51% attack
If someone gains a large amount (more than 50%) of computation capability of entire network,
he can do several malicious activities in the network to manipulate the block chain for his benefit.
This kind of malicious activities are called a 51% attack.
•Fraud other users
Fake transactions
Double spending
Ruin exchanges
Liquify to fiat currency
Convert to other
cryptocurrency
51% Attack Explained
Block 30 Block 31
Block 31 Block 32 Block 33
Block 32
Block 34
Block 35
Affects small and newly created networks
Investors and New Cryptocurrency Peer to Peer (P2P) Network
Present Solutions – Hybrid consensus protocol
P(PoW-PoS) = P(PoW) AND P(PoS)
= 51% X 51%
= (51/100) X (51/100)
= 26.01 %
P(PoW-PoS) = P(PoW) AND P(PoS)
= 71% X 71%
= (71/100) X (71/100)
= 50.41%
+
Present Solutions implemented by different cryptocurrencies
Dependent on another network. If other network falls then it’ll also fall.
Valid transactions could be reverted with the malicious transactions.
Transaction confirmation suffers from unwanted delays.
Peer to Peer protocol violation. No democracy and decentralization.
Miner and validator are different nodes for the same block.
Block Generation Time interval and profit distribution inconsistency.
These solutions cannot attract investors & ultimately are not suitable for new crypto
Komodo
Takes Snapshots
of their data
Stores them in
Bitcoin
Blockchain
Horizen
Delayed block
submission penalty
system
Watcher nodes for
watching malicious
activity
Decred
Voting system
Ticket distribution
At least 3/5 tickets
required
Ethereum
Casper FFG
Voting system
Deposit to be elected for
voting
2/3 votes required
Proposed Solution
PoW and PoS processing full cycle executes in the same thread sequentially in same node.
Difficulty target is adjusted in both cycle to maintain the block interval consistently
Defined strict spaced valid timestamp mechanism to slow down the faster nodes in the network
Block generation and Profit distribution is very accurate. Democratic and decentralized
No special validator. All nodes are equal, so P2P protocol is perfectly maintained
All the stake holders get rationally equal profit that is directly proportional to their staked asset
Nodes doing malicious activities are banned for certain period of time from the network
Flow Chart
Result
Blockchain height Block timestamp Average block time
10000 04-05-2019 12:44:32 164.72 sec
12437 09-05-2019 05:40:32 165.13 sec
15000 14-05-2019 01:18:24 164.67 sec
20000 23-05-2019 14:30:56 164.76 sec
25000 02-06-2019 03:20:00 164.75 sec
27660 07-06-2019 05:52:32 164.86 sec
30000 11-06-2019 18:12:32 165.00 sec
35700 22-06-2019 16:03:44 165.06 sec
40000 30-06-2019 21:04:32 165.05 sec
Expected block mining time: 150 + 16 = 166 sec. The first block’s mining timestamp was 15-04-2019 11:10:14.
Average block time = {(Block timestamp – first block timestamp) in seconds } / Block height
Results continued
Machine Configuration Staking Balance Reward Time Interval
3.5 GHz 4 CPU 8 GB RAM 10 Million coins 130 Minutes
3.5 GHz 8 CPU 16 GB RAM 10 Million coins 130 Minutes
3.1 GHz 8 CPU 32 GB RAM 10 Million coins 130 Minutes
2.8 GHz 8 CPU 16 GB RAM 10 Million coins 130 Minutes
2.8 GHz 2 CPU 3 GB RAM 10 Million coins 130 Minutes
2.8 GHz 1 CPU 3 GB RAM 10 Million coins 130 Minutes
Comparison
Supports
P2P
protocol
Consistent
block time
Investment
wise
proportional
profit
distribution
Autonomous
network –
Not need
any special
authority
Democratic
majority
peers are
decision
makers
Penalize
corrupted
or
malicious
user
Casper No No No No No Yes
Decred No No No No No No
PoW-PoS-PoA No No No No No No
Komodo’s dPoW Yes Yes No Yes Yes No
ZEN coin’s penalty No Yes No No Yes Yes
Proposed system Yes Yes Yes Yes Yes Yes
Limitations
The PoW mining loop cause processing and computing resource watage
Do not incentivize the miners according to their processing capabilities
It discourages mining pools and volunteer miners to mine in this network
Only who have some investment in this network can earn profit
References
[1] S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008. http://bitcoin.org/bitcoin.pdf.
[2] Marianna Belotti, Nikola Bozic, Guy Pujolle, Stefano Secci. A Vademecum on Blockchain Technologies:
When, Which and How. 2019. <hal-01870617>
[3] Yli-Huumo J, Ko D, Choi S, Park S, Smolander K. Where Is Current Research on Blockchain Technology?
— A Systematic Review. 2016.
[4] I. Eyal and E. Gun Sirer. Majority is not Enough: Bitcoin Mining is Vulnerable, 2013.
http://arxiv.org/pdf/1311.0243v5.pdf.
[5] L. M. Bach, B. Mihaljević,and M. Žagar. Comparative Analysis of Blockchain Consensus Algorithms <
MIPRO 2018/SP>
[6] M. Rosenfeld. Analysis of Bitcoin Pooled Mining Reward Systems. http://arxiv.org/pdf/1112.4980.pdf.
[7] A. Shoker, "Sustainable blockchain through proof of exercise",2017 IEEE 16th International
Symposium on Network Computing and Applications (NCA), 2017.
[8] D. Kuhnert. The Dogecoin survival guide. Accessed:2019-01-28. [online]: https://imgur.com/a/Sgyox.
References continued
[9] Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen. A
survey on consensus mechanisms and mining management in blockchain networks, 2019.
http://arxiv.org/abs/1805.02707v3.
[10] A. Laszka, B. Johnson, and J. Grossklags. When Bitcoin Mining Pools Run Dry: A Game-
Theoretic Analysis of the Long-TermImpact of Attacks Between Mining Pools. 2015. unpublished
[11] G. Karame, E. Androulaki, Bitcoin and Blockchain Security,Norwood, MA: Artech House, 2016.
[12] V. Buterin and V. Griffith. Casper the friendly finality gadget.arXiv preprint arXiv:1710.09437, 2017.
[13] Proof of Authority. Accessed: 2019-01-28. [online]: https://wiki.parity.io/Proof-of-Authority-Chains.
[14] Zhiqiang Liu, China Shuyang Tang, Sherman S.M. Chow, Zhen Liu, Yu Long. Fork-Free Hybrid
Consensus withFlexible Proof-of-Activity. 2017.
[15] Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, Paul Rimba. A
Taxonomy of Blockchain-Based Systems for Architecture Design. 2017.
[16] Florian Tschorsch, Björn Scheuermann. Bitcoin and Beyond: A Technical Survey on Decentralized
Digital Currencies. 2015.
References continued
[17] Marie Vasek, Micah Thornton, and Tyler Moore. Empirical Analysis of Denial-of-Service Attacks in the
Bitcoin Ecosystem. 2014.
[18] Danny Yuxing Huang. Profit-Driven Abuses of Virtual Currencies. 2013.
[19] Aggelos Kiayias, Ioannis Konstantinou, Alexander Russell, Bernardo David, Roman Oliynykov. A
Provably Secure Proof-of-Stake Blockchain Protocol. 2016.
[20] Robert Viglione, Rolf Versluis, and Jane Lippencott. Zen White Paper. 2017.
[21] Christina Jepson. DTB001: Decred Technical Brief. 2015.
[22] BitFury Group. Proof of Stake versus Proof of Work. 2015.
[23] Muhammad Saqib Niaz, Gunter Saake. Merkle Hash Tree based Techniques for Data Integrity of
Outsourced Data. 2015.
[24] Pavel Vasin. Black Coin’s Proof-of-Stake Protocol v2. www.blackcoin.co
[25] Serguei Popov. A Probabilistic Analysis of the Nxt Forging Algorithm. 2016.
[26] https://komodoplatform.com/51-attack-how-komodo-can-help-prevent-one/
Thanks a lot for your patience

More Related Content

What's hot

Cryptocurrency and the myth of the trustless transaction
Cryptocurrency and the myth of the trustless transactionCryptocurrency and the myth of the trustless transaction
Cryptocurrency and the myth of the trustless transaction
larakilini
 
Bitcoin (BTC) vs Bitcoin Cash (BCH)
Bitcoin (BTC) vs Bitcoin Cash (BCH)Bitcoin (BTC) vs Bitcoin Cash (BCH)
Bitcoin (BTC) vs Bitcoin Cash (BCH)
Aleksandar Svetski
 
Microeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin networkMicroeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin network
Stanislaw Baranski
 
Bitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsBitcoin- Technology beyond Politics
Bitcoin- Technology beyond Politics
Dr. Juan Trujillo
 
Global Future of Blockchain
Global Future of Blockchain Global Future of Blockchain
Global Future of Blockchain
Melanie Swan
 
Regulating digital currencies
Regulating digital currencies Regulating digital currencies
Regulating digital currencies
Yuri Livshitz
 
The Bitcoin blockchain (en)
The Bitcoin blockchain (en)The Bitcoin blockchain (en)
The Bitcoin blockchain (en)
Davide Carboni
 
Dash crypto
Dash cryptoDash crypto
Dash crypto
MohammadrezaTeymuri
 
Blockchain (1)
Blockchain (1)Blockchain (1)
Blockchain (1)
Ahsan Farooq
 
The Future of Money: Decentralized Finance
The Future of Money: Decentralized FinanceThe Future of Money: Decentralized Finance
The Future of Money: Decentralized Finance
J. Scott Christianson
 
Buzz factor or innovation potential - cryptocurrencies’ compared
Buzz factor or innovation potential - cryptocurrencies’ comparedBuzz factor or innovation potential - cryptocurrencies’ compared
Buzz factor or innovation potential - cryptocurrencies’ compared
Ian Beckett
 
Understand Bitcoin in 5 minutes
Understand Bitcoin in 5 minutesUnderstand Bitcoin in 5 minutes
Understand Bitcoin in 5 minutes
Patrick Bucquet
 
Crypto Currency Lending For The Masses
Crypto Currency Lending For The MassesCrypto Currency Lending For The Masses
Crypto Currency Lending For The Masses
Bizvestor
 
Blockchain and its application
Blockchain and its applicationBlockchain and its application
Blockchain and its application
Virtualcode
 
Distributed Ledger Technologies for International Banking - Eternic
Distributed Ledger Technologies for International Banking - EternicDistributed Ledger Technologies for International Banking - Eternic
Distributed Ledger Technologies for International Banking - Eternic
Eternic
 
Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...
Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...
Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...
Casey Botticello
 
Paper: Crypto Currency Mining
Paper: Crypto Currency MiningPaper: Crypto Currency Mining
Paper: Crypto Currency Mining
Hugo Rodrigues
 
Can Bitcoin be forecasted like any other asset?
Can Bitcoin be forecasted like any other asset?Can Bitcoin be forecasted like any other asset?
Can Bitcoin be forecasted like any other asset?
Patrick Bucquet
 
Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...
Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...
Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...
Kristian Rosenov, MBA
 
blockchain technology
blockchain technologyblockchain technology
blockchain technology
SumitNegi55
 

What's hot (20)

Cryptocurrency and the myth of the trustless transaction
Cryptocurrency and the myth of the trustless transactionCryptocurrency and the myth of the trustless transaction
Cryptocurrency and the myth of the trustless transaction
 
Bitcoin (BTC) vs Bitcoin Cash (BCH)
Bitcoin (BTC) vs Bitcoin Cash (BCH)Bitcoin (BTC) vs Bitcoin Cash (BCH)
Bitcoin (BTC) vs Bitcoin Cash (BCH)
 
Microeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin networkMicroeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin network
 
Bitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsBitcoin- Technology beyond Politics
Bitcoin- Technology beyond Politics
 
Global Future of Blockchain
Global Future of Blockchain Global Future of Blockchain
Global Future of Blockchain
 
Regulating digital currencies
Regulating digital currencies Regulating digital currencies
Regulating digital currencies
 
The Bitcoin blockchain (en)
The Bitcoin blockchain (en)The Bitcoin blockchain (en)
The Bitcoin blockchain (en)
 
Dash crypto
Dash cryptoDash crypto
Dash crypto
 
Blockchain (1)
Blockchain (1)Blockchain (1)
Blockchain (1)
 
The Future of Money: Decentralized Finance
The Future of Money: Decentralized FinanceThe Future of Money: Decentralized Finance
The Future of Money: Decentralized Finance
 
Buzz factor or innovation potential - cryptocurrencies’ compared
Buzz factor or innovation potential - cryptocurrencies’ comparedBuzz factor or innovation potential - cryptocurrencies’ compared
Buzz factor or innovation potential - cryptocurrencies’ compared
 
Understand Bitcoin in 5 minutes
Understand Bitcoin in 5 minutesUnderstand Bitcoin in 5 minutes
Understand Bitcoin in 5 minutes
 
Crypto Currency Lending For The Masses
Crypto Currency Lending For The MassesCrypto Currency Lending For The Masses
Crypto Currency Lending For The Masses
 
Blockchain and its application
Blockchain and its applicationBlockchain and its application
Blockchain and its application
 
Distributed Ledger Technologies for International Banking - Eternic
Distributed Ledger Technologies for International Banking - EternicDistributed Ledger Technologies for International Banking - Eternic
Distributed Ledger Technologies for International Banking - Eternic
 
Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...
Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...
Cryptocurrency Alliance Super PAC-The Global Emergence of Cryptocurrencies an...
 
Paper: Crypto Currency Mining
Paper: Crypto Currency MiningPaper: Crypto Currency Mining
Paper: Crypto Currency Mining
 
Can Bitcoin be forecasted like any other asset?
Can Bitcoin be forecasted like any other asset?Can Bitcoin be forecasted like any other asset?
Can Bitcoin be forecasted like any other asset?
 
Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...
Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...
Cryptocurrencies and blockchains - the outlook for Bitcoin into this constell...
 
blockchain technology
blockchain technologyblockchain technology
blockchain technology
 

Similar to Hybrid pow-pos-based-system against majority attack-in-cryptocurrency system compact version

Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking System
Gaurav Singh
 
Blockchain Technology and its effect on Environment: A Comparative Study betw...
Blockchain Technology and its effect on Environment: A Comparative Study betw...Blockchain Technology and its effect on Environment: A Comparative Study betw...
Blockchain Technology and its effect on Environment: A Comparative Study betw...
AI Publications
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
Sota Watanabe
 
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...
eraser Juan José Calderón
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?
Bernhard Haslhofer
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
19MEB302SahilAli
 
Crypto Jamming
Crypto JammingCrypto Jamming
Crypto Jamming
Melanie Swan
 
Blockchain Technology And Cryptocurrency
Blockchain Technology And CryptocurrencyBlockchain Technology And Cryptocurrency
Blockchain Technology And Cryptocurrency
Eno Bassey
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
DSCIITPatna
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
IRJET Journal
 
Lets learn the_importance_of_trilemma_in_blockchain_by_algorand
Lets learn the_importance_of_trilemma_in_blockchain_by_algorandLets learn the_importance_of_trilemma_in_blockchain_by_algorand
Lets learn the_importance_of_trilemma_in_blockchain_by_algorand
JitendraNaik16
 
Disadvantages and Advantages of Blockchain
Disadvantages and Advantages of BlockchainDisadvantages and Advantages of Blockchain
Disadvantages and Advantages of Blockchain
ijtsrd
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
toddr4
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
healdkathaleen
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
seancarmody
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptx
GopalSB
 
Blockchain
BlockchainBlockchain
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
Ishaan Bhardwaj
 

Similar to Hybrid pow-pos-based-system against majority attack-in-cryptocurrency system compact version (20)

Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking System
 
Blockchain Technology and its effect on Environment: A Comparative Study betw...
Blockchain Technology and its effect on Environment: A Comparative Study betw...Blockchain Technology and its effect on Environment: A Comparative Study betw...
Blockchain Technology and its effect on Environment: A Comparative Study betw...
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
 
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.. Be...
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
 
Crypto Jamming
Crypto JammingCrypto Jamming
Crypto Jamming
 
Blockchain Technology And Cryptocurrency
Blockchain Technology And CryptocurrencyBlockchain Technology And Cryptocurrency
Blockchain Technology And Cryptocurrency
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 
Lets learn the_importance_of_trilemma_in_blockchain_by_algorand
Lets learn the_importance_of_trilemma_in_blockchain_by_algorandLets learn the_importance_of_trilemma_in_blockchain_by_algorand
Lets learn the_importance_of_trilemma_in_blockchain_by_algorand
 
Disadvantages and Advantages of Blockchain
Disadvantages and Advantages of BlockchainDisadvantages and Advantages of Blockchain
Disadvantages and Advantages of Blockchain
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
 

More from Kishor Datta Gupta

GAN introduction.pptx
GAN introduction.pptxGAN introduction.pptx
GAN introduction.pptx
Kishor Datta Gupta
 
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Kishor Datta Gupta
 
A safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable dataA safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable data
Kishor Datta Gupta
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and Defense
Kishor Datta Gupta
 
Who is responsible for adversarial defense
Who is responsible for adversarial defenseWho is responsible for adversarial defense
Who is responsible for adversarial defense
Kishor Datta Gupta
 
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Kishor Datta Gupta
 
Zero shot learning
Zero shot learning Zero shot learning
Zero shot learning
Kishor Datta Gupta
 
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Kishor Datta Gupta
 
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Kishor Datta Gupta
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer security
Kishor Datta Gupta
 
Policy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionPolicy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detection
Kishor Datta Gupta
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
Kishor Datta Gupta
 
understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...
Kishor Datta Gupta
 
Different representation space for MNIST digit
Different representation space for MNIST digitDifferent representation space for MNIST digit
Different representation space for MNIST digit
Kishor Datta Gupta
 
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui..."Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
Kishor Datta Gupta
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Kishor Datta Gupta
 
Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)
Kishor Datta Gupta
 
Clustering report
Clustering reportClustering report
Clustering report
Kishor Datta Gupta
 
Basic digital image concept
Basic digital image conceptBasic digital image concept
Basic digital image concept
Kishor Datta Gupta
 
An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)
Kishor Datta Gupta
 

More from Kishor Datta Gupta (20)

GAN introduction.pptx
GAN introduction.pptxGAN introduction.pptx
GAN introduction.pptx
 
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
Interpretable Learning Model for Lower Dimensional Feature Space: A Case stud...
 
A safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable dataA safer approach to build recommendation systems on unidentifiable data
A safer approach to build recommendation systems on unidentifiable data
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and Defense
 
Who is responsible for adversarial defense
Who is responsible for adversarial defenseWho is responsible for adversarial defense
Who is responsible for adversarial defense
 
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
Robust Filtering Schemes for Machine Learning Systems to Defend Adversarial A...
 
Zero shot learning
Zero shot learning Zero shot learning
Zero shot learning
 
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
Using Negative Detectors for Identifying Adversarial Data Manipulation in Mac...
 
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
Deep Reinforcement Learning based Recommendation with Explicit User-ItemInter...
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer security
 
Policy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detectionPolicy Based reinforcement Learning for time series Anomaly detection
Policy Based reinforcement Learning for time series Anomaly detection
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...understanding the pandemic through mining covid news using natural language p...
understanding the pandemic through mining covid news using natural language p...
 
Different representation space for MNIST digit
Different representation space for MNIST digitDifferent representation space for MNIST digit
Different representation space for MNIST digit
 
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui..."Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
"Can NLP techniques be utilized as a reliable tool for medical science?" -Bui...
 
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Tech...
 
Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)Adversarial Input Detection Using Image Processing Techniques (IPT)
Adversarial Input Detection Using Image Processing Techniques (IPT)
 
Clustering report
Clustering reportClustering report
Clustering report
 
Basic digital image concept
Basic digital image conceptBasic digital image concept
Basic digital image concept
 
An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)An empirical study on algorithmic bias (aiml compsac2020)
An empirical study on algorithmic bias (aiml compsac2020)
 

Recently uploaded

Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 

Recently uploaded (20)

Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 

Hybrid pow-pos-based-system against majority attack-in-cryptocurrency system compact version

  • 1. A Hybrid POW-POS Implementation Against 51% Attack in Cryptocurrency System
  • 2. 51% attack If someone gains a large amount (more than 50%) of computation capability of entire network, he can do several malicious activities in the network to manipulate the block chain for his benefit. This kind of malicious activities are called a 51% attack. •Fraud other users Fake transactions Double spending Ruin exchanges Liquify to fiat currency Convert to other cryptocurrency
  • 3. 51% Attack Explained Block 30 Block 31 Block 31 Block 32 Block 33 Block 32 Block 34 Block 35
  • 4. Affects small and newly created networks
  • 5. Investors and New Cryptocurrency Peer to Peer (P2P) Network
  • 6. Present Solutions – Hybrid consensus protocol P(PoW-PoS) = P(PoW) AND P(PoS) = 51% X 51% = (51/100) X (51/100) = 26.01 % P(PoW-PoS) = P(PoW) AND P(PoS) = 71% X 71% = (71/100) X (71/100) = 50.41% +
  • 7. Present Solutions implemented by different cryptocurrencies Dependent on another network. If other network falls then it’ll also fall. Valid transactions could be reverted with the malicious transactions. Transaction confirmation suffers from unwanted delays. Peer to Peer protocol violation. No democracy and decentralization. Miner and validator are different nodes for the same block. Block Generation Time interval and profit distribution inconsistency. These solutions cannot attract investors & ultimately are not suitable for new crypto Komodo Takes Snapshots of their data Stores them in Bitcoin Blockchain Horizen Delayed block submission penalty system Watcher nodes for watching malicious activity Decred Voting system Ticket distribution At least 3/5 tickets required Ethereum Casper FFG Voting system Deposit to be elected for voting 2/3 votes required
  • 8. Proposed Solution PoW and PoS processing full cycle executes in the same thread sequentially in same node. Difficulty target is adjusted in both cycle to maintain the block interval consistently Defined strict spaced valid timestamp mechanism to slow down the faster nodes in the network Block generation and Profit distribution is very accurate. Democratic and decentralized No special validator. All nodes are equal, so P2P protocol is perfectly maintained All the stake holders get rationally equal profit that is directly proportional to their staked asset Nodes doing malicious activities are banned for certain period of time from the network
  • 10. Result Blockchain height Block timestamp Average block time 10000 04-05-2019 12:44:32 164.72 sec 12437 09-05-2019 05:40:32 165.13 sec 15000 14-05-2019 01:18:24 164.67 sec 20000 23-05-2019 14:30:56 164.76 sec 25000 02-06-2019 03:20:00 164.75 sec 27660 07-06-2019 05:52:32 164.86 sec 30000 11-06-2019 18:12:32 165.00 sec 35700 22-06-2019 16:03:44 165.06 sec 40000 30-06-2019 21:04:32 165.05 sec Expected block mining time: 150 + 16 = 166 sec. The first block’s mining timestamp was 15-04-2019 11:10:14. Average block time = {(Block timestamp – first block timestamp) in seconds } / Block height
  • 11. Results continued Machine Configuration Staking Balance Reward Time Interval 3.5 GHz 4 CPU 8 GB RAM 10 Million coins 130 Minutes 3.5 GHz 8 CPU 16 GB RAM 10 Million coins 130 Minutes 3.1 GHz 8 CPU 32 GB RAM 10 Million coins 130 Minutes 2.8 GHz 8 CPU 16 GB RAM 10 Million coins 130 Minutes 2.8 GHz 2 CPU 3 GB RAM 10 Million coins 130 Minutes 2.8 GHz 1 CPU 3 GB RAM 10 Million coins 130 Minutes
  • 12. Comparison Supports P2P protocol Consistent block time Investment wise proportional profit distribution Autonomous network – Not need any special authority Democratic majority peers are decision makers Penalize corrupted or malicious user Casper No No No No No Yes Decred No No No No No No PoW-PoS-PoA No No No No No No Komodo’s dPoW Yes Yes No Yes Yes No ZEN coin’s penalty No Yes No No Yes Yes Proposed system Yes Yes Yes Yes Yes Yes
  • 13. Limitations The PoW mining loop cause processing and computing resource watage Do not incentivize the miners according to their processing capabilities It discourages mining pools and volunteer miners to mine in this network Only who have some investment in this network can earn profit
  • 14. References [1] S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008. http://bitcoin.org/bitcoin.pdf. [2] Marianna Belotti, Nikola Bozic, Guy Pujolle, Stefano Secci. A Vademecum on Blockchain Technologies: When, Which and How. 2019. <hal-01870617> [3] Yli-Huumo J, Ko D, Choi S, Park S, Smolander K. Where Is Current Research on Blockchain Technology? — A Systematic Review. 2016. [4] I. Eyal and E. Gun Sirer. Majority is not Enough: Bitcoin Mining is Vulnerable, 2013. http://arxiv.org/pdf/1311.0243v5.pdf. [5] L. M. Bach, B. Mihaljević,and M. Žagar. Comparative Analysis of Blockchain Consensus Algorithms < MIPRO 2018/SP> [6] M. Rosenfeld. Analysis of Bitcoin Pooled Mining Reward Systems. http://arxiv.org/pdf/1112.4980.pdf. [7] A. Shoker, "Sustainable blockchain through proof of exercise",2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), 2017. [8] D. Kuhnert. The Dogecoin survival guide. Accessed:2019-01-28. [online]: https://imgur.com/a/Sgyox.
  • 15. References continued [9] Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen. A survey on consensus mechanisms and mining management in blockchain networks, 2019. http://arxiv.org/abs/1805.02707v3. [10] A. Laszka, B. Johnson, and J. Grossklags. When Bitcoin Mining Pools Run Dry: A Game- Theoretic Analysis of the Long-TermImpact of Attacks Between Mining Pools. 2015. unpublished [11] G. Karame, E. Androulaki, Bitcoin and Blockchain Security,Norwood, MA: Artech House, 2016. [12] V. Buterin and V. Griffith. Casper the friendly finality gadget.arXiv preprint arXiv:1710.09437, 2017. [13] Proof of Authority. Accessed: 2019-01-28. [online]: https://wiki.parity.io/Proof-of-Authority-Chains. [14] Zhiqiang Liu, China Shuyang Tang, Sherman S.M. Chow, Zhen Liu, Yu Long. Fork-Free Hybrid Consensus withFlexible Proof-of-Activity. 2017. [15] Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, Paul Rimba. A Taxonomy of Blockchain-Based Systems for Architecture Design. 2017. [16] Florian Tschorsch, Björn Scheuermann. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. 2015.
  • 16. References continued [17] Marie Vasek, Micah Thornton, and Tyler Moore. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem. 2014. [18] Danny Yuxing Huang. Profit-Driven Abuses of Virtual Currencies. 2013. [19] Aggelos Kiayias, Ioannis Konstantinou, Alexander Russell, Bernardo David, Roman Oliynykov. A Provably Secure Proof-of-Stake Blockchain Protocol. 2016. [20] Robert Viglione, Rolf Versluis, and Jane Lippencott. Zen White Paper. 2017. [21] Christina Jepson. DTB001: Decred Technical Brief. 2015. [22] BitFury Group. Proof of Stake versus Proof of Work. 2015. [23] Muhammad Saqib Niaz, Gunter Saake. Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data. 2015. [24] Pavel Vasin. Black Coin’s Proof-of-Stake Protocol v2. www.blackcoin.co [25] Serguei Popov. A Probabilistic Analysis of the Nxt Forging Algorithm. 2016. [26] https://komodoplatform.com/51-attack-how-komodo-can-help-prevent-one/
  • 17. Thanks a lot for your patience