Tren Penelitian Metode Konsensus, Serangan, serta Pencegahannya pada Cryptocurrency Mining

Authors

  • Dwina Satrinia Telkom University
  • Siti Zahrotul Fajriyah Universitas Telkom
  • Syifa Nurgaida Yutia Universitas Telkom

DOI:

https://doi.org/10.52661/jict.v6i2.343

Keywords:

attack on cryptomining, blockchain, consensus method, cryptocurrency, cryptomining

Abstract

Studi ini membahas metode konsensus di cryptomining, serangan umum, dan pencegahannya. Blockchain awal menggunakan Proof of Work (PoW), yang tidak efisien energi dan rentan keamanan. Proof of Stake (PoS) dikembangkan untuk meningkatkan desentralisasi dan efisiensi energi. Protokol seperti Proof-of-Search (PoS) dan Proof-of-Publicly Verifiable Randomness (PoPVR) menawarkan alternatif PoW, mengatasi penipuan dan serangan denial-of-service. Penelitian ini juga mengevaluasi perilaku penambangan strategis dan metode deteksi serta pencegahan serangan. Model konsensus hibrida, seperti Hybrid PoW-PoS, menggabungkan kekuatan PoW dan PoS untuk melawan serangan mayoritas. Temuan menekankan perlunya keamanan yang kuat dan pemantauan berkelanjutan untuk mencegah aktivitas jahat dan memastikan keadilan serta keberlanjutan penambangan kripto. Makalah ini mengumpulkan analisis dari berbagai jurnal untuk meningkatkan keamanan dan efisiensi penambangan kripto.

References

S. Verma, D. Yadav, and G. Chandra, “Introduction of Formal Methods in Blockchain Consensus Mechanism and Its Associated Protocols,” IEEE Access, vol. 10, pp. 66611–66624, 2022, doi: 10.1109/ACCESS.2022.3184799.

Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou, “A Survey of Distributed Consensus Protocols for Blockchain Networks,” IEEE Communications Surveys and Tutorials, vol. 22, no. 2, pp. 1432–1465, Apr. 2020, doi: 10.1109/COMST.2020.2969706.

R. Beer and T. Sharma, “A quick look at Cryptocurrency Mining: Proof of Work,” in Proceedings of 2nd International Conference on Innovative Practices in Technology and Management, ICIPTM 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 651–656. doi: 10.1109/ICIPTM54933.2022.9754144.

S. Islam, M. J. Islam, M. Hossain, S. Noor, K. S. Kwak, and S. M. R. Islam, “A Survey on Consensus Algorithms in Blockchain-Based Applications: Architecture, Taxonomy, and Operational Issues,” IEEE Access, vol. 11, pp. 39066–39082, 2023, doi: 10.1109/ACCESS.2023.3267047.

A. Soni and S. Maheswari, “A Survey of Attacks on the Bitcoin System,” in 2018 IEEE International Students Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal: IEEE, Feb. 2018.

F. A. Aponte-Novoa, A. L. S. Orozco, R. Villanueva-Polanco, and P. Wightman, “The 51% Attack on Blockchains: A Mining Behavior Study,” IEEE Access, vol. 9, pp. 140549–140564, 2021, doi: 10.1109/ACCESS.2021.3119291.

M. K. Linnenluecke, M. Marrone, and A. K. Singh, “Conducting systematic literature reviews and bibliometric analyses,” Australian Journal of Management, vol. 45, no. 2. SAGE Publications Ltd, pp. 175–194, May 01, 2020. doi: 10.1177/0312896219877678.

D. Wemona Rahma, S. Hidayatul Yulianing Tyas, and Q. Effendi Muftikhali, “Why do Consumers Adopt E-Grocery? A Systematic Literature Review,” DES 2022 Journal of Informatics and Communications Technology, vol. 4, no. 2, pp. 63–074, 2022, doi: 10.52661.

J. G. Combs, T. R. Crook, and A. Rauch, “Meta‐Analytic research in management: Contemporary approaches, unresolved controversies, and rising standards,” Journal of Management Studies, vol. 56, pp. 1–18, 2019.

C. T. Nguyen, D. T. Hoang, D. N. Nguyen, D. Niyato, H. T. Nguyen, and E. Dutkiewicz, “Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and Opportunities,” IEEE Access, vol. 7, pp. 85727–85745, 2019, doi: 10.1109/ACCESS.2019.2925010.

N. Shibata, “Proof-of-Search: Combining Blockchain Consensus Formation with Solving Optimization Problems,” IEEE Access, vol. 7, pp. 172994–173006, 2019, doi: 10.1109/ACCESS.2019.2956698.

S.-N. Li, Z. Yang, and C. J. Tessone, “Proof-of-Work cryptocurrency mining: a statistical approach to fairness,” in CIC International Conference on Communications in China (ICCC Workshops), IEEE, 2020, pp. 156–161.

W. Li, C. Feng, L. Zhang, H. Xu, B. Cao, and M. A. Imran, “A Scalable Multi-Layer PBFT Consensus for Blockchain,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 5, pp. 1146–1160, May 2021, doi: 10.1109/TPDS.2020.3042392.

L. Gundaboina, S. Badotra, S. Tanwar, and Manik, “Reducing Resource and Energy Consumption in Cryptocurrency Mining by using both Proof-of-Stake Algorithm and Renewable Energy,” in 2022 International Mobile and Embedded Technology Conference, MECON 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 605–610. doi: 10.1109/MECON53876.2022.9752365.

R. Bezuidenhout, W. Nel, and J. M. Maritz, “Permissionless Blockchain Systems as Pseudo-Random Number Generators for Decentralized Consensus,” IEEE Access, vol. 11, pp. 14587–14611, 2023, doi: 10.1109/ACCESS.2023.3244403.

P. Ekparinya, V. Gramoli, and G. Jourjon, “Impact of man-in-the-middle attacks on ethereum,” in Proceedings of the IEEE Symposium on Reliable Distributed Systems, IEEE Computer Society, Jul. 2018, pp. 11–20. doi: 10.1109/SRDS.2018.00012.

S. Zhu, W. Li, H. Li, L. Tian, G. Luo, and Z. Cai, “Coin hopping attack in blockchain-based IoT,” IEEE Internet Things J, vol. 6, no. 3, pp. 4614–4626, Jun. 2019, doi: 10.1109/JIOT.2018.2872458.

H. Shi, S. Wang, Q. Hu, X. Cheng, J. Zhang, and J. Yu, “Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain,” IEEE Trans Dependable Secure Comput, vol. 18, no. 4, pp. 1580–1590, Jul. 2021, doi: 10.1109/TDSC.2020.3021686.

F. Franzoni and V. Daza, “SoK: Network-Level Attacks on the Bitcoin P2P Network,” IEEE Access, vol. 10. Institute of Electrical and Electronics Engineers Inc., pp. 94924–94962, 2022. doi: 10.1109/ACCESS.2022.3204387.

K. D. Gupta, A. Rahman, S. Poudyal, M. N. Huda, and M. A. P. Mahmud, “A hybrid POW-POS implementation against 51 percent attack in cryptocurrency system,” in Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, IEEE Computer Society, Dec. 2019, pp. 396–403. doi: 10.1109/CloudCom.2019.00068.

X. Liu, Z. Huang, Q. Wang, X. Jiang, Y. Chen, and B. Wan, “Analyzing Miners’ Dynamic Equilibrium in Blockchain Networks under DDoS Attacks,” Electronics (Switzerland), vol. 12, no. 18, Sep. 2023, doi: 10.3390/electronics12183903.

Downloads

Published

2025-01-08

How to Cite

Satrinia, D., Fajriyah, S. Z., & Yutia, S. N. (2025). Tren Penelitian Metode Konsensus, Serangan, serta Pencegahannya pada Cryptocurrency Mining. Journal of Informatics and Communication Technology (JICT), 6(2), 70–79. https://doi.org/10.52661/jict.v6i2.343

Issue

Section

Informatika

Most read articles by the same author(s)