Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Li, Jing -
dc.contributor.author Niyato, Dusit -
dc.contributor.author Hong, Choong Seon -
dc.contributor.author Park, Kyung-Joon -
dc.contributor.author Wang, Li -
dc.contributor.author Han, Zhu -
dc.date.accessioned 2021-10-17T03:00:20Z -
dc.date.available 2021-10-17T03:00:20Z -
dc.date.created 2021-05-27 -
dc.date.issued 2021-09 -
dc.identifier.issn 1932-4537 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/15556 -
dc.description.abstract Sharding is a promising solution to achieving scalability within the blockchain network. A sharded blockchain network consists of a beacon chain and several committees powered by the participants (i.e. validators) through the Proof-of-Stake (PoS) consensus protocol. Efficient and scalable as it can be, the sharded blockchain based on PoS is vulnerable to discouragement attack. A discouragement attack occurs when malicious validators censor messages to discourage validators from participating in the network. Furthermore, no rate-limiting validator rotation (enter/exit quickly) makes it more challenging to detect such an attack. In this paper, considering the undetermined rotation and the discouragement attack, we render the beacon chain an intermediary, allowing the beacon chain to interact with validators and the cyber-insurer, aiming to encourage the validators’ stable rotation through insurance compensation. Specifically, we utilize a two-stage hierarchical game-based model to formulate the complicated interactions under the cyber insurance framework. In the first stage, the beacon chain develops compensatory strategies according to the insurer’s profile. In the second stage, the beacon chain designs a series of contracts for validators, including insurance items, compensatory strategies, and rotation requirements. Consequently, the proposed scheme incentivizes validators to remain online by transferring risk to the cyber insurer and enables the sharded blockchain network to weaken the attack’s impact through validators’ stable rotation. This paper presents closed-form solutions for the proposed model, in which the beacon chain and the cyber insurer can gain maximized profits. The simulations demonstrate the feasibility and superiority of the proposed model. IEEE -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers Inc. -
dc.title Cyber Insurance Design for Validator Rotation in Sharded Blockchain Networks: A Hierarchical Game Based Approach -
dc.type Article -
dc.identifier.doi 10.1109/TNSM.2021.3078142 -
dc.identifier.scopusid 2-s2.0-85105845245 -
dc.identifier.bibliographicCitation IEEE Transactions on Network and Service Management, v.18, no.3, pp.3092 - 3106 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor Bitcoin -
dc.subject.keywordAuthor Blockchain -
dc.subject.keywordAuthor Computer science -
dc.subject.keywordAuthor Consensus protocol -
dc.subject.keywordAuthor contract theory. -
dc.subject.keywordAuthor Contracts -
dc.subject.keywordAuthor cyber insurance -
dc.subject.keywordAuthor discouragement attack -
dc.subject.keywordAuthor Games -
dc.subject.keywordAuthor Insurance -
dc.subject.keywordAuthor sharding -
dc.subject.keywordAuthor Stackelberg game -
dc.subject.keywordPlus Consensus protocols -
dc.subject.keywordPlus Hierarchical games -
dc.subject.keywordPlus Rate limiting -
dc.subject.keywordPlus Blockchain -
dc.subject.keywordPlus Insurance -
dc.subject.keywordPlus Rotation -
dc.subject.keywordPlus Closed form solutions -
dc.subject.keywordPlus Compensatory strategy -
dc.citation.endPage 3106 -
dc.citation.number 3 -
dc.citation.startPage 3092 -
dc.citation.title IEEE Transactions on Network and Service Management -
dc.citation.volume 18 -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science CSI(Cyber-Physical Systems Integration) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE