publication . Preprint . Article . 2018

On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach

Shaohan Feng; Wenbo Wang; Zehui Xiong; Dusit Niyato; Ping Wang; Shaun Shuxun Wang;
Open Access English
  • Published: 27 Apr 2018
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based consensus protocols are vulnerable to cyber-attacks such as double-spending. In this paper, we propose a novel approach of cyber risk management for blockchain-based service. In particular, we adopt the cyber-insurance as an economic tool for neutralizing cyber risks due to attacks in blockchain networks. We consider a blockchain service market, which is composed of the infrastructure provider, the blockchain pr...
free text keywords: Computer Science - Cryptography and Security, Computer Science - Computer Science and Game Theory, Service market, Stackelberg competition, Risk perception, Distributed computing, Popularity, Blockchain, Game theoretic, Computer security, computer.software_genre, computer, Rationality, Computer science, Risk management, business.industry, business
Related Organizations
41 references, page 1 of 3

[1] D. T. T. Anh, M. Zhang, B. C. Ooi and G. Chen, “Untangling blockchain: A data processing view of blockchain systems,” IEEE Transactions on Knowledge and Data Engineering, vol. PP, no. 99, pp. 1-1, 2018.

[2] M. Bartoletti and L. Pompianu, “An empirical analysis of smart contracts: platforms, applications, and design patterns,” arXiv preprint arXiv:1703.06322, 2017. [OpenAIRE]

[3] H. Kopp, D. Mdinger, F. Hauck, F. Kargl and C. Bsch, “Design of a privacy-preserving decentralized file storage with financial incentives,” in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Paris, France, 2017.

[4] K. Toyoda, P. T. Mathiopoulos, I. Sasase and T. Ohtsuki, “A novel blockchain-based product ownership management system (poms) for anti-counterfeits in the post supply chain,” IEEE Access, vol. 5, pp. 17465-17477, 2017.

[5] J. Zou, b. ye, L. Qu, Y. Wang, M. A. Orgun and L. Li, “A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services,” IEEE Transactions on Services Computing, pp. 1-1, 2018.

[6] M. Conti, C. Lal, S. Ruj et al., “A survey on security and privacy issues of bitcoin,” arXiv preprint arXiv:1706.00916, 2017.

[7] G. O. Karame, E. Androulaki and S. Capkun, “Double-spending fast payments in bitcoin,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, Oct. 2012, CCS '12, pp. 906-917, ACM. [OpenAIRE]

[8] Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng and Y. Zhang, “Consortium blockchain for secure energy trading in industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. PP, no. 99, pp. 1-1, 2017.

[9] X. Huang, C. Xu, P. Wang and H. Liu, “Lnsc: A security model for electric vehicle and charging pile management based on blockchain ecosystem,” IEEE Access, vol. PP, no. 99, pp. 1-1, 2018.

[10] K. Kotobi and S. G. Biln, “Blockchain-enabled spectrum access in cognitive radio networks,” in 2017 Wireless Telecommunications Symposium (WTS), April 2017, pp. 1-6. [OpenAIRE]

[11] L. Ghiro, L. Maccari and R. L. Cigno, “Proof of networking: Can blockchains boost the next generation of distributed networks?,” in 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Feb. 2018, pp. 29-32.

[12] W. Wang, D. Niyato, P. Wang and A. Leshem, “Decentralized caching for content delivery based on blockchain: A game theoretic perspective,” in IEEE ICC 2018 Next Generation Networking and Internet Symposium, Kansas City, USA, May 2018. [OpenAIRE]

[13] S. Muhammad, M. Aziz, K. Charles, K. Kevin and N. Laurent, “Countering double spending in next-generation blockchains,” in IEEE ICC 2018, Kansas City, USA, May 2018.

[14] R. Pal, L. Golubchik, K. Psounis and P. Hui, “On a way to improve cyber-insurer profits when a security vendor becomes the cyberinsurer,” in IFIP Networking Conference, 2013. IEEE, 2013, pp. 1-9.

[15] A. Marotta, F. Martinelli, S. Nanni, A. Orlando and A. Yautsiukhin, “Cyber-insurance survey,” Computer Science Review, vol. 24, pp. 35 - 61, 2017.

41 references, page 1 of 3
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue