325
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Vulnerability of scale-free cryptocurrency networks to double-spending attacks

ORCID Icon, &
Pages 1235-1249 | Received 28 Apr 2020, Accepted 28 Jan 2021, Published online: 22 Feb 2021
 

Abstract

Cryptocurrencies including Bitcoin are known to be vulnerable to so-called ‘double-spending’ attacks, where the same digital currency is used to execute multiple different transactions simultaneously. Little is known, however, about the underlying reasons for this vulnerability. Here we develop an agent-based model to study how features of cryptocurrency networks contribute to their vulnerability to double-spending attacks. Perhaps surprisingly, we find neither the number of network nodes nor its path length seem to influence the probability of successful attacks. We find robust evidence that the network's clustering coefficient has substantial influence. In particular, scale-free networks, with their small clustering coefficients, are more than twice as likely to succumb to double-spending attacks than are networks with larger coefficients, such as regular networks. The implication is that cryptocurrency networks, which are scale-free, may be uniquely susceptible to double-spending attacks.

Acknowledgments

Junhuan Zhang acknowledges support from National Natural Science Foundation of China (# 71801008), and Beihang University (# KG12113201, # ZF202S1876). The authors also thank Editor Chris Adcock and  the three anonymous reviewers for their helpful comments.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

Junhuan Zhang acknowledges support from National Natural Science Foundation of China [grant number 71801008], and Beihang University [grant numbers KG12113201, ZF202S1876].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.