UMM Institutional Repository

EVALUASI PERFORMA BITCOIN MINING TERHADAP SERANGAN SELFISH MINING DAN DOUBLE SPENDING

Vernandes, Daniel (2019) EVALUASI PERFORMA BITCOIN MINING TERHADAP SERANGAN SELFISH MINING DAN DOUBLE SPENDING. Undergraduate (S1) thesis, University of Muhammadiyah Malang.

This is the latest version of this item.

[img]
Preview
Text
PENDAHULUAN.pdf

Download (1MB) | Preview
[img]
Preview
Text
BAB I.pdf

Download (73kB) | Preview
[img]
Preview
Text
BAB II.pdf

Download (373kB) | Preview
[img] Text
BAB III.pdf
Restricted to Registered users only

Download (747kB) | Request a copy
[img] Text
BAB IV.pdf
Restricted to Registered users only

Download (922kB) | Request a copy
[img] Text
BAB V.pdf
Restricted to Registered users only

Download (62kB) | Request a copy
[img] Text
POSTER.pdf
Restricted to Registered users only

Download (294kB) | Request a copy

Abstract

Nowadays there are so many digital currencies or what is commonly called cryptocurrency. Cryptocurrency is a digital cryptographic-based currency that is widely distributed to the public with a limited amount. One of the most popular digital currencies today is Bitcoin. Each Cryptocurrency carries a different currency value depending on the type. Bitcoin is no exception which has the highest currency exchange rate which naturally will be the target of attacks by irresponsible elements. Attackers can use various types of methods or attacks to get an unfair portion of the mining prize. Such attacks are generally commonly referred to as Mining Attack. There are many types of attacks on Bitcoin Mining, among which the most famous are Selfish Mining and Double Spending. In this study the author tries to analyze the performance of Bitcoin Mining and the impact caused when Selfish Mining and Double Spending attacks are carried out, with a simulated scenario plan using 15 miner nodes with mining activity at 100, 200, and 300 blocks. Testing parameters used to analyze the performance of Bitcoin Mining: block receive time, block propagation time, block size, stale block, total block, honest mining income, and attacker income. This study was simulated using network simulator 3 (ns-3) software as a simulator to simulate node mining with data sources using the Bitcoin Simulator software. Based on tests conducted, it is known that Double Spending attacks are far more effective than Selfish Mining and Bitcoin Mining Performance in the pre-attack period is much slower but stable than after the attack.

Item Type: Thesis (Undergraduate (S1))
Student ID: 201310370311190
Thesis Advisors: Diah Risqiwati (0716018202), Denar Regata Akbi (0701058601)
Keywords: Cryptocurrency, Bitcoin, Block, Selfish Mining, Double Spending
Subjects: Z Bibliography. Library Science. Information Resources > ZA Information resources
Divisions: Faculty of Engineering > Department of Informatics (55201)
Depositing User: 201310370311190
Date Deposited: 06 Nov 2019 06:58
Last Modified: 06 Nov 2019 06:58
URI : http://eprints.umm.ac.id/id/eprint/54790

Available Versions of this Item

Actions (login required)

View Item View Item
UMM Official

© 2008 UMM Library. All Rights Reserved.
Jl. Raya Tlogomas No 246 Malang East Java Indonesia - Phone +62341464318 ext. 150, 151 - Fax +62341464101
E-Mail : infopus[at]umm.ac.id - Website : http://lib.umm.ac.id - Online Catalog : http://laser.umm.ac.id - Repository : http://eprints.umm.ac.id

Web Analytics

UMM Institutional Repository is powered by :
EPrints Logo