Research Article

Detectable, Traceable, and Manageable Blockchain Technologies BHE: An Attack Scheme against Bitcoin P2P Network

Table 1

For the same type of node, the more malicious IP prefixes, the higher the optimal attack efficiency (the shorter the required attack time). The nodes running for 30 days are the least affected by this rule.

Node typeNumber of malicious IP prefixesOptimal attack efficiency(min)

Node running for 30 days25<6 min
50<5.5 min
75<2.5 min
100<1 min

Node running for 20 days25<17 min
50<14 min
75<7 min
100<6 min

Node running for 10 days25<13 min
50<9.5 min
75<5.5 min
100<5 min