{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:08:43Z","timestamp":1762607323964,"version":"3.37.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030004699"},{"type":"electronic","value":"9783030004705"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_9","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:43:19Z","timestamp":1536216199000},"page":"184-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids"],"prefix":"10.1007","author":[{"given":"Johanna","family":"Ullrich","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicholas","family":"Stifter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aljosha","family":"Judmayer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Amini, S., Mohsenian-Rad, H., Pasqualetti, F.: Dynamic load altering attacks in smart grid. In: IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT) (2015)","DOI":"10.1109\/ISGT.2015.7131791"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MPE.2012.2234407","volume":"11","author":"J Appen von","year":"2013","unstructured":"von Appen, J., Braun, M., Stetz, T., Diwold, K., Geibel, D.: Time in the sun: the challenge of high PV penetration in the German electric grid. IEEE Power Energy Mag. 11, 55\u201364 (2013)","journal-title":"IEEE Power Energy Mag."},{"key":"9_CR3","unstructured":"Back, A., et al.: Hashcash-a denial of service counter-measure (2002)"},{"key":"9_CR4","unstructured":"Bentov, I., Pass, R., Shi, E.: Snow white: provably secure proofs of stake (2016)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for Bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"9_CR6","unstructured":"Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform (2014)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Ullrich, J., Weippl, E.R.: Grid shock: coordinated load-changing attacks on power grids. In: Annual Computer Security Applications Conference (ACSAC) (2017)","DOI":"10.1145\/3134600.3134639"},{"key":"9_CR8","unstructured":"Deetman, S.: Bitcoin could consume as much electricity as denmark by 2020 (2016). https:\/\/motherboard.vice.com\/en_us\/article\/aek3za\/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology \u2014 CRYPTO 1992","author":"C Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139\u2013147. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-48071-4_10"},{"key":"9_CR11","unstructured":"ENTSO-E: Appendix 1 - Load-Frequency Control and Performance. In: Continental Europe Operation Handbook (2004)"},{"key":"9_CR12","unstructured":"ENTSO-E: Policy 1 - Load-Frequency Control and Performance. In: Continental Europe Operation Handbook (2004)"},{"key":"9_CR13","unstructured":"ENTSO-E: Analysis of CE inter-area oscillation of 19 and 24 February 2014 (2011)"},{"key":"9_CR14","unstructured":"ENTSO-E: Report on blackout in Turkey on 31st March 2015 (2015)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Fairley, P.: Blockchain world - feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous. In: IEEE Spectrum (2017)","DOI":"10.1109\/MSPEC.2017.8048837"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"9_CR17","unstructured":"Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., Rosenschein, J.S.: Bitcoin mining pools: a cooperative game theoretic analysis. In: International Conference on Autonomous Agents and Multiagent Systems (2015)"},{"key":"9_CR18","unstructured":"Micali, S.: ALGORAND: the efficient and democratic ledger (2016)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Mishra, S., Li, X., Kuhnle, A., Thai, M.T., Seo, J.: Rate alteration attacks in smart grid. In: IEEE Conference on Computer Communications (INFOCOM) (2015)","DOI":"10.1109\/INFOCOM.2015.7218623"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TSG.2011.2160297","volume":"2","author":"RH Mohsenian-Rad","year":"2011","unstructured":"Mohsenian-Rad, R.H., Leon-Garcia, A.: Distributed internet-based load altering attacks against smart power grids. IEEE Trans. Smart Grid 2, 667\u2013674 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"9_CR21","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"issue":"12","key":"9_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/3132259","volume":"60","author":"A Narayanan","year":"2017","unstructured":"Narayanan, A., Clark, J.: Bitcoin\u2019s academic pedigree. Commun. ACM 60(12), 36\u201345 (2017)","journal-title":"Commun. ACM"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"O\u2019Dwyer, K., Malone, D.: Bitcoin mining and its energy footprint. In: IET Irish Signals & Systems Conference (2014)","DOI":"10.1049\/cp.2014.0699"},{"key":"9_CR24","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MIC.2016.57","volume":"20","author":"H Orman","year":"2016","unstructured":"Orman, H.: The power (energy) of cryptography. IEEE Internet Comput. 20, 90\u201394 (2016)","journal-title":"IEEE Internet Comput."},{"key":"9_CR25","unstructured":"Ozisik, A.P., Bissias, G., Levine, B.N.: Estimation of miner hash rates and consensus on blockchains (2018)"},{"key":"9_CR26","unstructured":"Park, S., Pietrzak, K., Kwon, A., Alwen, J., Fuchsbauer, G., Ga\u017ei, P.: SpaceMint: a cryptocurrency based on proofs of space (2015)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Recabarren, R., Carbunar, B.: Hardening stratum, the bitcoin pool mining protocol. In: Symposium on Privacy Enhancing Technologies (PETS) (2017)","DOI":"10.1515\/popets-2017-0028"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: International Conference on Financial Cryptography (2016)","DOI":"10.1007\/978-3-662-54970-4_28"},{"key":"9_CR29","unstructured":"Union for the Co-ordination of Transmission of Electricity: Final report: System disturbance on 4 November 2006 (2007)"},{"key":"9_CR30","unstructured":"U.S.-Canada Power System Outage Task Force: Final report on the August 14, 2003 Blackout in the United States and Canada (2004)"},{"key":"9_CR31","unstructured":"Verband der Netzbetreiber (VDN): Transmissioncode 2007 - netz- und systemregeln der deutschen \u00dcbertragungsnetzbetreiber (2007)"},{"key":"9_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosust.2017.04.011","volume":"28","author":"H Vranken","year":"2017","unstructured":"Vranken, H.: Sustainability of bitcoin and blockchains. Curr. Opin. Environ. Sustain. 28, 1\u20139 (2017)","journal-title":"Curr. Opin. Environ. Sustain."},{"key":"9_CR33","unstructured":"the Vries, A.: Bitcoin energy consumption index (2017). https:\/\/web.archive.org\/web\/20170429092415\/https:\/\/digiconomist.net\/bitcoin-energy-consumption . Accessed 01 Mar 2018"},{"key":"9_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-319-15509-8_22","volume-title":"Passive and Active Measurement","author":"L Wang","year":"2015","unstructured":"Wang, L., Liu, Y.: Exploring miner evolution in bitcoin network. In: Mirkovic, J., Liu, Y. (eds.) PAM 2015. LNCS, vol. 8995, pp. 290\u2013302. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15509-8_22"},{"key":"9_CR35","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger eip-150 revision (759dccd - 2017-08-07) (2017)"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Xu, Z., Wang, H., Xu, Z., Wang, X.: Power attack: an increasing threat to data centers. In: Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23235"},{"key":"9_CR37","unstructured":"Zhang, F., Eyal, I., Escriva, R., Juels, A., van Renesse, R.: REM: resource-efficient mining for blockchains (2017)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T16:37:46Z","timestamp":1571848666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}