{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:08:31Z","timestamp":1772554111969,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00857-5","type":"journal-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T10:01:57Z","timestamp":1716199317000},"page":"2783-2792","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology"],"prefix":"10.1007","volume":"23","author":[{"given":"Nadisha","family":"Madhushanie","sequence":"first","affiliation":[]},{"given":"Sugandima","family":"Vidanagamachchi","sequence":"additional","affiliation":[]},{"given":"Nalin","family":"Arachchilage","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,20]]},"reference":[{"key":"857_CR1","doi-asserted-by":"crossref","unstructured":"Azimy, H., Ghorbani, A.: Competitive selfish mining. In: 2019 17th International Conference on Privacy, Security and Trust (PST) pp. 1\u20138. IEEE, (2019)","DOI":"10.1109\/PST47121.2019.8949043"},{"key":"857_CR2","doi-asserted-by":"crossref","unstructured":"Dey, T., Jaiswal, S., Sunderkrishnan, S., Katre, N.: Healthsense: A medical use case of internet of things and blockchain. In: 2017 International conference on intelligent sustainable systems (ICISS), pp. 486\u2013491. IEEE, (2017)","DOI":"10.1109\/ISS1.2017.8389459"},{"key":"857_CR3","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.procs.2018.01.019","volume":"123","author":"D Efanov","year":"2018","unstructured":"Efanov, D., Roschin, P.: The all-pervasiveness of the blockchain technology. Proc. Comput. Sci. 123, 116\u2013121 (2018)","journal-title":"Proc. Comput. Sci."},{"issue":"7","key":"857_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95\u2013102 (2018)","journal-title":"Commun. ACM"},{"key":"857_CR5","unstructured":"Fahmy, S.F.: Blockchain and its uses. In: Arab Academy for Science and Technology and Maritime Transport. Sheraton, (2018)"},{"issue":"2","key":"857_CR6","doi-asserted-by":"publisher","first-page":"100067","DOI":"10.1016\/j.bcra.2022.100067","volume":"3","author":"H Guo","year":"2022","unstructured":"Guo, H., Xingjie, Y.: A survey on blockchain technology and its security. Blockchain: Res. Appl. 3(2), 100067 (2022). https:\/\/doi.org\/10.1016\/j.bcra.2022.100067","journal-title":"Blockchain: Res. Appl."},{"key":"857_CR7","first-page":"100312","volume":"26","author":"K Hameed","year":"2022","unstructured":"Hameed, K., Barika, M., Garg, S., Amin, M.B., Kang, B.: A taxonomy study on securing blockchain-based industrial applications: an overview, application perspectives, requirements, attacks, countermeasures, and open issues. J. Ind. Inform. Integration 26, 100312 (2022)","journal-title":"J. Ind. Inform. Integration"},{"issue":"2","key":"857_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2060","volume":"29","author":"H Hasanova","year":"2019","unstructured":"Hasanova, H., Baek, U.-J., Shin, M.-G., Cho, K., Kim, M.-S.: A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. Int. J. Netw. Manage 29(2), e2060 (2019)","journal-title":"Int. J. Netw. Manage"},{"key":"857_CR9","doi-asserted-by":"crossref","unstructured":"Heilman, E.: One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In: Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers 18, pp. 161\u2013162. Springer, (2014)","DOI":"10.1007\/978-3-662-44774-1_12"},{"issue":"1","key":"857_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/LWC.2018.2864758","volume":"8","author":"J Kang","year":"2019","unstructured":"Kang, J., Xiong, Z., Niyato, D., Wang, P., Ye, D., Kim, D.I.: Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks. IEEE Wireless Commun. Lett. 8(1), 157\u2013160 (2019). https:\/\/doi.org\/10.1109\/LWC.2018.2864758","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"1","key":"857_CR11","first-page":"83","volume":"10","author":"JW Kim","year":"2020","unstructured":"Kim, J.W.: Blockchain technology and its applications: case studies. J. Syst. Manag. Sci. 10(1), 83\u201393 (2020)","journal-title":"J. Syst. Manag. Sci."},{"key":"857_CR12","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, Y.: Preventing bitcoin selfish mining using transaction creation time. In: 2018 International Conference on Software Security and Assurance (ICSSA), pp. 19\u201324. IEEE, (2018)","DOI":"10.1109\/ICSSA45270.2018.00014"},{"issue":"8","key":"857_CR13","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.3390\/sym14081711","volume":"14","author":"MJ Mihaljevi\u0107","year":"2022","unstructured":"Mihaljevi\u0107, M.J., Wang, L., Shujiang, X., Todorovi\u0107, M.: An approach for blockchain pool mining employing the consensus protocol robust against block withholding and selfish mining attacks. Symmetry 14(8), 1711 (2022). https:\/\/doi.org\/10.3390\/sym14081711","journal-title":"Symmetry"},{"key":"857_CR14","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 305\u2013320. IEEE, (2016)","DOI":"10.1109\/EuroSP.2016.32"},{"key":"857_CR15","doi-asserted-by":"crossref","unstructured":"Negy, K.N., Rizun, P.R., Sirer , P.R.: Selfish mining re-examined. In: Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10\u201314, 2020 Revised Selected Papers, pp. 61\u201378. Springer, (2020)","DOI":"10.1007\/978-3-030-51280-4_5"},{"key":"857_CR16","unstructured":"Pabba S.V.: Creating a fake cryptocurrency unit. (2018)"},{"key":"857_CR17","doi-asserted-by":"crossref","unstructured":"Pass, R., Shi, E., Fruitchains: A fair blockchain. In Proceedings of the ACM symposium on principles of distributed computing, pp. 315\u2013324, (2017).","DOI":"10.1145\/3087801.3087809"},{"key":"857_CR18","doi-asserted-by":"publisher","first-page":"237","DOI":"10.34190\/iccws.17.1.15","volume":"17","author":"M Peterson","year":"2022","unstructured":"Peterson, M., Andel, T., Benton, R.: Towards detection of selfish mining using machine learning. Int. Conf. Cyber Warfare Secur. 17, 237\u2013243 (2022)","journal-title":"Int. Conf. Cyber Warfare Secur."},{"issue":"4","key":"857_CR19","doi-asserted-by":"publisher","first-page":"1972","DOI":"10.1109\/TETC.2019.2949510","volume":"9","author":"E Politou","year":"2019","unstructured":"Politou, E., Casino, F., Alepis, E., Patsakis, C.: Blockchain mutability: challenges and proposed solutions. IEEE Trans. Emerg. Top. Comput. 9(4), 1972\u20131986 (2019)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"857_CR20","doi-asserted-by":"crossref","unstructured":"Reno, S., Sultana, S.: Preventing selfish mining in public blockchain using alarming block and block interval time approach. In: 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), pp. 988\u2013993. IEEE, (2022)","DOI":"10.1109\/ICAISS55157.2022.10010734"},{"key":"857_CR21","doi-asserted-by":"crossref","unstructured":"Saad, Md., Njilla, l., Kamhoua, C., Mohaisen, A.: Countering selfish mining in blockchains. In: 2019 International Conference on Computing, Networking and Communications (ICNC), pp. 360\u2013364. IEEE, (2019)","DOI":"10.1109\/ICCNC.2019.8685577"},{"issue":"3","key":"857_CR22","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1109\/COMST.2020.2975999","volume":"22","author":"M Saad","year":"2020","unstructured":"Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D.H., Mohaisen, D.: Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun. Surv. Tutor. 22(3), 1977\u20132008 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"9","key":"857_CR23","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.3390\/app9091788","volume":"9","author":"S Sayeed","year":"2019","unstructured":"Sayeed, S., Marco-Gisbert, H.: Assessing blockchain consensus and security mechanisms against the 51% attack. Appl. Sci. 9(9), 1788 (2019)","journal-title":"Appl. Sci."},{"issue":"01","key":"857_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33130\/AJCT.2019v05i01.013","volume":"05","author":"H Sheth","year":"2019","unstructured":"Sheth, H., Dattani, J.: Overview of blockchain technology. Asian J. Convergence Technol. 05(01), 1\u20134 (2019). https:\/\/doi.org\/10.33130\/AJCT.2019v05i01.013","journal-title":"Asian J. Convergence Technol."},{"key":"857_CR25","doi-asserted-by":"crossref","unstructured":"Solat, S., Potop-Butucaru, M.: Zeroblock: Timestamp-free prevention of block-withholding attack in bitcoin. arXiv preprint arXiv:1605.02435, (2016).","DOI":"10.1007\/978-3-319-69084-1_25"},{"key":"857_CR26","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.procs.2020.06.093","volume":"174","author":"M Usman","year":"2020","unstructured":"Usman, M., Qamar, U.: Secure electronic medical records storage and sharing using blockchain technology. Proc. Comput. Sci. 174, 321\u2013327 (2020)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"857_CR27","doi-asserted-by":"publisher","first-page":"422","DOI":"10.3390\/app13010422","volume":"13","author":"C Zhou","year":"2022","unstructured":"Zhou, C., Xing, L., Liu, Q., Wang, H.: Effective selfish mining defense strategies to improve bitcoin dependability. Appl. Sci. 13(1), 422 (2022)","journal-title":"Appl. Sci."},{"key":"857_CR28","unstructured":"Zhu, L., Zheng, B., Shen, M., Yu, S., Gao, F., Li, H., Shi, K., Gai, K.: Research on the security of blockchain data: a survey. arXiv preprint arXiv:1812.02009, (2018)."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00857-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00857-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00857-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:16:54Z","timestamp":1721013414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00857-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["857"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00857-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,20]]},"assertion":[{"value":"18 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}