{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:40:48Z","timestamp":1773157248746,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T00:00:00Z","timestamp":1720915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T00:00:00Z","timestamp":1720915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification process. The stale block rate is a crucial security metric that quantifies the proportion of rejected blocks in the blockchain network. The absence of a block verification process represents another critical security concern, as it permits the potential for invalid transactions within the network. In this article, we propose and implement a quantitative and analytical model to capture the primary operations of Proof-of-Work blockchains utilizing the Performance Evaluation Process Algebra. The proposed model can assist blockchain designers, architects, and analysts in achieving the ideal security level for blockchain systems by determining the proper network and consensus settings. We conduct extensive experiments to determine the sensitivity of security to four aspects: the number of active miners and their mining hash rates, the duration between blocks, the latency in block propagation, and the time required for block verification, all of which have been shown to influence the outcomes. We contribute to the findings of the existing research by conducting the first analysis of how the number of miners affects the frequency of stale block results, as well as how the delay in block propagation influences the incentives received by rational miners who choose to avoid the block verification process.<\/jats:p>","DOI":"10.1007\/s10586-024-04645-7","type":"journal-article","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T05:01:31Z","timestamp":1720933291000},"page":"14113-14130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A quantitative analysis of the security of PoW-based blockchains"],"prefix":"10.1007","volume":"27","author":[{"given":"Maher","family":"Alharby","sequence":"first","affiliation":[]},{"given":"Ali","family":"Alssaiari","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Alateef","sequence":"additional","affiliation":[]},{"given":"Nigel","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Aad van","family":"Moorsel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,14]]},"reference":[{"issue":"4","key":"4645_CR1","doi-asserted-by":"publisher","first-page":"1972","DOI":"10.1109\/TETC.2019.2949510","volume":"9","author":"E Politou","year":"2019","unstructured":"Politou, E., Casino, F., Alepis, E., Patsakis, C.: Blockchain mutability: Challenges and proposed solutions. IEEE Trans. Emerg. Top. Comput. 9(4), 1972\u20131986 (2019)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"4645_CR2","doi-asserted-by":"crossref","unstructured":"Alharby, M.: Blockchain-based system for secure storage and sharing of diabetics healthcare records. In: 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), pp. 1\u20136 (2023). IEEE","DOI":"10.1109\/ICAISC56366.2023.10085169"},{"key":"4645_CR3","doi-asserted-by":"crossref","unstructured":"Wu, H., Yao, Q., Liu, Z., Huang, B., Zhuang, Y., Tang, H., Liu, E.: Blockchain for finance: A survey. IET Blockchain (2024)","DOI":"10.1049\/blc2.12067"},{"key":"4645_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-024-08900-2","author":"M Mohammed","year":"2024","unstructured":"Mohammed, M., Alzahrani, M., Hejjou, A., Alharby, M.: Trustchain: Trusted blockchain-based system for supply chain traceability. Arab. J. Sci. Eng. (2024). https:\/\/doi.org\/10.1007\/s13369-024-08900-2","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"4645_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100175","volume":"5","author":"L Zhang","year":"2024","unstructured":"Zhang, L., Ci, L., Wu, Y., Wiwatanapataphee, B.: The real estate time-stamping and registration system based on Ethereum blockchain. Blockchain Res. Appl. 5(1), 100175 (2024)","journal-title":"Blockchain Res. Appl."},{"key":"4645_CR6","unstructured":"Nakamoto, S.: Bitcoin whitepaper. URL: https:\/\/bitcoin.org\/bitcoin.pdf (2008) Accessed 17 July 2019"},{"issue":"2014","key":"4645_CR7","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"4645_CR8","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De\u00a0Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"4645_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2020.102067","volume":"142","author":"P Dutta","year":"2020","unstructured":"Dutta, P., Choi, T.-M., Somani, S., Butala, R.: Blockchain technology in supply chain operations: applications, challenges and research opportunities. Transp. Res. Part E Logist. Transp. Rev. 142, 102067 (2020)","journal-title":"Transp. Res. Part E Logist. Transp. Rev."},{"issue":"1","key":"4645_CR10","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s10586-021-03412-2","volume":"25","author":"J Gong","year":"2022","unstructured":"Gong, J., Navimipour, N.J.: An in-depth and systematic literature review on the blockchain-based approaches for cloud computing. Cluster Comput. 25(1), 383\u2013400 (2022)","journal-title":"Cluster Comput."},{"issue":"5","key":"4645_CR11","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/spy2.83","volume":"2","author":"A Saha","year":"2019","unstructured":"Saha, A., Amin, R., Kunal, S., Vollala, S., Dwivedi, S.K.: Review on \u201cblockchain technology based medical healthcare system with privacy issues\u2019\u2019. Secur. Privacy 2(5), 83 (2019)","journal-title":"Secur. Privacy"},{"issue":"8","key":"4645_CR12","doi-asserted-by":"publisher","first-page":"5045","DOI":"10.1016\/j.jksuci.2021.05.002","volume":"34","author":"K Shuaib","year":"2022","unstructured":"Shuaib, K., Abdella, J., Sallabi, F., Serhani, M.A.: Secure decentralized electronic health records sharing system based on blockchains. Journal of King Saud University-Computer and Information Sciences 34(8), 5045\u20135058 (2022)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"4645_CR13","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in blockchain based iot systems: Integration issues, prospects, challenges, and future research directions. Future Gener. Comput. Syst. 97, 512\u2013529 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"4645_CR14","first-page":"726","volume":"35","author":"OA Khashan","year":"2023","unstructured":"Khashan, O.A., Khafajah, N.M.: Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous iot systems. J. King Saud Univ. Comput. Inf. Sci. 35(2), 726\u2013739 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"4645_CR15","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.future.2022.11.006","volume":"141","author":"N Wu","year":"2023","unstructured":"Wu, N., Xu, L., Zhu, L.: A blockchain based access control scheme with hidden policy and attribute. Future Gener. Comput. Syst. 141, 186\u2013196 (2023)","journal-title":"Future Gener. Comput. Syst."},{"issue":"10","key":"4645_CR16","first-page":"9216","volume":"34","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Zhang, L., Wu, Q., Mu, Y.: Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in iov. J. King Saud Univ. Comput. Inf. Sci. 34(10), 9216\u20139227 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"4645_CR17","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"4645_CR18","doi-asserted-by":"crossref","unstructured":"W\u00fcst, K., Gervais, A.: Do you need a blockchain? In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 45\u201354. IEEE (2018)","DOI":"10.1109\/CVCBT.2018.00011"},{"issue":"9","key":"4645_CR19","first-page":"6719","volume":"34","author":"AG Gad","year":"2022","unstructured":"Gad, A.G., Mosa, D.T., Abualigah, L., Abohany, A.A.: Emerging trends in blockchain technology and applications: a review and outlook. J. King Saud Univ. Comput. Inf. Sci. 34(9), 6719\u20136742 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"4645_CR20","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang, W., Hoang, D.T., Hu, P., Xiong, Z., Niyato, D., Wang, P., Wen, Y., Kim, D.I.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328\u201322370 (2019)","journal-title":"IEEE Access"},{"key":"4645_CR21","doi-asserted-by":"crossref","unstructured":"Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G.: Sok: Consensus in the age of blockchains. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 183\u2013198 (2019)","DOI":"10.1145\/3318041.3355458"},{"key":"4645_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385","volume":"154","author":"SMH Bamakan","year":"2020","unstructured":"Bamakan, S.M.H., Motavali, A., Bondarti, A.B.: A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 154, 113385 (2020)","journal-title":"Expert Syst. Appl."},{"key":"4645_CR23","doi-asserted-by":"crossref","unstructured":"Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers 19, pp. 507\u2013527. Springer (2015)","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"4645_CR24","doi-asserted-by":"crossref","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: Proceedings of the 22nd ACM Sigsac Conference on Computer and Communications Security, pp. 706\u2013719 (2015)","DOI":"10.1145\/2810103.2813659"},{"key":"4645_CR25","series-title":"Texts in Theoretical Computer Science. An EATCS Series","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-319-42900-7_16","volume-title":"Models of Computation","author":"R Bruni","year":"2017","unstructured":"Bruni, R., Montanari, U.: PEPA - Performance evaluation process algebra. In: Models of Computation. Texts in Theoretical Computer Science. An EATCS Series, pp. 343\u2013356. Springer, Cham (2017)"},{"issue":"8","key":"4645_CR26","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.peva.2009.07.005","volume":"67","author":"Y Zhao","year":"2010","unstructured":"Zhao, Y., Thomas, N.: Efficient solutions of a pepa model of a key distribution centre. Perform. Eval. 67(8), 740\u2013756 (2010). https:\/\/doi.org\/10.1016\/j.peva.2009.07.005. (Special Issue on Software and Performance)","journal-title":"Perform. Eval."},{"key":"4645_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.entcs.2020.09.016","volume":"353","author":"O Almutairi","year":"2020","unstructured":"Almutairi, O., Thomas, N.: Performance modelling of the impact of cyber attacks on a web-based sales system. Electr. Notes Theoret. Comput. Sci. 353, 5\u201320 (2020). https:\/\/doi.org\/10.1016\/j.entcs.2020.09.016. (Tenth International Workshop on the Practical Application of Stochastic Modelling (PASM))","journal-title":"Electr. Notes Theoret. Comput. Sci."},{"key":"4645_CR28","doi-asserted-by":"publisher","unstructured":"Sanders, W.S., Srivastava, S., Banicescu, I.: Performance modeling of scalable resource allocations with the imperial pepa compiler. In: 2022 21st International Symposium on Parallel and Distributed Computing (ISPDC), pp. 99\u2013106 (2022). https:\/\/doi.org\/10.1109\/ISPDC55340.2022.00023","DOI":"10.1109\/ISPDC55340.2022.00023"},{"key":"4645_CR29","volume-title":"A Compositional Approach to Performance Modelling","author":"J Hillston","year":"2005","unstructured":"Hillston, J.: A Compositional Approach to Performance Modelling, vol. 12. Cambridge University Press, Cambridge (2005)"},{"key":"4645_CR30","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/3-540-58021-2_20","volume-title":"Computer Performance Evaluation Modelling Techniques and Tools","author":"S Gilmore","year":"1994","unstructured":"Gilmore, S., Hillston, J.: The pepa workbench: A tool to support a process algebra-based approach to performance modelling. In: Haring, G., Kotsis, G. (eds.) Computer Performance Evaluation Modelling Techniques and Tools, pp. 353\u2013368. Springer, Berlin (1994)"},{"issue":"4","key":"4645_CR31","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/1530873.1530880","volume":"36","author":"M Tribastone","year":"2009","unstructured":"Tribastone, M., Duguid, A., Gilmore, S.: The pepa eclipse plugin. ACM Sigmetrics Perform. Eval. Rev. 36(4), 28\u201333 (2009)","journal-title":"ACM Sigmetrics Perform. Eval. Rev."},{"key":"4645_CR32","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings, pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/P2P.2013.6688698"},{"key":"4645_CR33","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"4645_CR34","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3389\/fbloc.2020.00028","volume":"3","author":"M Alharby","year":"2020","unstructured":"Alharby, M., Moorsel, A.: Blocksim: An extensible simulation tool for blockchain systems. Front. Blockchain 3, 28 (2020)","journal-title":"Front. Blockchain"},{"key":"4645_CR35","doi-asserted-by":"crossref","unstructured":"Alharby, M., Lunardi, R.C., Aldweesh, A., Van\u00a0Moorsel, A.: Data-driven model-based analysis of the ethereum verifier\u2019s dilemma. In: 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 209\u2013220. IEEE (2020).","DOI":"10.1109\/DSN48063.2020.00038"},{"issue":"6","key":"4645_CR36","doi-asserted-by":"publisher","first-page":"193","DOI":"10.3390\/a15060193","volume":"15","author":"R Antwi","year":"2022","unstructured":"Antwi, R., Gadze, J.D., Tchao, E.T., Sikora, A., Nunoo-Mensah, H., Agbemenu, A.S., Obour Agyekum, K.O.-B., Agyemang, J.O., Welte, D., Keelson, E.: A survey on network optimization techniques for blockchain systems. Algorithms 15(6), 193 (2022)","journal-title":"Algorithms"},{"key":"4645_CR37","doi-asserted-by":"crossref","unstructured":"Smuseva, D., Malakhov, I., Marin, A., Moorsel, A., Rossi, S.: Verifier\u2019s dilemma in ethereum blockchain: A quantitative analysis. In: International Conference on Quantitative Evaluation of Systems, pp. 317\u2013336. Springer (2022).","DOI":"10.1007\/978-3-031-16336-4_16"},{"issue":"17","key":"4645_CR38","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.3390\/electronics10172135","volume":"10","author":"H Kim","year":"2021","unstructured":"Kim, H., Kim, D.: Adjusting the block interval in pow consensus by block interval process improvement. Electronics 10(17), 2135 (2021)","journal-title":"Electronics"},{"key":"4645_CR39","doi-asserted-by":"publisher","first-page":"17489","DOI":"10.1109\/ACCESS.2020.2967861","volume":"8","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Hei, Y., Xu, T., Liu, J.: An evaluation of uncle block mechanism effect on Ethereum selfish and stubborn mining combined with an eclipse attack. IEEE Access 8, 17489\u201317499 (2020)","journal-title":"IEEE Access"},{"key":"4645_CR40","first-page":"835","volume":"19","author":"Q Wang","year":"2023","unstructured":"Wang, Q., Li, C., Xia, T., Ren, Y., Wang, D., Zhang, G., Choo, K.-K.R.: Optimal selfish mining-based denial-of-service attack. IEEE Trans. Inf. Forensics Secur 19, 835\u2013850 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"4645_CR41","doi-asserted-by":"publisher","first-page":"3116","DOI":"10.1109\/TIFS.2023.3275736","volume":"18","author":"Q Bai","year":"2023","unstructured":"Bai, Q., Xu, Y., Liu, N., Wang, X.: Blockchain mining with multiple selfish miners. IEEE Trans. Inf. Forensics Secur. 18, 3116\u20133131 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4645_CR42","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, Q., Turnbull, S.J., Omote, K.: The validator\u2019s dilemma in pow blockchain: An evolutionary game perspective. In: 2023 IEEE International Conference on Blockchain (Blockchain), pp. 17\u201324. IEEE (2023)","DOI":"10.1109\/Blockchain60715.2023.00013"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04645-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04645-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04645-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T02:37:39Z","timestamp":1732415859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04645-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,14]]},"references-count":42,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["4645"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04645-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,14]]},"assertion":[{"value":"28 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors confirm that they do not have any Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"his article does not involve any studies with human participants or animals conducted by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"No informed consent was obtained for this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}