{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:02Z","timestamp":1758987602258,"version":"3.44.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02064-y","type":"journal-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T01:29:47Z","timestamp":1751851787000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigation of selfish mining attack using dynamic difficulty adjustment algorithm"],"prefix":"10.1007","volume":"18","author":[{"given":"Shriniwas","family":"Patil","sequence":"first","affiliation":[]},{"given":"Keyur","family":"Parmar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"2064_CR1","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review"},{"key":"2064_CR2","doi-asserted-by":"publisher","unstructured":"Gebraselase BG, Helvik BE, Jiang Y (2022) Bitcoin P2P network measurements: A testbed study of the effect of peer selection on transaction propagation and confirmation times. Trans Netw Serv Manag 19(4):3975\u20133987. https:\/\/doi.org\/10.1109\/TNSM.2022.3216955. IEEE","DOI":"10.1109\/TNSM.2022.3216955"},{"key":"2064_CR3","doi-asserted-by":"publisher","unstructured":"Garay J, Kiayias A, Leonardos N (2024) The bitcoin backbone protocol: Analysis and applications. Journal of the ACM 71(4):1\u201349. https:\/\/doi.org\/10.1145\/3653445. ACM","DOI":"10.1145\/3653445"},{"key":"2064_CR4","doi-asserted-by":"publisher","unstructured":"Seike H, Aoki Y, Koshizuka N (2024) A statistical method for detecting bitcoin mining resource changes considering difficulty adjustments. In: Proceedings of the International conference on omni-layer intelligent systems (COINS), London, United Kingdom, pp 1\u20138. https:\/\/doi.org\/10.1109\/COINS61597.2024.10622338. IEEE","DOI":"10.1109\/COINS61597.2024.10622338"},{"key":"2064_CR5","doi-asserted-by":"publisher","unstructured":"Kitamura Y (2022) Can we stabilize the price of a cryptocurrency? understanding the design of bitcoin and its potential to compete with central bank money. In: Proceedings of the quest for good money: past, present and future, pp 103\u2013123. https:\/\/doi.org\/10.1007\/978-981-19-5591-4_6. Springer","DOI":"10.1007\/978-981-19-5591-4_6"},{"key":"2064_CR6","doi-asserted-by":"publisher","unstructured":"Eyal I, Sirer EG (2018) Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM 61(7):95\u2013102. https:\/\/doi.org\/10.1145\/3212998. ACM","DOI":"10.1145\/3212998"},{"key":"2064_CR7","doi-asserted-by":"publisher","unstructured":"Bai Q, Xu Y, Liu N, Wang X (2023) Blockchain mining with multiple selfish miners. Trans Inf Forensics Sec 18:3116\u20133131. https:\/\/doi.org\/10.1109\/TIFS.2023.3275736. IEEE","DOI":"10.1109\/TIFS.2023.3275736"},{"key":"2064_CR8","doi-asserted-by":"publisher","unstructured":"Bahrani M, Weinberg SM (2024) Undetectable selfish mining. In: Proceedings of the 25th conference on economics and computation, pp 1017\u20131044. https:\/\/doi.org\/10.1145\/3670865.3673485. ACM","DOI":"10.1145\/3670865.3673485"},{"key":"2064_CR9","doi-asserted-by":"publisher","unstructured":"Madhushanie N, Vidanagamachchi S, Arachchilage N (2024) Selfish mining attack in blockchain: a systematic literature review. Intl J Inf Secur 23:1\u201319. https:\/\/doi.org\/10.1007\/s10207-024-00849-5. Springer","DOI":"10.1007\/s10207-024-00849-5"},{"key":"2064_CR10","doi-asserted-by":"publisher","unstructured":"Nayak K, Kumar S, Miller A, Shi E (2016) Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: European symposium on security and privacy (EuroS &P), pp 305\u2013320. https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30. IEEE","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"2064_CR11","doi-asserted-by":"publisher","unstructured":"Sapirshtein A, Sompolinsky Y, Zohar A (2017) Optimal selfish mining strategies in bitcoin. In: Proceedings of the international conference on financial cryptography and data security (FC), Barbados, pp 515\u2013532. https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30. Springer","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"2064_CR12","doi-asserted-by":"publisher","unstructured":"Azimy H, Ghorbani AA, Bagheri E (2022) Preventing proof-of-work mining attacks. Inf Sci 608:1503\u20131523. https:\/\/doi.org\/10.1016\/j.ins.2022.07.035. Elsevier","DOI":"10.1016\/j.ins.2022.07.035"},{"key":"2064_CR13","doi-asserted-by":"publisher","unstructured":"Azimy H, Ghorbani A (2019) Competitive selfish mining. In: Proceedings of the 17th international conference on privacy, security and trust (PST), Fredericton, Canada, pp 1\u20138. https:\/\/doi.org\/10.1109\/PST47121.2019.8949043. IEEE","DOI":"10.1109\/PST47121.2019.8949043"},{"key":"2064_CR14","doi-asserted-by":"publisher","unstructured":"Tovanich N, Souli\u00e9 N, Heulot N, Isenberg P (2022) The evolution of mining pools and miners\u2019 behaviors in the bitcoin blockchain. Trans Netw Serv Manage 19(3):3633\u20133644. https:\/\/doi.org\/10.1109\/TNSM.2022.3159004. IEEE","DOI":"10.1109\/TNSM.2022.3159004"},{"key":"2064_CR15","doi-asserted-by":"publisher","unstructured":"Zhang C, Ma Z, Liu L, Liu Y (2023) Modeling & analysis of block generation process of the mining pool in blockchain system. Peer-to-Peer Netw Appl 16(2):475\u2013487. https:\/\/doi.org\/10.1007\/s12083-022-01359-8. Springer","DOI":"10.1007\/s12083-022-01359-8"},{"key":"2064_CR16","unstructured":"Lewenberg Y, Bachrach Y, Sompolinsky Y, Zohar A, Rosenschein JS (2015) Bitcoin mining pools: A cooperative game theoretic analysis. In: Proceedings of the 14th international conference on autonomous agents and multiagent systems (AAMS), Istanbul, Turkey, pp 919\u2013927"},{"key":"2064_CR17","doi-asserted-by":"publisher","unstructured":"Lee S, Kim S (2023) Rethinking selfish mining under pooled mining. ICT Express 9(3):356\u2013361. https:\/\/doi.org\/10.1016\/j.icte.2022.03.003. Elsevier","DOI":"10.1016\/j.icte.2022.03.003"},{"key":"2064_CR18","unstructured":"Yang R, Chang X, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB (2021) Deep-dive analysis of selfish and stubborn mining in bitcoin and ethereum. arXiv:2112.02588"},{"key":"2064_CR19","doi-asserted-by":"publisher","unstructured":"Bag S, Ruj S, Sakurai K (2016) Bitcoin block withholding attack: Analysis and mitigation. Trans Inf Forensics Secur 12(8):1967\u20131978. https:\/\/doi.org\/10.1109\/TIFS.2016.2623588. IEEE","DOI":"10.1109\/TIFS.2016.2623588"},{"key":"2064_CR20","doi-asserted-by":"publisher","unstructured":"Conti M, Kumar ES, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. Commun Surv & Tutor 20(4):3416\u20133452. https:\/\/doi.org\/10.1109\/COMST.2018.2842460. IEEE","DOI":"10.1109\/COMST.2018.2842460"},{"key":"2064_CR21","doi-asserted-by":"publisher","unstructured":"Gangwal A, Conti M (2019) Cryptomining cannot change its spots: Detecting covert cryptomining using magnetic side-channel. Trans Inf Forensics Secur 15:1630\u20131639. https:\/\/doi.org\/10.1109\/TIFS.2019.2945171. IEEE","DOI":"10.1109\/TIFS.2019.2945171"},{"key":"2064_CR22","doi-asserted-by":"publisher","unstructured":"Kwon Y, Kim D, Son Y, Vasserman E, Kim Y (2017) Be selfish and avoid dilemmas: Fork after withholding (FAW) attacks on bitcoin. In: Proceedings of the conference on computer and communications security (CCS), Dallas, USA, pp 195\u2013209. ACM. https:\/\/doi.org\/10.1145\/3133956.3134019","DOI":"10.1145\/3133956.3134019"},{"key":"2064_CR23","doi-asserted-by":"publisher","unstructured":"Zhu H, Chang X, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Yang R (2022) Revisiting faw attack in an imperfect pow blockchain system. Peer-to-Peer Netw Appl 15(5):2430\u20132443. https:\/\/doi.org\/10.1007\/s12083-022-01360-1. Springer","DOI":"10.1007\/s12083-022-01360-1"},{"key":"2064_CR24","doi-asserted-by":"publisher","unstructured":"Xia Q, Dou W, Xi T, Zeng J, Zhang F, Wei J, Liang G (2021) The impact analysis of multiple miners and propagation delay on selfish mining. In: Proceedings of the 45th annual computers, software, and applications conference (COMPSAC), Madrid, Spain, pp 694\u2013703. https:\/\/doi.org\/10.1109\/COMPSAC51774.2021.00101. IEEE","DOI":"10.1109\/COMPSAC51774.2021.00101"},{"key":"2064_CR25","doi-asserted-by":"publisher","unstructured":"Motlagh SG, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB (2021) Analysis of selfish miner behavior in the bitcoin network. In: Proceedings of the international conference on communications (ICC), Montreal, Canada, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICC42927.2021.9500701. IEEE","DOI":"10.1109\/ICC42927.2021.9500701"},{"key":"2064_CR26","doi-asserted-by":"publisher","unstructured":"Sarenche R, Zhang R, Nikova S, Preneel B (2024) Selfish mining time-averaged analysis in bitcoin: Is orphan reporting an effective countermeasure? Trans Inf Foren Secur 20:449\u2013464. https:\/\/doi.org\/10.1109\/TIFS.2024.3518090. IEEE","DOI":"10.1109\/TIFS.2024.3518090"},{"key":"2064_CR27","doi-asserted-by":"publisher","unstructured":"Motlagh SG, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB (2021) The impact of selfish mining on bitcoin network performance. Trans Netw Sci Eng 8(1):724\u2013735. https:\/\/doi.org\/10.1109\/TNSE.2021.3050034. IEEE","DOI":"10.1109\/TNSE.2021.3050034"},{"key":"2064_CR28","doi-asserted-by":"publisher","unstructured":"Wang H, Yan Q, Leung VC (2021) The impact of propagation delay to different selfish miners in proof-of-work blockchains. Peer-to-Peer Netw Appl, pp 1\u20138. https:\/\/doi.org\/10.1007\/s12083-021-01087-5. Springer","DOI":"10.1007\/s12083-021-01087-5"},{"key":"2064_CR29","doi-asserted-by":"publisher","unstructured":"Zhang S, Zhang K, Kemme B (2020) A simulation-based analysis of multiplayer selfish mining. In: Proceedings of the international conference on blockchain and cryptocurrency (ICBC), Toronto, Canada, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICBC48266.2020.9169446. IEEE","DOI":"10.1109\/ICBC48266.2020.9169446"},{"key":"2064_CR30","doi-asserted-by":"publisher","unstructured":"Li C, Spychiger F, Tessone CJ (2022) The miner\u2019s dilemma with migration: The control effect of solo-mining. Trans Netw Serv Manag 20(3):2760\u20132770. https:\/\/doi.org\/10.1109\/TNSM.2022.3232183. IEEE","DOI":"10.1109\/TNSM.2022.3232183"},{"key":"2064_CR31","doi-asserted-by":"publisher","unstructured":"Liu H, Ruan N, Du R, Jia W (2018) On the strategy and behavior of bitcoin mining with n-attackers. In: Proceedings of the asia conference on computer and communications security (ASIACCS), New York, USA, pp 357\u2013368. https:\/\/doi.org\/10.1145\/3196494.3196512","DOI":"10.1145\/3196494.3196512"},{"key":"2064_CR32","doi-asserted-by":"publisher","unstructured":"Heilman E (2014) One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In: Proceedings of the Financial cryptography and data security (FC), Barbados, pp 161\u2013162. https:\/\/doi.org\/10.1007\/978-3-662-44774-1_12. Springer","DOI":"10.1007\/978-3-662-44774-1_12"},{"key":"2064_CR33","unstructured":"Solat S, Potop-Butucaru M (2016) Zeroblock: Preventing selfish mining in bitcoin. arXiv:1605.02435"},{"key":"2064_CR34","doi-asserted-by":"publisher","unstructured":"Ren W, Hu J, Zhu T, Ren Y, Choo K-KR (2020) A flexible method to defend against computationally resourceful miners in blockchain proof of work. Information Sciences 507:161\u2013171. https:\/\/doi.org\/10.1016\/j.ins.2019.08.031. Elsevier","DOI":"10.1016\/j.ins.2019.08.031"},{"key":"2064_CR35","doi-asserted-by":"publisher","unstructured":"Saad M, Njilla L, Kamhoua C, Mohaisen A (2019) Countering selfish mining in blockchains. In: Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Hawaii, USA, pp. 360\u2013364. https:\/\/doi.org\/10.1109\/ICCNC.2019.8685577. IEEE","DOI":"10.1109\/ICCNC.2019.8685577"},{"key":"2064_CR36","doi-asserted-by":"publisher","unstructured":"Madhushanie N, Vidanagamachchi S, Arachchilage N (2024) BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology. Intl J Inf Secur, pp 1\u201310. https:\/\/doi.org\/10.1007\/s10207-024-00857-5. Springer","DOI":"10.1007\/s10207-024-00857-5"},{"key":"2064_CR37","doi-asserted-by":"publisher","unstructured":"Bi\u00e7er O, K\u00fcp\u00e7\u00fc A (2023) FORTIS: Selfish mining mitigation by (FOR) geable (TI) me (S) tamps. Distributed Ledger Technologies: Res Pract 2(4):1\u201326. https:\/\/doi.org\/10.1145\/3616397. ACM","DOI":"10.1145\/3616397"},{"key":"2064_CR38","doi-asserted-by":"publisher","unstructured":"Xia Q, Dou W, Zhang F, Liang G (2021) The performance of selfish mining in ghost. In: Proceedings of the 20th International conference on trust, security and privacy in computing and communications (TrustCom), Shenyang, China, pp 26\u201333. https:\/\/doi.org\/10.1109\/TrustCom53373.2021.00022. IEEE","DOI":"10.1109\/TrustCom53373.2021.00022"},{"key":"2064_CR39","doi-asserted-by":"publisher","unstructured":"Yang R, Chang X, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Kang H (2022) Quantitative comparison of two chain-selection protocols under selfish mining attack. Trans Netw Serv Manage 19(2):1142\u20131158. https:\/\/doi.org\/10.1109\/TNSM.2022.3151083. IEEE","DOI":"10.1109\/TNSM.2022.3151083"},{"key":"2064_CR40","doi-asserted-by":"publisher","unstructured":"Sharifian Z, Saidi H, Fanian A, Gulliver TA (2023) A new approach to orphan blocks in the nakamoto consensus blockchain. Trans Netw Sci Eng 11(2):1771\u20131784. https:\/\/doi.org\/10.1109\/TNSE.2023.3331014. IEEE","DOI":"10.1109\/TNSE.2023.3331014"},{"key":"2064_CR41","doi-asserted-by":"crossref","unstructured":"Wright DCS, Savanah S (2017) The fallacy of the selfish miner in bitcoin: An economic critique. Available at SSRN 3009466","DOI":"10.2139\/ssrn.3009466"},{"key":"2064_CR42","doi-asserted-by":"publisher","unstructured":"Jiang Y, Zhang J (2024) Profitability analysis of time-restricted double-spending attack on pow-based large scale blockchains with the aid of multiple attacks. Trans Inf Forensics Secur 19:8155\u20138171. https:\/\/doi.org\/10.1109\/TIFS.2024.3449224. IEEE","DOI":"10.1109\/TIFS.2024.3449224"},{"key":"2064_CR43","unstructured":"Grunspan C, P\u00e9rez-Marco R (2019) On profitability of selfish mining. arXiv:1805.08281"},{"key":"2064_CR44","unstructured":"Davidson M, Diamond T (2020) On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms. Cryptology ePrint Archive, Paper 2020\/094. https:\/\/eprint.iacr.org\/2020\/094"},{"key":"2064_CR45","doi-asserted-by":"publisher","unstructured":"Negy KA, Rizun PR, Sirer EG (2020) Selfish mining re-examined. In: Proceedings of the international conference on financial cryptography and data security (FC), Sabah, Malaysia, pp 61\u201378. https:\/\/doi.org\/10.1007\/978-3-030-51280-4_5. Springer","DOI":"10.1007\/978-3-030-51280-4_5"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02064-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02064-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02064-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:02Z","timestamp":1758986522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02064-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2064"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02064-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"5 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"235"}}