{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:07Z","timestamp":1773615547976,"version":"3.50.1"},"reference-count":24,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625701044","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:14Z","timestamp":1771936454000},"page":"1484-1490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Smart City Blockchain Systems from Selfish Mining Attacks"],"prefix":"10.3103","volume":"59","author":[{"given":"M. O.","family":"Kalinin","sequence":"first","affiliation":[]},{"given":"A. S.","family":"Konoplev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7939_CR1","doi-asserted-by":"publisher","unstructured":"Pechenkin, A.I., Poltavtseva, M.A., and Lavrova, D.S., An approach to data normalization in the Internet of Things for security analysis, Programmnye Produkty i Sistemy, 2016, no. 2, pp. 83\u201388. https:\/\/doi.org\/10.15827\/0236-235X.114.083-088","DOI":"10.15827\/0236-235X.114.083-088"},{"key":"7939_CR2","unstructured":"Moskvin, D.A., Ovasapyan, T.D., and Nikulkin, V.A., Adaptive control of honeypot system for Internet of Things cybersecurity, Zashchita Informatsii. Insaid, 2022, no. 2, pp. 16\u201321."},{"key":"7939_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.31577\/cai_2022_2_405","volume":"41","author":"R.W. Anwar","year":"2022","unstructured":"Anwar, R.W. and Ali, S., Smart cities security threat landscape: A review, Comput. Inf., 2022, vol. 41, no. 2, pp.\u00a0405\u2013423. https:\/\/doi.org\/10.31577\/cai_2022_2_405","journal-title":"Comput. Inf."},{"key":"7939_CR4","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.3390\/electronics12041036","volume":"12","author":"S. Biswas","year":"2023","unstructured":"Biswas, S., Yao, Z., Yan, L., Alqhatani, A., Bairagi, A.K., Asiri, F., and Masud, M., Interoperability benefits and challenges in smart city services: Blockchain as a solution, Electronics, 2023, vol. 12, no. 4, p. 1036. https:\/\/doi.org\/10.3390\/electronics12041036","journal-title":"Electronics"},{"key":"7939_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/mnet.001.1900178","volume":"34","author":"S. Hakak","year":"2020","unstructured":"Hakak, S., Khan, W.Z., Gilkar, G.A., Imran, M., and Guizani, N., Securing smart cities through blockchain technology: Architecture, requirements, and challenges, IEEE Network, 2020, vol. 34, no. 1, pp. 8\u201314. https:\/\/doi.org\/10.1109\/mnet.001.1900178","journal-title":"IEEE Network"},{"key":"7939_CR6","doi-asserted-by":"publisher","first-page":"76805","DOI":"10.1109\/access.2022.3189998","volume":"10","author":"U. Khalil","year":"2022","unstructured":"Khalil, U., Mueen-Uddin, Malik, O.A., and Hussain, S., A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: State-of-the-art advancements, challenges and future research directions, IEEE Access, 2022, vol. 10, pp. 76805\u201376823. https:\/\/doi.org\/10.1109\/access.2022.3189998","journal-title":"IEEE Access"},{"key":"7939_CR7","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.3103\/s0146411618080400","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P., Moskvin, D.A., and Myasnikov, A.V., Assurance of cyber resistance of the distributed data storage systems using the blockchain technology, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1111\u20131116. https:\/\/doi.org\/10.3103\/s0146411618080400","journal-title":"Autom. Control Comput. Sci."},{"key":"7939_CR8","doi-asserted-by":"publisher","unstructured":"Aggarwal, V. and Gagandeep,, Review of security aspects of 51 percent attack on blockchain, Machine Learning and Big Data Analytics (Proceedings of International Conference on Machine Learning and Big Data Analytics (ICMLBDA) \n               2021), Misra, R., Shyamasundar, R.K., Chaturvedi, A., and Omer, R., Eds., Lecture Notes in Networks and Systems, vol. 256, Cham: Springer, 2022, pp. 236\u2013243. https:\/\/doi.org\/10.1007\/978-3-030-82469-3_21","DOI":"10.1007\/978-3-030-82469-3_21"},{"key":"7939_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I. Eyal","year":"2018","unstructured":"Eyal, I. and Sirer, E.G., Majority is not enough: Bitcoin mining is vulnerable, Commun. ACM, 2018, vol. 61, no.\u00a07, pp. 95\u2013102. https:\/\/doi.org\/10.1145\/3212998","journal-title":"Commun. ACM"},{"key":"7939_CR10","doi-asserted-by":"publisher","unstructured":"Peterson, M., Andel, T., and Benton, R., Towards detection of selfish mining using machine learning, International Conference on Cyber Warfare and Security, 2022, vol. 17, no. 1, pp. 237\u2013243. https:\/\/doi.org\/10.34190\/iccws.17.1.15","DOI":"10.34190\/iccws.17.1.15"},{"key":"7939_CR11","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.1109\/tnsm.2021.3073414","volume":"18","author":"H. Kang","year":"2021","unstructured":"Kang, H., Chang, X., Yang, R., Misic, J., and Misic, V.B., Understanding selfish mining in imperfect Bitcoin and Ethereum networks with extended forks, IEEE Trans. Network Service Manage., 2021, vol. 18, no. 3, pp.\u00a03079\u20133091. https:\/\/doi.org\/10.1109\/tnsm.2021.3073414","journal-title":"IEEE Trans. Network Service Manage."},{"key":"7939_CR12","doi-asserted-by":"publisher","unstructured":"Saad, M., Njilla, L., Kamhoua, Ch., and Mohaisen, A., Countering selfish mining in blockchains, 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, 2019, IEEE, 2019, pp. 360\u2013364. https:\/\/doi.org\/10.1109\/iccnc.2019.8685577","DOI":"10.1109\/iccnc.2019.8685577"},{"key":"7939_CR13","doi-asserted-by":"publisher","first-page":"5959698","DOI":"10.1155\/2021\/5959698","volume":"2021","author":"Zh. Wang","year":"2021","unstructured":"Wang, Zh., Lv, Q., Lu, Zh., Wang, Yi., and Yue, Sh., ForkDec: Accurate detection for selfish mining attacks, Security and Communication Networks, 2021, vol. 2021, p. 5959698. https:\/\/doi.org\/10.1155\/2021\/5959698","journal-title":"Security and Communication Networks"},{"key":"7939_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s12243-019-00746-2","volume":"75","author":"V. Chicarino","year":"2020","unstructured":"Chicarino, V., Albuquerque, C., Jesus, E., and Rocha, A., On the detection of selfish mining and stalker attacks in blockchain networks, Ann. Telecommun., 2020, vol. 75, nos. 3\u20134, pp. 143\u2013152. https:\/\/doi.org\/10.1007\/s12243-019-00746-2","journal-title":"Ann. Telecommun."},{"key":"7939_CR15","unstructured":"Khan, M.I., Deep reinforcement learning for selfish nodes detection in a blockchain, French Regional Conference on Complex Systems, 2023."},{"key":"7939_CR16","doi-asserted-by":"publisher","unstructured":"Ritz, F. and Zugenmaier, A., The impact of uncle rewards on selfish mining in Ethereum, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS amp;PW), London, 2018, IEEE, 2018, pp. 50\u201357. https:\/\/doi.org\/10.1109\/eurospw.2018.00013","DOI":"10.1109\/eurospw.2018.00013"},{"key":"7939_CR17","doi-asserted-by":"publisher","unstructured":"Tosh, D.K., Shetty, S., Liang, X., Kamhoua, Ch.A., Kwiat, K.A., and Njilla, L., Security implications of blockchain cloud with analysis of block withholding attack, 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, 2017, IEEE, 2017, pp. 458\u2013467. https:\/\/doi.org\/10.1109\/ccgrid.2017.111","DOI":"10.1109\/ccgrid.2017.111"},{"key":"7939_CR18","doi-asserted-by":"publisher","unstructured":"Zhang, R. and Preneel, B., Publish or perish: A backward-compatible defense against selfish mining in Bitcoin, Topics in Cryptology\u2013CT-RSA 2017, Handschuh, H., Ed., Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, vol. 10159, Cham: Springer, 2017, pp. 277\u2013292. https:\/\/doi.org\/10.1007\/978-3-319-52153-4_16","DOI":"10.1007\/978-3-319-52153-4_16"},{"key":"7939_CR19","doi-asserted-by":"publisher","unstructured":"Nikhalat-Jahromi, A., Saghiri, A.M., and Meybodi, M.R., VDHLA: Variable depth hybrid learning automaton and its application to defense against the selfish mining attack in Bitcoin, arXiv Preprint, 2023. https:\/\/doi.org\/10.48550\/arXiv.2302.12096","DOI":"10.48550\/arXiv.2302.12096"},{"key":"7939_CR20","doi-asserted-by":"publisher","first-page":"766","DOI":"10.3103\/s0146411615080131","volume":"49","author":"V.V. Platonov","year":"2015","unstructured":"Platonov, V.V. and Semenov, P.O., Using data-mining methods to detect network attacks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 766\u2013769. https:\/\/doi.org\/10.3103\/s0146411615080131","journal-title":"Autom. Control Comput. Sci."},{"key":"7939_CR21","doi-asserted-by":"publisher","unstructured":"K\u0119dziora, M., Koz\u0142owski, P., Szczepanik, M., and J\u00f3\u017awiak, P., Analysis of blockchain selfish mining attacks, Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology\u2013ISAT 2019, Borzemski, L., \u015awi\u0105tek, J., and Wilimowska, Z., Eds., Advances in Intelligent Systems and Computing, vol. 1050, Cham: Springer, 2020, pp. 231\u2013240. https:\/\/doi.org\/10.1007\/978-3-030-30440-9_22","DOI":"10.1007\/978-3-030-30440-9_22"},{"key":"7939_CR22","unstructured":"Past and future of bitcoin mining protocols: Stratum V2 overview, Braiins Systems s.r.o, Prague. https:\/\/braiins.com\/blog\/past-and-future-of-bitcoin-mining-protocols-stratum-v2-overview. Cited March 27, 2025."},{"key":"7939_CR23","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.icte.2022.03.003","volume":"9","author":"S. Lee","year":"2023","unstructured":"Lee, S. and Kim, S., Rethinking selfish mining under pooled mining, ICT Express, 2023, vol. 9, no. 3, pp. 356\u2013361. https:\/\/doi.org\/10.1016\/j.icte.2022.03.003","journal-title":"ICT Express"},{"key":"7939_CR24","unstructured":"Aleksandrova, E.B. and Yarmak, A.V., Hierarchical group-based authentication for Industrial Internet of Things, Zashchita Informatsii. Insaid, 2021, no. 2, pp. 23\u201327."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701044.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625701044","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701044.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:23Z","timestamp":1773612083000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625701044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7939"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625701044","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"29 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}