{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:50:42Z","timestamp":1770526242972,"version":"3.49.0"},"reference-count":21,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and communications Technology Promotion","doi-asserted-by":"publisher","award":["IITP-2018-2014-1-00720"],"award-info":[{"award-number":["IITP-2018-2014-1-00720"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Pool hopping attack is the result of miners leaving the pool when it offers fewer financial rewards and joining back when the rewards of mining yield higher rewards in blockchain networks. This act of leaving and rejoining the pool only during the good times results in the miner receiving more rewards than the computational power they contribute. Miners exiting the pool deprive it of its collective hash power, which leaves the pool unable to mine the block successfully. This results in its competitors mining the block before they can finish mining. Existing research shows pool hopping resistant measures and detection strategies; however, they do not offer any robust preventive solution to discourage miners from leaving the mining pool. To prevent pool hopping attacks, a smart contract-based pool hopping attack prevention model is proposed. The main objective of our research is maintaining the symmetrical relationship between the miners by requiring them all to continually contribute their computational power to successfully mine a block. We implement a ledger containing records of all miners, in the form of a miner certificate, which tracks the history of the miner\u2019s earlier behavior. The certificate enables a pool manager to better initiate terms of the smart contract, which safeguards the interests of existing mining pool members. The model prevents frequent mine hoppers from pool hopping as they submit coins in the form of an escrow and risk losing them if they abandon the pool before completing mining of the block. The key critical factors that every pool hopping attack prevention solution must address and a study of comparative analysis with existing solutions are presented in the paper.<\/jats:p>","DOI":"10.3390\/sym11070941","type":"journal-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T02:55:37Z","timestamp":1563764137000},"page":"941","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0030-5691","authenticated-orcid":false,"given":"Sushil","family":"Singh","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7870-9368","authenticated-orcid":false,"given":"Mikail","family":"Salim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7668-0933","authenticated-orcid":false,"given":"Minjeong","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeonghun","family":"Cha","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi","family":"Pan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Georgia State University, Atlanta, GA 30302-5060, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1831-0309","authenticated-orcid":false,"given":"Jong","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"ref_1","unstructured":"Nakamoto, S. (2019, May 08). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ferreira, M., Rodrigues, S., Reis, C., and Maximiano, M. (2018). Blockchain: A Tale of Two Applications. Appl. Sci., 8.","DOI":"10.3390\/app8091506"},{"key":"ref_3","first-page":"101","article-title":"A Survey about Consensus Algorithms Used in Blockchain","volume":"14","author":"Nguyen","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Johnson, B., Laszka, A., Grossklags, J., Vasek, M., and Moore, T. (2014, January 3\u20137). Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados.","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Fisch, B., Pass, R., and Shelat, A. (2017, January 17\u201320). Socially optimal mining pools. Proceedings of the International Conference on Web and Internet Economics, Bangalore, India.","DOI":"10.1007\/978-3-319-71924-5_15"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.future.2019.03.002","article-title":"Block withholding game among bitcoin mining pools","volume":"97","author":"Haghighat","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","unstructured":"(2019, May 08). Mining Pool Starts. Available online: https:\/\/miningpoolstats.stream\/bitcoin."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Liang, X., Shetty, S., and Tosh, D. (2018, January 16\u201319). Exploring the Attack Surfaces in Blockchain Enabled Smart Cities. Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA.","DOI":"10.1109\/ISC2.2018.8656852"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kwon, Y., Kim, D., Son, Y., Vasserman, E., and Kim, Y. (November, January 30). Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134019"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Park, J., and Park, J. (2017). Blockchain security in cloud computing: Use cases, challenges, and solutions. Symmetry, 9.","DOI":"10.3390\/sym9080164"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"67189","DOI":"10.1109\/ACCESS.2018.2874539","article-title":"Bitcoin concepts, threats, and machine-learning security solutions","volume":"6","author":"Rahouti","year":"2018","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4614","DOI":"10.1109\/JIOT.2018.2872458","article-title":"Coin Hopping Attack in Blockchain-based IoT","volume":"6","author":"Zhu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ch\u00e1vez, J.J.G., and da Silva Rodrigues, C.K. (September, January 31). Automatic hopping among pools and distributed applications in the Bitcoin network. Proceedings of the 2016 XXI Symposium on Signal. Processing, Images and Artificial Vision (STSIVA), Bucaramanga, DC, USA.","DOI":"10.1109\/STSIVA.2016.7743340"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Belotti, M., Kirati, S., and Secci, S. (2018, January 10\u201313). Bitcoin Pool-Hopping Detection. Proceedings of the 2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI), Palermo, Italy.","DOI":"10.1109\/RTSI.2018.8548376"},{"key":"ref_15","unstructured":"(2019, May 16). SLUSH POOL: Stratum Mining Protocol. Available online: https:\/\/slushpool.com\/help\/#!\/manual\/stratum-protocol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Salimitari, M., Chatterjee, M., Yuksel, M., and Pasiliao, E. (2017, January 15\u201317). Profit maximization for bitcoin pool mining: A prospect theoretic approach. Proceedings of the 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, USA.","DOI":"10.1109\/CIC.2017.00043"},{"key":"ref_17","unstructured":"Rosenfeld, M. (2011). Analysis of bitcoin pooled mining reward systems. Distributed, Parallel, and Cluster Computing. arXiv."},{"key":"ref_18","unstructured":"Luu, L., Velner, Y., Teutsch, J., and Saxena, P. (2017, January 16\u201318). Smartpool: Practical decentralized pooled mining. Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada."},{"key":"ref_19","first-page":"837","article-title":"A Solution towards Eliminating Transaction Malleability in Bitcoin","volume":"14","author":"Rajput","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Zamyatin, A., Wolter, K., Werner, S., Harrison, P.G., Mulligan, C.E., and Knottenbelt, W.J. (2017, January 20\u201322). Swimming with Fishes and Sharks: Beneath the Surface of Queue-based Ethereum Mining Pools. Proceedings of the 2017 IEEE 25th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Banff, AB, Canada.","DOI":"10.1109\/MASCOTS.2017.22"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s13673-018-0136-7","article-title":"Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain","volume":"8","author":"Kim","year":"2018","journal-title":"Hum.-Cent. Comput. Inf. Sci."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/7\/941\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:07:28Z","timestamp":1760188048000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/7\/941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":21,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,7]]}},"alternative-id":["sym11070941"],"URL":"https:\/\/doi.org\/10.3390\/sym11070941","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,19]]}}}