2019
DOI: 10.3390/sym11070941
|View full text |Cite
|
Sign up to set email alerts
|

Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks

Abstract: Pool hopping attack is the result of miners leaving the pool when it offers fewer financial rewards and joining back when the rewards of mining yield higher rewards in blockchain networks. This act of leaving and rejoining the pool only during the good times results in the miner receiving more rewards than the computational power they contribute. Miners exiting the pool deprive it of its collective hash power, which leaves the pool unable to mine the block successfully. This results in its competitors mining t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…The emergent technology BC is a secure distributed ledger that shares any information in real time between significant participating nodes, that is, it shares the copy of the ledger with each participating node [13]. It has various characteristics such as transparency, trust, security, privacy, and immutability.…”
Section: Blockchain: Security and Privacy Aspectsmentioning
confidence: 99%
“…The emergent technology BC is a secure distributed ledger that shares any information in real time between significant participating nodes, that is, it shares the copy of the ledger with each participating node [13]. It has various characteristics such as transparency, trust, security, privacy, and immutability.…”
Section: Blockchain: Security and Privacy Aspectsmentioning
confidence: 99%
“…It manages the transactions between the peer nodes in a blockchain network using the SC (a set of a computer program) under specific terms and conditions. 59 To ensure the reliability within a blockchain network, it involves various consensus algorithms such as proof-of-state (PoS), proof-of-burn (PoB), PoA, proof-of-work (PoW), delegated PoS (DPoS), practical byzantine fault tolerance (PBFT), proof-of-elapsed time (PoET), and federated BFT.…”
Section: Blockchainmentioning
confidence: 99%
“…Network Coding is a key enabler for scaling bandwidth and optimizing energy consumption in the UDN environment. However, before moving to the phase of network coding and adaptation in 5G network deployment, the security vulnerabilities need to be considered [50]. Adat et al [51] considered this issue and proposed a blockchain-based message authentication scheme, which can minimize the delay and signaling costs, all while studying the performance of Random Linear Network Coding for wireless mobile networks.…”
Section: Secure Network Codingmentioning
confidence: 99%