Skip to main content
Log in

Selfish mining attack in blockchain: a systematic literature review

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Selfish mining is a sneaky way that some people cheat in blockchain networks or distributed digital ledger systems. They do it by mining a block in secret and keeping it hidden. Then, when the secret chain of these miners’ are longer than the real one, they show it to everyone, and the blockchain system selects the longest chain as the valid chain. This leads to the network adopting the longest chain as the valid one, resulting in the effort put into mining by other miners becoming futile. By doing this, selfish miners in the blockchain network have a high potential to get more rewards. This behavior goes against the rules of blockchain networks, where everyone is supposed to play by the same rules and have an equal chance of getting rewards. This prejudiced action of selfish miners have motivated us to investigate systematically the existing methods that are being used to address the selfish mining attacks. Therefore, we conducted a SLR (systematic literature review) of 29 papers using the Kitchenham methodology and put that into PRISMA framework. This study aims to investigate methods for detecting and mitigating selfish mining attacks, their limitations, and future directions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no data sets were generated or analyzed during the current study.

Notes

  1. SARSA - State-Action-Reward-State-Action.

References

  1. Marwa Chaieb, S., Yousfi, P., Lafourcade, Robbana, R.: Verify-your-vote: A verifiable blockchain-based online voting protocol. In Information Systems: 15th European, Mediterranean, and Middle Eastern Conference, EMCIS Limassol, Cyprus, October 4–5, 2018, Proceedings 15, pages 16–30. Springer, 2019. (2018)

  2. Peterson, M., Andel, T., Benton, R.: Towards detection of selfish mining using machine learning. In International Conference on Cyber Warfare and Security, volume 17, pages 237–243, (2022)

  3. Alyssa Hertig: Blockchain’s once-feared 51% attack is now becoming regular. Coindesk com., (2018)

  4. Mark Nesbitt: Deep chain reorganization detected on ethereum classic (etc). Available [online].[Accessed: 1212-2019], (2019)

  5. Barbara Kitchenham: Procedures for performing systematic reviews. Keele UK Keele Univ. 33(2004), 1–26 (2004)

    Google Scholar 

  6. Matthew, J., Page, J.E., McKenzie, P.M., Bossuyt, I., Boutron, T.C., Hoffmann, C.D., Mulrow, L., Shamseer, J.M., Tetzlaff, Elie, A., Akl, Sue, E., Brennan, et al.: The prisma 2020 statement: An updated guideline for reporting systematic reviews. Bmj, 372, (2021)

  7. Adam, Back, et al.: Hashcash-a denial of service counter-measure. (2002)

  8. Hanife Tesnim C¸ alı¸skan: A New Type of Payment in Philanthropy: Blockchain Applications. PhD thesis, Marmara Universitesi (Turkey), (2021)

  9. Suman Ghimire and Henry Selvaraj: 26th International Conference on Systems Engineering (ICSEng), pages 1–6. IEEE, 2018. (2018)

  10. Marko Vukoli´c: The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. In International workshop on open problems in network security, pages 112–125. Springer, (2015)

  11. Satoshi Nakamoto: Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., page 21260, (2008)

  12. Kevin Alarc´on Negy, Peter, R., Rizun: and Emin Gu¨n Sirer. Selfish mining re-examined. In International Conference on Financial Cryptography and Data Security, pages 61–78. Springer, (2020)

  13. Ittay Eyal and Emin Gu¨n Sirer: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM. 61(7), 95–102 (2018)

    Article  Google Scholar 

  14. Kervins Nicolas, Y., Wang, G.C., Giakos, B., Wei, Shen, H.: Blockchain system defensive overview for double-spend and selfish mining attacks: A systematic approach. IEEE Access. 9, 3838–3857 (2020)

    Article  Google Scholar 

  15. Sandi Rahmadika, B.J., Kweka, H., Kim, Rhee, K.: A scoping review in defend against selfish mining attack in bitcoin. IT Converg Pract. 6(3), 18–26 (2018)

    Google Scholar 

  16. Chen, Y., Chen, H., Han, M., Liu, B., Chen, Q., Ren, T.: A novel computing power allocation algorithm for blockchain system in multiple mining pools under withholding attack. IEEE Access. 8, 155630–155644 (2020)

    Article  Google Scholar 

  17. Huanliang Xiong, M., Chen, C., Wu, Y., Zhao, Yi, W.: Research on progress of blockchain consensus algorithm: A review on recent progress of blockchain consensus algorithms. Future Internet. 14(2), 47 (2022)

    Article  Google Scholar 

  18. Arlene Fink: Conducting Research Literature Reviews: from the Internet to Paper. Sage (2019)

  19. Chitu Okoli and Kira Schabram: A guide to conducting a systematic literature review of information systems research. (2010)

  20. Justus Randolph: A guide to writing the dissertation literature review. Practical assessment, research, and evaluation, 14(1):13, (2009)

  21. Richard, J., Torraco: Writing integrative literature reviews: Guidelines and examples. Hum. Resour. Dev. Rev. 4(3), 356–367 (2005)

    Article  Google Scholar 

  22. Claes Wohlin: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In Proceedings of the 18th international conference on evaluation and assessment in software engineering, pages 1–10, (2014)

  23. Hamid Azimy and Ali Ghorbani: Alternative difficulty adjustment algorithms for preventing selfish mining attack. In International Conference on Blockchain, pages 59–73. Springer, (2021)

  24. Vanessa Chicarino, C., Albuquerque, E., Jesus, Rocha, A.: On the detection of selfish mining and stalker attacks in blockchain networks. Ann. Telecommun. 75(3), 143–152 (2020)

    Article  Google Scholar 

  25. Nicolas, T., Courtois and Lear Bahack:. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718, (2014)

  26. Ittay Eyal: The miner’s dilemma. In 2015 IEEE Symposium on Security and Privacy, pages 89–103. IEEE, (2015)

  27. Jonathan Gal, Maytal, B., Szabo: Majority is not needed: A counterstrategy to selfish mining. arXiv preprint arXiv:2304.06313, (2023)

  28. Cyril Grunspan and Ricardo P´erez-Marco: On profitability of selfish mining. arXiv preprint arXiv:1805.08281, (2018)

  29. Ethan Heilman: One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In International Conference on Financial Cryptography and Data Security, pages 161–162. Springer, (2014)

  30. Hou, C., Zhou, M., Ji, Y., Daian, P., Tramer, F.: Giulia Fanti, and Ari Juels. Squirrl: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. arXiv preprint arXiv:01798, 2019. (1912)

  31. Hongyue Kang, X., Chang, R., Yang, J., Miˇsi´c, Vojislav, B., Miˇsi´c: Understanding selfish mining in imperfect bitcoin and ethereum networks with extended forks. IEEE Trans. Netw. Serv. Manage. 18(3), 3079–3091 (2021)

    Article  Google Scholar 

  32. Muhidul Islam Khan: Deep reinforcement learning for selfish nodes detection in a blockchain

  33. Suhyeon Lee and Seungjoo Kim: Countering block with-holding attack efficiently. In IEEE INFOCOM 2019- IEEE Conference on Computer Communications Work-shops (INFOCOM WKSHPS), pages 330–335. IEEE, (2019)

  34. Suhyeon Lee and Seungjoo Kim: Pooled mining makes selfish mining tricky. Cryptol. ePrint Archive, (2018)

  35. Jihye Lee and Yoonjeong Kim: Preventing bitcoin selfish mining using transaction creation time. In 2018 International Conference on Software Security and Assurance (ICSSA), pages 19–24. IEEE, (2018)

  36. Liang Liu, W., Chen, L., Zhang, J.Y., Liu, Qin, J.: A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. Math. Biosci. Eng. 17(1), 309–327 (2020)

    Article  MathSciNet  Google Scholar 

  37. Miodrag, J.M., Wang, L., Xu, S., Milan, Todorovi´c: An approach for blockchain pool mining employing the consensus protocol robust against block withholding and selfish mining attacks. Symmetry. 14(8), 1711 (2022)

    Article  Google Scholar 

  38. Saghiri, A.N.-J.A.M., and Mohammad Reza Meybodi:. Vdhla: Variable depth hybrid learning automatonits application to defense against the selfish mining attack in bitcoin. arXiv preprint arXiv:2302.12096, (2023)

  39. Rafael Pass and Elaine Shi: Fruitchains: A fair blockchain. In Proceedings of the ACM symposium on principles of distributed computing, pages 315–324, (2017)

  40. Saha Reno and Simu Sultana: Preventing selfish mining in public blockchain using alarming block and block interval time approach. In 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), pages 988–993. IEEE, (2022)

  41. Fabian Ritz and Alf Zugenmaier: The impact of uncle rewards on selfish mining in ethereum. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 50–57. IEEE, (2018)

  42. Muhammad Saad, L., Njilla, C., Kamhoua, Mohaisen, A.: Countering selfish mining in blockchains. In. International Conference on Computing, Networking and Communications (ICNC), pages 360–364. IEEE, 2019. (2019)

  43. Siamak Solat and Maria Potop-Butucaru: Brief announcement: Zeroblock: Timestamp-free prevention of block-withholding attack in bitcoin. In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pages 356–360. Springer, (2017)

  44. Ayelet Sapirshtein, Y., Sompolinsky, Zohar, A.: Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security, pages 515–532. Springer, (2016)

  45. Sarwar Sayeed and Hector Marco-Gisbert. Assessing blockchain consensus and security mechanisms against the 51% attack. Applied sciences, 9(9):1788 (2019)

  46. Deepak, K., Tosh, S., Shetty, X., Liang, C.A., Kamhoua, Kevin, A., Kwiat, Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pages 458–467. IEEE, (2017)

  47. Zhaojie Wang, Q., Lv, Z., Lu, Y., Wang, Yue, S.: Forkdec: Accurate detection for selfish mining attacks. Security and Communication Networks, 2021. (2021)

  48. Ren Zhang and Bart Preneel: Broadcasting intermediate blocks as a defense mechanism against selfish-mine in bitcoin. Cryptol. ePrint Archive, (2015)

  49. Ren Zhang and Bart Preneel: Publish or perish: A backward-compatible defense against selfish mining in bitcoin. In Cryptographers’ Track at the RSA Conference, pages 277–292. Springer, (2017)

  50. Chencheng Zhou, L., Xing, Q., Liu, Wang, H.: Effective selfish mining defense strategies to improve bitcoin dependability. Appl. Sci. 13(1), 422 (2022)

    Article  Google Scholar 

  51. Yilei Wang, Z., Wang, M., Zhao, X., Han, H., Zhou: Xiaoying Wang, and Arthur Sandor Voundi Koe. Bsm-ether: Bribery selfish mining in blockchain-based healthcare systems. Inf. Sci. 601, 1–17 (2022)

    Article  Google Scholar 

  52. Maher Alharby and Aad van Moorsel: Blocksim: An extensible simulation tool for blockchain systems. Front. Blockchain. 3, 28 (2020)

    Article  Google Scholar 

  53. Tao Li, Z., Wang, G., Yang, Y., Cui, Y., Chen, Yu, X.: Semi-selfish mining based on hidden markov decision process. Int. J. Intell. Syst. 36(7), 3596–3612 (2021)

    Article  Google Scholar 

  54. Li, Q.-L., Yan-Xia Chang, and, Zhang, C.: Tree representation, growth rate of blockchain and reward allocation in ethereum with multiple mining pools. arXiv preprint arXiv:2201.10087, (2022)

  55. Runkai Yang, X., Chang, J., Miˇsi´c, B., Miˇsi´c: Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Computers Secur. 97, 101956 (2020)

    Article  Google Scholar 

  56. Arthur Gervais, Ghassan, O., Karame, K., Wu¨st, V., Glykantzis: Hubert Ritzdorf, and Srdjan Capkun. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 3–16, (2016)

  57. Chicarino, V., Jesus, E.F., Albuquerque, C., Rocha, A.: A heuristic for the detection of selfish miner and stalker attacks in blockchains networks. In IEEE Blockchain, Robotics and AI for Networking Security Conference, pages 1–6, (2019)

  58. Chen Feng and Jianyu Niu: Selfish mining in ethereum. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pages 1306–1316. IEEE, (2019)

  59. Bienfang, J.C., Fan, J., Migdall, A., Polyakov, S.V.: Single-Photon Generation and Detection: Chap. 1. Introduction, vol. 45. Elsevier Inc. Chapters (2013)

  60. Michael, O., Rabin: Transaction protection by beacons. J. Comput. Syst. Sci. 27(2), 256–267 (1983)

    Article  MathSciNet  Google Scholar 

  61. Ma, G., Ge, C., Lu, Zhou: Achieving reliable timestamp in the bitcoin platform. Peer-to-Peer Netw. Appl. 13(6), 2251–2259 (2020)

    Article  Google Scholar 

  62. Saki Billah: One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. (2015)

  63. Meni Rosenfeld: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, (2011)

  64. Emin Gu¨n Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, and Fred B Schneider. Logical attestation: an authorization architecture for trustworthy computing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 249–264, (2011)

  65. Hamid Azimy, A.A., Ghorbani, Bagheri, E.: Preventing proof-of-work mining attacks. Inf. Sci. 608, 1503–1523 (2022)

    Article  Google Scholar 

  66. Hamid Azimy and Ali Ghorbani: Competitive selfish mining. In 2019 17th International Conference on Privacy, Security and Trust (PST), pages 1–8. IEEE, (2019)

  67. Tin Leelavimolsilp, V., Nguyen: Sebastian Stein, and Long Tran-Thanh. Selfish mining in proof-of-work blockchain with multiple miners: An empirical evaluation. In International Conference on Principles and Practice of Multi-Agent Systems, pages 219–234. Springer, (2019)

Download references

Author information

Authors and Affiliations

Authors

Contributions

Nadisha Madhushanie - Review paper writingSugandima Vidanagamachchi - Supervision and Editing the paperNalin Arachchilage - Supervision and Editing the paperAll authors reviewed the manuscript.

Corresponding author

Correspondence to Nadisha Madhushanie.

Ethics declarations

Competing interests

The authors declare no competing interests.

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Madhushanie, N., Vidanagamachchi, S. & Arachchilage, N. Selfish mining attack in blockchain: a systematic literature review. Int. J. Inf. Secur. (2024). https://doi.org/10.1007/s10207-024-00849-5

Download citation

  • Published:

  • DOI: https://doi.org/10.1007/s10207-024-00849-5

Keywords

Navigation