REFERENCES
1. Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Available from:https://assets.pubpub.org/d8wct41f/31611263538139.pdf [Last accessed on 6 May 2023].
2. Wood G. Ethereum: a secure decentralised generalised transaction ledger. Available from: https://mnmarketcap.com/wp-content/uploads/2022/09/Ethereum-Whitepaper.pdf [Last accessed on 6 May 2023].
3. Yutaka M, Zhang Y, Sasabe M, et al. Using ethereum blockchain for distributed attribute-based access control in the internet of things. 2019 IEEE Global Communications Conference (GLOBECOM); 2019 Dec 1-6.
4. Wang W, Chen Q, Yin Z, et al. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J 2022;9:8883-91.
5. Lian Z, Zeng Q, Wang W, Gadekallu TR, Su C. Blockchain-based two-stage federated learning with non-IID data in IoMT system. IEEE Trans Comput Soc Syst ; doi: 10.1109/tcss.2022.3216802.
6. Gadekallu T R, Huynh-The T, Wang W, et al. Blockchain for the metaverse: a review. arXiv preprint arXiv:2203.09738, 2022.
7. Gjermundrød H, Chalkias K, Dionysiou I. Going beyond the coinbase transaction fee: alternative reward schemes for miners in blockchain systems. Proceedings of the 20th Pan-Hellenic Conference on Informatics. 2016 Nov 1-4.
8. Recabarren R, Carbunar B. Hardening stratum, the Bitcoin pool mining protocol. Proceedings on Privacy Enhancing Technologies 2017;2017:57-74.
9. Fujita K, Zhang Y, Sasabe M, Kasahara S. Mining pool selection under block withHolding attack. Applied Sciences 2021;11:1617.
10. Courtois N T, Bahack L. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718, 2014.
11. Dong X, Wu F, Faree A, Guo D, Shen Y, Ma J. Selfholding: a combined attack model using selfish mining with block withholding attack. Computers & Security 2019;87:101584.
12. Chang S, Park Y, Wuthier S, Chen C. Uncle-block attack: blockchain mining threat beyond block withholding for rational and uncooperative miners. In: Deng RH, Gauthier-umaña V, Ochoa M, Yung M, editors. Applied Cryptography and Network Security. Cham: Springer International Publishing; 2019. pp. 241-58.
13. Qin R, Yuan Y, Wang F. Optimal block withholding strategies for blockchain mining pools. IEEE Trans Comput Soc Syst 2020;7:709-17.
14. Kwon Y, Kim D, Son Y, et al. Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017 Oct 195-209.
15. Yang R, Chang X, Misic J, Misic V, Kang H. On selfholding attack impact on imperfect PoW blockchain networks. IEEE Trans Netw Sci Eng 2021;8:3073-86.
16. Gao S, Li Z, Peng Z, et al. Power adjusting and bribery racing: Novel mining attacks in the bitcoin system. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security; 2019 Nov 833-850.
17. Eyal I, Sirer EG. Majority is not enough: Bitcoin mining is vulnerable. Commu ACM 2018;61:95-102.
18. Nayak K, Kumar S, Miller A, et al. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. 2016 IEEE European Symposium on Security and Privacy; 2016 Mar 305-320.
19. Sapirshtein A, Sompolinsky Y, Zohar A. Optimal selfish mining strategies in Bitcoin. In: Grossklags J, Preneel B, editors. Financial Cryptography and Data Security. Berlin: Springer Berlin Heidelberg; 2017. pp. 515-32.
20. Li T, Wang Z, Yang G, Cui Y, Chen Y, Yu X. Semi-selfish mining based on hidden Markov decision process. Int J Intell Syst 2021;36:3596-612.
21. Rosenfeld M. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011.
23. Toda K, Kuze N, Ushio T. Mining pool game model and nash equilibrium analysis for PoW-based blockchain networks.IEEE;101049-60
24. Li W, Cao M, Wang Y, Tang C, Lin F. Mining pool game model and nash equilibrium analysis for PoW-based blockchain networks. IEEE Access 2020;8:101049-60.
25. Haghighat A A, Shajari M. Block withholding game among bitcoin mining pools. Future Generation Computer Systems 2019;97:482-91.
26. Eyal I, Sirer E G. How to disincentivize large bitcoin mining pools. Available from: https://hackingdistributed.com/2014/06/18/how-to-disincentivize-large-bitcoin-mining-pools/ [Last accessed on 6 May 2023].
27. Bag S, Ruj S, Sakurai K. Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Trans Inform Forensic Secur 2017;12:1967-78.
28. Bag S, Sakurai K. Yet another note on block withholding attack on bitcoin mining pools. In: Bishop M, Nascimento ACA, editors. Information security. Cham: Springer International Publishing; 2016. pp. 167-80.
29. Schrijvers O, Bonneau J, Boneh D, Roughgarden T. Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags J, Preneel B, editors. Financial cryptography and data security. Berlin: Springer Berlin Heidelberg; 2017. pp. 477-98.
30. Luu L, Velner Y, Teutsch J, et al. SMART POOL: practical decentralized pooled mining. Available from: https://ia.cr/2017/019 [Last accessed on 6 May 2023].
31. Available from: https://bitcointalk.org/index.php?topic=18313.14900 [Last accessed on 6 May 2023].