Security Analysis of Double-Spend Attack in Blockchains with Checkpoints for Resilient Decentralized Energy Systems in Smart Regions
Abstract
1. Introduction
1.1. Motivation
- Increased attack surface. The sheer volume of interconnected devices (smart meters, sensors, and actuators) in a decentralized system dramatically expands the attack surface, creating countless new entry points for malicious actors.
- Lack of central trust. Managing transactions and coordinating these diverse, autonomous DERs securely without a single, trusted central authority is difficult and expensive under traditional IT security models.
1.2. Contribution and Paper Organization
2. Related Work
2.1. Blockchain in Decentralized Energy Trading/Smart Regions
2.2. Security of the Blockchain Layer: A Double-Spend Attack
2.3. Objectives and Contributions
3. Materials and Methods
3.1. Checkpoint Mechanism
3.2. Description of a Double-Spend Attack
3.3. Designations and Auxiliary Results
4. Results
5. Discussion
6. Conclusions
- 1.
- The probability of the double-spend attack for a blockchain with checkpoints is smaller than for a blockchain without them;
- 2.
- The smaller the distance between checkpoints, the smaller the probability of attack;
- 3.
- The larger the ratio of malicious participants, the larger the difference between probabilities of attack for a blockchain with checkpoints and for a blockchain without them;
- 4.
- The probability of the attack decrease exponentially with an increase in block confirmation number, like in the case of a classical blockchain without checkpoints;
- 5.
- As we can see from Formula (3), the probability of a double-spend attack is a bit larger for PoW-based blockchains than for PoS-based ones.
- Optimize protocol parameters: Determine the most secure and efficient distance between checkpoints to guarantee transaction finality for various EIS applications;
- Enhance operational trust: Offer quantitative assurance to utilities and consumers regarding the integrity of decentralized energy transactions;
- Support sustainable security: Justify the adoption of PoS protocols for decentralized energy management based on both their superior energy efficiency and demonstrably better security profile against double-spend attacks.
Future Research Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Dashkevych, O.; Portnov, B.A. Criteria for smart city identification: A systematic literature review. Sustainability 2022, 14, 4448. [Google Scholar] [CrossRef]
- Mehmood, R.; Yigitcanlar, T.; Corchado, J.M. Smart technologies for sustainable urban and regional development. Sustainability 2024, 16, 1171. [Google Scholar] [CrossRef]
- Wright, M.; Chizari, H.; Viana, T. A systematic review of smart city infrastructure threat modelling methodologies: A Bayesian focused review. Sustainability 2022, 14, 10368. [Google Scholar] [CrossRef]
- da Silva Tomadon, L.; do Couto, E.V.; de Vries, W.T.; Moretto, Y. Smart city and sustainability indicators: A bibliometric literature review. Discov. Sustain. 2024, 5, 143. [Google Scholar] [CrossRef]
- Barros, P.; Agupugo, C.P.; Ejichukwu, E.; Ogunmoye, K.A.; Hayden, M.D. Decentralized energy security: Cybersecurity challenges and opportunities in distributed renewable energy. World J. Adv. Res. Rev. 2025, 26, 1256–1272. [Google Scholar] [CrossRef]
- Kumar, N.M.; Chand, A.A.; Malvoni, M.; Prasad, K.A.; Mamun, K.A.; Islam, F.; Chopra, S.S. Distributed energy resources and the application of AI, IoT, and blockchain in smart grids. Energies 2020, 13, 5739. [Google Scholar] [CrossRef]
- Iweh, C.D.; Gyamfi, S.; Tanyi, E.; Effah-Donyina, E. Distributed generation and renewable energy integration into the grid: Prerequisites, push factors, practical options, issues and merits. Energies 2021, 14, 5375. [Google Scholar] [CrossRef]
- Coll-Mayor, D.; Notholt, A. Distributed Ledger Technologies for the energy sector: Facilitating interoperability analysis. IEEE Open Access J. Power Energy 2023, 10, 593–604. [Google Scholar] [CrossRef]
- Cohen, A. The Blockchain Revolution in the Energy Market. 2024. Available online: https://www.forbes.com/sites/arielcohen/2024/12/06/the-blockchain-revolution-in-the-energy-market/ (accessed on 18 December 2025).
- Aloqaily, M.; Boukerche, A.; Bouachir, O.; Khalid, F.; Jangsher, S. An Energy Trade Framework Using Smart Contracts: Overview and Challenges. IEEE Netw. 2020, 34, 119–125. [Google Scholar] [CrossRef]
- Lu, J.; Wu, S.; Cheng, H.; Song, B.; Xiang, Z. Smart contract for electricity transactions and charge settlements using blockchain. Appl. Stoch. Model. Bus. Ind. 2021, 37, 442–453. [Google Scholar] [CrossRef]
- Kajaan, N.A.M.; Amidi, N.H.N.; Salam, Z.; Radzi, R.Z.R.M. Blockchain-Based Smart Contract for P2P Energy Trading in a Microgrid Environment. Proc. J. Phys. Conf. Ser. 2022, 2312, 012020. [Google Scholar] [CrossRef]
- Preetha, P.; Nair, M.G. Smart contract based energy trading-an overview. In Proceedings of the 2022 IEEE 19th India Council International Conference (INDICON); IEEE: Piscataway, NJ, USA, 2022; pp. 1–7. [Google Scholar]
- Su, X.; Hu, Y.; Liu, W.; Jiang, Z.; Qiu, C.; Xiong, J.; Sun, J. A blockchain-based smart contract model for secured energy trading management in smart microgrids. Secur. Priv. 2024, 7, e341. [Google Scholar] [CrossRef]
- Shao, C.; Liu, X.; Li, D.; Chen, X. Optimizing power system trading processes using smart contract algorithms. Energy Inform. 2024, 7, 146. [Google Scholar] [CrossRef]
- Zhang, L.; Huang, R.; Jiao, M.; Lu, Q.; Yang, Y. Distributed Power Trading Mechanism Based on Blockchain Smart Contracts. Energies 2025, 18, 2040. [Google Scholar] [CrossRef]
- Gurjar, G.; Nikose, M.D. Smart contract framework for secure and efficient P2P energy trading with blockchain. J. Electr. Eng. Technol. 2025, 20, 255–269. [Google Scholar] [CrossRef]
- Vionis, P.; Kotsilieris, T. The potential of blockchain technology and smart contracts in the energy sector: A review. Appl. Sci. 2023, 14, 253. [Google Scholar] [CrossRef]
- Santos, L.; Gomes, A.; Rupino, P. Energy trading using blockchain: Smart contracts functionalities—A systematic review. Energy Strategy Rev. 2025, 61, 101825. [Google Scholar]
- Evdokimov, V.; Kudin, A.; Chikhladze, V.; Artemchuk, V. A Blockchain Architecture for Hourly Electricity Rights and Yield Derivatives. FinTech 2025, 5, 2. [Google Scholar] [CrossRef]
- Blinov, I.V.; Parus, Y.V.; Artemchuk, V.O. Prosumer Operation Planning Model in the Retail Electricity Market. Electrodynamics 2026, 1, 50–61. [Google Scholar] [CrossRef]
- Kovalchuk, L.; Vykhlo, A. Estimation of the probability of success of a frontrunning attack on smart contracts. Cybern. Syst. Anal. 2024, 60, 881–890. [Google Scholar] [CrossRef]
- Vykhlo, A.; Kovalchuk, L. Estimation of the Probability of Success of a Suppression Attack. Theor. Appl. Cybersecur. 2025, 7, 65–70. [Google Scholar] [CrossRef]
- Nakamoto, S. A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 18 December 2025).
- Kovalchuk, L.; Kaidalov, D.; Shevtsov, O.; Nastenko, A.; Rodinko, M.; Oliynykov, R. Analysis of splitting attacks on Bitcoin and GHOST consensus protocols. In Proceedings of the 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS); IEEE: Piscataway, NJ, USA, 2017; Volume 2, pp. 978–982. [Google Scholar]
- Nijsse, J.; Litchfield, A. A Taxonomy of Blockchain Consensus Methods. Cryptography 2020, 4, 32. [Google Scholar] [CrossRef]
- Johar, S.; Ahmad, N.; Asher, W.; Cruickshank, H.; Durrani, A. Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey. Appl. Sci. 2021, 11, 6252. [Google Scholar] [CrossRef]
- Rathod, T.; Jadav, N.; Alshehri, M.; Tanwar, S.; Sharma, R.; Felseghi, R.A.; Raboaca, M. Blockchain for Future Wireless Networks: A Decade Survey. Sensors 2022, 22, 4182. [Google Scholar] [CrossRef]
- Pincheira, M.; Antonini, M.; Vecchio, M. Integrating the IoT and Blockchain Technology for the Next Generation of Mining Inspection Systems. Sensors 2022, 22, 899. [Google Scholar] [CrossRef]
- Susanto, H.; Kemaluddin, N. Innovative Blockchain-Based Tracking Systems, A Technology Acceptance for Cross-Border Runners during and Post-Pandemic. Sustainability 2023, 15, 6519. [Google Scholar] [CrossRef]
- Auhl, Z.; Chilamkurti, N.; Alhadad, R.; Heyne, W. A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks. Electronics 2022, 11, 2694. [Google Scholar] [CrossRef]
- Huang, H.; Yin, Z.; Chen, Q.; Zheng, J.; Luo, X.; Ye, G.; Peng, X.; Zheng, Z.; Guo, S. BrokerChain: A Blockchain Sharding Protocol by Exploiting Broker Accounts. IEEE Trans. Netw. 2025, 33, 1930–1945. [Google Scholar] [CrossRef]
- Jie, W.; Qiu, W.; Koe, A.S.V.; Li, J.; Wang, Y.; Wu, Y.; Li, J.; Zheng, Z. A Secure and Flexible Blockchain-Based Offline Payment Protocol. IEEE Trans. Comput. 2024, 73, 408–421. [Google Scholar] [CrossRef]
- Badertscher, C.; Maurer, U.; Tschudi, D.; Zikas, V. Bitcoin as a Transaction Ledger: A Composable Treatment. J. Cryptol. 2024, 37, 18. [Google Scholar] [CrossRef]
- Garay, J.; Kiayias, A.; Leonardos, N. The Bitcoin Backbone Protocol: Analysis and Applications; Springer: London, UK, 2015; pp. 281–310. [Google Scholar] [CrossRef]
- Karpinski, M.; Kovalchuk, L.; Kochan, R.; Oliynykov, R.; Rodinko, M.; Wieclaw, L. Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus. Sensors 2021, 21, 6408. [Google Scholar] [CrossRef]
- Rosenfeld, M. Analysis of Hashrate-Based Double Spending. arXiv 2014, arXiv:1402.2009. [Google Scholar] [CrossRef]
- Pinzón, C.; Rocha, C. Double-spend Attack Models with Time Advantage for Bitcoin. Electron. Notes Theor. Comput. Sci. 2016, 329, 79–103. [Google Scholar] [CrossRef]
- Grunspan, C.; Pérez-Marco, R. Double Spend Races. Int. J. Theor. Appl. Financ. 2017, 21, 1850053. [Google Scholar] [CrossRef]
- Incomplete Gamma Function. Available online: https://en.wikipedia.org/wiki/Incomplete_gamma_function (accessed on 18 December 2025).
- Khamis, S. Some Basic Properties of the Incomplete Gamma Function Ratio. Ann. Math. Stat. 1965, 36, 926–937. [Google Scholar] [CrossRef]
- Kovalchuk, L.; Kaidalov, D.; Nastenko, A.; Rodinko, M.; Shevtsov, O.; Oliynykov, R. Decreasing security threshold against double spend attack in networks with slow synchronization. Comput. Commun. 2020, 154, 75–81. [Google Scholar] [CrossRef]
- Naz, S.; Siddiqui, M.J.; Lee, S.U.J. S&SEM: A Secure and Speed-Up Election Mechanism for PoS-Based Blockchain Network. Mathematics 2024, 12, 3263. [Google Scholar] [CrossRef]
- Li, W.; Deng, X.; Liu, J.; Yu, Z.; Lou, X. Delegated Proof of Stake Consensus Mechanism Based on Community Discovery and Credit Incentive. Entropy 2023, 25, 1320. [Google Scholar] [CrossRef]
- Buterin, V. Ethereum white paper. GitHub Repos. 2013, 1, 5–7. [Google Scholar]
- Kalodner, H.; Goldfeder, S.; Chen, X.; Weinberg, S.M.; Felten, E.W. Arbitrum: Scalable, private smart contracts. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18); USENIX Association: Berkeley, CA, USA, 2018; pp. 1353–1370. [Google Scholar]
- Armstrong, M. Ethereum, Smart Contracts and the Optimistic Roll-Up; University of Dublin: Dublin, Ireland, 2021. [Google Scholar]
- Kovalchuk, L.; Kostanda, V.; Marukhnenko, O.; Pozhylenkov, O. Achieving security in Proof-of-Proof protocol with non-zero synchronization time. Mathematics 2022, 10, 2422. [Google Scholar] [CrossRef]
- Chorey, P. Checkpoint-Based Blockchain Approach for Securing Online Transaction; Springer: London, UK, 2022; p. 12. [Google Scholar] [CrossRef]
- King, S.; Nadal, S. Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Available online: https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf (accessed on 18 December 2025).
- Kiayias, A.; Russell, A.; David, B.; Oliynykov, R. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; Volume 10401, pp. 357–388. [Google Scholar]
- David, B.M.; Gazi, P.; Kiayias, A.; Russell, A. Ouroboros Praos: An Adaptively-Secure, Semi-Synchronous Proof-of-Stake Protocol. IACR Cryptology ePrint Archive. 2017. Available online: https://eprint.iacr.org/2017/573 (accessed on 18 December 2025).
- Badertscher, C.; Gazi, P.; Kiayias, A.; Russell, A.; Zikas, V. Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security; ACM: New York, NY, USA, 2018. [Google Scholar]
- Badertscher, C.; Gazi, P.; Kiayias, A.; Russell, A.; Zikas, V. Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake. IACR Cryptology ePrint Archive 2019. Available online: https://eprint.iacr.org/2019/838 (accessed on 18 December 2025).
- Daian, P.; Pass, R.; Shi, E. Snow White: Provably Secure Proofs of Stake. 2016. Available online: https://eprint.iacr.org/2016/919 (accessed on 18 December 2025).
- Gencer, A.; Van Renesse, R.; Sirer, E. Short Paper: Service-Oriented Sharding for Blockchains; Springer International Publishing: Cham, Switzerland, 2017. [Google Scholar] [CrossRef]
- Bitcoin. BlockChain.Checkpoint. 2013. Available online: https://hackage.haskell.org/package/bitcoin-hs-0.0.1/docs/Bitcoin-BlockChain-Checkpoint.html (accessed on 18 December 2025).
- Bitcoin Cash ABC’s Rolling 10 Block Checkpoints. 2018. Available online: https://blog.bitmex.com/bitcoin-cash-abcs-rolling-10-block-checkpoints/ (accessed on 18 December 2025).
- The Beacon Chain Ethereum 2.0 Explainer You Need to Read First. 2022. Available online: https://ethos.dev/beacon-chain (accessed on 18 December 2025).
- Transaction Construction Guides. 2022. Available online: https://wiki.polkadot.network/docs/build-transaction-construction (accessed on 18 December 2025).
- Core Concepts. Introduction to Cardano: The Big Picture. 2025. Available online: https://developers.cardano.org/docs/stake-pool-course/introduction-to-cardano/ (accessed on 18 December 2025).
- Feller, W. An Introduction to Probability Theory and Its Applications; Wiley: Hoboken, NJ, USA, 1991; Volume 1. [Google Scholar]
- Kovalchuk, L.; Oliynykov, R.; Rodinko, M. Probability of Double Spend Attack for PoS Consensus with Ouroboros Praos Slot Leader Election Procedure. In Proceedings of the 24th Central European Conference on Cryptology, Warsaw, Poland, 20–21 June 2024; pp. 46–49. [Google Scholar]




| Adversary’s Ratio | A Classic Case of a Blockchain System | A Blockchain System Containing Checkpoints | Compare | |||
|---|---|---|---|---|---|---|
| n | q | z | Attack Probabilities | z | Attack Probabilities | Difference in Percent |
| 50 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 50 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 50 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606849 | 0 |
| 50 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728135353 | 0.00051 |
| 50 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087305341156 | 0.32672 |
| 50 | 0.35 | 50 | 0.002188394725421 | 50 | 0.00145056147656 | 33.71573 |
| 50 | 0.4 | 50 | 0.043860884260170 | 50 | 0.02709919775701 | 38.21557 |
| 50 | 0.45 | 50 | 0.317304397874194 | 50 | 0.18272818468614 | 42.41234 |
| 100 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 100 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 100 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 100 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 100 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591508657 | 0.00002 |
| 100 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096385710585 | 0.12858 |
| 100 | 0.4 | 100 | 0.004320189876101 | 100 | 0.00263540335618 | 38.99797 |
| 100 | 0.45 | 100 | 0.156775865424405 | 100 | 0.08870061556165 | 43.42202 |
| 150 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 150 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 150 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 150 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 150 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522496 | 0 |
| 150 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509262566 | 0.00056 |
| 150 | 0.4 | 133 | 0.000994204554214 | 131 | 0.00099269100223 | 0.15224 |
| 150 | 0.45 | 150 | 0.082748003254018 | 150 | 0.04647043929210 | 43.84101 |
| 200 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 200 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 200 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 200 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 200 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522497 | 0 |
| 200 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509801118 | 0 |
| 200 | 0.4 | 133 | 0.000994204554214 | 133 | 0.00098816813374 | 0.60716 |
| 200 | 0.45 | 200 | 0.045094107137097 | 200 | 0.02521789162552 | 44.07719 |
| 250 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 250 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 250 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 250 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 250 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522497 | 0 |
| 250 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509804124 | 0 |
| 250 | 0.4 | 133 | 0.000994204554214 | 133 | 0.00099369763105 | 0.05099 |
| 250 | 0.45 | 250 | 0.025054006060346 | 250 | 0.01397246465419 | 44.23062 |
| Adversary’s Ratio | A Classic Case of a Blockchain System | A Blockchain System Containing Checkpoints | Compare | |||
|---|---|---|---|---|---|---|
| n | q | z | Attack Probabilities | z | Attack Probabilities | Difference in Percent |
| 300 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 300 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 300 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 300 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 300 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522497 | 0 |
| 300 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509804143 | 0 |
| 300 | 0.4 | 133 | 0.000994204554214 | 133 | 0.00099415700256 | 0.00478 |
| 300 | 0.45 | 300 | 0.014103172217858 | 300 | 0.00784997018068 | 44.33898 |
| 350 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 350 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 350 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 350 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 350 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522497 | 0 |
| 350 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509804143 | 0 |
| 350 | 0.4 | 133 | 0.000994204554214 | 133 | 0.00099419980533 | 0.00048 |
| 350 | 0.45 | 350 | 0.008014568841529 | 350 | 0.00445450733757 | 44.41988 |
| 400 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 400 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 400 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 400 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 400 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522497 | 0 |
| 400 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509804143 | 0 |
| 400 | 0.4 | 133 | 0.000994204554214 | 133 | 0.00099420405994 | 0.00005 |
| 400 | 0.45 | 400 | 0.004587569593162 | 400 | 0.00254689356707 | 44.48273 |
| 450 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 450 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 450 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 450 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 450 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522497 | 0 |
| 450 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509804143 | 0 |
| 450 | 0.4 | 133 | 0.000994204554214 | 133 | 0.00099420450122 | 0.00001 |
| 450 | 0.45 | 450 | 0.002640947961755 | 450 | 0.00146485355051 | 44.53304 |
| 500 | 0.1 | 6 | 0.000591412160000 | 6 | 0.00059141216000 | 0 |
| 500 | 0.15 | 9 | 0.000590058017484 | 9 | 0.00059005801748 | 0 |
| 500 | 0.2 | 13 | 0.000738096069111 | 13 | 0.00073809606911 | 0 |
| 500 | 0.25 | 20 | 0.000747285192981 | 20 | 0.00074728519298 | 0 |
| 500 | 0.3 | 32 | 0.000875915224973 | 32 | 0.00087591522497 | 0 |
| 500 | 0.35 | 58 | 0.000965098041430 | 58 | 0.00096509804143 | 0 |
| 500 | 0.4 | 133 | 0.000994204554214 | 133 | 0.00099420454840 | 0 |
| 500 | 0.45 | 500 | 0.001527357879058 | 497 | 0.00097425727297 | 36.21290 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Kovalchuk, L.; Kolomiiets, A.; Korchenko, O.; Rodinko, M. Security Analysis of Double-Spend Attack in Blockchains with Checkpoints for Resilient Decentralized Energy Systems in Smart Regions. Sustainability 2026, 18, 1673. https://doi.org/10.3390/su18031673
Kovalchuk L, Kolomiiets A, Korchenko O, Rodinko M. Security Analysis of Double-Spend Attack in Blockchains with Checkpoints for Resilient Decentralized Energy Systems in Smart Regions. Sustainability. 2026; 18(3):1673. https://doi.org/10.3390/su18031673
Chicago/Turabian StyleKovalchuk, Lyudmila, Andrii Kolomiiets, Oleksandr Korchenko, and Mariia Rodinko. 2026. "Security Analysis of Double-Spend Attack in Blockchains with Checkpoints for Resilient Decentralized Energy Systems in Smart Regions" Sustainability 18, no. 3: 1673. https://doi.org/10.3390/su18031673
APA StyleKovalchuk, L., Kolomiiets, A., Korchenko, O., & Rodinko, M. (2026). Security Analysis of Double-Spend Attack in Blockchains with Checkpoints for Resilient Decentralized Energy Systems in Smart Regions. Sustainability, 18(3), 1673. https://doi.org/10.3390/su18031673

