{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T17:06:16Z","timestamp":1771520776528,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62366004"],"award-info":[{"award-number":["62366004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62366004"],"award-info":[{"award-number":["62366004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s00607-025-01496-x","type":"journal-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:52:20Z","timestamp":1749016340000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Scalable tree-based Byzantine fault tolerance algorithm for edge networks"],"prefix":"10.1007","volume":"107","author":[{"given":"Jiali","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Lijun","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"1496_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100255","volume":"11","author":"S Hamdan","year":"2020","unstructured":"Hamdan S, Ayyash M, Almajali S (2020) Edge-computing architectures for internet of things applications: a survey. Internet of Things 11:100255. https:\/\/doi.org\/10.1016\/j.iot.2020.100255","journal-title":"Internet of Things"},{"issue":"1","key":"1496_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.3390\/s25010213","volume":"25","author":"T Zhukabayeva","year":"2025","unstructured":"Zhukabayeva T, Zholshiyeva L, Karabayev N, Khan S, Alnazzawi N (2025) Cybersecurity solutions for industrial IoT-edge computing integration: challenges, threats, and future directions. Sensors 25(1):213. https:\/\/doi.org\/10.3390\/s25010213","journal-title":"Sensors"},{"key":"1496_CR3","unstructured":"Castro M, Liskov B (1999) Practical Byzantine fault tolerance, In: Proceedings of the 3rd USENIX symposium on operating systems design and implementation (OSDI), 99, pp 173\u2013186"},{"issue":"5","key":"1496_CR4","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TPDS.2020.3042392","volume":"32","author":"W Li","year":"2023","unstructured":"Li W, Feng C, Zhang L, Xu H, Cao B, Imran MA (2023) A scalable multi-layer PBFT consensus for blockchain. IEEE Trans Parallel Distrib Syst 32(5):1146\u20131160","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"1496_CR5","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2970598","volume":"22","author":"Y Xiao","year":"2020","unstructured":"Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutor 22(2):1432\u20131465. https:\/\/doi.org\/10.1109\/COMST.2020.2970598","journal-title":"IEEE Commun Surv Tutor"},{"key":"1496_CR6","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.future.2020.09.036","volume":"115","author":"R Sinha","year":"2021","unstructured":"Sinha R, Tiwari D, Kumar S, Bhatnagar V (2021) DCBFT: dynamic and concurrent BFT protocol for large-scale permissioned blockchains. Futur Gener Comput Syst 115:278\u2013290. https:\/\/doi.org\/10.1016\/j.future.2020.09.036","journal-title":"Futur Gener Comput Syst"},{"key":"1496_CR7","doi-asserted-by":"crossref","unstructured":"Yin M, Malkhi D, Reiter MK, Gueta GG, Abraham I (2019) HotStuff: BFT consensus with linearity and responsiveness, In: Proceedings of the 2019 ACM symposium on principles of distributed computing, p 347\u2013356","DOI":"10.1145\/3293611.3331591"},{"key":"1496_CR8","doi-asserted-by":"crossref","unstructured":"Gueta GG, Abraham I, Grossman S, Malkhi D, Pinkas B, Reiter M, Tomescu A (2019) SBFT: a scalable and decentralized trust infrastructure. In: 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), p 568\u2013580","DOI":"10.1109\/DSN.2019.00063"},{"key":"1496_CR9","unstructured":"Stathakopoulou C, David T, Vukolic M (2019) Mir-bft: high-throughput BFT for blockchains, arXiv preprint arXiv:1906.05552"},{"key":"1496_CR10","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Syta E, Ford B (2018) Omniledger: a secure, scale-out, decentralized ledger via sharding, In: 2018 IEEE Symposium on Security and Privacy (SP), p 583\u2013598","DOI":"10.1109\/SP.2018.000-5"},{"key":"1496_CR11","unstructured":"Yang L, Bagaria V, Wang G, Alizadeh M, Tse D, Fanti G, Viswanath P (2019) Prism: scaling bitcoin by 10,000x, arXiv preprint  arXiv:1909.11261"},{"key":"1496_CR12","doi-asserted-by":"crossref","unstructured":"Al-Bassam M , Sonnino A, Bano S, Hrycyszyn D, Danezis G (2017) Chainspace: a shared smart contracts platform, arXiv preprint arXiv:1708.03778","DOI":"10.14722\/ndss.2018.23241"},{"key":"1496_CR13","doi-asserted-by":"crossref","unstructured":"Zamani M, Movahedi M, Raykova M (2018) Rapidchain: scaling blockchain via full sharding, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p 931\u2013948","DOI":"10.1145\/3243734.3243853"},{"key":"1496_CR14","doi-asserted-by":"crossref","unstructured":"Dziembowski S, Eckey L, Faust S, Malinowski D (2019) Perun: virtual payment hubs over cryptocurrencies, In: 2019 IEEE symposium on security and privacy (SP), p 106\u2013123","DOI":"10.1109\/SP.2019.00020"},{"key":"1496_CR15","doi-asserted-by":"publisher","first-page":"3755","DOI":"10.1007\/s00607-024-01335-5","volume":"106","author":"M Ghorbian","year":"2024","unstructured":"Ghorbian M, Ghobaei-Arani M (2024) A survey on the cold start latency approaches in serverless computing: an optimization-based perspective. Computing 106:3755\u20133809. https:\/\/doi.org\/10.1007\/s00607-024-01335-5","journal-title":"Computing"},{"key":"1496_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.future.2024.03.015","volume":"152","author":"M Ghorbian","year":"2024","unstructured":"Ghorbian M, Ghobaei-Arani M (2024) Function placement approaches in serverless computing: a survey. Futur Gener Comput Syst 152:12\u201325. https:\/\/doi.org\/10.1016\/j.future.2024.03.015","journal-title":"Futur Gener Comput Syst"},{"key":"1496_CR17","doi-asserted-by":"publisher","first-page":"4887","DOI":"10.1007\/s11227-020-03476-8","volume":"77","author":"F Jazayeri","year":"2021","unstructured":"Jazayeri F, Shahidinejad A, Ghobaei-Arani M (2021) A latency-aware and energy-efficient computation offloading in mobile fog computing: a hidden Markov model-based approach. J Supercomput 77:4887\u20134916. https:\/\/doi.org\/10.1007\/s11227-020-03476-8","journal-title":"J Supercomput"},{"issue":"3","key":"1496_CR18","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1002\/spe.3033","volume":"53","author":"R Aghazadeh","year":"2023","unstructured":"Aghazadeh R, Shahidinejad A, Ghobaei-Arani M (2023) Proactive content caching in edge computing environment: a review. Softw Pract Exp 53(3):811\u2013855. https:\/\/doi.org\/10.1002\/spe.3033","journal-title":"Softw Pract Exp"},{"key":"1496_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.future.2024.02.005","volume":"150","author":"M Ghorbian","year":"2024","unstructured":"Ghorbian M, Ghobaei-Arani M (2024) Cold start latency mitigation mechanisms in serverless computing. Futur Gener Comput Syst 150:11\u201323. https:\/\/doi.org\/10.1016\/j.future.2024.02.005","journal-title":"Futur Gener Comput Syst"},{"key":"1496_CR20","doi-asserted-by":"publisher","first-page":"5571","DOI":"10.1007\/s10586-023-04264-8","volume":"27","author":"M Ghorbian","year":"2024","unstructured":"Ghorbian M, Ghobaei-Arani M, Esmaeili L (2024) A survey on the scheduling mechanisms in serverless computing: a taxonomy, challenges, and trends. Clust Comput 27:5571\u20135610. https:\/\/doi.org\/10.1007\/s10586-023-04264-8","journal-title":"Clust Comput"},{"key":"1496_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.108762","volume":"110","author":"M Ghorbian","year":"2024","unstructured":"Ghorbian M, Ghobaei-Arani M (2024) Function offloading approaches in serverless computing: a Survey. Comput Electr Eng 110:108762. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.108762","journal-title":"Comput Electr Eng"},{"key":"1496_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100650","volume":"53","author":"M Tarahomi","year":"2024","unstructured":"Tarahomi M, Ghobaei-Arani M, Pouramini J (2024) Auto-scaling mechanisms in serverless computing: a comprehensive review. Comput Sci Rev 53:100650. https:\/\/doi.org\/10.1016\/j.cosrev.2024.100650","journal-title":"Comput Sci Rev"},{"issue":"1","key":"1496_CR23","doi-asserted-by":"publisher","first-page":"2311","DOI":"10.1109\/TCE.2023.3347690","volume":"71","author":"M Kumar","year":"2025","unstructured":"Kumar M, Samriya JK, Walia GK, Verma P, Wu H, Gill SS (2025) Blockchain Empowered Secure Federated Learning for Consumer IoT Applications in Cloud-Edge Collaborative Environment. IEEE Trans Consum Electron 71(1):2311\u20132322. https:\/\/doi.org\/10.1109\/TCE.2023.3347690","journal-title":"IEEE Trans Consum Electron"},{"key":"1496_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2024.108302","volume":"158","author":"M Gupta","year":"2024","unstructured":"Gupta M, Kumar M, Gupta Y (2024) A Blockchain-Empowered Federated Learning-based Framework for Data Privacy in Lung Disease Detection System. Comput Hum Behav 158:108302. https:\/\/doi.org\/10.1016\/j.chb.2024.108302","journal-title":"Comput Hum Behav"},{"issue":"1","key":"1496_CR25","doi-asserted-by":"publisher","first-page":"2311","DOI":"10.1109\/TCE.2023.3347690","volume":"70","author":"JK Samriya","year":"2024","unstructured":"Samriya JK, Kumar S, Kumar M, Xu M, Wu H, Gill SS (2024) Blockchain and reinforcement neural network for trusted cloud-enabled IoT network. IEEE Trans Consum Electron 70(1):2311\u20132322. https:\/\/doi.org\/10.1109\/TCE.2023.3347690","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"1496_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/jcp3010001","volume":"3","author":"M Kumar","year":"2023","unstructured":"Kumar M, Raj H, Chaurasia N, Gill SS (2023) Blockchain inspired secure and reliable data exchange architecture for cyber-physical healthcare system 4.0. J Cybersecur Priv 3(1):1\u201317. https:\/\/doi.org\/10.3390\/jcp3010001","journal-title":"J Cybersecur Priv"},{"issue":"1","key":"1496_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/LCOMM.2024.3281234","volume":"29","author":"J Hajipour","year":"2025","unstructured":"Hajipour J, Mohajer A, Leung VCM (2025) Dynamic offloading in mobile edge computing with traffic-aware network slicing and adaptive TD3 strategy. IEEE Commun Lett 29(1):95\u201399. https:\/\/doi.org\/10.1109\/LCOMM.2024.3281234","journal-title":"IEEE Commun Lett"},{"key":"1496_CR28","doi-asserted-by":"crossref","unstructured":"Shen X, Fu Y (2022) PBFT consensus algorithm based on group reputation. In: 2022 2nd conference on high performance computing and communication engineering (HPCCE 2022), p 154\u2013159","DOI":"10.1117\/12.2673235"},{"key":"1496_CR29","doi-asserted-by":"crossref","unstructured":"Zhao L, Li B, Zhou Q, Chen X (2022) A scalable multi-group consensus algorithm based on PBFT. In: 2022 4th international conference on communications, information system and computer engineering (CISCE), p 350\u2013356","DOI":"10.1109\/CISCE55963.2022.9851050"},{"key":"1496_CR30","doi-asserted-by":"publisher","unstructured":"Ramachandran R, Alzantot M (2020) Hierarchical byzantine fault tolerance for scalable blockchain consensus, In: Proceedings of IEEE Blockchain p 1\u20138, https:\/\/doi.org\/10.1109\/Blockchain50366.2020.00012","DOI":"10.1109\/Blockchain50366.2020.00012"},{"issue":"9","key":"1496_CR31","doi-asserted-by":"publisher","first-page":"15434","DOI":"10.1109\/JIOT.2023.3347232","volume":"11","author":"F Tang","year":"2023","unstructured":"Tang F, Xu T, Peng J, Gan N (2023) TP-PBFT: a scalable PBFT based on threshold proxy signature for IoT-blockchain applications. IEEE Internet of Things J 11(9):15434\u201315449","journal-title":"IEEE Internet of Things J"},{"key":"1496_CR32","unstructured":"Micciancio S, Vadhan S (1999) Verifiable random functions. In: 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), p 120\u2013130"},{"key":"1496_CR33","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps, In: Advances in Cryptology - EUROCRYPT 2003: international conference on the theory and applications of cryptographic techniques, p 416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"1496_CR34","first-page":"33509","volume":"11","author":"S Tong","year":"2014","unstructured":"Tong S, Li J, Fu W (2014) An efficient and scalable byzantine fault-tolerant consensus mechanism based on credit scoring and aggregated signatures. IEEE Access 11:33509\u201333519","journal-title":"IEEE Access"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01496-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-025-01496-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01496-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T05:47:41Z","timestamp":1751003261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-025-01496-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1496"],"URL":"https:\/\/doi.org\/10.1007\/s00607-025-01496-x","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"5 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"I declare that the authors have no Conflict of interest as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"141"}}