{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T19:04:05Z","timestamp":1762110245816,"version":"build-2065373602"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T00:00:00Z","timestamp":1729814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T00:00:00Z","timestamp":1729814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10586-024-04687-x","type":"journal-article","created":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T12:02:13Z","timestamp":1729857733000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things"],"prefix":"10.1007","volume":"28","author":[{"given":"Riham","family":"Elsaadany","sequence":"first","affiliation":[]},{"given":"Guy","family":"B\u00e9gin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,25]]},"reference":[{"key":"4687_CR1","doi-asserted-by":"publisher","unstructured":"Bouachir, O., Aloqaily, M., Karray, F., Elsaddik, A., \u201cAI-based blockchain for the metaverse: Approaches and challenges,\u201d,: 4th Int. Conf. Blockchain Comput. Appl. (BCCA). San Antonio, TX, USA 2022, 231\u2013236 (2022). https:\/\/doi.org\/10.1109\/BCCA55292.2022.9922509","DOI":"10.1109\/BCCA55292.2022.9922509"},{"key":"4687_CR2","doi-asserted-by":"publisher","DOI":"10.33423\/ajm.v23i3.6376","author":"S Vendette","year":"2023","unstructured":"Vendette, S., Thundiyil, T.G.: Decentralization in blockchain: reconsidering change management theories. Amer. J. Manage. (2023). https:\/\/doi.org\/10.33423\/ajm.v23i3.6376","journal-title":"Amer. J. Manage"},{"key":"4687_CR3","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2020070103","author":"A Mohan","year":"2020","unstructured":"Mohan, A., Asfak, M., Gladston, A.: Merkle Tree and blockchain-based cloud data auditing. Int. J. Cloud Appl. Comput. (2020). https:\/\/doi.org\/10.4018\/IJCAC.2020070103","journal-title":"Int. J. Cloud Appl. Comput."},{"key":"4687_CR4","doi-asserted-by":"publisher","DOI":"10.37896\/YMER22.04\/74","author":"G Loganathan","year":"2023","unstructured":"Loganathan, G., Saleh, I., Murad, I., Qaysar, M., Hamid, Q.: Secure cloud storage using blockchain for decentralized system with Merkle Tree algorithm. Ymer (2023). https:\/\/doi.org\/10.37896\/YMER22.04\/74","journal-title":"Ymer"},{"key":"4687_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10731-7","author":"M Sadrishojaei","year":"2023","unstructured":"Sadrishojaei, M., Kazemian, F.: Development of an enhanced blockchain mechanism for internet of things authentication. Wireless Pers. Commun. (2023). https:\/\/doi.org\/10.1007\/s11277-023-10731-7","journal-title":"Wireless Pers. Commun."},{"key":"4687_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/network3010006","volume":"3","author":"N Adhikari","year":"2023","unstructured":"Adhikari, N., Ramkumar, M.: IoT and blockchain integration: applications, opportunities, and challenges. Network 3, 115\u2013141 (2023). https:\/\/doi.org\/10.3390\/network3010006","journal-title":"Network"},{"key":"4687_CR7","doi-asserted-by":"publisher","unstructured":"Elsaadany, R., B\u00e9gin, G., \u201cA blockchain node organizing and auto-scaling architecture for the Internet of Things,\u201d,: 5th Int. Conf. Blockchain Comput. Appl. (BCCA). Kuwait, Kuwait 2023, 36\u201343 (2023). https:\/\/doi.org\/10.1109\/BCCA58897.2023.10338882","DOI":"10.1109\/BCCA58897.2023.10338882"},{"key":"4687_CR8","doi-asserted-by":"publisher","unstructured":"Elsaadany, R., B\u00e9gin, G., \u201cA self-scaling dynamic blockchain model for IoT,\u201d,: IEEE 3rd Int. Conf. Comput. Mach. Intell. (ICMI). Mt Pleasant, MI, USA 2024, 1\u20132 (2024). https:\/\/doi.org\/10.1109\/ICMI60790.2024.10585617","DOI":"10.1109\/ICMI60790.2024.10585617"},{"key":"4687_CR9","doi-asserted-by":"crossref","unstructured":"Elsaadany, R., B\u00e9gin, G.: \u201cA number of conceptual scalable node-organizing multi-tiered blockchain architectures for IoT,\u201d 2024 IEEE 12th Cybermatics Congr., 2024 IEEE 20th Int. Conf. Green Comput. Commun., Copenhagen, Denmark, in press (2024)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics62450.2024.00085"},{"key":"4687_CR10","doi-asserted-by":"crossref","unstructured":"Elsaadany, R., B\u00e9gin, G.: Predicting node colocality for an auto-scaling multi-tiered node-organizing blockchain architecture for IoT. In: 2024 IEEE 6th Conf. Blockchain Res. Appl. Innov. Netw. Services (BRAINS), Berlin, Germany (2024, in press)","DOI":"10.1109\/BRAINS63024.2024.10732642"},{"key":"4687_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC58397.2023.10217935","author":"V Tumas","year":"2023","unstructured":"Tumas, V., Rivera, S., Magoni, D., State, R.: Federated byzantine agreement protocol robustness to targeted network attacks. IEEE Symp. Comput. Commun. (ISCC) (2023). https:\/\/doi.org\/10.1109\/ISCC58397.2023.10217935","journal-title":"IEEE Symp. Comput. Commun. (ISCC)"},{"key":"4687_CR12","doi-asserted-by":"publisher","unstructured":"Rebello, G.A.F., Camilo, G.F., Guimar\u00e9es, L.C.B., de Souza, L.A.C., Duarte, O.C.M.B., \u201cSecurity and performance analysis of Quorum-based blockchain consensus protocols,\u201d,: 6th Cyber Secur. in Netw. Conf. (CSNet). Rio de Janeiro2022, 1\u20137 (2022). https:\/\/doi.org\/10.1109\/CSNet56116.2022.9955597","DOI":"10.1109\/CSNet56116.2022.9955597"},{"key":"4687_CR13","doi-asserted-by":"publisher","unstructured":"Lunardi, R.C., Alharby, M., Nunes, H.C., Zorzo, A.F., Dong, C., A. v. Moorsel, \u201cContext-based consensus for appendable-block blockchains,\u201d,: IEEE Int. Conf. Blockchain (Blockchain). Rhodes2020, 401\u2013408 (2020). https:\/\/doi.org\/10.1109\/Blockchain50366.2020.00058","DOI":"10.1109\/Blockchain50366.2020.00058"},{"key":"4687_CR14","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S., Jurdak, R., Gauravaram, P.: \u201cBlockchain for IoT security and privacy: The case study of a smart home,\u201d 2017 IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PerCom Workshops), pp. 618\u2013623, (2017)","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"4687_CR15","unstructured":"IOTA.org, accessed February, (2024)"},{"key":"4687_CR16","doi-asserted-by":"publisher","first-page":"2564","DOI":"10.3390\/electronics12122564","volume":"12","author":"A Albulayhi","year":"2023","unstructured":"Albulayhi, A., Alsukayti, I.: A blockchain-centric IoT architecture for effective smart contract-based management of IoT data communications. Electronics 12, 2564 (2023)","journal-title":"Electronics"},{"key":"4687_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/blockchains2010001","volume":"2","author":"V Misic","year":"2024","unstructured":"Misic, V., Mighan, S., Mi\u0161ic, J., Chang, X.: Decentralization is good or not? Defending consensus in Ethereum 2.0. Blockchains 2, 1\u201319 (2024). https:\/\/doi.org\/10.3390\/blockchains2010001","journal-title":"Blockchains"},{"key":"4687_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93344-9_11","author":"S Srivastava","year":"2022","unstructured":"Srivastava, S., Bhatnagar, R., Srivastava, G., Srivastava, U.: Smart contracts in blockchain application: review chain. Transform. Through Blockchain Technol.: New Digital Revolut. (2022). https:\/\/doi.org\/10.1007\/978-3-030-93344-9_11","journal-title":"Transform. Through Blockchain Technol.: New Digital Revolut."},{"key":"4687_CR19","doi-asserted-by":"publisher","first-page":"4314","DOI":"10.3390\/electronics12204314","volume":"12","author":"A Alhusayni","year":"2023","unstructured":"Alhusayni, A., Thayananthan, V., Albeshri, A., Alghamdi, S.A.: Decentralized multi-layered architecture to strengthen the security in the internet of things environment using blockchain technology. Electronics 12, 4314 (2023). https:\/\/doi.org\/10.3390\/electronics12204314","journal-title":"Electronics"},{"key":"4687_CR20","doi-asserted-by":"publisher","first-page":"772","DOI":"10.3390\/s21030772","volume":"21","author":"H Honar Pajooh","year":"2021","unstructured":"Honar Pajooh, H., Rashid, M., Alam, F., Demidenko, S.N.: Multi-layer blockchain-based security architecture for Internet of Things. Sensors 21, 772 (2021). https:\/\/doi.org\/10.3390\/s21030772","journal-title":"Sensors"},{"key":"4687_CR21","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.3390\/electronics9061050","volume":"9","author":"Y Oktian","year":"2020","unstructured":"Oktian, Y., Lee, S., Lee, H.: Hierarchical multi-blockchain architecture for scalable internet of things environment. Electronics 9, 1050 (2020). https:\/\/doi.org\/10.3390\/electronics9061050","journal-title":"Electronics"},{"key":"4687_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965147","author":"G Yu","year":"2020","unstructured":"Yu, G., Wang, X., Yu, K., Ni, W., Zhang, J.A., Liu, R.: Survey: sharding in blockchains. IEEE Access (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2965147","journal-title":"IEEE Access"},{"key":"4687_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3328430","author":"L Yin","year":"2023","unstructured":"Yin, L., Xu, J., Liang, K., Zhang, Z.: Sidechains with optimally succinct proof. IEEE Trans. Dependable Secure Comput. (2023). https:\/\/doi.org\/10.1109\/TDSC.2023.3328430","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4687_CR24","unstructured":"Haffey, M., Arlitt, M., Williamson, C.: \u201c Network heartbeat traffic characterization,\u201d Accessed: Jul. 24, (2024). https:\/\/pages.cpsc.ucalgary.ca\/~carey\/talks\/Heartbeats-CLW.pdf"},{"key":"4687_CR25","doi-asserted-by":"publisher","first-page":"200","DOI":"10.54254\/2754-1169\/12\/20230624","volume":"12","author":"M Chen","year":"2023","unstructured":"Chen, M.: Comparison on proof of work versus proof of stake and analysis on why ethereum converted to proof of stake. Adv. Econ. Manage. Political Sci. 12, 200\u2013204 (2023). https:\/\/doi.org\/10.54254\/2754-1169\/12\/20230624","journal-title":"Adv. Econ. Manage. Political Sci."},{"key":"4687_CR26","doi-asserted-by":"publisher","first-page":"784","DOI":"10.54097\/hset.v39i.6645","volume":"39","author":"Y Yu","year":"2023","unstructured":"Yu, Y.: Analysis of POW in bitcoin and POS in peercoin. Highlights Sci. Eng. Technol. 39, 784\u2013788 (2023). https:\/\/doi.org\/10.54097\/hset.v39i.6645","journal-title":"Highlights Sci. Eng. Technol."},{"key":"4687_CR27","first-page":"114","volume-title":"Provably secure blockchain protocols from distributed proof-of-deep-learning\u201d in network and system security","author":"X Su","year":"2023","unstructured":"Su, X., Larangeira, M., Tanaka, K.: Provably secure blockchain protocols from distributed proof-of-deep-learning\u2019\u2019 in network and system security, pp. 114\u2013136. Springer, Berlin (2023)"},{"key":"4687_CR28","unstructured":"Salhab, M., Mershad, K.: Proof of Deep Learning: approaches, challenges, and future directions. arXiv preprint arXiv:2308.16730. (2023)"},{"key":"4687_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3278314","author":"L Qi","year":"2023","unstructured":"Qi, L., Tian, J., Chai, M., Cai, H.: A cooperative PoW and incentive mechanism for blockchain in edge computing. IEEE Internet Things J. (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3278314","journal-title":"IEEE Internet Things J."},{"key":"4687_CR30","unstructured":"Yildirim, S.: Top Machine Learning algorithms for clustering. owardsdatascience.com. https:\/\/towardsdatascience.com\/top-machine-learning-algorithms-for-clustering-a09c6771805 (2024). Accessed 24 Jul 2024"},{"key":"4687_CR31","unstructured":"Demian Lerner, S.: Uncle Mining, an Ethereum consensus protocol flaw. bitslog.wordpress.com. https:\/\/bitslog.wordpress.com\/2016\/04\/28\/uncle-mining-an-ethereum-consensus-protocol-flaw\/ (2024). Accessed 24 Jul 2024"},{"key":"4687_CR32","doi-asserted-by":"crossref","unstructured":"Brandes, U., Delling, D., Gaertler, M., G\u00f6rke, R., Hoefer, M., Nikoloski, Z., Wagner, D.: \u201cOn modularity clustering,\u201d IEEE Trans. on Knowl. Data Eng., vol. 20, pp. 172\u2013188, 2008, https:\/\/algo.cs.uni-frankfurt.de\/~mhoefer\/05-07\/Brandes07ModularityJ.pdf(2024). Accessed 24 Jul 2024","DOI":"10.1109\/TKDE.2007.190689"},{"key":"4687_CR33","first-page":"434","volume-title":"Advanced data structures\u2019 in Introduction to algorithms","author":"TH Cormen","year":"1990","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Advanced data structures\u2019 in Introduction to algorithms, pp. 434\u2013454. MIT Press, Cambridge (1990)"},{"key":"4687_CR34","doi-asserted-by":"crossref","unstructured":"Motwani, R., Raghavan, P.: Moments and deviations in Randomized algorithms, U.K.: Camvbridge Univ. Press, ch. 3, pp. 43-45, https:\/\/rajsain.files.wordpress.com\/2013\/11\/randomized-algorithms-motwani-and-raghavan.pdf (1995). Accessed 24 Jul 2024","DOI":"10.1017\/CBO9780511814075"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04687-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04687-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04687-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:14:38Z","timestamp":1736522078000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04687-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,25]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4687"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04687-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2024,10,25]]},"assertion":[{"value":"25 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"45"}}