{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T18:54:09Z","timestamp":1772564049087,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11432-023-4054-5","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T15:01:42Z","timestamp":1719932502000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios"],"prefix":"10.1007","volume":"67","author":[{"given":"Bo","family":"Li","sequence":"first","affiliation":[]},{"given":"Guanjie","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Honghao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xueqiang","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Shuiguang","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"key":"4054_CR1","first-page":"16","volume":"7","author":"L Chettri","year":"2019","unstructured":"Chettri L, Bera R. A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Int Things J. 2019, 7: 16\u201332","journal-title":"IEEE Int Things J"},{"key":"4054_CR2","doi-asserted-by":"publisher","first-page":"130300","DOI":"10.1007\/s11432-023-3704-8","volume":"66","author":"W Xu","year":"2023","unstructured":"Xu W, Huang Y M, Wang W, et al. Toward ubiquitous and intelligent 6G networks: from architecture to technology. Sci China Inf Sci. 2023. 66: 130300","journal-title":"Sci China Inf Sci"},{"key":"4054_CR3","doi-asserted-by":"crossref","unstructured":"Hewa T, G\u00fcr G, Kalla A, et al. The role of blockchain in 6G: challenges, opportunities and research directions. In: Proceedings of the 2nd 6G Wireless Summit (6G SUMMIT), 2020","DOI":"10.1109\/6GSUMMIT49458.2020.9083784"},{"key":"4054_CR4","first-page":"359","volume":"9","author":"D C Nguyen","year":"2021","unstructured":"Nguyen D C, Ding M, Pathirana P N, et al. 6G Internet of Things: a comprehensive survey. IEEE Int Things J, 2021, 9: 359\u2013383","journal-title":"IEEE Int Things J"},{"key":"4054_CR5","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/MWC.001.2100255","volume":"29","author":"A H Khan","year":"2021","unstructured":"Khan A H, Ul Hassan N, Yuen C, et al. Blockchain and 6G: the future of secure and ubiquitous communication. IEEE Wireless Commun, 2021, 29: 194\u2013201","journal-title":"IEEE Wireless Commun"},{"key":"4054_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.001.2000175","volume":"58","author":"T Maksymyuk","year":"2020","unstructured":"Maksymyuk T, Gazda J, Volosin M, et al. Blockchain-empowered framework for decentralized network management in 6G. IEEE Commun Mag, 2020, 58: 86\u201392","journal-title":"IEEE Commun Mag"},{"key":"4054_CR7","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/ACCESS.2013.2260813","volume":"1","author":"T S Rappaport","year":"2013","unstructured":"Rappaport T S, Sun S, Mayzus R, et al. Millimeter wave mobile communications for 5G cellular: it will work! IEEE Access, 2013, 1: 335\u2013349","journal-title":"IEEE Access"},{"key":"4054_CR8","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCOM.001.1900411","volume":"58","author":"M Giordani","year":"2020","unstructured":"Giordani M, Polese M, Mezzavilla M, et al. Toward 6G networks: use cases and technologies. IEEE Commun Mag, 2020, 58: 55\u201361","journal-title":"IEEE Commun Mag"},{"key":"4054_CR9","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1109\/JSAC.2020.3000826","volume":"38","author":"J Y Zhang","year":"2020","unstructured":"Zhang J Y, Bj\u00f6rnson E, Matthaiou M, et al. Prospective multiple antenna technologies for beyond 5G. IEEE J Select Area Commun, 2020, 38: 1637\u20131660","journal-title":"IEEE J Select Area Commun"},{"key":"4054_CR10","doi-asserted-by":"publisher","first-page":"166415","DOI":"10.1016\/j.ijleo.2021.166415","volume":"231","author":"Z R M Hajiyat","year":"2021","unstructured":"Hajiyat Z R M, Ismail A, Sali A, et al. Antenna in 6G wireless communication system: specifications, challenges, and research directions. Optik, 2021, 231: 166415","journal-title":"Optik"},{"key":"4054_CR11","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1109\/JPROC.2021.3061701","volume":"109","author":"H Tataria","year":"2021","unstructured":"Tataria H, Shafi M, Molisch A F, et al. 6G wireless systems: vision, requirements, challenges, insights, and opportunities. Proc IEEE, 2021, 109: 1166\u20131199","journal-title":"Proc IEEE"},{"key":"4054_CR12","doi-asserted-by":"publisher","first-page":"130302","DOI":"10.1007\/s11432-022-3692-5","volume":"66","author":"Q H Wu","year":"2023","unstructured":"Wu Q H, Wang W, Li Z G, et al. SpectrumChain: a disruptive dynamic spectrum-sharing framework for 6G. Sci China Inf Sci, 2023, 66: 130302","journal-title":"Sci China Inf Sci"},{"key":"4054_CR13","first-page":"21215","volume":"11","author":"H Zeng","year":"2024","unstructured":"Zeng H, Zhu Z, Wang Y, et al. Periodic collaboration and real-time dispatch using an actor-critic framework for UAV movement in mobile edge computing. IEEE Int Things J, 2024, 11: 21215\u201321226","journal-title":"IEEE Int Things J"},{"key":"4054_CR14","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/TVT.2023.3309321","volume":"73","author":"H Gao","year":"2024","unstructured":"Gao H, Wang X, Wei W, et al. Com-DDPG: task offloading based on multiagent reinforcement learning for information-communication-enhanced mobile edge computing in the Internet of Vehicles. IEEE Trans Veh Technol, 2024, 73: 348\u2013361","journal-title":"IEEE Trans Veh Technol"},{"key":"4054_CR15","doi-asserted-by":"publisher","first-page":"130306","DOI":"10.1007\/s11432-022-3598-4","volume":"66","author":"X H You","year":"2023","unstructured":"You X H. 6G extreme connectivity via exploring spatiotemporal exchangeability. Sci China Inf Sci, 2023, 66: 130306","journal-title":"Sci China Inf Sci"},{"key":"4054_CR16","doi-asserted-by":"publisher","first-page":"172301","DOI":"10.1007\/s11432-022-3658-7","volume":"66","author":"L He","year":"2023","unstructured":"He L, Li F C, Xu H K, et al. Blockchain-based vehicular edge computing networks: the communication perspective. Sci China Inf Sci, 2023, 66: 172301","journal-title":"Sci China Inf Sci"},{"key":"4054_CR17","doi-asserted-by":"crossref","unstructured":"Chaer A, Salah K, Lima C, et al. Blockchain for 5G: opportunities and challenges. In: Proceedings of IEEE Globecom Workshops (GC Wkshps), Waikoloa, 2019. 1\u20136","DOI":"10.1109\/GCWkshps45667.2019.9024627"},{"key":"4054_CR18","doi-asserted-by":"publisher","first-page":"102693","DOI":"10.1016\/j.jnca.2020.102693","volume":"166","author":"D C Nguyen","year":"2020","unstructured":"Nguyen D C, Pathirana P N, Ding M, et al. Blockchain for 5G and beyond networks: a state of the art survey. J Network Comput Appl, 2020, 166: 102693","journal-title":"J Network Comput Appl"},{"key":"4054_CR19","doi-asserted-by":"publisher","first-page":"106382","DOI":"10.1016\/j.ymssp.2019.106382","volume":"135","author":"I Mistry","year":"2020","unstructured":"Mistry I, Tanwar S, Tyagi S, et al. Blockchain for 5G-enabled IoT for industrial automation: a systematic review, solutions, and challenges. Mech Syst Signal Process, 2020, 135: 106382","journal-title":"Mech Syst Signal Process"},{"key":"4054_CR20","doi-asserted-by":"crossref","unstructured":"Sotenga P, Chuku P, Olwal T. Analysis of IEEE 802.11n network access categories in EDCA non-saturated networks. In: Proceedings of International Conference on Computing, Communication and Security (ICCCS), 2015. 1\u20136","DOI":"10.1109\/CCCS.2015.7374188"},{"key":"4054_CR21","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.3390\/app14062507","volume":"14","author":"S Y An","year":"2024","unstructured":"An S Y, Ngayo G, Hong S P. Enhancing 5G antenna manufacturing efficiency and reliability through blockchain and smart contract integration: a comprehensive AHP analysis. Appl Sci, 2024, 14: 2507","journal-title":"Appl Sci"},{"key":"4054_CR22","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/s11036-023-02093-y","volume":"28","author":"Z Qin","year":"2023","unstructured":"Qin Z, Deng S, Yan X, et al. 6G data plane: a novel architecture enabling data collaboration with arbitrary topology. Mobile Netw Appl, 2023, 28: 394\u2013405","journal-title":"Mobile Netw Appl"},{"key":"4054_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.dcan.2020.06.002","volume":"6","author":"H Xu","year":"2020","unstructured":"Xu H, Klaine P V, Onireti O, et al. Blockchain-enabled resource management and sharing for 6G communications. Digital Commun Netw, 2020, 6: 261\u2013269","journal-title":"Digital Commun Netw"},{"key":"4054_CR24","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TCSS.2021.3056540","volume":"9","author":"G Cheng","year":"2021","unstructured":"Cheng G, Chen Y, Deng S, et al. A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans Comput Soc Syst, 2021, 9: 146\u2013158","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"4054_CR25","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/OJCOMS.2021.3057679","volume":"2","author":"W Jiang","year":"2021","unstructured":"Jiang W, Han B, Habibi M A, et al. The road towards 6G: a comprehensive survey. IEEE Open J Commun Soc, 2021, 2: 334\u2013366","journal-title":"IEEE Open J Commun Soc"},{"key":"4054_CR26","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/MNET.001.1900336","volume":"34","author":"A Refaey","year":"2020","unstructured":"Refaey A, Hammad K, Magierowski S, et al. A blockchain policy and charging control framework for roaming in cellular networks. IEEE Netw, 2020, 34: 170\u2013177","journal-title":"IEEE Netw"},{"key":"4054_CR27","doi-asserted-by":"publisher","first-page":"4868","DOI":"10.1109\/TII.2021.3107556","volume":"18","author":"S Velliangiri","year":"2022","unstructured":"Velliangiri S, Manoharan R, Ramachandran S, et al. Blockchain based privacy preserving framework for emerging 6G wireless communications. IEEE Trans Ind Inf, 2022, 18: 4868\u20134874","journal-title":"IEEE Trans Ind Inf"},{"key":"4054_CR28","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TCE.2024.3371501","volume":"70","author":"X Wang","year":"2024","unstructured":"Wang X, Shankar A, Li K, et al. Blockchain-Enabled decentralized edge intelligence for trustworthy 6G consumer electronics. IEEE Trans Consumer Electron, 2024, 70: 1214\u20131225","journal-title":"IEEE Trans Consumer Electron"},{"key":"4054_CR29","doi-asserted-by":"publisher","first-page":"7732","DOI":"10.1109\/TII.2024.3360467","volume":"20","author":"Y Wei","year":"2024","unstructured":"Wei Y, Gai K, Yu J, et al. Trustworthy access control for multiaccess edge computing in blockchain-assisted 6G systems. IEEE Trans Ind Inf, 2024, 20: 7732\u20137743","journal-title":"IEEE Trans Ind Inf"},{"key":"4054_CR30","doi-asserted-by":"crossref","unstructured":"Chaer A, Salah K, Lima C, et al. Blockchain for 5G: opportunities and challenges. In: Proceedings of IEEE Globecom Workshops (GC Wkshps), 2019","DOI":"10.1109\/GCWkshps45667.2019.9024627"},{"key":"4054_CR31","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/OJCOMS.2020.3010270","volume":"1","author":"M Z Chowdhury","year":"2020","unstructured":"Chowdhury M Z, Shahjalal M, Ahmed S, et al. 6G wireless communication systems: applications, requirements, technologies, challenges, and research directions. IEEE Open J Commun Soc, 2020, 1: 957\u2013975","journal-title":"IEEE Open J Commun Soc"},{"key":"4054_CR32","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.comcom.2020.07.020","volume":"161","author":"G Manogaran","year":"2020","unstructured":"Manogaran G, Rawal B S, Saravanan V, et al. Blockchain based integrated security measure for reliable service delegation in 6G communication environment. Comput Commun, 2020, 161: 248\u2013256","journal-title":"Comput Commun"},{"key":"4054_CR33","doi-asserted-by":"publisher","first-page":"7133","DOI":"10.1109\/TII.2020.3047206","volume":"17","author":"P K Deb","year":"2021","unstructured":"Deb P K, Misra S, Sarkar T, et al. Magnum: a distributed framework for enabling transfer learning in B5G-enabled industrial IoT. IEEE Trans Ind Inf, 2021, 17: 7133\u20137140","journal-title":"IEEE Trans Ind Inf"},{"key":"4054_CR34","doi-asserted-by":"publisher","first-page":"2468","DOI":"10.1109\/JIOT.2021.3097890","volume":"9","author":"Y Zhao","year":"2021","unstructured":"Zhao Y, Yang X, Yu Y, et al. Blockchain-based auditable privacy-preserving data classification for Internet of Things. IEEE Internet Things J, 2021, 9: 2468\u20132484","journal-title":"IEEE Internet Things J"},{"key":"4054_CR35","doi-asserted-by":"crossref","unstructured":"Liu L, Liang W, Mang G, et al. Blockchain based spectrum sharing over 6G hybrid cloud. In: Proceedings of International Wireless Communications and Mobile Computing (IWCMC), 2021. 492\u2013497","DOI":"10.1109\/IWCMC51323.2021.9498978"},{"key":"4054_CR36","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/MWC.001.2000409","volume":"28","author":"S Hu","year":"2021","unstructured":"Hu S, Liang Y C, Xiong Z, et al. Blockchain and artificial intelligence for dynamic resource sharing in 6G and beyond. IEEE Wireless Commun, 2021, 28: 145\u2013151","journal-title":"IEEE Wireless Commun"},{"key":"4054_CR37","first-page":"1974","volume":"7","author":"A Asheralieva","year":"2019","unstructured":"Asheralieva A, Niyato D. Distributed dynamic resource management and pricing in the IoT systems with blockchain-as-a-service and UAV-enabled mobile edge computing. IEEE Int Things J, 2019, 7: 1974\u20131993","journal-title":"IEEE Int Things J"},{"key":"4054_CR38","first-page":"2592","volume":"9","author":"S Otoum","year":"2021","unstructured":"Otoum S, Ridhawi I A, Mouftah H. Securing critical IoT infrastructures with blockchain-supported federated learning. IEEE Int Things J, 2021, 9: 2592\u20132601","journal-title":"IEEE Int Things J"},{"key":"4054_CR39","doi-asserted-by":"crossref","unstructured":"Nguyen T, Tran N, Loven L, et al. Privacy-aware blockchain innovation for 6G: challenges and opportunities. In: Proceedings of the 2nd 6G Wireless Summit (6G SUMMIT), 2020","DOI":"10.1109\/6GSUMMIT49458.2020.9083832"},{"key":"4054_CR40","first-page":"8078","volume":"9","author":"Y Yang","year":"2022","unstructured":"Yang Y, Wei L, Wu J, et al. A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Int Things J, 2022, 9: 8078\u20138090","journal-title":"IEEE Int Things J"},{"key":"4054_CR41","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TMC.2021.3068717","volume":"22","author":"J Li","year":"2021","unstructured":"Li J, Wu J, Chen L, et al. Blockchain-based secure key management for mobile edge computing. IEEE Trans Mobile Comput, 2021, 22: 100\u2013114","journal-title":"IEEE Trans Mobile Comput"},{"key":"4054_CR42","unstructured":"Yang K, Sunny J, Wang L. Blockchain-based decentralized public key management for named data networking. In: Proceedings of the International Conference on Computer Communications and Networks (ICCCN 2018), 2018"},{"key":"4054_CR43","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MNET.009.2100736","volume":"36","author":"S R Garzon","year":"2022","unstructured":"Garzon S R, Yildiz H, K\u00fcpper A. Decentralized identifiers and self-sovereign identity in 6G. IEEE Netw, 2022, 36: 142\u2013148","journal-title":"IEEE Netw"},{"key":"4054_CR44","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1109\/JSYST.2016.2585681","volume":"12","author":"D Wang","year":"2016","unstructured":"Wang D, Cheng H, He D, et al. On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J, 2016, 12: 916\u2013925","journal-title":"IEEE Syst J"},{"key":"4054_CR45","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D, Zeadally S, et al. A survey on privacy protection in blockchain system. J Netw Comput Appl, 2019, 126: 45\u201358","journal-title":"J Netw Comput Appl"},{"key":"4054_CR46","doi-asserted-by":"crossref","unstructured":"Bonneau J, Herley C, van Oorschot P C, et al. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Proceedings of IEEE Symposium on Security and Privacy, 2012. 553\u2013567","DOI":"10.1109\/SP.2012.44"},{"key":"4054_CR47","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang D, Wang P. On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw, 2014, 73: 41\u201357","journal-title":"Comput Netw"},{"key":"4054_CR48","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang D, Wang P. Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput, 2018, 15: 708\u2013722","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"4054_CR49","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang D, Li W, Wang P. Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf, 2018, 14: 4081\u20134092","journal-title":"IEEE Trans Ind Inf"},{"key":"4054_CR50","doi-asserted-by":"crossref","unstructured":"Wang D, Gu Q C, Cheng H B, et al. The request for better measurement: a comparative evaluation of two-factor authentication schemes. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016. 475\u2013486","DOI":"10.1145\/2897845.2897916"},{"key":"4054_CR51","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11265-015-1061-x","volume":"83","author":"M Alam","year":"2016","unstructured":"Alam M, Yang D, Huq K, et al. Towards 5G: context aware resource allocation for energy saving. J Sign Process Syst, 2016, 83: 279\u2013291","journal-title":"J Sign Process Syst"},{"key":"4054_CR52","unstructured":"Liu G, Li N, Deng J, et al. 6G mobile network architecture-SOLIDS: driving forces, features, and functional topology."},{"key":"4054_CR53","doi-asserted-by":"publisher","first-page":"11475","DOI":"10.1007\/s00521-020-05519-w","volume":"34","author":"I Yaqoob","year":"2022","unstructured":"Yaqoob I, Salah K, Jayaraman R, et al. Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput Applic, 2022, 34: 11475\u201311490","journal-title":"Neural Comput Applic"},{"key":"4054_CR54","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TIFS.2019.2928256","volume":"15","author":"W Dai","year":"2019","unstructured":"Dai W, Dai C, Choo K K R, et al. SDTE: a secure blockchain-based data trading ecosystem. IEEE Trans Inform Forensic Secur, 2019, 15: 725\u2013737","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4054_CR55","doi-asserted-by":"publisher","first-page":"103081","DOI":"10.1016\/j.jnca.2021.103081","volume":"185","author":"L Shi","year":"2021","unstructured":"Shi L, Li X, Gao Z, et al. Worm computing: a blockchain-based resource sharing and cybersecurity framework. J Netw Comput Appl, 2021, 185: 103081","journal-title":"J Netw Comput Appl"},{"key":"4054_CR56","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3390\/fi9040085","volume":"9","author":"Z Hong","year":"2017","unstructured":"Hong Z, Wang Z, Cai W, et al. Blockchain-empowered fair computational resource sharing system in the D2D network. Future Int, 2017, 9: 85","journal-title":"Future Int"},{"key":"4054_CR57","first-page":"12025","volume":"10","author":"Y Le","year":"2023","unstructured":"Le Y, Ling X, Wang J, et al. Resource sharing and trading of blockchain radio access networks: architecture and prototype design. IEEE Int Things J, 2023, 10: 12025\u201312043","journal-title":"IEEE Int Things J"},{"key":"4054_CR58","first-page":"10548","volume":"7","author":"B Hamdaoui","year":"2020","unstructured":"Hamdaoui B, Alkalbani M, Rayes A, et al. IoTShare: a blockchain-enabled IoT resource sharing on-demand protocol for smart city situation-awareness applications. IEEE Int Things J, 2020, 7: 10548\u201310561","journal-title":"IEEE Int Things J"},{"key":"4054_CR59","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1109\/MNET.103.2100489","volume":"36","author":"L Giupponi","year":"2022","unstructured":"Giupponi L, Wilhelmi F. Blockchain-enabled network sharing for O-RAN in 5G and beyond. IEEE Netw, 2022, 36: 218\u2013225","journal-title":"IEEE Netw"},{"key":"4054_CR60","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/MWC.001.2000102","volume":"28","author":"Y Gao","year":"2021","unstructured":"Gao Y, Wu W, Si P, et al. B-ReST: blockchain-enabled resource sharing and transactions in fog computing. IEEE Wireless Commun, 2021, 28: 172\u2013180","journal-title":"IEEE Wireless Commun"},{"key":"4054_CR61","doi-asserted-by":"publisher","first-page":"4902","DOI":"10.1109\/ACCESS.2016.2598736","volume":"4","author":"M Ali","year":"2016","unstructured":"Ali M, Qaisar S, Naeem M, et al. Energy efficient resource allocation in D2D-assisted heterogeneous networks with relays. IEEE Access, 2016, 4: 4902\u20134911","journal-title":"IEEE Access"},{"key":"4054_CR62","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MNET.001.1900188","volume":"34","author":"Z Zhou","year":"2020","unstructured":"Zhou Z, Chen X, Zhang Y, et al. Blockchain-empowered secure spectrum sharing for 5G heterogeneous networks. IEEE Netw, 2020, 34: 24\u201331","journal-title":"IEEE Netw"},{"key":"4054_CR63","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1109\/JSAC.1986.1146410","volume":"4","author":"R Jain","year":"1986","unstructured":"Jain R, Routhier S. Packet trains-measurements and a new model for computer network traffic. IEEE J Sel Areas Commun, 1986, 4: 986\u2013995","journal-title":"IEEE J Sel Areas Commun"},{"key":"4054_CR64","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah A, Elkalam A A, Ouahman A A. FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur Comm Netw, 2016, 9: 5943\u20135964","journal-title":"Secur Comm Netw"},{"key":"4054_CR65","unstructured":"Baliga A, Subhod I, Kamat P, et al. Performance evaluation of the Quorum blockchain platform. 2018. ArXiv:1809.03421"},{"key":"4054_CR66","unstructured":"Moniz H. The Istanbul BFT consensus algorithm. 2020. ArXiv:2002.03613"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-4054-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-023-4054-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-4054-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T00:21:50Z","timestamp":1757118110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-023-4054-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,27]]},"references-count":66,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["4054"],"URL":"https:\/\/doi.org\/10.1007\/s11432-023-4054-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,27]]},"assertion":[{"value":"19 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"170301"}}