{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:12:09Z","timestamp":1771917129089,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003392","name":"natural science foundation of fujian province","doi-asserted-by":"publisher","award":["2019J01245"],"award-info":[{"award-number":["2019J01245"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12083-021-01240-0","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T10:13:10Z","timestamp":1634638390000},"page":"444-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing"],"prefix":"10.1007","volume":"15","author":[{"given":"Qiaohong","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0768-7859","authenticated-orcid":false,"given":"Hongju","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Xiaoqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chengkuan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,19]]},"reference":[{"issue":"8","key":"1240_CR1","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TC.2021.3060484","volume":"70","author":"T Wang","year":"2021","unstructured":"Wang T, Lu Y, Wang J, Dai HN, Zheng X, Jia W (2021) EIHDP: Edge-intelligent hierarchical dynamic pricing based on cloud-edge-client collaboration for IoT Systems. IEEE Trans Comput 70(8):1285\u20131298. https:\/\/doi.org\/10.1109\/TC.2021.3060484","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"1240_CR2","doi-asserted-by":"publisher","first-page":"2342","DOI":"10.1109\/JIOT.2020.3048345","volume":"8","author":"L Liu","year":"2021","unstructured":"Liu L, Feng J, Pei Q, Chen C, Ming Y, Shang B, Dong M (2021) Blockchain-enabled secure data sharing scheme in mobile-edge computing: An asynchronous advantage actor\u2013critic learning approach. IEEE Internet Things J 8(4):2342\u20132353. https:\/\/doi.org\/10.1109\/JIOT.2020.3048345","journal-title":"IEEE Internet Things J"},{"key":"1240_CR3","doi-asserted-by":"publisher","unstructured":"Queiroz A, Oliveira E, Barbosa M, Dias K (2020) A Survey on Blockchain and Edge Computing applied to the Internet of Vehicles. In 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) 14\u201317. https:\/\/doi.org\/10.1109\/ANTS50601.2020.9342818","DOI":"10.1109\/ANTS50601.2020.9342818"},{"key":"1240_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s12083-019-00730-6","volume":"13","author":"YJ Lee","year":"2019","unstructured":"Lee Y, Lee K, Sang H (2019) Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. Peer Peer Netw Appl 13:671\u2013683. https:\/\/doi.org\/10.1007\/s12083-019-00730-6","journal-title":"Peer Peer Netw Appl"},{"issue":"10","key":"1240_CR5","doi-asserted-by":"publisher","first-page":"10288","DOI":"10.1109\/JIOT.2020.3004273","volume":"7","author":"E Zaghloul","year":"2020","unstructured":"Zaghloul E, Li T, Mutka MW, Ren J (2020) Bitcoin and blockchain: Security and privacy. IEEE Internet Things J 7(10):10288\u201310313. https:\/\/doi.org\/10.1109\/JIOT.2020.3004273","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"1240_CR6","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/TSMC.2019.2916565","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang S, Taha AF, Wang J, Kvaternik K, Hahn A (2019) Energy crowdsourcing and peer-to-peer energy trading in blockchain-enabled smart grids. IEEE Trans Syst Man Cybern Syst Hum 49(8):1612\u20131623. https:\/\/doi.org\/10.1109\/TSMC.2019.2916565","journal-title":"IEEE Trans Syst Man Cybern Syst Hum"},{"key":"1240_CR7","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2018.2876971","volume":"6","author":"HR Hasan","year":"2018","unstructured":"Hasan HR, Salah K (2018) Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access 6:65439\u201365448. https:\/\/doi.org\/10.1109\/ACCESS.2018.2876971","journal-title":"IEEE Access"},{"key":"1240_CR8","doi-asserted-by":"publisher","unstructured":"Underwood S (2016) Blockchain beyond bitcoin. Commun ACM 59(11):15\u201317. https:\/\/doi.org\/10.1145\/2994581","DOI":"10.1145\/2994581"},{"key":"1240_CR9","doi-asserted-by":"publisher","first-page":"85727","DOI":"10.1109\/ACCESS.2019.2925010","volume":"7","author":"CT Nguyen","year":"2019","unstructured":"Cong TN, Hoang DT, Nguyen DN, Niyato D, Nguyen HT, Dutkiewicz E (2019) Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access 7:85727\u201385745. https:\/\/doi.org\/10.1109\/ACCESS.2019.2925010","journal-title":"IEEE Access"},{"key":"1240_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3083263","author":"T Wang","year":"2021","unstructured":"Wang T, Liu Y, Zheng X, Dai HN, Xie M (2021) Edge-Based Communication Optimization for Distributed Federated Learning. IEEE Trans Netw Sci Eng 99:56\u201366. https:\/\/doi.org\/10.1109\/TNSE.2021.3083263","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1240_CR11","doi-asserted-by":"publisher","unstructured":"Wang T, Wang P, Cai S, Zheng X, Wang G (2021) Mobile edge-enabled trust evaluation for the Internet of Things. Inf Fusion 75(3):90\u2013100. https:\/\/doi.org\/10.1016\/j.inffus.2021.04.007","DOI":"10.1016\/j.inffus.2021.04.007"},{"issue":"6","key":"1240_CR12","doi-asserted-by":"publisher","first-page":"4132","DOI":"10.1109\/TCOMM.2019.2898573","volume":"67","author":"CF Liu","year":"2019","unstructured":"Liu CF, Bennis M, Debbah M, Poor HV (2019) Dynamic task offloading and resource allocation for ultra-reliable low-latency edge computing. IEEE Trans Commun 67(6):4132\u20134150. https:\/\/doi.org\/10.1109\/TCOMM.2019.2898573","journal-title":"IEEE Trans Commun"},{"key":"1240_CR13","doi-asserted-by":"publisher","unstructured":"Wang S, Chen M, Liu X, Yin C, Cui S, Vincent Poor H (2021) A machine learning approach for task and resource allocation in mobile-edge computing-based networks. IEEE Internet Things J 8(3):1358\u20131372. https:\/\/doi.org\/10.1109\/JIOT.2020.3011286","DOI":"10.1109\/JIOT.2020.3011286"},{"key":"1240_CR14","doi-asserted-by":"publisher","unstructured":"Feng J, Yu FR, Pei Q, Chu X, Du J, Zhu L (2020) Cooperative computation offloading and resource allocation for blockchain-enabled mobile-edge computing: A Deep reinforcement learning approach. IEEE Internet Things J 7(7):6214\u20136228. https:\/\/doi.org\/10.1109\/JIOT.2019.2961707","DOI":"10.1109\/JIOT.2019.2961707"},{"issue":"4","key":"1240_CR15","doi-asserted-by":"publisher","first-page":"2226","DOI":"10.1109\/JIOT.2020.3035437","volume":"8","author":"Y He","year":"2021","unstructured":"He Y, Wang Y, Qiu C, Lin Q, Li J, Ming Z (2021) Blockchain-based edge computing resource allocation in IoT: A deep reinforcement learning approach. IEEE Internet Things J 8(4):2226\u20132237. https:\/\/doi.org\/10.1109\/JIOT.2020.3035437","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"1240_CR16","doi-asserted-by":"publisher","first-page":"3107","DOI":"10.1109\/TWC.2020.3047496","volume":"20","author":"H Xu","year":"2021","unstructured":"Xu H, Huang W, Zhou Y, Yang D, Li M, Han Z (2021) Edge computing resource allocation for unmanned aerial vehicle assisted mobile network with blockchain applications. IEEE Trans Wirel Commun 20(5):3107\u20133121. https:\/\/doi.org\/10.1109\/TWC.2020.3047496","journal-title":"IEEE Trans Wirel Commun"},{"issue":"9","key":"1240_CR17","doi-asserted-by":"publisher","first-page":"6050","DOI":"10.1109\/TWC.2020.2999721","volume":"19","author":"W Sun","year":"2020","unstructured":"Sun W, Liu J, Yue Y, Wang P (2020) Joint resource allocation and incentive design for blockchain-based mobile edge computing. IEEE Trans Wirel Commun 19(9):6050\u20136064. https:\/\/doi.org\/10.1109\/TWC.2020.2999721","journal-title":"IEEE Trans Wirel Commun"},{"key":"1240_CR18","doi-asserted-by":"publisher","unstructured":"Oliveira MT, Carrara GR, Fernandes NC, Albuquerque CVN, Carrano RC, Medeiros DSV, Mattos DMF (2019) Towards a performance evaluation of private blockchain frameworks using a realistic workload. In 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) 180\u2013187. https:\/\/doi.org\/10.1109\/ICIN.2019.8685888","DOI":"10.1109\/ICIN.2019.8685888"},{"key":"1240_CR19","unstructured":"Buchman E (2016) Tendermint: Byzantine fault tolerance in the age of blockchains. Ontario: University of Guelph 18\u201334"},{"key":"1240_CR20","doi-asserted-by":"publisher","unstructured":"Chai H, Leng S, Zhang K, Mao S (2019) Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles. IEEE Access 7:175744\u2013175757. https:\/\/doi.org\/10.1109\/ACCESS.2019.2956955","DOI":"10.1109\/ACCESS.2019.2956955"},{"key":"1240_CR21","doi-asserted-by":"publisher","unstructured":"Gai F, Wang B, Deng W, Peng W (2018) Proof of reputation: A reputation-based consensus protocol for peer-to-peer network. In International Conference on Database Systems for Advanced Applications 10828:666\u2013681. https:\/\/doi.org\/10.1007\/978-3-319-91458-9_41","DOI":"10.1007\/978-3-319-91458-9_41"},{"issue":"8","key":"1240_CR22","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1109\/TC.2019.2900648","volume":"68","author":"J Yu","year":"2019","unstructured":"Yu J, Kozhaya D, Decouchant J, Esteves-Verissimo P (2019) Repucoin: Your reputation is your power. IEEE Trans Comput 68(8):1225\u20131237. https:\/\/doi.org\/10.1109\/TC.2019.2900648","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"1240_CR23","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TVCG.2009.99","volume":"16","author":"D Wagner","year":"2010","unstructured":"Wagner D, Reitmayr G, Mulloni A, Drummond T, Schmalstieg D (2010) Real-time detection and tracking for augmented reality on mobile phones. IEEE Trans Vis Comput Graph 16(3):355\u2013368. https:\/\/doi.org\/10.1109\/TVCG.2009.99","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"1","key":"1240_CR24","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/TVT.2018.2881191","volume":"68","author":"TX Tran","year":"2019","unstructured":"Tran TX, Pompili D (2019) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. IEEE Trans Veh Technol 68(1):856\u2013868. https:\/\/doi.org\/10.1109\/TVT.2018.2881191","journal-title":"IEEE Trans Veh Technol"},{"key":"1240_CR25","doi-asserted-by":"publisher","first-page":"25408","DOI":"10.1109\/ACCESS.2017.2769878","volume":"5","author":"X Huang","year":"2017","unstructured":"Huang X, Yu R, Kang J, Zhang Y (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5:25408\u201325420. https:\/\/doi.org\/10.1109\/ACCESS.2017.2769878","journal-title":"IEEE Access"},{"key":"1240_CR26","doi-asserted-by":"publisher","unstructured":"Oliveira M, Reis L, Medeiros D, Carrano RC, Mattos D (2020) Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications. Comput Netw 179:107367. https:\/\/doi.org\/10.1016\/j.comnet.2020.107367","DOI":"10.1016\/j.comnet.2020.107367"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01240-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01240-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01240-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T02:17:35Z","timestamp":1642645055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01240-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1240"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01240-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"11 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}}]}}