{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:48:08Z","timestamp":1769881688548,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:00:00Z","timestamp":1659484800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:00:00Z","timestamp":1659484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12083-022-01363-y","type":"journal-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T12:02:48Z","timestamp":1659528168000},"page":"2444-2456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A high performance two-layer consensus architecture for blockchain-based IoT systems"],"prefix":"10.1007","volume":"15","author":[{"given":"Haytham","family":"Qushtom","sequence":"first","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7760-9920","authenticated-orcid":false,"given":"Vojislav B.","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,3]]},"reference":[{"key":"1363_CR1","doi-asserted-by":"publisher","unstructured":"Yazdinejad A, Srivastava G, Parizi RM, Dehghantanha A, Karimipour H, Karizno SR (2020) Slpow: Secure and low latency proof of work protocol for blockchain in green iot networks. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1\u2013. https:\/\/doi.org\/10.1109\/VTC2020-Spring48590.2020.9129462","DOI":"10.1109\/VTC2020-Spring48590.2020.9129462"},{"issue":"5","key":"1363_CR2","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"HN Dai","year":"2019","unstructured":"Dai HN, Zheng Z, Zhang Y (2019) Blockchain for internet of things: A survey. IEEE Internet Things J 6(5):8076\u20138094. https:\/\/doi.org\/10.1109\/JIOT.2019.2920987","journal-title":"IEEE Internet Things J"},{"key":"1363_CR3","unstructured":"Bano S, Sonnino A, Al-Bassam M, Azouvi S, McCorry P, Meiklejohn S, Danezis G (2017) Consensus in the age of blockchains"},{"key":"1363_CR4","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"1363_CR5","unstructured":"Castro M, Liskov B (1999) Practical Byzantine fault tolerance. In: OSDI: Symposium on Operating Systems Design and Implementation. New Orleans, LA"},{"key":"1363_CR6","doi-asserted-by":"publisher","unstructured":"Aublin PL, Guerraoui R, Kne\u017eevi\u0107 N, Qu\u00e9ma V, Vukoli\u0107 M ()2015 The next 700 bft protocols. ACM Trans Comput Syst 32(4). https:\/\/doi.org\/10.1145\/2658994","DOI":"10.1145\/2658994"},{"key":"1363_CR7","doi-asserted-by":"crossref","unstructured":"Veronese GS, Correia M, Bessani AN, Lung LC (2010) Ebawa: Efficient byzantine agreement for wide-area networks","DOI":"10.1109\/HASE.2010.19"},{"key":"1363_CR8","doi-asserted-by":"crossref","unstructured":"Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Chang X, Qushtom H (2020) PBFT-based ordering service for IoT domains. In: IEEE Transactions on Vehicular Technology (TVT)","DOI":"10.1109\/VTC2020-Fall49728.2020.9348646"},{"key":"1363_CR9","doi-asserted-by":"crossref","unstructured":"Qushtom H, Mi\u0161i\u0107 J, Mi\u0161i\u0107 V (2022) Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT systems. In: IEEE ICC 2022. Seoul, South Korea","DOI":"10.1109\/ICC45855.2022.9838616"},{"issue":"9","key":"1363_CR10","doi-asserted-by":"publisher","first-page":"8228","DOI":"10.1109\/JIOT.2020.2984011","volume":"7","author":"M Zhang","year":"2020","unstructured":"Zhang M, Zhou Y, Quan W, Zhu J, Zheng R, Wu Q (2020) Online learning for iot optimization: A frank-wolfe adam-based algorithm. IEEE Internet Things J 7(9):8228\u20138237. https:\/\/doi.org\/10.1109\/JIOT.2020.2984011","journal-title":"IEEE Internet Things J"},{"issue":"107","key":"1363_CR11","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.comnet.2020.107464","volume":"182","author":"P Fazio","year":"2020","unstructured":"Fazio P, Tropea M, Voznak M, De Rango F (2020) On packet marking and markov modeling for ip traceback: A deep probabilistic and stochastic analysis. Comput Netw 182(107):464. https:\/\/doi.org\/10.1016\/j.comnet.2020.107464","journal-title":"Comput Netw"},{"key":"1363_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.01.006","volume":"130","author":"G Liu","year":"2019","unstructured":"Liu G, Quan W, Cheng N, Zhang H, Yu S (2019) Efficient ddos attacks mitigation for stateful forwarding in internet of things. J Netw Comput Appl 130:1\u201313. https:\/\/doi.org\/10.1016\/j.jnca.2019.01.006","journal-title":"J Netw Comput Appl"},{"key":"1363_CR13","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-030-69255-1_18","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"L Malina","year":"2021","unstructured":"Malina L, Smekal D, Ricci S, Hajny J, C\u00edbik P, Hrabovsky J (2021) Hardware-accelerated cryptography for software-defined networks with p4. In: Maimut D, Oprina AG, Sauveron D (eds) Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, Cham, pp 271\u2013287"},{"key":"1363_CR14","doi-asserted-by":"publisher","unstructured":"Hauser F, H\u00e4berle M, Schmidt M, Menth M (2020) P4-ipsec: Site-to-site and host-to-site vpn with ipsec in p4-based sdn. IEEE Access 8:139,567\u2013139,586. https:\/\/doi.org\/10.1109\/ACCESS.2020.3012738","DOI":"10.1109\/ACCESS.2020.3012738"},{"issue":"8","key":"1363_CR15","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.1109\/JIOT.2020.3048842","volume":"8","author":"G Liu","year":"2021","unstructured":"Liu G, Quan W, Cheng N, Gao D, Lu N, Zhang H, Shen X (2021) Softwarized iot network immunity against eavesdropping with programmable data planes. IEEE Internet Things J 8(8):6578\u20136590. https:\/\/doi.org\/10.1109\/JIOT.2020.3048842","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1363_CR16","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TDSC.2010.70","volume":"8","author":"Y Amir","year":"2010","unstructured":"Amir Y, Coan B, Kirsch J, Lane J (2010) Prime: Byzantine replication under attack. IEEE Trans Dependable Secure Comput 8(4):564\u2013577","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1363_CR17","doi-asserted-by":"crossref","unstructured":"Miller A, Xia Y, Croman K, Shi E, Song D (2016) The honey badger of BFT protocols. In: Proc. 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 31\u201342","DOI":"10.1145\/2976749.2978399"},{"key":"1363_CR18","doi-asserted-by":"crossref","unstructured":"Kotla R, Alvisi L, Dahlin M, Clement A, Wong E (2010) Zyzzyva: Speculative Byzantine fault tolerance. ACM Trans Comput Syst 27(4)","DOI":"10.1145\/1658357.1658358"},{"key":"1363_CR19","doi-asserted-by":"crossref","unstructured":"Veronese GS, Correia M, Bessani AN, Lung LC (2009) Spin one\u2019s wheels? Byzantine fault tolerance with a spinning primary. In: 2009 28th IEEE International Symposium on Reliable Distributed Systems, pp. 135\u2013144. IEEE","DOI":"10.1109\/SRDS.2009.36"},{"key":"1363_CR20","unstructured":"Gueta GG, Abraham I, Grossman S, Malkhi D, Pinkas B, Reiter M, Seredinschi DA, Tamir O, Tomescu A (2019) SBFT: a scalable and decentralized trust infrastructure. In: 2019 49th Annual IEEE\/IFIP international conference on dependable systems and networks (DSN), pp. 568\u2013580. IEEE"},{"key":"1363_CR21","unstructured":"Abraham I, Gueta G, Malkhi D (2018) Hot-stuff the linear, optimal-resilience, one-message BFT devil. arXiv preprint arXiv:1803.05069"},{"key":"1363_CR22","unstructured":"Baudet M, Ching A, Chursin A, Danezis G, Garillot F, Li Z, Malkhi D, Naor O, Perelman D, Sonnino A (2019) State machine replication in the libra blockchain. white paper, Cryptorating \u2013 cryptocurrency rating agency. https:\/\/github.com\/Cryptorating"},{"key":"1363_CR23","unstructured":"Buchman E (2016) Tendermint: Byzantine fault tolerance in the age of blockchains. Ph.D. thesis, The University of Guelph, Ontario, Canada"},{"key":"1363_CR24","doi-asserted-by":"publisher","unstructured":"Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Chang X (2020) Comparison of single- and multiple entry point PBFT for IoT blockchain systems. In: 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), pp. 1\u20136. https:\/\/doi.org\/10.1109\/VTC2020-Fall49728.2020.9348782","DOI":"10.1109\/VTC2020-Fall49728.2020.9348782"},{"key":"1363_CR25","doi-asserted-by":"crossref","unstructured":"Qushtom H, Mi\u0161i\u0107 J, Mi\u0161i\u0107 V (2021) Multiple leader PBFT based blockchain architecture for IoT domains. In: 2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (IEEE CCECE 2021). virtual, Canada","DOI":"10.1109\/CCECE53047.2021.9569177"},{"key":"1363_CR26","doi-asserted-by":"publisher","unstructured":"Majkowski J, Palacio FC (2006) Dynamic txop configuration for qos enhancement in ieee 802.11e wireless lan. In: 2006 International Conference on Software in Telecommunications and Computer Networks, pp. 66\u201370. https:\/\/doi.org\/10.1109\/SOFTCOM.2006.329721","DOI":"10.1109\/SOFTCOM.2006.329721"},{"key":"1363_CR27","unstructured":"Takagi H (1991) Queueing Analysis: Vacation and priority systems (pt. 1). QUEUEING ANALYSIS. North-Holland"},{"issue":"1","key":"1363_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TVT.2020.3048291","volume":"70","author":"J Mi\u0161i\u0107","year":"2021","unstructured":"Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Chang X, Qushtom H (2021) Adapting PBFT for use with blockchain-enabled IoT systems. IEEE Trans Veh Technol 70(1):33\u201348. https:\/\/doi.org\/10.1109\/TVT.2020.3048291","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01363-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01363-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01363-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T07:28:03Z","timestamp":1661412483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01363-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,3]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["1363"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01363-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,3]]},"assertion":[{"value":"31 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no other competing interests, financial or otherwise.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}