{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:54:30Z","timestamp":1774454070689,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100019062","name":"Tianjin Research Innovation Project for Postgraduate Students","doi-asserted-by":"publisher","award":["2022BKYZ044"],"award-info":[{"award-number":["2022BKYZ044"]}],"id":[{"id":"10.13039\/501100019062","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tianjin University of Technology Research Innovation Practice Project for Postgraduate Students","award":["YJ2241"],"award-info":[{"award-number":["YJ2241"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072336"],"award-info":[{"award-number":["62072336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tianjin Technical Innovation Guidance Special Project","award":["22YDPYGX00040"],"award-info":[{"award-number":["22YDPYGX00040"]}]},{"name":"Key Research and Development Program of Tianjin","award":["23YFZCSN00240"],"award-info":[{"award-number":["23YFZCSN00240"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01852-2","type":"journal-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T07:38:57Z","timestamp":1734075537000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security resource allocation in blockchain-based IoT"],"prefix":"10.1007","volume":"18","author":[{"given":"Hang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jinsong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zening","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Huayue","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,13]]},"reference":[{"key":"1852_CR1","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.future.2021.02.006","volume":"119","author":"E Bandara","year":"2021","unstructured":"Bandara E, Tosh D, Foytik P, Shetty S, Ranasinghe N, De Zoysa K (2021) Tikiri\u2013towards a lightweight blockchain for iot. Future Gener Comput Syst 119:154\u2013165","journal-title":"Future Gener Comput Syst"},{"key":"1852_CR2","doi-asserted-by":"crossref","unstructured":"Safa O, Ismaeel Al\u00a0R, Hussein M (2021) Securing critical iot infrastructures with blockchain-supported federated learning. IEEE Int Things J, 9(4):2592\u20132601,","DOI":"10.1109\/JIOT.2021.3088056"},{"key":"1852_CR3","unstructured":"Dr\u00a0Craig\u00a0S W (2008) Bitcoin: A peer-to-peer electronic cash system. Available at SSRN 3440802,"},{"key":"1852_CR4","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Baqer M, Jun Z, Dusit N, Yong\u00a0Liang G, Chau Y, Sumei S, Kwok-Yan L, Leong\u00a0Hai K (2020) Blockchain for the internet of vehicles towards intelligent transportation systems: A survey. IEEE Int Things J, 8(6):4157\u20134185,","DOI":"10.1109\/JIOT.2020.3028368"},{"issue":"3","key":"1852_CR5","first-page":"1421","volume":"9","author":"X Yang","year":"2020","unstructured":"Yang X, Zhang C, Wang G, Qin Z, Zeng Q (2020) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Topics in Comput 9(3):1421\u20131432","journal-title":"IEEE Trans Emerg Topics in Comput"},{"key":"1852_CR6","doi-asserted-by":"crossref","unstructured":"Benil T, Jasper JJCN (2020) Cloud based security on outsourcing using blockchain in e-health systems. Comput Netw 178:107344","DOI":"10.1016\/j.comnet.2020.107344"},{"key":"1852_CR7","doi-asserted-by":"crossref","unstructured":"Dinh\u00a0C N, Pubudu\u00a0N P, Ming D, Aruna S (2020) Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning. IEEE Trans Netw Service Manage, 17(4):2536\u20132549,","DOI":"10.1109\/TNSM.2020.3010967"},{"issue":"12","key":"1852_CR8","doi-asserted-by":"publisher","first-page":"8333","DOI":"10.1109\/TWC.2021.3091861","volume":"20","author":"Y Zuo","year":"2021","unstructured":"Zuo Y, Jin S, Zhang S (2021) Computation offloading in untrusted mec-aided mobile blockchain iot systems. IEEE Trans Wireless Commu 20(12):8333\u20138347","journal-title":"IEEE Trans Wireless Commu"},{"issue":"11","key":"1852_CR9","doi-asserted-by":"publisher","first-page":"9084","DOI":"10.1109\/JIOT.2021.3056656","volume":"8","author":"Y Zuo","year":"2021","unstructured":"Zuo Y, Jin S, Zhang S, Zhang Y (2021) Blockchain storage and computation offloading for cooperative mobile-edge computing. IEEE Int Things J 8(11):9084\u20139098","journal-title":"IEEE Int Things J"},{"key":"1852_CR10","doi-asserted-by":"crossref","unstructured":"Zhang K, Gui X, Ren D, Tianjiao D, He X (2022) Optimal pricing-based computation offloading and resource allocation for blockchain-enabled beyond 5g networks. Comput Netw 203:108674","DOI":"10.1016\/j.comnet.2021.108674"},{"key":"1852_CR11","unstructured":"Mai T, Yao H, Zhang N, Lexi X, Guizani M (2021) and Song Guo. An evolutionary game approach. IEEE Trans Cloud Comput, Cloud mining pool aided blockchain-enabled internet of things"},{"issue":"5","key":"1852_CR12","doi-asserted-by":"publisher","first-page":"8507","DOI":"10.1109\/JIOT.2019.2919781","volume":"6","author":"N Zhao","year":"2019","unstructured":"Zhao N, Hao W, Chen Y (2019) Coalition game-based computation resource allocation for wireless blockchain networks. IEEE Int Things J 6(5):8507\u20138518","journal-title":"IEEE Int Things J"},{"key":"1852_CR13","unstructured":"Ghassan\u00a0O K, Elli A, Srdjan C (2012) Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM conference on Computer and communications security, pages 906\u2013917,"},{"key":"1852_CR14","doi-asserted-by":"crossref","unstructured":"Mehrdad N, Arash G, Laurent N, Kevin K, Charles K (2019) Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm. In: Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2, pages 1118\u20131134. Springer,","DOI":"10.1007\/978-3-030-01177-2_81"},{"issue":"11","key":"1852_CR15","doi-asserted-by":"publisher","first-page":"7105","DOI":"10.1109\/TII.2020.2973248","volume":"16","author":"Z Chang","year":"2020","unstructured":"Chang Z, Guo W, Guo X, Zhou Z, Ristaniemi T (2020) Incentive mechanism for edge-computing-based blockchain. IEEE Trans Indust Inf 16(11):7105\u20137114","journal-title":"IEEE Trans Indust Inf"},{"issue":"3","key":"1852_CR16","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TMC.2019.2959772","volume":"20","author":"A Asheralieva","year":"2019","unstructured":"Asheralieva A, Niyato D (2019) Learning-based mobile edge computing resource management to support public blockchain networks. IEEE Trans Mobile Comput 20(3):1092\u20131109","journal-title":"IEEE Trans Mobile Comput"},{"key":"1852_CR17","unstructured":"Zehui X, Jiawen K, Dusit N, Ping W, H\u00a0Vincent P (2019) Cloud\/edge computing service management in blockchain networks: Multi-leader multi-follower game-based admm for pricing. IEEE Trans Serv Comput, 13(2):356\u2013367,"},{"key":"1852_CR18","doi-asserted-by":"crossref","unstructured":"Guo S, Dai Y, Guo S, Qiu X, Qi F (2020) Blockchain meets edge computing: Stackelberg game and double auction based task offloading for mobile blockchain. IEEE Trans Veh Technol 69(5):5549\u20135561","DOI":"10.1109\/TVT.2020.2982000"},{"key":"1852_CR19","doi-asserted-by":"crossref","unstructured":"Jain V, Kumar B (2021) Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts. Peer-to-Peer Netw Appl 14:3124\u20133142","DOI":"10.1007\/s12083-021-01161-y"},{"key":"1852_CR20","doi-asserted-by":"crossref","unstructured":"Ding X, Guo J, Li D, Weili W (2020) An incentive mechanism for building a secure blockchain-based internet of things. IEEE Trans Netw Sci Eng 8(1):477\u2013487","DOI":"10.1109\/TNSE.2020.3040446"},{"key":"1852_CR21","doi-asserted-by":"crossref","unstructured":"Haitao X, Huang W, Zhou Y, Yang D, Li M, Han Z (2021) Edge computing resource allocation for unmanned aerial vehicle assisted mobile network with blockchain applications. IEEE Trans Wireless Commu 20(5):3107\u20133121","DOI":"10.1109\/TWC.2020.3047496"},{"issue":"9","key":"1852_CR22","doi-asserted-by":"publisher","first-page":"6050","DOI":"10.1109\/TWC.2020.2999721","volume":"19","author":"W Sun","year":"2020","unstructured":"Sun W, Liu J, Yue Y, Wang P (2020) Joint resource allocation and incentive design for blockchain-based mobile edge computing. IEEE Trans Wireless Commu 19(9):6050\u20136064","journal-title":"IEEE Trans Wireless Commu"},{"key":"1852_CR23","doi-asserted-by":"crossref","unstructured":"Tuyet D, Lei F, Jonathan K, Phuc T, Hong-Sheng Z (2020) 2-hop blockchain: Combining proof-of-work and proof-of-stake securely. In: European Symposium on Research in Computer Security, pages 697\u2013712. Springer,","DOI":"10.1007\/978-3-030-59013-0_34"},{"issue":"6","key":"1852_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102382","volume":"57","author":"J Li","year":"2020","unstructured":"Li J, Jigang W, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process Manage 57(6):102382","journal-title":"Inf Process Manage"},{"issue":"10","key":"1852_CR25","doi-asserted-by":"publisher","first-page":"10548","DOI":"10.1109\/JIOT.2020.3004441","volume":"7","author":"B Hamdaoui","year":"2020","unstructured":"Hamdaoui B, Alkalbani M, Rayes A, Zorba N (2020) Iotshare: A blockchain-enabled iot resource sharing on-demand protocol for smart city situation-awareness applications. IEEE Int Things J 7(10):10548\u201310561","journal-title":"IEEE Int Things J"},{"issue":"3","key":"1852_CR26","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1109\/COMST.2020.2975999","volume":"22","author":"M Saad","year":"2020","unstructured":"Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen D (2020) Exploring the attack surface of blockchain: A comprehensive survey. IEEE Commu Surv Tutor 22(3):1977\u20132008","journal-title":"IEEE Commu Surv Tutor"},{"key":"1852_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02915-y","volume":"19","author":"Y-L Gao","year":"2020","unstructured":"Gao Y-L, Chen X-B, Gang X, Yuan K-G, Liu W, Yang Y-X (2020) A novel quantum blockchain scheme base on quantum entanglement and dpos. Quantum Inf Process 19:1\u201315","journal-title":"Quantum Inf Process"},{"issue":"5","key":"1852_CR28","first-page":"1492","volume":"14","author":"F Shaohan","year":"2018","unstructured":"Shaohan F, Wenbo W, Zehui X, Dusit N, Ping W, Shaun SW (2018) On cyber risk management of blockchain networks: A game theoretic approach. IEEE Trans Serv Comput 14(5):1492\u20131504","journal-title":"IEEE Trans Serv Comput"},{"key":"1852_CR29","doi-asserted-by":"publisher","first-page":"2251","DOI":"10.1007\/s12083-020-00905-6","volume":"13","author":"G Ma","year":"2020","unstructured":"Ma G, Ge C, Zhou L (2020) Achieving reliable timestamp in the bitcoin platform. Peer-to-Peer Netw Appl 13:2251\u20132259","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"6","key":"1852_CR30","first-page":"495","volume":"60","author":"E Zamani","year":"2020","unstructured":"Zamani E, He Y, Phillips M (2020) On the security risks of the blockchain. J Comput Inf Syst 60(6):495\u2013506","journal-title":"J Comput Inf Syst"},{"key":"1852_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107978","volume":"191","author":"Y Wen","year":"2021","unstructured":"Wen Y, Fengyuan L, Liu Y, Huang X (2021) Attacks and countermeasures on blockchains: A survey from layering perspective. Comput Netw 191:107978","journal-title":"Comput Netw"},{"issue":"12","key":"1852_CR32","doi-asserted-by":"publisher","first-page":"3533","DOI":"10.1109\/JSAC.2022.3213324","volume":"40","author":"W Liu","year":"2022","unstructured":"Liu W, Cao B, Peng M (2022) Blockchain based offloading strategy: Incentive, effectiveness and security. IEEE J Select Areas in Commu 40(12):3533\u20133546","journal-title":"IEEE J Select Areas in Commu"},{"key":"1852_CR33","unstructured":"Yun Chao H, Milan P, Dario S, Nurit S, Valerie Y (2015) Mobile edge computing\u2013a key technology towards 5g. ETSI white paper 11(11):1\u201316"},{"issue":"5","key":"1852_CR34","first-page":"78","volume":"49","author":"W Shi","year":"2016","unstructured":"Shi W, Dustdar S (2016) The promise of edge computing. Comput 49(5):78\u201381","journal-title":"The promise of edge computing. Comput"},{"issue":"1","key":"1852_CR35","first-page":"157","volume":"8","author":"K Jiawen","year":"2018","unstructured":"Jiawen K, Zehui X, Dusit N, Ping W, Dongdong Y, Dong In K (2018) Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks. IEEE Wireless Commu Lett 8(1):157\u2013160","journal-title":"IEEE Wireless Commu Lett"},{"key":"1852_CR36","unstructured":"J\u00f6rgen\u00a0W W (1997) Evolutionary game theory. MIT press,"},{"issue":"21","key":"1852_CR37","doi-asserted-by":"publisher","first-page":"20985","DOI":"10.1109\/JIOT.2022.3175729","volume":"9","author":"L Wenjian","year":"2022","unstructured":"Wenjian L, Zhang X (2022) Computation offloading for partitionable applications in dense networks: An evolutionary game approach. IEEE Int Things J 9(21):20985\u201320996","journal-title":"IEEE Int Things J"},{"issue":"5","key":"1852_CR38","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/LWC.2018.2820009","volume":"7","author":"X Liu","year":"2018","unstructured":"Liu X, Wang W, Niyato D, Zhao N, Wang P (2018) Evolutionary game for mining pool selection in blockchain networks. IEEE Wireless Commu Lett 7(5):760\u2013763","journal-title":"IEEE Wireless Commu Lett"},{"key":"1852_CR39","unstructured":"Meni R (2014) Analysis of hashrate-based double spending. arXiv:1402.2009,"},{"key":"1852_CR40","doi-asserted-by":"crossref","unstructured":"Liu W, Cao B, Peng M (2022) Blockchain based offloading strategy: Incentive, effectiveness and security. IEEE J Select Areas Commu 40(12):3533\u20133546","DOI":"10.1109\/JSAC.2022.3213324"},{"issue":"6","key":"1852_CR41","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MNET.2019.1900002","volume":"33","author":"B Cao","year":"2019","unstructured":"Cao B, Li Y, Zhang L, Zhang L, Mumtaz S, Zhou Z, Peng M (2019) When internet of things meets blockchain: Challenges in distributed consensus. IEEE Netw 33(6):133\u2013139","journal-title":"IEEE Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01852-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01852-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01852-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:33:44Z","timestamp":1747474424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01852-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1852"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01852-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"4 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"This publication has been consented to by all authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"45"}}