{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:16:56Z","timestamp":1763644616865,"version":"3.44.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T00:00:00Z","timestamp":1746576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T00:00:00Z","timestamp":1746576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01980-3","type":"journal-article","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:42:54Z","timestamp":1746592974000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Minecrafter: A secure and decentralized consensus protocol for blockchain-enabled vaccine supply chain"],"prefix":"10.1007","volume":"18","author":[{"given":"Sreenu","family":"Maloth","sequence":"first","affiliation":[]},{"given":"Nishant Singh","family":"Hada","sequence":"additional","affiliation":[]},{"given":"Chandrashekar","family":"Jatoth","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Ugo","family":"Fiore","sequence":"additional","affiliation":[]},{"given":"Pradip Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,7]]},"reference":[{"key":"1980_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.comcom.2022.04.031","volume":"191","author":"M Sreenu","year":"2022","unstructured":"Sreenu M, Gupta N, Jatoth C, Saad A, Alharbi A, Nkenyereye L (2022) Blockchain based secure and reliable cyber physical ecosystem for vaccine supply chain. Comput Commun 191:173\u2013183","journal-title":"Comput Commun"},{"issue":"2","key":"1980_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3388446","volume":"21","author":"L Cui","year":"2021","unstructured":"Cui L, Xiao Z, Wang J, Chen F, Pan Y, Dai H, Qin J (2021) Improving vaccine safety using blockchain. ACM Transactions on Internet Technology (TOIT) 21(2):1\u201324","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"1980_CR3","first-page":"102024","volume":"52","author":"B Yong","year":"2020","unstructured":"Yong B, Shen J, Liu X, Li F, Chen H, Zhou Q (2020) An intelligent blockchain-based system for safe vaccine supply and supervision. Int J Inf Manag 52:102024","journal-title":"Int J Inf Manag"},{"key":"1980_CR4","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/OJCS.2021.3067450","volume":"2","author":"C Antal","year":"2021","unstructured":"Antal C, Cioara T, Antal M, Anghel I (2021) Blockchain platform for covid-19 vaccine supply management. IEEE Open J Comput Soc 2:164\u2013178","journal-title":"IEEE Open J Comput Soc"},{"key":"1980_CR5","doi-asserted-by":"publisher","first-page":"71372","DOI":"10.1109\/ACCESS.2021.3079197","volume":"9","author":"A Musamih","year":"2021","unstructured":"Musamih A, Jayaraman R, Salah K, Hasan HR, Yaqoob I, Al-Hammadi Y (2021) Blockchain-based solution for distribution and delivery of covid-19 vaccines. IEEE Access 9:71372\u201371387","journal-title":"IEEE Access"},{"issue":"23","key":"1980_CR6","doi-asserted-by":"publisher","first-page":"10953","DOI":"10.1109\/JSEN.2019.2935035","volume":"19","author":"B Alotaibi","year":"2019","unstructured":"Alotaibi B (2019) Utilizing blockchain to overcome cyber security concerns in the internet of things: a review. IEEE Sens J 19(23):10953\u201310971","journal-title":"IEEE Sens J"},{"key":"1980_CR7","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData congress). IEEE, pp 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"1980_CR8","doi-asserted-by":"crossref","unstructured":"Moosavi J, Naeni LM, Fathollahi-Fard AM, Fiore U (2021) Blockchain in supply chain management: a review, bibliometric, and network analysis. Environ Sci Pollut Res 1\u201315","DOI":"10.1007\/s11356-021-13094-3"},{"key":"1980_CR9","doi-asserted-by":"crossref","unstructured":"Donet\u00a0Donet JA, P\u00e9rez-Sola C, Herrera-Joancomart\u00ed J (2014) The bitcoin p2p network. In: International conference on financial cryptography and data security. Springer, pp 87\u2013102","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"1980_CR10","doi-asserted-by":"crossref","unstructured":"Khan AA, Bourouis S, Kamruzzaman M, Hadjouni M, Shaikh ZA, Laghari AA, Elmannai H, Dhahbi S (2023) Data security in healthcare industrial internet of things with blockchain. IEEE Sens J","DOI":"10.1109\/JSEN.2023.3273851"},{"key":"1980_CR11","doi-asserted-by":"crossref","unstructured":"Bryatov S, Borodinov A (2019) Blockchain technology in the pharmaceutical supply chain: Researching a business model based on hyperledger fabric. In: Proceedings of the International Conference on Information Technology and Nanotechnology (ITNT), Samara, Russia, pp 21\u201324","DOI":"10.18287\/1613-0073-2019-2416-134-140"},{"issue":"16","key":"1980_CR12","doi-asserted-by":"publisher","first-page":"17591","DOI":"10.1109\/JSEN.2020.3012294","volume":"21","author":"A Vangala","year":"2020","unstructured":"Vangala A, Das AK, Kumar N, Alazab M (2020) Smart secure sensing for iot-based agriculture: Blockchain perspective. IEEE Sens J 21(16):17591\u201317607","journal-title":"IEEE Sens J"},{"key":"1980_CR13","doi-asserted-by":"publisher","first-page":"113385","DOI":"10.1016\/j.eswa.2020.113385","volume":"154","author":"SMH Bamakan","year":"2020","unstructured":"Bamakan SMH, Motavali A, Bondarti AB (2020) A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl 154:113385","journal-title":"Expert Syst Appl"},{"issue":"6","key":"1980_CR14","doi-asserted-by":"publisher","first-page":"5736","DOI":"10.1109\/TVT.2020.2974005","volume":"69","author":"Z Zheng","year":"2020","unstructured":"Zheng Z, Pan J, Cai L (2020) Lightweight blockchain consensus protocols for vehicular social networks. IEEE Trans Veh Technol 69(6):5736\u20135748","journal-title":"IEEE Trans Veh Technol"},{"key":"1980_CR15","doi-asserted-by":"crossref","unstructured":"Zhuang Q, Liu Y, Chen L, Ai Z (2019) Proof of reputation: a reputation-based consensus protocol for blockchain based systems. In: Proceedings of the 2019 international electronics communication conference, pp 131\u2013138","DOI":"10.1145\/3343147.3343169"},{"issue":"6","key":"1980_CR16","doi-asserted-by":"publisher","first-page":"8716","DOI":"10.1109\/JSEN.2021.3052009","volume":"21","author":"S Hameed","year":"2021","unstructured":"Hameed S, Shah SA, Saeed QS, Siddiqui S, Ali I, Vedeshin A, Draheim D (2021) A scalable key and trust management solution for iot sensors using sdn and blockchain technology. IEEE Sens J 21(6):8716\u20138733","journal-title":"IEEE Sens J"},{"issue":"4","key":"1980_CR17","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1145\/332051.332797","volume":"43","author":"PG Neumann","year":"2000","unstructured":"Neumann PG (2000) Denial-of-service attacks. Commun ACM 43(4):136\u2013136","journal-title":"Commun ACM"},{"key":"1980_CR18","doi-asserted-by":"crossref","unstructured":"Wang A, Mohaisen A, Chen S (2017) An adversary-centric behavior modeling of ddos attacks. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 1126\u20131136","DOI":"10.1109\/ICDCS.2017.213"},{"key":"1980_CR19","doi-asserted-by":"crossref","unstructured":"Bonneau J (2016) Why buy when you can rent? In: International conference on financial cryptography and data security. Springer, pp 19\u201326","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"1980_CR20","unstructured":"Heilman E, Kendler A, Zohar A, Goldberg S (2015) Eclipse attacks on $$\\{$$Bitcoin\u2019s$$\\}$$$$\\{$$peer-to-peer$$\\}$$ network. In: 24th USENIX Security Symposium (USENIX Security 15), pp 129\u2013144"},{"key":"1980_CR21","unstructured":"Rosenfeld M (2011) Analysis of bitcoin pooled mining reward systems. arXiv:1112.4980"},{"issue":"12","key":"1980_CR22","doi-asserted-by":"publisher","first-page":"e5232","DOI":"10.1002\/cpe.5232","volume":"32","author":"N Alzahrani","year":"2020","unstructured":"Alzahrani N, Bulusu N (2020) A new product anti-counterfeiting blockchain using a truly decentralized dynamic consensus protocol. Concurr Comput Pract Exp 32(12):e5232","journal-title":"Concurr Comput Pract Exp"},{"key":"1980_CR23","doi-asserted-by":"crossref","unstructured":"Alzahrani N, Bulusu N (2018) Towards true decentralization: a blockchain consensus protocol based on game theory and randomness. In: International conference on decision and game theory for security. Springer, pp 465\u2013485","DOI":"10.1007\/978-3-030-01554-1_27"},{"issue":"1","key":"1980_CR24","doi-asserted-by":"publisher","first-page":"13","DOI":"10.3390\/cryptography7010013","volume":"7","author":"A Koyama","year":"2023","unstructured":"Koyama A, Tran VC, Fujimoto M, Bao VNQ, Tran TH (2023) A decentralized covid-19 vaccine tracking system using blockchain technology. Cryptography 7(1):13","journal-title":"Cryptography"},{"key":"1980_CR25","first-page":"100485","volume":"34","author":"R Mishra","year":"2023","unstructured":"Mishra R, Ramesh D, Edla DR, Qi L (2023) Vaccinechain: a checkpoint assisted scalable blockchain based secure vaccine supply chain with selective revocation. J Ind Inf Integr 34:100485","journal-title":"J Ind Inf Integr"},{"key":"1980_CR26","doi-asserted-by":"crossref","unstructured":"Chinnasamy P, Vinodhini B, Praveena V, Vinothini C, Sujitha BB (2021) Blockchain based access control and data sharing systems for smart devices. J Phys Conf Ser 1767:012056. IOP Publishing","DOI":"10.1088\/1742-6596\/1767\/1\/012056"},{"issue":"8","key":"1980_CR27","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.3390\/sym13081363","volume":"13","author":"DP Oyinloye","year":"2021","unstructured":"Oyinloye DP, Teh JS, Jamil N, Alawida M (2021) Blockchain consensus: an overview of alternative protocols. Symmetry 13(8):1363","journal-title":"Symmetry"},{"key":"1980_CR28","doi-asserted-by":"crossref","unstructured":"Chinnasamy P, Ayyasamy RK, Tiwari V, Dhanasekaran S, Kumar BS, Sivaprakasam T (2024) Blockchain enabled privacy-preserved supply-chain management for tracing the food goods. In: 2024 International Conference on Science Technology Engineering and Management (ICSTEM). IEEE, pp 1\u20135","DOI":"10.1109\/ICSTEM61137.2024.10560589"},{"key":"1980_CR29","doi-asserted-by":"crossref","unstructured":"Kumar A, Jain S (2019) Proof of game (pog): a game theory based consensus model. In: International conference on sustainable communication networks and application. Springer, pp 755\u2013764","DOI":"10.1007\/978-3-030-34515-0_80"},{"issue":"1","key":"1980_CR30","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/TVT.2021.3129828","volume":"71","author":"HN Abishu","year":"2021","unstructured":"Abishu HN, Seid AM, Yacob YH, Ayall T, Sun G, Liu G (2021) Consensus mechanism for blockchain-enabled vehicle-to-vehicle energy trading in the internet of electric vehicles. IEEE Trans Veh Technol 71(1):946\u2013960","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"1980_CR31","doi-asserted-by":"publisher","first-page":"3970","DOI":"10.3390\/app13063970","volume":"13","author":"P Chinnasamy","year":"2023","unstructured":"Chinnasamy P, Albakri A, Khan M, Raja AA, Kiran A, Babu JC (2023) Smart contract-enabled secure sharing of health data for a mobile cloud-based e-health system. Appl Sci 13(6):3970","journal-title":"Appl Sci"},{"key":"1980_CR32","unstructured":"Liu Z, Luong NC, Wang W, Niyato D, Wang P, Liang YC, Kim DI (2019) A survey on applications of game theory in blockchain. arXiv:1902.10865"},{"key":"1980_CR33","doi-asserted-by":"crossref","unstructured":"Sgantzos K, Grigg I (2019) Artificial intelligence implementations on the blockchain. Use cases and future applications. Future Internet 11(8):170","DOI":"10.3390\/fi11080170"},{"key":"1980_CR34","doi-asserted-by":"publisher","first-page":"54371","DOI":"10.1109\/ACCESS.2020.2981415","volume":"8","author":"U Bodkhe","year":"2020","unstructured":"Bodkhe U, Mehta D, Tanwar S, Bhattacharya P, Singh PK, Hong WC (2020) A survey on decentralized consensus mechanisms for cyber physical systems. IEEE Access 8:54371\u201354401","journal-title":"IEEE Access"},{"key":"1980_CR35","doi-asserted-by":"crossref","unstructured":"Pahlajani S, Kshirsagar A, Pachghare V (2019) Survey on private blockchain consensus algorithms. In: 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT). IEEE, pp 1\u20136","DOI":"10.1109\/ICIICT1.2019.8741353"},{"key":"1980_CR36","doi-asserted-by":"crossref","unstructured":"Ma T, Du B, Li M, Li J, Shi Y, Fan H (2022) Toward data authenticity and integrity for blockchain-based mobile edge computing. IEEE Sens J 22(10):9967\u20139980","DOI":"10.1109\/JSEN.2022.3163915"},{"key":"1980_CR37","unstructured":"Owen G (2013) Game theory. Emerald Group Publishing, Bingley, UK"},{"key":"1980_CR38","unstructured":"Morgenstern O, Von\u00a0Neumann J (1953) Theory of games and economic behavior. Princeton university press"},{"key":"1980_CR39","unstructured":"Ester M, Kriegel HP, Sander J, Xu X et\u00a0al (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: kdd, vol\u00a096, pp 226\u2013231"},{"issue":"3","key":"1980_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3068335","volume":"42","author":"E Schubert","year":"2017","unstructured":"Schubert E, Sander J, Ester M, Kriegel HP, Xu X (2017) Dbscan revisited, revisited: why and how you should (still) use dbscan. ACM Trans Database Syst (TODS) 42(3):1\u201321","journal-title":"ACM Trans Database Syst (TODS)"},{"issue":"6","key":"1980_CR41","doi-asserted-by":"publisher","first-page":"6178","DOI":"10.1109\/JSEN.2023.3241093","volume":"23","author":"H Li","year":"2023","unstructured":"Li H, Han D, Chang CC (2023) Dac4sh: A novel data access control scheme for smart home using smart contracts. IEEE Sens J 23(6):6178\u20136191","journal-title":"IEEE Sens J"},{"key":"1980_CR42","doi-asserted-by":"crossref","unstructured":"Hu VC (2022) Blockchain for access control systems. https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2022\/NIST.IR.8403.pdf","DOI":"10.6028\/NIST.IR.8403"},{"key":"1980_CR43","doi-asserted-by":"crossref","unstructured":"Faria C, Correia M (2019) Blocksim: blockchain simulator. In: 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, pp 439\u2013446","DOI":"10.1109\/Blockchain.2019.00067"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01980-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01980-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01980-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:19Z","timestamp":1758986479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01980-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,7]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1980"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01980-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,7]]},"assertion":[{"value":"18 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"168"}}