{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:51:07Z","timestamp":1765547467124,"version":"3.44.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02072-y","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:38:44Z","timestamp":1752140324000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Proof of time offset: Blockchain consensus for resource constrained environments"],"prefix":"10.1007","volume":"18","author":[{"given":"Pankaj","family":"Gugnani","sequence":"first","affiliation":[]},{"given":"W.Wilfred","family":"Godfrey","sequence":"additional","affiliation":[]},{"given":"Debanjan","family":"Sadhya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"issue":"2","key":"2072_CR1","doi-asserted-by":"publisher","first-page":"100067","DOI":"10.1016\/j.bcra.2022.100067","volume":"3","author":"H Guo","year":"2022","unstructured":"Guo H, Yu X (2022) A survey on blockchain technology and its security. Blockchain Res Appl 3(2):100067. https:\/\/doi.org\/10.1016\/j.bcra.2022.100067","journal-title":"Blockchain Res Appl"},{"key":"2072_CR2","doi-asserted-by":"publisher","first-page":"100190","DOI":"10.1016\/j.jii.2020.100190","volume":"21","author":"S Latif","year":"2021","unstructured":"Latif S, Idrees Z, Ahmad J, Zheng L, Zou Z (2021) A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things. JInd Inf Integr 21:100190. https:\/\/doi.org\/10.1016\/j.jii.2020.100190","journal-title":"JInd Inf Integr"},{"key":"2072_CR3","doi-asserted-by":"publisher","first-page":"103035","DOI":"10.1016\/j.jnca.2021.103035","volume":"182","author":"MS Ferdous","year":"2021","unstructured":"Ferdous MS, Chowdhury MJM, Hoque MA (2021) A survey of consensus algorithms in public blockchain systems for crypto-currencies. J NetwComput Appl 182:103035. https:\/\/doi.org\/10.1016\/j.jnca.2021.103035","journal-title":"J NetwComput Appl"},{"issue":"2","key":"2072_CR4","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","volume":"22","author":"Y Xiao","year":"2020","unstructured":"Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutor 22(2):1432\u20131465. https:\/\/doi.org\/10.1109\/COMST.2020.2969706","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"2072_CR5","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/TCSS.2021.3049477","volume":"8","author":"D Das","year":"2021","unstructured":"Das D (2021) Toward next generation of blockchain using improvized bitcoin-ng. IEEE Trans Comput Soc Syst 8(2):512\u2013521. https:\/\/doi.org\/10.1109\/TCSS.2021.3049477","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"3","key":"2072_CR6","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/TLA.2022.9667139","volume":"20","author":"A Santos Abreu","year":"2022","unstructured":"Santos Abreu A, Coutinho EF, Ilane Moreira Bezerra C (2022) Performance evaluation of data transactions in blockchain. IEEE Lat Am Trans 20(3):409\u2013416. https:\/\/doi.org\/10.1109\/TLA.2022.9667139","journal-title":"IEEE Lat Am Trans"},{"key":"2072_CR7","doi-asserted-by":"publisher","unstructured":"Gugnani P, Godfrey WW, Sadhya D (2022) Ethereum based smart contract for event management system. In: 2022 IEEE 6th Conference on Information and Communication Technology (CICT), pp 1\u20135. https:\/\/doi.org\/10.1109\/CICT56698.2022.9997939","DOI":"10.1109\/CICT56698.2022.9997939"},{"issue":"1","key":"2072_CR8","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s12083-023-01598-3","volume":"17","author":"MT Ta","year":"2024","unstructured":"Ta MT, Do TQ (2024) A study on gas cost of ethereum smart contracts and performance of blockchain on simulation tool. Peer-to-Peer Netw Appl 17(1):200\u2013212. https:\/\/doi.org\/10.1007\/s12083-023-01598-3","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2072_CR9","doi-asserted-by":"publisher","unstructured":"Khan M, Hartog F, Hu J (2022) A survey and ontology of blockchain consensus algorithms for resource-constrained iot systems. Sensors 22(21). https:\/\/doi.org\/10.3390\/s22218188","DOI":"10.3390\/s22218188"},{"key":"2072_CR10","doi-asserted-by":"publisher","first-page":"113385","DOI":"10.1016\/j.eswa.2020.113385","volume":"154","author":"SMH Bamakan","year":"2020","unstructured":"Bamakan SMH, Motavali A, Babaei Bondarti A (2020) A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl 154:113385. https:\/\/doi.org\/10.1016\/j.eswa.2020.113385","journal-title":"Expert Syst Appl"},{"key":"2072_CR11","unstructured":"Castro M, Liskov B (1999) Practical byzantine fault tolerance. In: 3rd Symposium on Operating Systems Design and Implementation (OSDI 99). USENIX Association, New Orleans, LA. https:\/\/www.usenix.org\/conference\/osdi-99\/practical-byzantine-fault-tolerance"},{"key":"2072_CR12","doi-asserted-by":"crossref","unstructured":"Duan S, Wang X, Zhang H (2023) Fin: practical signature-free asynchronous common subset in constant time. In: Proceedings of the 2023 ACM SIGSAC conference on computer and communications security, pp 815\u2013829","DOI":"10.1145\/3576915.3616633"},{"key":"2072_CR13","doi-asserted-by":"crossref","unstructured":"Duan S, Zhang H, Sui X, Huang B, Mu C, Di G, Wang X (2024) Dashing and star: byzantine fault tolerance with weak certificates. In: Proceedings of the nineteenth european conference on computer systems, pp 250\u2013264","DOI":"10.1145\/3627703.3650073"},{"key":"2072_CR14","unstructured":"Natoli C, Yu J, Gramoli V, Esteves-Verissimo P (2019) Deconstructing blockchains: a comprehensive survey on consensus, membership and structure. arXiv:1908.08316"},{"key":"2072_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01661-7","author":"Z Naderi","year":"2024","unstructured":"Naderi Z, Shariatpanahi SP, Bahrak B (2024) A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies. Peer-to-Peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-024-01661-7","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"9","key":"2072_CR16","doi-asserted-by":"publisher","first-page":"6793","DOI":"10.1016\/j.jksuci.2021.08.005","volume":"34","author":"B Shrimali","year":"2022","unstructured":"Shrimali B, Patel HB (2022) Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities. J King Saud Univ - Comput Inf Sci 34(9):6793\u20136807. https:\/\/doi.org\/10.1016\/j.jksuci.2021.08.005","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"2","key":"2072_CR17","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease M, Shostak R, Lamport L (1980) Reaching agreement in the presence of faults. J ACM 27(2):228\u2013234. https:\/\/doi.org\/10.1145\/322186.322188","journal-title":"J ACM"},{"key":"2072_CR18","unstructured":"Ongaro D, Ousterhout J (2014) In search of an understandable consensus algorithm. In: Proceedings of the 2014 USENIX Conference on USENIX annual technical conference. USENIX ATC\u201914, pp 305\u2013320. USENIX Association, USA"},{"key":"2072_CR19","doi-asserted-by":"publisher","first-page":"102503","DOI":"10.1016\/j.sysarc.2022.102503","volume":"127","author":"A Singh","year":"2022","unstructured":"Singh A, Kumar G, Saha R, Conti M, Alazab M, Thomas R (2022) A survey and taxonomy of consensus protocols for blockchains. J Syst Archit 127:102503. https:\/\/doi.org\/10.1016\/j.sysarc.2022.102503","journal-title":"J Syst Archit"},{"key":"2072_CR20","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"2072_CR21","unstructured":"King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. https:\/\/decred.org\/research\/king2012.pdf"},{"key":"2072_CR22","first-page":"85","volume":"81","author":"D Larimer","year":"2014","unstructured":"Larimer D (2014) Delegated proof-of-stake (dpos). Bitshare whitepaper. 81:85","journal-title":"Bitshare whitepaper."},{"key":"2072_CR23","doi-asserted-by":"publisher","unstructured":"Kara M, Laouid A, AlShaikh M, Hammoudeh M, Bounceur A, Euler R, Amamra A, Laouid B (2021) A compute and wait in pow (cw-pow) consensus algorithm for preserving energy consumption. Appl Sci 11(15). https:\/\/doi.org\/10.3390\/app11156750","DOI":"10.3390\/app11156750"},{"issue":"11","key":"2072_CR24","doi-asserted-by":"publisher","first-page":"8336","DOI":"10.1109\/TII.2022.3168747","volume":"18","author":"M Kara","year":"2022","unstructured":"Kara M, Laouid A, Hammoudeh M, AlShaikh M, Bounceur A (2022) Proof of chance: a lightweight consensus algorithm for the internet of things. IEEE Trans Industr Inf 18(11):8336\u20138345. https:\/\/doi.org\/10.1109\/TII.2022.3168747","journal-title":"IEEE Trans Industr Inf"},{"key":"2072_CR25","doi-asserted-by":"publisher","unstructured":"Wadhwa S, Rani S, Kavita Verma S, Shafi J, Wozniak M (2022) Energy efficient consensus approach of blockchain for iot networks with edge computing. Sensors 22(10). https:\/\/doi.org\/10.3390\/s22103733","DOI":"10.3390\/s22103733"},{"key":"2072_CR26","doi-asserted-by":"publisher","first-page":"5665","DOI":"10.1109\/TIFS.2023.3315192","volume":"18","author":"V Mishra","year":"2023","unstructured":"Mishra V, Sadhya D (2023) Height and punishment: toward accountable iot blockchain with network sanitization. IEEE Trans Inf Forensics Secur 18:5665\u20135677. https:\/\/doi.org\/10.1109\/TIFS.2023.3315192","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"2072_CR27","doi-asserted-by":"publisher","first-page":"2908","DOI":"10.1109\/TSC.2022.3231927","volume":"16","author":"A Biswas","year":"2023","unstructured":"Biswas A, Yadav R, Baranwal G, Tripathi AK (2023) Proof of karma (pok): a novel consensus mechanism for consortium blockchain. IEEE Trans Serv Comput 16(4):2908\u20132922. https:\/\/doi.org\/10.1109\/TSC.2022.3231927","journal-title":"IEEE Trans Serv Comput"},{"key":"2072_CR28","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1109\/TIFS.2023.3266628","volume":"18","author":"Y Liu","year":"2023","unstructured":"Liu Y, Xing X, Cheng H, Li D, Guan Z, Liu J, Wu Q (2023) A flexible sharding blockchain protocol based on cross-shard byzantine fault tolerance. IEEE Trans Inf Forensics Secur 18:2276\u20132291","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2072_CR29","doi-asserted-by":"crossref","unstructured":"Liu Y, Liu A, Lu Y, Pan Z, Li Y, Liu J, Bian S, Conti M (2024) Kronos: a secure and generic sharding blockchain consensus with optimized overhead. Cryptology ePrint Archive","DOI":"10.14722\/ndss.2025.230472"},{"issue":"3","key":"2072_CR30","doi-asserted-by":"publisher","first-page":"2147","DOI":"10.1109\/TNSE.2021.3079415","volume":"8","author":"P Zhang","year":"2021","unstructured":"Zhang P, Zhou M, Zhao Q, Abusorrah A, Bamasag OO (2021) A performance-optimized consensus mechanism for consortium blockchains consisting of trust-varying nodes. IEEE Trans Netw Sci Eng 8(3):2147\u20132159. https:\/\/doi.org\/10.1109\/TNSE.2021.3079415","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2072_CR31","doi-asserted-by":"publisher","unstructured":"Milutinovic M, He W, Wu H, Kanwal M (2016) Proof of luck: an efficient blockchain consensus protocol. In: Proceedings of the 1st workshop on system software for trusted execution. SysTEX \u201916. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3007788.3007790","DOI":"10.1145\/3007788.3007790"},{"key":"2072_CR32","doi-asserted-by":"publisher","first-page":"118541","DOI":"10.1109\/ACCESS.2019.2935149","volume":"7","author":"F Yang","year":"2019","unstructured":"Yang F, Zhou W, Wu Q, Long R, Xiong NN, Zhou M (2019) Delegated proof of stake with downgrade: a secure and efficient blockchain consensus algorithm with downgrade mechanism. IEEE Access 7:118541\u2013118555. https:\/\/doi.org\/10.1109\/ACCESS.2019.2935149","journal-title":"IEEE Access"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02072-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02072-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02072-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:34Z","timestamp":1758986554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02072-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2072"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02072-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"15 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"All authors confirm that this paper has not been submitted to other journals or conferences. All authors consent to publish this research paper in the Peer-to-Peer Networking Applications journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"240"}}