{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:35:33Z","timestamp":1762432533928,"version":"build-2065373602"},"reference-count":71,"publisher":"Emerald","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,9]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>Integrating Internet of Things (IoT) networks with distributed ledger technology (DLT) and artificial intelligence (AI) presents critical challenges, particularly related to latency, scalability, hardware constraints and data security. Efficient data ingestion and validation are essential to enable real-time AI processing. The main contribution of this paper is the proposal of the Energy consensus algorithm, designed to minimize both latency and energy consumption in such environments.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>Energy is a consensus algorithm tailored for public directed acyclic graph-based DLTs in IoT contexts. It introduces a flexible transaction validation mechanism that reduces or bypasses Proof of Work requirements. The algorithm\u2019s performance is experimentally compared with IOTA under varying payload conditions.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>Results show that Energy significantly reduces latency and energy consumption, especially for small payloads, which are common in IoT applications. These findings demonstrate Energy\u2019s ability to enhance transaction efficiency and support real-time AI model updates based on verified IoT data streams.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Research limitations\/implications<\/jats:title>\n                  <jats:p>Future work should investigate the scalability of Energy in larger and more heterogeneous IoT ecosystems, as well as its compatibility with different AI frameworks. Evaluating its performance under diverse network conditions and hardware setups would further strengthen the generalizability of the results.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Practical implications<\/jats:title>\n                  <jats:p>The Energy algorithm enables continuous AI model updates while ensuring data integrity, traceability and low latency. Its adaptability makes it a suitable solution for large-scale IoT deployments requiring secure and efficient data processing.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This paper presents a novel consensus algorithm that bridges the requirements of IoT, DLT and AI, with a particular focus on improving latency and energy efficiency. Energy offers a robust approach for optimizing data flow and transaction processing in real-time, AI-driven IoT systems.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/ijwis-11-2024-0332","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T06:00:42Z","timestamp":1749448842000},"page":"567-593","source":"Crossref","is-referenced-by-count":2,"title":["Energy: reducing latency in IoT DLTs for AI-driven real-time solutions"],"prefix":"10.1108","volume":"21","author":[{"given":"Francisco","family":"Moya Perez","sequence":"first","affiliation":[{"name":"University of Ja\u00e9n Department of Computer Science, , Ja\u00e9n,","place":["Spain"]}]},{"given":"Francisco Jos\u00e9","family":"Quesada Real","sequence":"additional","affiliation":[{"name":"University of Ja\u00e9n Department of Computer Science, , Ja\u00e9n,","place":["Spain"]}]},{"given":"Luis","family":"Mart\u00ednez L\u00f3pez","sequence":"additional","affiliation":[{"name":"University of Ja\u00e9n Department of Computer Science, , Ja\u00e9n,","place":["Spain"]}]},{"given":"Fco Javier","family":"Estrella Liebana","sequence":"additional","affiliation":[{"name":"University of Ja\u00e9n Department of Computer Science, , Ja\u00e9n,","place":["Spain"]}]}],"member":"140","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"issue":"1","key":"2025100702115041400_ref001","first-page":"1","article-title":"Blockchain-assisted secured data management framework for health information analysis based on internet of medical things","volume":"28","author":"Abbas","year":"2021","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2","key":"2025100702115041400_ref002","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MIOT.2020.9125425","article-title":"Blockchain-enabled industrial Internet of Things: advances, applications, and challenges","volume":"3","author":"Abdallah","year":"2020","journal-title":"IEEE Internet of Things Magazine"},{"issue":"12","key":"2025100702115041400_ref003","doi-asserted-by":"crossref","first-page":"7082","DOI":"10.3390\/app13127082","article-title":"Re-thinking data strategy and integration for artificial intelligence: concepts, opportunities, and challenges","volume":"13","author":"Aldoseri","year":"2023","journal-title":"Applied Sciences"},{"issue":"1","key":"2025100702115041400_ref004","first-page":"1","article-title":"Internet of Things: features, challenges, and vulnerabilities","volume":"4","author":"Alsaadi","year":"2015","journal-title":"International Journal of Advanced Computer Science and Information Technology"},{"issue":"6","key":"2025100702115041400_ref005","doi-asserted-by":"crossref","first-page":"3634","DOI":"10.1007\/s12083-021-01204-4","article-title":"Proof of humanity: a tax-aware society-centric consensus algorithm for blockchains","volume":"14","author":"Arjomandi-Nezhad","year":"2021","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"5","key":"2025100702115041400_ref006","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1080\/17477891.2020.1867493","article-title":"Internet of Things in disaster management: Technologies and uses","volume":"20","author":"Bail","year":"2021","journal-title":"Environmental Hazards"},{"key":"2025100702115041400_ref007","first-page":"1","article-title":"IoT standardization and implementation challenges","volume":"2016","author":"Banafa","year":"2016","journal-title":"IEEE Internet of Things Newsletter"},{"key":"2025100702115041400_ref008","first-page":"1","article-title":"Reinforcing IoT security through machine learning based spam detection","author":"Chatrapathi","year":"2023"},{"key":"2025100702115041400_ref009","first-page":"1","article-title":"Dbft: Efficient leaderless byzantine consensus and its application to blockchains","author":"Crain","year":"2018"},{"key":"2025100702115041400_ref010","first-page":"796","article-title":"Proofs of space","volume":"2013","author":"Dziembowski","year":"2015","journal-title":"IACR Cryptol. ePrint Arch"},{"issue":"2","key":"2025100702115041400_ref011","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/857076.857078","article-title":"The many faces of publish\/subscribe","volume":"35","author":"Eugster","year":"2003","journal-title":"ACM Computing Surveys"},{"key":"2025100702115041400_ref012","doi-asserted-by":"crossref","first-page":"102936","DOI":"10.1016\/j.jnca.2020.102936","article-title":"The convergence of IoT and distributed ledger technologies (DLT): opportunities, challenges, and solutions","volume":"177","author":"Farahani","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"2025100702115041400_ref013","first-page":"324","article-title":"Using LSTM and GRU neural network methods for traffic flow prediction","author":"Fu","year":"2016"},{"issue":"2","key":"2025100702115041400_ref014","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/564585.564601","article-title":"Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services","volume":"33","author":"Gilbert","year":"2002","journal-title":"ACM SIGACT News"},{"key":"2025100702115041400_ref016","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Volume 2, Basic Applications","author":"Goldreich","year":"2001"},{"key":"2025100702115041400_ref017","doi-asserted-by":"crossref","first-page":"100194","DOI":"10.1016\/j.jii.2020.100194","article-title":"A review of logistics internet-of-things: current trends and scope for future research","volume":"22","author":"Golp\u00eera","year":"2021","journal-title":"Journal of Industrial Information Integration"},{"key":"2025100702115041400_ref019","doi-asserted-by":"crossref","first-page":"100318","DOI":"10.1016\/j.cosrev.2020.100318","article-title":"Big data and IoT-based applications in smart environments: a systematic review","volume":"39","author":"Hajjaji","year":"2021","journal-title":"Computer Science Review"},{"key":"2025100702115041400_ref020","doi-asserted-by":"crossref","first-page":"100285","DOI":"10.1016\/j.cosrev.2020.100285","article-title":"A comprehensive survey and analysis of generative models in machine learning","volume":"38","author":"Harshvardhan","year":"2020","journal-title":"Computer Science Review"},{"issue":"4","key":"2025100702115041400_ref021","doi-asserted-by":"crossref","DOI":"10.1136\/svn-2017-000101","article-title":"Artificial intelligence in healthcare: past, present and future","volume":"2","author":"Jiang","year":"2017","journal-title":"Stroke and Vascular Neurology"},{"key":"2025100702115041400_ref022","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-030-51280-4_28","article-title":"Proof-of-burn","volume-title":"Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers 24","author":"Karantias","year":"2020"},{"issue":"20","key":"2025100702115041400_ref023","doi-asserted-by":"crossref","DOI":"10.3390\/app11209372","article-title":"Systematic literature review of challenges in blockchain scalability","volume":"11","author":"Khan","year":"2021","journal-title":"Applied Sciences"},{"issue":"3","key":"2025100702115041400_ref024","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The Byzantine generals problem","volume":"4","author":"Lamport","year":"1982","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"2","key":"2025100702115041400_ref025","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/TSE.1977.229904","article-title":"Proving the correctness of multiprocess programs","volume":"SE-3","author":"Lamport","year":"1977","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2025100702115041400_ref026","article-title":"Bitshares: a peer-to-peer polymorphic digital asset exchange","volume-title":"BitShares","author":"Larimer","year":"2017"},{"issue":"11","key":"2025100702115041400_ref027","doi-asserted-by":"crossref","first-page":"11008","DOI":"10.1109\/TVT.2018.2866365","article-title":"Computation offloading and content caching in wireless blockchain networks with mobile edge computing","volume":"67","author":"Liu","year":"2018","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2025100702115041400_ref029","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.jnca.2018.10.019","article-title":"Blockchain\u2019s adoption in IoT: the challenges, and a way forward","volume":"125","author":"Makhdoom","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"2025100702115041400_ref030","doi-asserted-by":"crossref","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","article-title":"Anatomy of threats to the Internet of Things","volume":"21","author":"Makhdoom","year":"2018","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2025100702115041400_ref031","doi-asserted-by":"crossref","DOI":"10.1016\/j.procs.2022.03.059","article-title":"Information quality: the cornerstone for ai-based industry 4.0","volume-title":"Procedia Computer Science, 201:453-460, 2022. The 13th International Conference on Ambient Systems, Networks and Technologies (ANT) \/ The 5th International Conference on Emerging Data and Industry 4.0 (EDI40).","author":"Mattioli","year":"2022"},{"issue":"2","key":"2025100702115041400_ref032","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TMC.2011.32","article-title":"Protecting location privacy in sensor networks against a global eavesdropper","volume":"11","author":"Mehta","year":"2011","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2025100702115041400_ref033","doi-asserted-by":"crossref","DOI":"10.1145\/3410699.3413800","article-title":"Scaling blockchains without giving up decentralization and security: a solution to the blockchain scalability trilemma","author":"Monte","year":"2020"},{"key":"2025100702115041400_ref034","first-page":"909","article-title":"Aspmi: an adaptable spam protection mechanism for IoT scenarios","volume-title":"In International Conference on Ubiquitous Computing and Ambient Intelligence","author":"Moya","year":"2024"},{"issue":"7","key":"2025100702115041400_ref035","doi-asserted-by":"crossref","DOI":"10.1007\/s11276-023-03458-7","article-title":"Phonendo: a platform for publishing wearable data on distributed ledger technologies","volume":"30","author":"Moya","year":"2023","journal-title":"Wireless Networks"},{"key":"2025100702115041400_ref036","first-page":"932","article-title":"Integrating IoT and DLT to enhance patient wait time traceability in radiotherapy oncology","author":"Mu\u00f1oz-Higueras","year":"2024"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2008","author":"Nakamoto","key":"2025100702115041400_ref037"},{"key":"2025100702115041400_ref038","first-page":"1","article-title":"Jamming in the Internet of Things: a game-theoretic perspective","volume-title":"In 2016 IEEE Global Communications Conference (GLOBECOM)","author":"Namvar","year":"2016"},{"article-title":"Secure hash standard (SHS)","year":"2015","author":"National Institute of Standards and Technology (NIST)","key":"2025100702115041400_ref039"},{"issue":"8","key":"2025100702115041400_ref040","first-page":"1","article-title":"IOTA whitepaper v1.4.3","volume":"81","author":"Popov","year":"2018","journal-title":"New Yorker"},{"issue":"3","key":"2025100702115041400_ref041","doi-asserted-by":"crossref","first-page":"277","DOI":"10.3897\/jucs.150345","article-title":"A transparent and ecologically sustainable DLT-based approach for tendering processes","volume":"31","author":"Quesada-Real","year":"2025","journal-title":"JUCS - Journal of Universal Computer Science"},{"key":"2025100702115041400_ref042","doi-asserted-by":"crossref","first-page":"148550","DOI":"10.1109\/ACCESS.2019.2946983","article-title":"SoK of used cryptography in blockchain","volume":"7","author":"Raikwar","year":"2019","journal-title":"IEEE Access"},{"volume-title":"Blockchain in Action","year":"2020","author":"Ramamurthy","key":"2025100702115041400_ref043"},{"key":"2025100702115041400_ref044","first-page":"920","article-title":"Combining distributed ledger technologies and differentially private sketching techniques for securing health monitoring","author":"Ramos-Cruz","year":"2024"},{"issue":"15","key":"2025100702115041400_ref045","first-page":"1","article-title":"The Internet of Things: an overview","volume":"80","author":"Rose","year":"2015","journal-title":"The Internet Society (ISOC)"},{"key":"2025100702115041400_ref046","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.eswa.2016.03.001","article-title":"High utility pattern mining over data streams with sliding window technique","volume":"57","author":"Ryang","year":"2016","journal-title":"Expert Systems with Applications"},{"year":"2025","author":"Senart","key":"2025100702115041400_ref047"},{"key":"2025100702115041400_ref048","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"Journal of Network and Computer Applications"},{"key":"2025100702115041400_ref049","doi-asserted-by":"crossref","first-page":"54595","DOI":"10.1109\/ACCESS.2019.2913340","article-title":"The rising role of big data analytics and IoT in disaster management: recent advances, taxonomy and prospects","volume":"7","author":"Shah","year":"2019","journal-title":"IEEE Access"},{"key":"2025100702115041400_ref050","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-981-16-5655-2_28","article-title":"SIoT (social Internet of Things): a review","author":"Shahab","year":"2022","journal-title":"ICT Analysis and Applications"},{"issue":"5","key":"2025100702115041400_ref051","doi-asserted-by":"crossref","DOI":"10.26562\/ijirae.2023.v1005.09","article-title":"An efficient spam detection technique for IoT devices using machine learning","volume":"10","author":"Sravya","year":"2023","journal-title":"International Journal of Innovative Research in Advanced Engineering"},{"article-title":"Ppcoin: peer-to-peer crypto-currency with proof-of-stake","year":"2025","author":"Sunny","key":"2025100702115041400_ref052"},{"issue":"2","key":"2025100702115041400_ref053","first-page":"100006","article-title":"A survey on the adoption of blockchain in IoT: challenges and solutions","volume":"2","author":"Uddin","year":"2021","journal-title":"Blockchain: Research and Applications"},{"issue":"11","key":"2025100702115041400_ref054","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.3390\/s20113113","article-title":"Advances in smart environment monitoring systems using IoT and sensors","volume":"20","author":"Ullo","year":"2020","journal-title":"Sensors"},{"key":"2025100702115041400_ref055","first-page":"9","volume-title":"In Internet of Things-Global Technological and Societal Trends from Smart Environments and Spaces to Green ICT","author":"Vermesan","year":"2022"},{"key":"2025100702115041400_ref056","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.comcom.2019.01.006","article-title":"Survey on blockchain for Internet of Things","volume":"136","author":"Wang","year":"2019","journal-title":"Computer Communications"},{"issue":"2","key":"2025100702115041400_ref057","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.jiixd.2023.10.007","article-title":"Unveiling security, privacy, and ethical concerns of ChatGPT","volume":"2","author":"Wu","year":"2024","journal-title":"Journal of Information and Intelligence"},{"key":"2025100702115041400_ref058","first-page":"374","article-title":"Large scale incremental learning","author":"Wu","year":"2019"},{"key":"2025100702115041400_ref059","doi-asserted-by":"crossref","DOI":"10.1016\/j.aiia.2022.01.001","article-title":"Review of agricultural IoT technology","volume":"6","author":"Xu","year":"2022","journal-title":"Artificial Intelligence in Agriculture"},{"key":"2025100702115041400_ref060","first-page":"1","article-title":"A review on scalability of blockchain","author":"Yang","year":"2020"},{"issue":"1","key":"2025100702115041400_ref061","first-page":"1","article-title":"The effect of the GDPR on privacy policies: recent progress and future promise","volume":"12","author":"Zaeem","year":"2020","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"issue":"4","key":"2025100702115041400_ref062","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3390\/fi11040094","article-title":"A review of machine learning and IoT in smart transportation","volume":"11","author":"Zantalis","year":"2019","journal-title":"Future Internet"},{"key":"2025100702115041400_ref063","first-page":"1","article-title":"Anti-pollution source location privacy preserving scheme in wireless sensor networks","author":"Zha","year":"2016"},{"issue":"9","key":"2025100702115041400_ref064","doi-asserted-by":"crossref","first-page":"2240","DOI":"10.1109\/TIFS.2018.2812714","article-title":"The impact of link duration on the integrity of distributed mobile networks","volume":"13","author":"Zha","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"2025100702115041400_ref065","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/JIOT.2014.2344013","article-title":"Sybil attacks and their defenses in the Internet of Things","volume":"1","author":"Zhang","year":"2014","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"2025100702115041400_ref066","doi-asserted-by":"crossref","first-page":"4633","DOI":"10.1109\/TPEL.2020.3024914","article-title":"An overview of artificial intelligence applications for power electronics","volume":"36","author":"Zhao","year":"2020","journal-title":"IEEE Transactions on Power Electronics"},{"issue":"6","key":"2025100702115041400_ref067","first-page":"1","article-title":"Applications of distributed ledger technologies to the Internet of Things: a survey","volume":"52","author":"Zhu","year":"2019","journal-title":"ACM Computing Surveys (CSUR)"},{"article-title":"Golang","year":"2022","author":"Go.dev","key":"2025100702115041400_ref0150"},{"article-title":"GNU Bash Reference Manual, Version 5.2","year":"2022","author":"GNU Project","key":"2025100702115041400_ref0300"},{"article-title":"LibP2P","year":"2025","author":"libp2p.io","key":"2025100702115041400_ref0170"},{"article-title":"Proof of Importance","year":"2025","author":"NEM Project","key":"2025100702115041400_ref0180"},{"volume-title":"Principles of Distributed Database Systems","year":"1999","author":"\u00d6zsu","key":"2025100702115041400_ref071"},{"article-title":"Filecoin: a decentralized storage network","year":"2017","author":"Protocol Labs","key":"2025100702115041400_ref0160"},{"article-title":"Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025","year":"2022","author":"Statista.com","key":"2025100702115041400_ref0250"}],"container-title":["International Journal of Web Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-11-2024-0332\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ijwis\/article-pdf\/doi\/10.1108\/IJWIS-11-2024-0332\/10335578\/ijwis-11-2024-0332en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ijwis\/article-pdf\/doi\/10.1108\/IJWIS-11-2024-0332\/10335578\/ijwis-11-2024-0332en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T06:12:11Z","timestamp":1759817531000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ijwis\/article\/21\/5\/567\/1265433\/Energy-reducing-latency-in-IoT-DLTs-for-AI-driven"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,11]]},"references-count":71,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10,9]]}},"URL":"https:\/\/doi.org\/10.1108\/ijwis-11-2024-0332","relation":{},"ISSN":["1744-0084","1744-0092"],"issn-type":[{"type":"print","value":"1744-0084"},{"type":"electronic","value":"1744-0092"}],"subject":[],"published":{"date-parts":[[2025,6,11]]}}}