{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T01:32:05Z","timestamp":1769131925931,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004837","name":"Spanish Ministry of Science and Innovation","doi-asserted-by":"publisher","award":["RTI2018-098156-B-C52"],"award-info":[{"award-number":["RTI2018-098156-B-C52"]}],"id":[{"id":"10.13039\/501100004837","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["PEJ2018-003001-A"],"award-info":[{"award-number":["PEJ2018-003001-A"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3082197","type":"journal-article","created":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T19:35:01Z","timestamp":1621539301000},"page":"75231-75251","source":"Crossref","is-referenced-by-count":25,"title":["HIDRA: A Distributed Blockchain-Based Architecture for Fog\/Edge Computing Environments"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7899-1321","authenticated-orcid":false,"given":"Carlos","family":"Nunez-Gomez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3312-7393","authenticated-orcid":false,"given":"Blanca","family":"Caminero","sequence":"additional","affiliation":[]},{"given":"Carmen","family":"Carrion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2900238"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.050"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806671"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2017.49"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0086-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8255974"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09534-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/fi12040061"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999213"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09491-1"},{"key":"ref27","year":"2021","journal-title":"Geth"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.09.008"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.057"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3326066"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"ref23","article-title":"Blockchain consensus algorithms: A survey","author":"ferdous","year":"2020","journal-title":"arXiv 2001 07091"},{"key":"ref26","article-title":"A next-generation smart contract and decentralized application platform","author":"buterin","year":"2013"},{"key":"ref25","first-page":"1","article-title":"PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain","author":"de angelis","year":"2018","journal-title":"Proc Italian Conf Cyber Secur"},{"key":"ref50","year":"2021","journal-title":"Solidity"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00030"},{"key":"ref10","year":"2021","journal-title":"Kubeedge an open platform to enable edge computing"},{"key":"ref11","year":"2021","journal-title":"K3s lightweight kubernetes"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/app9245538"},{"key":"ref12","first-page":"43","author":"avasalcai","year":"2020","journal-title":"Edge and Fog A Survey Use Cases and Future Challenges"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102882"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2017.3421554"},{"key":"ref15","first-page":"1","article-title":"Smart contracts: Building blocks for digital markets","volume":"16","author":"szabo","year":"1996","journal-title":"EXTROPY The Journal of Transhumanist Thought"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3403955"},{"key":"ref18","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.020"},{"key":"ref4","author":"dignan","year":"2021","journal-title":"What&#x2019;s next for data centers? Think micro data centers"},{"key":"ref3","year":"2021","journal-title":"Cisco Devnet What is IOx"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983253"},{"key":"ref5","year":"2021","journal-title":"Raspberry Pi official webpage"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2704444"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8810708"},{"key":"ref49","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"2014"},{"key":"ref9","year":"2021","journal-title":"Production-Grade Container Orchestration"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ECMSM.2017.7945879"},{"key":"ref45","year":"2021","journal-title":"ET Docker"},{"key":"ref48","first-page":"122","article-title":"Trust management in Internet of Things","author":"nabil","year":"2018","journal-title":"Security and Privacy in Smart Sensor Networks"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035849"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2952472"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878154"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICFC.2019.00013"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3017891"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09437230.pdf?arnumber=9437230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:14Z","timestamp":1639770974000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9437230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3082197","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}