{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:19:16Z","timestamp":1776183556904,"version":"3.50.1"},"reference-count":181,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072319"],"award-info":[{"award-number":["62072319"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology on Communication Security Laboratory","award":["6142103190415"],"award-info":[{"award-number":["6142103190415"]}]},{"DOI":"10.13039\/100012542","name":"Sichuan Science and Technology Program","doi-asserted-by":"publisher","award":["2020YFG0254"],"award-info":[{"award-number":["2020YFG0254"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Science and Technology Program","doi-asserted-by":"publisher","award":["2019JDTD0001"],"award-info":[{"award-number":["2019JDTD0001"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2021.3115797","type":"journal-article","created":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T20:51:42Z","timestamp":1632775902000},"page":"2191-2217","source":"Crossref","is-referenced-by-count":126,"title":["A Survey of Decentralizing Applications via Blockchain: The 5G and Beyond Perspective"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1849-7647","authenticated-orcid":false,"given":"Kaifeng","family":"Yue","sequence":"first","affiliation":[]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9677-7142","authenticated-orcid":false,"given":"Yanru","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5602-1738","authenticated-orcid":false,"given":"Lian","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8347-0539","authenticated-orcid":false,"given":"Chunming","family":"Rong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6166-890X","authenticated-orcid":false,"given":"Liangyin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024409"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.2999024"},{"key":"ref171","author":"hu","year":"0","journal-title":"Mobile edge computing&#x2014;A key technology towards 5G"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2016.66"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1080\/10686967.2018.1404373"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.06.002"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref177","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kokoris-kogias","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2017.96"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.4337\/9781784717766.00019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3183367"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2017.71011"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2732196"},{"key":"ref31","year":"2021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref37","year":"2021","journal-title":"Sawtooth Lake"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref34","first-page":"1","article-title":"Understanding blockchain consensus models","volume":"4","author":"baliga","year":"2017","journal-title":"Persistent"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055526"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761539"},{"key":"ref179","first-page":"568","article-title":"SBFT: A scalable and decentralized trust infrastructure","author":"gueta","year":"2019","journal-title":"Proc 49th Annu IEEE\/ IFIP Int Conf Depend Syst Netw (DSN)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/289.291"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024627"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5220\/0006648801270138"},{"key":"ref21","first-page":"119","article-title":"The truth about blockchain","volume":"95","author":"lakhani","year":"2017","journal-title":"Harvard Bus Rev"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939271"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2921235"},{"key":"ref100","first-page":"1","article-title":"The blockchain consensus layer and BFT","volume":"3","author":"abraham","year":"2017","journal-title":"Bull EATCS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885763"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0465-0"},{"key":"ref154","author":"schwartz","year":"0","journal-title":"The Ripple protocol consensus algorithm"},{"key":"ref153","year":"2021"},{"key":"ref156","year":"2014","journal-title":"Quorum White Paper"},{"key":"ref155","author":"hearn","year":"2019","journal-title":"Corda A distributed ledger"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2900514"},{"key":"ref152","year":"2021"},{"key":"ref151","author":"nakamoto","year":"2009","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2805369"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5615-7"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7514161"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8368983"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2933899"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000508"},{"key":"ref57","year":"2014","journal-title":"Service Aspects and Requirements for Network Sharing"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600284"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2899"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800234"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2914052"},{"key":"ref40","author":"buterin","year":"2020","journal-title":"A next-generation smart contract and decentralized application platform"},{"key":"ref167","author":"buterin","year":"2016","journal-title":"On Settlement Finality"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900336"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2959929"},{"key":"ref164","first-page":"313","article-title":"Blockchain-based infrastructure sharing in 5G small cell networks","author":"mafakheri","year":"2018","journal-title":"Proc 14th Int Conf Netw Serv Manage (CNSM)"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.07.010"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2754579"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref160","author":"greenspan","year":"0","journal-title":"MultiChain Private Blockchain&#x2014;White Paper"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1883-0"},{"key":"ref3","author":"swanson","year":"2015","journal-title":"Consensus-as-a-service a brief report on the emergence of permissioned distributed ledger systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.027"},{"key":"ref5","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref159","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3386\/w22952"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966271"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/5974586"},{"key":"ref157","year":"2021"},{"key":"ref158","year":"2021"},{"key":"ref9","first-page":"1","article-title":"The interplay between decentralization and privacy: The case of blockchain technologies","volume":"7","author":"de filippi","year":"2016","journal-title":"J Peer Prod"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2968343"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2019.00065"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"32","DOI":"10.23919\/JCIN.2021.9387703","article-title":"Realizing intelligent spectrum management for integrated satellite and terrestrial networks","volume":"6","author":"liang","year":"2021","journal-title":"J Commun Inf Netw"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s18082413"},{"key":"ref42","article-title":"Blockchain technology overview","author":"yaga","year":"2019"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref44","volume":"3","author":"kawanishi","year":"2019","journal-title":"Seamless Networks for Beyond 5G"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891144"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2936190"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2017.7980742"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900188"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.10.004"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.43"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737533"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1007-5"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900582"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900103"},{"key":"ref76","article-title":"The future of contracts in a digital economy: The impact of smart contracts on transaction costs in financial markets","author":"harder","year":"2017"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149093"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.15"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2752203"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCN.2017.8121598"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089507"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2017.7943523"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCT.2019.8711021"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2915117"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2019.8858457"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647581"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102693"},{"key":"ref137","author":"pascale","year":"2017","journal-title":"Smart contract SLAs for dense small-cell-as-a-service"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000088"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651845"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/AIACT.2019.8847762"},{"key":"ref61","article-title":"5G PPP architecture working group: View on 5G architecture (version 2.0, december 2017)","author":"queseth","year":"0"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900252"},{"key":"ref64","article-title":"Incentive mechanism design for resource sharing in collaborative edge learning","author":"lim","year":"2020"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0776-2_5"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2825278"},{"key":"ref141","author":"eggerton","year":"2018","journal-title":"FCC&#x2019;s Rosenworcel Talks Up 6G Broadcasting Cable"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000175"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/CTTE.2017.8260985"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.3002415"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59016-1_37"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref144","year":"2015","journal-title":"Report and order and second further notice of proposed rulemaking GN docket no 12&#x2013;354"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2744751"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI48352.2020.9104092"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988579"},{"key":"ref109","first-page":"39","article-title":"Eventually returning to strong consistency","volume":"39","author":"vukolic","year":"2016","journal-title":"IEEE Data Eng Bull"},{"key":"ref95","first-page":"237","article-title":"All about eve: Execute-verify replication for multi-core servers","author":"kapritsos","year":"2012","journal-title":"Proc 10th USENIX Conf Oper Syst Design Implement"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/1466443.1466448"},{"key":"ref94","article-title":"Tendermint: Byzantine fault tolerance in the age of blockchains","author":"buchman","year":"2016"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.37"},{"key":"ref93","first-page":"19","author":"charron-bost","year":"5959","journal-title":"Replication"},{"key":"ref106","author":"wilkinson","year":"0","journal-title":"Storj A Peer-to-Peer Cloud Storage Network"},{"key":"ref92","article-title":"Gosig: Scalable byzantine consensus on adversarial wide area network for blockchains","author":"li","year":"2018"},{"key":"ref105","author":"mcconaghy","year":"0","journal-title":"BigchainDB A Scalable Blockchain Database(DRAFT)"},{"key":"ref91","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc 13th USENIX Conf Netw Syst Design Implement"},{"key":"ref104","year":"2015","journal-title":"Filecoin&#x2014;Whitepaper"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1999.776508"},{"key":"ref102","article-title":"IPFS&#x2014;Content addressed, versioned, P2P file system","author":"benet","year":"2014"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897805"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833321"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CTTE.2017.8260929"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2928178"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3934\/mfc.2018007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref118","author":"gauba","year":"2018","journal-title":"Finality in Blockchain Consensus"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975911"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899617"},{"key":"ref81","author":"bashir","year":"2017","journal-title":"Mastering Blockchain"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00197"},{"key":"ref119","year":"2020","journal-title":"MWC Barcelona 2020"},{"key":"ref19","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"nguyen","year":"2018","journal-title":"J Inf Process Syst"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"ref114","year":"2013","journal-title":"Coinjoin Bitcoin Privacy for the Real World"},{"key":"ref113","year":"2021","journal-title":"Bitcoin energy consumption index"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"ref80","author":"buterin","year":"2017","journal-title":"The meaning of decentralization"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083832"},{"key":"ref89","year":"2021","journal-title":"Falcon&#x2014;A Fast Bitcoin Backbone"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083784"},{"key":"ref122","year":"2019","journal-title":"Blockchain A Key Enabler for 5G"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2018.8610483"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3340422.3343640"},{"key":"ref88","year":"2021"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9621320\/09548956.pdf?arnumber=9548956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:53:25Z","timestamp":1673344405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548956\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":181,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2021.3115797","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}