{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T19:20:27Z","timestamp":1774898427746,"version":"3.50.1"},"reference-count":254,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB2101901"],"award-info":[{"award-number":["2019YFB2101901"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072332"],"award-info":[{"award-number":["62072332"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002260"],"award-info":[{"award-number":["62002260"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2020M670654"],"award-info":[{"award-number":["2020M670654"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Fund from Guangdong Laboratory of Artificial Intelligence and Digital Economy","award":["GML-KF-22-03"],"award-info":[{"award-number":["GML-KF-22-03"]}]},{"name":"Guangdong Pearl River Talent Recruitment Program","award":["2019ZT08X603"],"award-info":[{"award-number":["2019ZT08X603"]}]},{"name":"Guangdong Pearl River Talent Plan","award":["2019JC01X235"],"award-info":[{"award-number":["2019JC01X235"]}]},{"DOI":"10.13039\/501100010877","name":"Shenzhen Science and Technology Innovation Commission","doi-asserted-by":"publisher","award":["R2020A045"],"award-info":[{"award-number":["R2020A045"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore and Infocomm Media Development Authority under its Future Communications Research & Development Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007040","name":"Singapore University of Technology and Design","doi-asserted-by":"publisher","award":["SRG-ISTD-2021-165"],"award-info":[{"award-number":["SRG-ISTD-2021-165"]}],"id":[{"id":"10.13039\/501100007040","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SUTD-ZJU IDEA","award":["SUTD-ZJU (VP) 202102"],"award-info":[{"award-number":["SUTD-ZJU (VP) 202102"]}]},{"name":"SUTD-ZJU IDEA Seed","award":["SUTD-ZJU (SD) 202101"],"award-info":[{"award-number":["SUTD-ZJU (SD) 202101"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/comst.2022.3189962","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T15:26:57Z","timestamp":1657639617000},"page":"2193-2229","source":"Crossref","is-referenced-by-count":74,"title":["Integrating Edge Intelligence and Blockchain: What, Why, and How"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7223-1030","authenticated-orcid":false,"given":"Xiaofei","family":"Wang","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3166-1405","authenticated-orcid":false,"given":"Xiaoxu","family":"Ren","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2224-2292","authenticated-orcid":false,"given":"Chao","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4440-941X","authenticated-orcid":false,"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[{"name":"Pillar of Information Systems Technology and Design, Singapore University of Technology and Design, Somapah Rd, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1391-7363","authenticated-orcid":false,"given":"Haipeng","family":"Yao","sequence":"additional","affiliation":[{"name":"Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3529-2640","authenticated-orcid":false,"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.3010987"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149217"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013824"},{"key":"ref174","year":"2022","journal-title":"Tendermint"},{"key":"ref173","year":"2022","journal-title":"Raft consensus algorithm"},{"key":"ref176","year":"2022","journal-title":"Concord-BFT A Distributed Trust Infrastructure"},{"key":"ref175","year":"2022","journal-title":"Byzantine Fault-Tolerant (BFT) State Machine Replication"},{"key":"ref178","year":"2022","journal-title":"cpp-ethereum"},{"key":"ref177","year":"2022","journal-title":"A Lightweight and Multi-Language Library Collection for Byzantine Fault Tolerance"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.3390\/e21080723"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2948870"},{"key":"ref39","year":"2022","journal-title":"NVIDIA Turing GPU Architecture"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108004"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975911"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093633"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6126247"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486403"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984887"},{"key":"ref35","article-title":"A survey on edge intelligence","author":"xu","year":"2020","journal-title":"arXiv 2003 12172"},{"key":"ref34","year":"2021","journal-title":"Edge intelligence (white paper)"},{"key":"ref181","year":"2021","journal-title":"Relic"},{"key":"ref180","year":"2021","journal-title":"Crypto++ Library 8 6"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.10"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3010967"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148888"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3035990"},{"key":"ref189","article-title":"Anomaly detection in Bitcoin network using unsupervised learning methods","author":"pham","year":"2016","journal-title":"arXiv 1611 03941"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2016.7802939"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.443"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3020092"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00063"},{"key":"ref29","article-title":"Edge-native intelligence for 6G communications driven by federated learning: A survey of trends and challenges","author":"al-quraan","year":"2021","journal-title":"arXiv 2111 07392"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45656-0_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539529"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899617"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102693","article-title":"Blockchain for 5G and beyond networks: A state of the art survey","volume":"166","author":"nguyen","year":"2020","journal-title":"J Netw Comput Appl"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3028368"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359646"},{"key":"ref51","article-title":"Gossip training for deep learning","author":"blot","year":"2016","journal-title":"arXiv 1611 09726"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977383"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892848"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940052"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2996273"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00057"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00047"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017668"},{"key":"ref146","year":"2021","journal-title":"Hyperledger-Write First App"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3285017.3285027"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2921755"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900006"},{"key":"ref58","article-title":"A survey of model compression and acceleration for deep neural networks","author":"cheng","year":"2017","journal-title":"arXiv 1710 09282"},{"key":"ref57","first-page":"3","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding","volume":"56","author":"han","year":"2015","journal-title":"FIBER"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131675"},{"key":"ref55","first-page":"9031","article-title":"FastGRNN: A fast, accurate, stable and tiny kilobyte sized gated recurrent neural network","volume":"31","author":"kusupati","year":"2018","journal-title":"Proc Annu Conf Neural Inf Process Syst 31 (NeurIPS)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref53","article-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and 1MB model size","author":"iandola","year":"2016","journal-title":"arXiv 1602 07360"},{"key":"ref52","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"howard","year":"2017","journal-title":"arXiv 1704 04861"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485850"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00023"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.1900617"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751419"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2904049"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.201.2000462"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000419"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749276"},{"key":"ref6","year":"2018","journal-title":"5 Trends Emerge in the Gartner Hype Cycle for Emerging Technologies"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800254"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3017377"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858384"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3040968"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2018.00044"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900119"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2928811"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2787979"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2330900"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054634"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800286"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700317"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref71","author":"buterin","year":"2014","journal-title":"A next-generation smart contract and decentralized application platform"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961372"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3094126"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.12.019"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3027980"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0043"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.49"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203852"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240796"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737614"},{"key":"ref64","article-title":"ReXCam: Resource-efficient, cross-camera video analytics at enterprise scale","author":"jain","year":"2018","journal-title":"arXiv 1811 01268"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00019"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2928178"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2019.04.002"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/INFOMAN.2017.7950404"},{"key":"ref197","year":"2018","journal-title":"Matrix Technical Whitepaper"},{"key":"ref198","author":"chen","year":"2017","journal-title":"Cortex&#x2014;AI on Blockchain"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/LISS.2018.8593220"},{"key":"ref193","year":"2022","journal-title":"Huobi ECO Chain"},{"key":"ref194","year":"2022","journal-title":"Huobi Global"},{"key":"ref195","author":"wood","year":"2018","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3457337.3457841"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2961958"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2959772"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422549"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2902563"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987843"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-118"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"2116","DOI":"10.1109\/JIOT.2020.3037733","article-title":"Blockchain-based decentralized authentication modeling scheme in edge and IoT environment","volume":"8","author":"ma","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072611"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3110965"},{"key":"ref99","year":"2021","journal-title":"FISCO BCOS"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3140878"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600321"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3047496"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.12.055"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3038468"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3049152"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048345"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102786"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052910"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3058689"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2000735"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.061"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3028101"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120521"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897805"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969429"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref201","article-title":"Towards safer smart contracts: A sequence learning approach to detecting security threats","author":"tann","year":"2018","journal-title":"arXiv 1811 06632"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871394"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2985581"},{"key":"ref205","article-title":"Hunting the Ethereum smart contract: Color-inspired inspection of potential attacks","author":"huang","year":"2018","journal-title":"arXiv 1807 01868"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"ref211","year":"2022","journal-title":"MOAC System"},{"key":"ref210","year":"2022","journal-title":"MOAC Multi-Layer Blockchain Architecture for Commercial Applications Join OUR Telegram"},{"key":"ref212","year":"2022","journal-title":"Hyperledger fabric"},{"key":"ref213","year":"2022","journal-title":"The Corda Platform&#x2014;Open Source + Enterprise"},{"key":"ref214","year":"2022","journal-title":"Hyperledger sawtooth"},{"key":"ref215","year":"2022","journal-title":"The Eosio Pubic Blockchain"},{"key":"ref216","year":"2022","journal-title":"Hyperledger iroha"},{"key":"ref217","year":"2022","journal-title":"Welcome to the International Standard for Open Source Compliance"},{"key":"ref218","year":"2022","journal-title":"Permissioned Distributed Ledger Based on Ethereum"},{"key":"ref219","year":"2022","journal-title":"Join the Community-Driven&#x2014;Open Network for the Smart Economy"},{"key":"ref220","year":"2022","journal-title":"Stellar is An Open Network for Storing and Moving Money"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106646"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05081-8_19"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644088"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647713"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2952942"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00073"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647221"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923525"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2929740"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986803"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_39"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3390\/info11120570"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2917307"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3125307"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3002712"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00077"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922039"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00030"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928325"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972284"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.8048842"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2930418"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2018.05.011"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.8454517"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904303"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2709784"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2916565"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2893433"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2922936"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900161"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973705"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2966778"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900215"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000514"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2957140"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2018.8531125"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000788"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2967703"},{"key":"ref1","article-title":"IoT Connections Outlook: NB-IoT and CAT-M Technologies Will Account for Close to 45 Percent of Cellular IoT Connections in 2024.","year":"2019"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10243131"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757177"},{"key":"ref242","year":"2021","journal-title":"Build on Quorum the Complete Open Source Blockchain Platform for Business"},{"key":"ref243","year":"2019","journal-title":"Burrow&#x2014;The Boring Blockchain"},{"key":"ref244","year":"2022","journal-title":"Hyperledger Indy"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2015.10.006"},{"key":"ref248","first-page":"67","article-title":"Towards in-network computing infrastructures for connected vehicles","author":"dennis","year":"2019","journal-title":"Proc 2 KuVS Fachgesprach Netw Softw"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357395"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03165-4"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS52497.2021.9569838"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/HotICN50779.2020.9350853"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2995371"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2956519"},{"key":"ref107","first-page":"1","article-title":"Resource allocation for blockchain-enabled distributed network function virtualization (NFV) with mobile edge cloud (MEC)","author":"fu","year":"2019","journal-title":"Proc IEEE INFOCOM Conf Comput Commun Workshops (INFOCOM WKSHPS)"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026589"},{"key":"ref105","article-title":"Multi-agent reinforcement learning aided service function chain deployment for Internet of Things","author":"zhu","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3141728"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900136"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422743"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951593"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3035437"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3007869"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000319"},{"key":"ref251","year":"2022","journal-title":"The Big History Project"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-020-00375-7"},{"key":"ref252","article-title":"From the Internet of information to the Internet of intelligence","author":"yu","year":"2019","journal-title":"arXiv 909 08068"},{"key":"ref253","article-title":"Learning markets: An AI collaboration framework based on blockchain and smart contracts","author":"ouyang","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref10","author":"nakamoto","year":"2021","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800309"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3229556.3229562"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2924015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030646"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6693731"},{"key":"ref19","first-page":"2567","article-title":"A review on consensus algorithm of blockchain","author":"du","year":"2017","journal-title":"Proc IEEE Int Conf Syst Man Cybern (SMC)"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3026319"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3014229"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2961707"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016644"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3007770"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2829141"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348271"},{"key":"ref122","year":"2022","journal-title":"Enterprise Blockchains"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1108\/APJIE-12-2017-037"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9956928\/09826754.pdf?arnumber=9826754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T14:18:12Z","timestamp":1670854692000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9826754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":254,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2022.3189962","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.19634610","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19634610.v1","asserted-by":"object"}]},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}