{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:29:47Z","timestamp":1764937787289,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634349","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["SoK: DePIN Data Layer for Modular Blockchain"],"prefix":"10.1109","author":[{"given":"Babu","family":"Pillai","sequence":"first","affiliation":[{"name":"Southern Cross University,Faculty of Science and Engineering,Gold Coast,Australia"}]},{"given":"Vinh","family":"Bui","sequence":"additional","affiliation":[{"name":"Southern Cross University,Faculty of Science and Engineering,Gold Coast,Australia"}]}],"member":"263","reference":[{"volume-title":"What is the decentralized physical infrastructure (depin) narrative in crypto?","year":"2024","author":"Agbo","key":"ref1"},{"key":"ref2","first-page":"72","volume-title":"Enabling blockchain innovations with pegged sidechains","author":"Back","year":"2014"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/3-540-32834-3_9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WF-IoT58464.2023.10539514"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-1-4842-8045-4_8"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICBC54727.2022.9805533"},{"volume-title":"Application-specific blockchains: The past, present, and future","year":"2022","author":"Berenzon","key":"ref7"},{"key":"ref8","first-page":"1","article-title":"Architecture of the hyperledger blockchain fabric","volume-title":"In: Workshop on distributed cryptocurrencies and consensus ledgers","volume":"310","author":"Cachin"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-662-53357-4_8"},{"volume-title":"Crytoray: Decoding depin: The decentralized future of real-world infrastructure","year":"2024","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3243734.3243856"},{"key":"ref12","first-page":"45","article-title":"{Bitcoin-NG}: A scalable blockchain protocol","volume-title":"In: 13th USENIX symposium on networked systems design and implementation (NSDI 16)","author":"Eyal"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3628354.3629534"},{"volume-title":"Dismantling the bitcoin\/ethereum layer 2 security model and risk indicators","year":"2024","author":"Finance","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-030-51280-4_12"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/IVS.2018.8500557"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.2139\/ssrn.3040224"},{"key":"ref18","article-title":"Centralized versus decentralized infrastructure networks","author":"Hines","year":"2015","journal-title":"arXiv preprint arXiv:1510.08792"},{"key":"ref19","article-title":"Data availability and decentralization: New techniques for zkrollups in layer 2 blockchain networks","author":"Huang","year":"2024","journal-title":"arXiv preprint arXiv:2403.10828"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICTAI53825.2021.9673260"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-319-63688-7_12"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/SP.2018.000-5"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.3390\/info14020088"},{"key":"ref24","article-title":"Scp: A computationally-scalable byzantine consensus protocol for blockchains","author":"Luu","year":"2015","journal-title":"Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2976749.2978389"},{"volume-title":"Data availability layer: Enabling scalability in blockchain networks","year":"2023","author":"Mas","key":"ref26"},{"key":"ref27","article-title":"Sprites: Payment channels that go faster than lightning","volume":"abs\/1702.05812","author":"Miller","year":"2017","journal-title":"CoRR"},{"key":"ref28","first-page":"28747","article-title":"Is a modular architecture enough?","volume":"35","author":"Mittal","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"volume-title":"Data link layer security problems and solutions","year":"2015","author":"Mustafa","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ACCESS.2023.3237897"},{"volume-title":"Oxorio: Securing layer 2: Unique security concerns and mitigation strategies","year":"2023","key":"ref31"},{"key":"ref32","article-title":"Hybrid consensus: Efficient consensus in the permissionless model","author":"Pass","year":"2016","journal-title":"Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/WiMob58348.2023.10187762"},{"volume-title":"Hivemapper","year":"2024","author":"Seth","key":"ref34"},{"key":"ref35","article-title":"Layer 2 blockchain scaling: A survey","author":"Sguanci","year":"2021","journal-title":"arXiv preprint arXiv:2107.10881"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.3390\/fi15060212"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.procs.2020.04.149"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/BRAINS59668.2023.10316912"},{"key":"ref39","article-title":"Iotex: a decentralized network for internet of things powered by a privacy-centric blockchain","author":"Team","year":"2018","journal-title":"IoTeX Team"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ACCESS.2022.3200051"},{"key":"ref41","first-page":"14","article-title":"Framework for analyzing private blockchains","volume-title":"In: Proceedings of the 2017 ACM International Conference on Management of Data","author":"Tien Tuan Anh"},{"volume-title":"WifiMap: Wifi map digest","year":"2023","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1371\/journal,pone.0163477"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/3243734.3243853"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2024,5,27]]},"location":"Dublin, Ireland","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634349.pdf?arnumber=10634349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:49:21Z","timestamp":1725338961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634349","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}