{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T04:45:25Z","timestamp":1761108325619,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/iintec.2018.8695298","type":"proceedings-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T23:52:56Z","timestamp":1556236376000},"page":"183-190","source":"Crossref","is-referenced-by-count":15,"title":["An Assessment of Blockchain Consensus Protocols for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Beverley","family":"MacKenzie","sequence":"first","affiliation":[]},{"given":"Robert Ian","family":"Ferguson","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Bellekens","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Distributed consensus from proof of stake is impossible","author":"poelstra","year":"2014","journal-title":"self-published paper"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"ref31","article-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake","volume":"19","author":"king","year":"2012","journal-title":"self-published paper August"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref36","first-page":"1","article-title":"Kafka: A distributed messaging system for log processing","author":"kreps","year":"2011","journal-title":"Proceedings of the NetDB"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1561\/1000000052"},{"key":"ref34","first-page":"4","article-title":"Intel&#x00AE; sgx for dummies (intel&#x00AE; sgx design objectives)","volume":"3","author":"hoekstra","year":"2014","journal-title":"Retrieved Sep"},{"key":"ref10","first-page":"1019","article-title":"Speed-security tradeoffs in blockchain protocols","volume":"2015","author":"kiayias","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.111"},{"key":"ref12","first-page":"112","article-title":"The quest for scalable blockchain fabric: Proof-of-work vs. bft replication","author":"vukoli?","year":"2015","journal-title":"International Workshop on Open Problems in Network Security"},{"key":"ref13","first-page":"129","article-title":"Eclipse attacks on bitcoin&#x2019;s peer-to-peer network","author":"heilman","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","author":"atzei","year":"2017","journal-title":"Principles of Security and Trust"},{"key":"ref16","article-title":"Comparison of ethereum, hyperledger fabric and corda","author":"valenta","year":"2017","journal-title":"Technical Report Working Paper"},{"year":"0","key":"ref17","article-title":"Hyperledger sawtooth"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C","year":"2007","author":"schneier","key":"ref18"},{"key":"ref19","first-page":"1","article-title":"Intel sgx explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref28","article-title":"bitcoin energy consumption","author":"de vries","year":"2018","journal-title":"Online"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0699"},{"key":"ref3","article-title":"Challenges in iot networking via tcp\/ip architecture","author":"shang","year":"2016","journal-title":"Technical Report NDN-0038 NDN Project"},{"journal-title":"Insight on how to lead in a connected world","year":"0","author":"hung","key":"ref6"},{"key":"ref29","first-page":"258","article-title":"Proofs of work and bread pudding protocols","author":"jakobsson","year":"1999","journal-title":"Information and Network Security"},{"article-title":"A survey on consensus mechanisms and mining management in blockchain networks","year":"2018","author":"wang","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"year":"0","key":"ref7","article-title":"Internet of things research study"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4337\/9781784717766.00019"},{"key":"ref1","first-page":"653","article-title":"A survey of blockchain security issues and challenges","volume":"19","author":"lin","year":"2017","journal-title":"IJ Network Security"},{"key":"ref20","article-title":"Architecture of the hyperledger blockchain fabric","volume":"310","author":"cachin","year":"2016","journal-title":"Workshop on Distributed Cryptocurrencies and Consensus Ledgers (DCCL)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"journal-title":"User's Guide To Cryptography And Standards (Artech House Computer Security)","year":"2004","author":"dent","key":"ref21"},{"article-title":"Top 10 iot vulnerabilities","year":"0","author":"smith","key":"ref24"},{"key":"ref23","article-title":"Blockchain challenges and opportunities: A survey","author":"zheng","year":"2016","journal-title":"Work Pap &#x2013;2016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"ref25","first-page":"933","article-title":"The computer for the 21st century: specialized elements of hardware and software, connected by wires, radio waves and infrared, will be so ubiquitous that no one will notice their presence","author":"weiser","year":"1995","journal-title":"Readings in Human&#x2013;Computer Interaction"}],"event":{"name":"2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)","start":{"date-parts":[[2018,12,20]]},"location":"Hamammet, Tunisia","end":{"date-parts":[[2018,12,21]]}},"container-title":["2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8693705\/8695265\/08695298.pdf?arnumber=8695298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T19:10:01Z","timestamp":1557774601000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8695298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iintec.2018.8695298","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}