{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T03:27:55Z","timestamp":1779247675907,"version":"3.51.4"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"PCL Future Greater-Bay Area Network Facilities for Large-Scale Experiments and Applications","award":["PCL2018KP001"],"award-info":[{"award-number":["PCL2018KP001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/jiot.2020.3029781","type":"journal-article","created":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T19:43:52Z","timestamp":1602272632000},"page":"6257-6272","source":"Crossref","is-referenced-by-count":68,"title":["Voting-Based Decentralized Consensus Design for Improving the Efficiency and Security of Consortium Blockchain"],"prefix":"10.1109","volume":"8","author":[{"given":"Gang","family":"Sun","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Miao","family":"Dai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Jian","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Hongfang","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"PBFT vs proof-of-authority: Applying the cap theorem to permissioned blockchain","author":"de angelis","year":"2018","journal-title":"Proc Italian Conf Cyber Security"},{"key":"ref38","author":"larimer","year":"2014","journal-title":"Delegated Proof-of-Stake (DPOS)"},{"key":"ref33","author":"buterin","year":"2014","journal-title":"A next-generation smart contract and decentralized application platform"},{"key":"ref32","author":"king","year":"2012","journal-title":"Ppcoin Peer-to-peer Crypto-currency with Proof-of-stake"},{"key":"ref31","author":"li","year":"2018","journal-title":"Scaling nakamoto consensus to thousands of transactions per second"},{"key":"ref30","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kogias","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref36","first-page":"357","article-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol","author":"kiayias","year":"2017","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref35","author":"ren","year":"2014","journal-title":"Proof of Stake Velocity Building the Social Currency of the Digital Age"},{"key":"ref34","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref28","first-page":"1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/logistics2010002"},{"key":"ref29","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc 13th USENIX Symp Netw Syst Design Implementation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266430"},{"key":"ref1","first-page":"1","article-title":"Design of a secure timestamping service with minimal trust requirement","author":"massias","year":"1999","journal-title":"Proc 20th Symp Inf Theory Benelux"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00341"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3620971"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102407"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"162","DOI":"10.3390\/s18010162","article-title":"Blockchain based decentralized management of demand response programs in smart energy grids","volume":"18","author":"pop","year":"2018","journal-title":"SENSORS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2018.08.012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0982-x"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993759"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800339"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42019-6_12"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.001"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951410"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951410"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.61"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700041"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2992994"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874398"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2921755"},{"key":"ref18","author":"lyu","year":"2019","journal-title":"Towards fair and decentralized privacy-preserving deep learning with blockchain"},{"key":"ref19","author":"baldominos","year":"2019","journal-title":"Coin ai A proof-of-useful-work scheme for blockchain-based distributed deep learning"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812176"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref6","first-page":"3690","article-title":"Consortium blockchain for secure energy trading in industrial Internet of Things","volume":"14","author":"li","year":"2018","journal-title":"IEEE Trans Ind Informat"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119456735.ch9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805837"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377385"},{"key":"ref49","author":"fran\u00e7a","year":"2019","journal-title":"Albatross An optimistic consensus algorithm"},{"key":"ref9","author":"kuo","year":"2018","journal-title":"ModelChain Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891065"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref48","first-page":"604","article-title":"Reputation-based Byzantine fault-tolerance for consortium blockchain","author":"lei","year":"2018","journal-title":"Proc IEEE 24th Int Conf Parallel Distrib Syst"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00184"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/2695533.2695545","article-title":"Proof of activity: Extending bitcoin&#x2019;s proof of work via proof of stake","volume":"42","author":"bentov","year":"2014","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539561"},{"key":"ref44","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2014","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref43","first-page":"51","article-title":"Paxos made simple","volume":"32","author":"lamport","year":"2001","journal-title":"ACM SIGACT News"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9398162\/09219122.pdf?arnumber=9219122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:40Z","timestamp":1652194420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9219122\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":56,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3029781","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,15]]}}}