{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T18:54:13Z","timestamp":1774551253344,"version":"3.50.1"},"reference-count":64,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/netsoft48620.2020.9165480","type":"proceedings-article","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T21:29:37Z","timestamp":1597267777000},"page":"465-472","source":"Crossref","is-referenced-by-count":9,"title":["On the Security of Permissioned Blockchain Solutions for IoT Applications"],"prefix":"10.1109","author":[{"given":"Sotirios","family":"Brotsis","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Kolokotronis","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Limniotis","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Tendermint: Consensus without mining","volume":"1","author":"kwon","year":"2014","journal-title":"Draft v 0 6 fall"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00018"},{"key":"ref32","year":"2019","journal-title":"Symbiont documentation"},{"key":"ref31","year":"2017","journal-title":"Istanbul byzantine fault tolerance"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2860009"},{"key":"ref37","year":"2018","journal-title":"Vbft introduction"},{"key":"ref36","year":"0","journal-title":"Indy documentation"},{"key":"ref35","year":"0","journal-title":"Ontology documentation"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.53"},{"key":"ref60","year":"0","journal-title":"Exonum documentation"},{"key":"ref62","year":"0","journal-title":"Ripple documentation"},{"key":"ref61","author":"carlyle","year":"0","journal-title":"Corda performance To infinity &#x2026; and beyond"},{"key":"ref63","year":"0"},{"key":"ref28","author":"ferris","year":"0","journal-title":"Does hyperledger fabric perform at scale?"},{"key":"ref64","year":"0","journal-title":"Hyperledger iroha Working towards standard protocols for identity and digital asset management"},{"key":"ref27","year":"0","journal-title":"Hyperledger fabric documentation"},{"key":"ref29","article-title":"Pbft vs proof-of-authority: applying the cap theorem to permissioned blockchain","author":"angelis","year":"2018","journal-title":"Italian Conf on Cyber Security (06\/02\/18)"},{"key":"ref2","first-page":"30:1","article-title":"Hyperledger fabric: A distributed operating system for permissioned blockchains","author":"androulaki","year":"0","journal-title":"Proc 13th Europ Conf"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055526"},{"key":"ref20","first-page":"11","article-title":"Zookeeper: Wait-free coordination for internet-scale systems","author":"hunt","year":"2010","journal-title":"USENIX ATC&#x2019; 10 Proc of 2010 USENIX Annual Technical Conf"},{"key":"ref22","year":"2018","journal-title":"Sawtooth v1 2 4 documentation"},{"key":"ref21","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2014","journal-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)"},{"key":"ref24","year":"0","journal-title":"R3 primer series 1"},{"key":"ref23","year":"2018","journal-title":"Quorum documentation"},{"key":"ref26","article-title":"Performance evaluation of the quorum blockchain platform","volume":"abs 1809 3421","author":"baliga","year":"2018","journal-title":"CoRR"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823238"},{"key":"ref50","year":"0","journal-title":"Neo documentation"},{"key":"ref51","article-title":"YAC: BFT consensus algorithm for blockchain","volume":"abs 1809 554","author":"muratov","year":"2018","journal-title":"CoRR"},{"key":"ref59","author":"mahankali","year":"2019","journal-title":"Blockchain The Untold Story From birth of Internet to future of Blockchain"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8944-2_123"},{"key":"ref57","article-title":"The ripple protocol consensus algorithm","volume":"5","author":"schwartz","year":"2014","journal-title":"Ripple Labs Inc White Paper"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69084-1_19"},{"key":"ref55","first-page":"86","article-title":"Intel sgx explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref54","year":"0","journal-title":"PoET 1 0 Specification"},{"key":"ref53","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2019","journal-title":"Manubot Tech Rep"},{"key":"ref52","year":"0","journal-title":"Hyperledger iroha documentation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref40","year":"0","journal-title":"Hyperledger burrow documentation"},{"key":"ref12","first-page":"97","article-title":"Fault-tolerant broadcasts and related problems","author":"hadzilacos","year":"1993","journal-title":"Distributed Systems"},{"key":"ref13","first-page":"8","article-title":"Viewstamped replication: A new primary copy method to support highly-available distributed systems","author":"oki","year":"0","journal-title":"Proceedings of the Annual ACM Symposium on Principles of Distributed Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"ref17","author":"lynch","year":"1996","journal-title":"Distributed Algorithms"},{"key":"ref18","year":"2001","journal-title":"Kafka 2 3 documentation"},{"key":"ref19","year":"0","journal-title":"Corda documentation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref3","first-page":"1:1","article-title":"Blockchain Consensus Protocols in the Wild (Keynote Talk)","volume":"91","author":"cachin","year":"0","journal-title":"Proc 31st Int Symposium Distributed Comput (DISC 2017)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2922538"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3372136"},{"key":"ref7","article-title":"An overview of blockchain and consensus protocols for iot networks","volume":"abs 1809 5613","author":"salimitari","year":"2018","journal-title":"CoRR"},{"key":"ref49","year":"2019","journal-title":"Parity tech documentation"},{"key":"ref9","author":"sadek ferdous","year":"2020","journal-title":"Blockchain Consensus Algorithms A Survey"},{"key":"ref46","year":"0","journal-title":"Tron documentation"},{"key":"ref45","year":"0","journal-title":"Eosio documentation"},{"key":"ref48","year":"0","journal-title":"Lisk documentation"},{"key":"ref47","year":"0","journal-title":"Tezos (xtz)"},{"key":"ref42","year":"0","journal-title":"A beginner's guide to ethermint"},{"key":"ref41","year":"0","journal-title":"Autonity documentation"},{"key":"ref44","year":"0","journal-title":"Bitshares documentation"},{"key":"ref43","first-page":"1","author":"yanovich","year":"2018","journal-title":"Exonum Byzantine fault tolerant protocol for blockchains"}],"event":{"name":"2020 6th IEEE International Conference on Network Softwarization (NetSoft)","location":"Ghent, Belgium","start":{"date-parts":[[2020,6,29]]},"end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 6th IEEE Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9158198\/9165305\/09165480.pdf?arnumber=9165480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:37Z","timestamp":1656453337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9165480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/netsoft48620.2020.9165480","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}