{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T21:22:00Z","timestamp":1775510520120,"version":"3.50.1"},"reference-count":82,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/sies.2018.8442076","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T22:10:52Z","timestamp":1535062252000},"page":"1-10","source":"Crossref","is-referenced-by-count":32,"title":["On the Consensus Mechanisms of Blockchain\/DLT for Internet of Things"],"prefix":"10.1109","author":[{"given":"Qingqiang","family":"He","sequence":"first","affiliation":[]},{"given":"Nan","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Mingsong","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"OSDI"},{"key":"ref72","author":"bramas","year":"2018","journal-title":"The stability and the security of the tangle"},{"key":"ref71","year":"0","journal-title":"A primer on iota (with presentation)-iota"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"ref76","year":"0","journal-title":"Tendermint - blockchain consensus"},{"key":"ref77","year":"0","journal-title":"Proof of authority chains - paritytech\/parity wiki - github"},{"key":"ref74","year":"0","journal-title":"Hyperledger fabric - hyperledger"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093829"},{"key":"ref75","year":"0","journal-title":"Parity"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref78","author":"de angelis","year":"2017","journal-title":"Pbft vs proof-of-authority applying the cap theorem to permissioned blockchain"},{"key":"ref79","first-page":"2017","article-title":"Tendermint: Consensus without mining","volume":"18","author":"kwon","year":"2014","journal-title":"Retrieved May"},{"key":"ref33","year":"0","journal-title":"Blockchain size - blockchain"},{"key":"ref32","year":"0","journal-title":"Machinomy - distributed platform for iot micropayments"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"ref30","year":"0","journal-title":"Bitcoin Wiki Confirmation"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","article-title":"Quantitative analysis of the full bitcoin transaction graph","author":"ron","year":"2013","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref34","article-title":"Analysis of the communication traffic for blockchain synchronization of iot devices","author":"danzi","year":"2017","journal-title":"arXiv preprint arXiv 1711 00540"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1007\/978-3-319-69084-1_19","article-title":"On security analysis of proof-of-elapsed-time (poet)","author":"chen","year":"2017","journal-title":"International Symposium on Stabilization Safety and Security of Distributed Systems"},{"key":"ref62","author":"mizrahi","year":"2014","journal-title":"Proof of Activity Extending Bitcoin?s Proof of Work via Proof of Stake"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"ref63","year":"0","journal-title":"Nem_techref pdf"},{"key":"ref28","year":"0","journal-title":"The future of energy - blockchain transactive grids microgrids energy trading - lo3 stock tokens and information - lo3 energy"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"International Workshop on Peer-to-Peer Systems"},{"key":"ref27","year":"0","journal-title":"filecoin pdf"},{"key":"ref65","first-page":"585","article-title":"Proofs of space","author":"dziembowski","year":"2015","journal-title":"Annual Cryptology Conference"},{"key":"ref66","year":"0","journal-title":"Proof-of-space - wikipedia"},{"key":"ref29","year":"0","journal-title":"Irreversible transactions - bitcoin wiki"},{"key":"ref67","first-page":"37","article-title":"Pebbling and proofs of work","author":"dwork","year":"2005","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref68","author":"moran","year":"2017","journal-title":"Rational proofs of space-time"},{"key":"ref69","year":"0","journal-title":"slimcoin_whitepaper pdf"},{"key":"ref2","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098790"},{"key":"ref21","article-title":"Not just for cryptocash: How blockchain tech could help secure iot","volume":"13","author":"kumar","year":"2017","journal-title":"IoT Agenda"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref23","article-title":"Lsb: A lightweight scalable blockchain for iot security and privacy","author":"dorri","year":"2017","journal-title":"arXiv preprint arXiv 1712 02969"},{"key":"ref26","year":"0","journal-title":"True micropayments with bitcoin - earn com - medium"},{"key":"ref25","year":"0","journal-title":"EtherAPIs Decentralized Anonymous Trustless APIs"},{"key":"ref50","year":"0","journal-title":"Problems - ethereumlwiki wiki - github"},{"key":"ref51","first-page":"142","article-title":"Cryptocurrencies without proof of work","author":"bentov","year":"2016","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref59","year":"0","journal-title":"Poet 1 0 specification - sawtooth v1 0 1 documentation"},{"key":"ref58","article-title":"Proof of stake velocity: Building the social currency of the digital age","author":"ren","year":"2014","journal-title":"Self-published white paper"},{"key":"ref57","year":"0","journal-title":"Dpos consensus algorithm - the missing white paper - s-teemit"},{"key":"ref56","year":"0","journal-title":"Waves platform"},{"key":"ref55","year":"0","journal-title":"Waves launches balance leasing in lite client - waves platform"},{"key":"ref54","year":"0","journal-title":"Proof-of-stake coins list !"},{"key":"ref53","year":"0","journal-title":"2give"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/19390450903037302"},{"key":"ref10","first-page":"39","article-title":"The blockchain-based internet of things development: Initiatives and challenges","author":"sergio","year":"2017","journal-title":"ICSE 2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0040-y"},{"key":"ref40","article-title":"Securing real-time internet-of-things","author":"chen","year":"2017","journal-title":"arXiv preprint arXiv 1705 08489"},{"key":"ref12","author":"brody","year":"2014","journal-title":"Device Democracy Saving the Future of the Internet of Things"},{"key":"ref13","article-title":"A next-generation smart contract and decentralized application platform","author":"buterin","year":"2014","journal-title":"White Paper"},{"key":"ref14","article-title":"Ipfs-content addressed, versioned, p2p file system","author":"benet","year":"2014","journal-title":"arXiv preprint arXiv 1407 3561"},{"key":"ref15","first-page":"3","article-title":"Creation of smart-contracting collaborations for decentralized autonomous organizations","author":"norta","year":"2015","journal-title":"International Conference on Business Informatics Research"},{"key":"ref82","year":"0","journal-title":"Demystifying hashgraph Benefits and challenges hacker - noon"},{"key":"ref16","author":"holler","year":"2014","journal-title":"From Machine-to-Machine to the Internet of Things Introduction to A New Age of Intelligence"},{"key":"ref81","year":"0","journal-title":"hh-whitepaper-v1 0&#x2013;180313 pdf"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.54"},{"key":"ref18","first-page":"173","article-title":"Towards an Optimized BlockChain for IoT","author":"ali dorri","year":"2017","journal-title":"2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3140649.3140656"},{"key":"ref80","article-title":"Hashgraph consensus: fair, fast, byzantine fault tolerance","author":"baird","year":"2016","journal-title":"Swirlds Tech Report Tech Rep"},{"key":"ref4","article-title":"How blockchain is changing finance","volume":"1","author":"tapscott","year":"2017","journal-title":"Harvard Business Review"},{"key":"ref3","year":"0","journal-title":"The internet of trusted things - kaleido insights"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412073"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref7","article-title":"Blockchain challenges and opportunities: A survey","author":"zheng","year":"2016","journal-title":"Work Pap -2016"},{"key":"ref49","article-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake","volume":"19","author":"king","year":"2012","journal-title":"self-published paper"},{"key":"ref9","article-title":"Blockchain in internet of things: challenges and solutions","author":"dorri","year":"0","journal-title":"arXiv preprint arXiv 1608 05140 2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"ref45","year":"0","journal-title":"Mining - bitcoin wiki"},{"key":"ref48","year":"0","journal-title":"51% attack - investopedia"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086197"},{"key":"ref42","first-page":"131","article-title":"The tangle","author":"popov","year":"2016","journal-title":"CIT"},{"key":"ref41","article-title":"Understanding blockchain consensus models","author":"baliga","year":"2017","journal-title":"Tech Rep"},{"key":"ref44","author":"back","year":"2002","journal-title":"Hashcash A Denial of Service Countermeasure"},{"key":"ref43","first-page":"258","article-title":"Proofs of work and bread pudding protocols","author":"jakobsson","year":"1999","journal-title":"IET Information Security"}],"event":{"name":"2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES)","location":"Graz","start":{"date-parts":[[2018,6,6]]},"end":{"date-parts":[[2018,6,8]]}},"container-title":["2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410983\/8442074\/08442076.pdf?arnumber=8442076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:35:34Z","timestamp":1643211334000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8442076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":82,"URL":"https:\/\/doi.org\/10.1109\/sies.2018.8442076","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}