{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:12:12Z","timestamp":1763017932252,"version":"3.28.0"},"reference-count":82,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/sies.2018.8442076","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T22:10:52Z","timestamp":1535062252000},"page":"1-10","source":"Crossref","is-referenced-by-count":32,"title":["On the Consensus Mechanisms of Blockchain\/DLT for Internet of Things"],"prefix":"10.1109","author":[{"given":"Qingqiang","family":"He","sequence":"first","affiliation":[]},{"given":"Nan","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Mingsong","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"OSDI"},{"journal-title":"The stability and the security of the tangle","year":"2018","author":"bramas","key":"ref72"},{"journal-title":"A primer on iota (with presentation)-iota","year":"0","key":"ref71"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"journal-title":"Tendermint - blockchain consensus","year":"0","key":"ref76"},{"journal-title":"Proof of authority chains - paritytech\/parity wiki - github","year":"0","key":"ref77"},{"journal-title":"Hyperledger fabric - hyperledger","year":"0","key":"ref74"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093829"},{"journal-title":"Parity","year":"0","key":"ref75"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"journal-title":"Pbft vs proof-of-authority applying the cap theorem to permissioned blockchain","year":"2017","author":"de angelis","key":"ref78"},{"key":"ref79","first-page":"2017","article-title":"Tendermint: Consensus without mining","volume":"18","author":"kwon","year":"2014","journal-title":"Retrieved May"},{"journal-title":"Blockchain size - blockchain","year":"0","key":"ref33"},{"journal-title":"Machinomy - distributed platform for iot micropayments","year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"journal-title":"Bitcoin Wiki Confirmation","year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","article-title":"Quantitative analysis of the full bitcoin transaction graph","author":"ron","year":"2013","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref34","article-title":"Analysis of the communication traffic for blockchain synchronization of iot devices","author":"danzi","year":"2017","journal-title":"arXiv preprint arXiv 1711 00540"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1007\/978-3-319-69084-1_19","article-title":"On security analysis of proof-of-elapsed-time (poet)","author":"chen","year":"2017","journal-title":"International Symposium on Stabilization Safety and Security of Distributed Systems"},{"journal-title":"Proof of Activity Extending Bitcoin?s Proof of Work via Proof of Stake","year":"2014","author":"mizrahi","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"journal-title":"Nem_techref pdf","year":"0","key":"ref63"},{"journal-title":"The future of energy - blockchain transactive grids microgrids energy trading - lo3 stock tokens and information - lo3 energy","year":"0","key":"ref28"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"International Workshop on Peer-to-Peer Systems"},{"journal-title":"filecoin pdf","year":"0","key":"ref27"},{"key":"ref65","first-page":"585","article-title":"Proofs of space","author":"dziembowski","year":"2015","journal-title":"Annual Cryptology Conference"},{"journal-title":"Proof-of-space - wikipedia","year":"0","key":"ref66"},{"journal-title":"Irreversible transactions - bitcoin wiki","year":"0","key":"ref29"},{"key":"ref67","first-page":"37","article-title":"Pebbling and proofs of work","author":"dwork","year":"2005","journal-title":"6th Annual International Cryptology Conference"},{"journal-title":"Rational proofs of space-time","year":"2017","author":"moran","key":"ref68"},{"journal-title":"slimcoin_whitepaper pdf","year":"0","key":"ref69"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098790"},{"key":"ref21","article-title":"Not just for cryptocash: How blockchain tech could help secure iot","volume":"13","author":"kumar","year":"2017","journal-title":"IoT Agenda"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref23","article-title":"Lsb: A lightweight scalable blockchain for iot security and privacy","author":"dorri","year":"2017","journal-title":"arXiv preprint arXiv 1712 02969"},{"journal-title":"True micropayments with bitcoin - earn com - medium","year":"0","key":"ref26"},{"journal-title":"EtherAPIs Decentralized Anonymous Trustless APIs","year":"0","key":"ref25"},{"journal-title":"Problems - ethereumlwiki wiki - github","year":"0","key":"ref50"},{"key":"ref51","first-page":"142","article-title":"Cryptocurrencies without proof of work","author":"bentov","year":"2016","journal-title":"International Conference on Financial Cryptography and Data Security"},{"journal-title":"Poet 1 0 specification - sawtooth v1 0 1 documentation","year":"0","key":"ref59"},{"key":"ref58","article-title":"Proof of stake velocity: Building the social currency of the digital age","author":"ren","year":"2014","journal-title":"Self-published white paper"},{"journal-title":"Dpos consensus algorithm - the missing white paper - s-teemit","year":"0","key":"ref57"},{"journal-title":"Waves platform","year":"0","key":"ref56"},{"journal-title":"Waves launches balance leasing in lite client - waves platform","year":"0","key":"ref55"},{"journal-title":"Proof-of-stake coins list !","year":"0","key":"ref54"},{"journal-title":"2give","year":"0","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/19390450903037302"},{"key":"ref10","first-page":"39","article-title":"The blockchain-based internet of things development: Initiatives and challenges","author":"sergio","year":"2017","journal-title":"ICSE 2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0040-y"},{"key":"ref40","article-title":"Securing real-time internet-of-things","author":"chen","year":"2017","journal-title":"arXiv preprint arXiv 1705 08489"},{"journal-title":"Device Democracy Saving the Future of the Internet of Things","year":"2014","author":"brody","key":"ref12"},{"key":"ref13","article-title":"A next-generation smart contract and decentralized application platform","author":"buterin","year":"2014","journal-title":"White Paper"},{"key":"ref14","article-title":"Ipfs-content addressed, versioned, p2p file system","author":"benet","year":"2014","journal-title":"arXiv preprint arXiv 1407 3561"},{"key":"ref15","first-page":"3","article-title":"Creation of smart-contracting collaborations for decentralized autonomous organizations","author":"norta","year":"2015","journal-title":"International Conference on Business Informatics Research"},{"journal-title":"Demystifying hashgraph Benefits and challenges hacker - noon","year":"0","key":"ref82"},{"journal-title":"From Machine-to-Machine to the Internet of Things Introduction to A New Age of Intelligence","year":"2014","author":"holler","key":"ref16"},{"journal-title":"hh-whitepaper-v1 0&#x2013;180313 pdf","year":"0","key":"ref81"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.54"},{"key":"ref18","first-page":"173","article-title":"Towards an Optimized BlockChain for IoT","author":"ali dorri","year":"2017","journal-title":"2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3140649.3140656"},{"key":"ref80","article-title":"Hashgraph consensus: fair, fast, byzantine fault tolerance","author":"baird","year":"2016","journal-title":"Swirlds Tech Report Tech Rep"},{"key":"ref4","article-title":"How blockchain is changing finance","volume":"1","author":"tapscott","year":"2017","journal-title":"Harvard Business Review"},{"journal-title":"The internet of trusted things - kaleido insights","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412073"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref7","article-title":"Blockchain challenges and opportunities: A survey","author":"zheng","year":"2016","journal-title":"Work Pap -2016"},{"key":"ref49","article-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake","volume":"19","author":"king","year":"2012","journal-title":"self-published paper"},{"key":"ref9","article-title":"Blockchain in internet of things: challenges and solutions","author":"dorri","year":"0","journal-title":"arXiv preprint arXiv 1608 05140 2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"journal-title":"Mining - bitcoin wiki","year":"0","key":"ref45"},{"journal-title":"51% attack - investopedia","year":"0","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086197"},{"key":"ref42","first-page":"131","article-title":"The tangle","author":"popov","year":"2016","journal-title":"CIT"},{"key":"ref41","article-title":"Understanding blockchain consensus models","author":"baliga","year":"2017","journal-title":"Tech Rep"},{"journal-title":"Hashcash A Denial of Service Countermeasure","year":"2002","author":"back","key":"ref44"},{"key":"ref43","first-page":"258","article-title":"Proofs of work and bread pudding protocols","author":"jakobsson","year":"1999","journal-title":"IET Information Security"}],"event":{"name":"2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES)","start":{"date-parts":[[2018,6,6]]},"location":"Graz","end":{"date-parts":[[2018,6,8]]}},"container-title":["2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410983\/8442074\/08442076.pdf?arnumber=8442076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:35:34Z","timestamp":1643211334000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8442076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":82,"URL":"https:\/\/doi.org\/10.1109\/sies.2018.8442076","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}