{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T20:05:18Z","timestamp":1776197118677,"version":"3.50.1"},"reference-count":177,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100013223","name":"Chongqing Research Program of Basic Research and Frontier Technology","doi-asserted-by":"crossref","award":["cstc2019jcyj-msxmX0681, cstc2017jcyjAX0256, and cstc2018jcyjAX0154"],"award-info":[{"award-number":["cstc2019jcyj-msxmX0681, cstc2017jcyjAX0256, and cstc2018jcyjAX0154"]}],"id":[{"id":"10.13039\/501100013223","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61903056 and 61702066"],"award-info":[{"award-number":["61903056 and 61702066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,11,30]]},"abstract":"<jats:p>Distributed Ledger Technologies (DLTs) and blockchain systems have received enormous academic, government, and commercial interest in recent years. This article surveys the integration of DLTs within another life-changing technology, the Internet of Things (IoT). IoT-based applications, such as smart home, smart transport, supply chain, smart healthcare, and smart energy, promise to boost the efficiency of existing infrastructures and change every facet of our daily life. This article looks into the challenges faced by such applications and reviews a comprehensive selection of existing DLT solutions to those challenges. We also identify issues for future research, including DLT security and scalability, multi-DLT applications, and survival of DLT in the post-quantum world.<\/jats:p>","DOI":"10.1145\/3359982","type":"journal-article","created":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T22:07:36Z","timestamp":1573769256000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Applications of Distributed Ledger Technologies to the Internet of Things"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1168-1599","authenticated-orcid":false,"given":"Qingyi","family":"Zhu","sequence":"first","affiliation":[{"name":"Chongqing University of Posts and Telecommunications and Deakin University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5339-9305","authenticated-orcid":false,"given":"Seng W.","family":"Loke","sequence":"additional","affiliation":[{"name":"Deakin University, Melbourne, Australia"}]},{"given":"Rolando","family":"Trujillo-Rasua","sequence":"additional","affiliation":[{"name":"Deakin University, Melbourne, Australia"}]},{"given":"Frank","family":"Jiang","sequence":"additional","affiliation":[{"name":"Deakin University, Melbourne, Australia"}]},{"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[{"name":"Deakin University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"ITU Internet Reports 2005: The Internet of Things. Retrieved from http:\/\/www.itu.int\/pub\/S-POL-IR.IT-2005\/e.  ITU Internet Reports 2005: The Internet of Things. Retrieved from http:\/\/www.itu.int\/pub\/S-POL-IR.IT-2005\/e."},{"key":"e_1_2_1_2_1","unstructured":"M. Hung. Leading the IoT Reports. Retrieved from https:\/\/www.gartner.com\/imagesrv\/books\/iot\/iotEbook_digital.pdf.  M. Hung. Leading the IoT Reports. Retrieved from https:\/\/www.gartner.com\/imagesrv\/books\/iot\/iotEbook_digital.pdf."},{"key":"e_1_2_1_3_1","volume-title":"Growth Analysis 8 Opportunity Outlook","author":"Market Internet","year":"2023"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2818623"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2863956"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA\u201916)","author":"Conoscenti M."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779263"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"E. F. Jesus V. R. L. Chicarino C. V. N. de Albuquerque etal 2018. A survey of how to use blockchain to secure internet of things and the stalker attack. Security and Communication Networks Article 9675050 (2018) 27 pages.  E. F. Jesus V. R. L. Chicarino C. V. N. de Albuquerque et al. 2018. A survey of how to use blockchain to secure internet of things and the stalker attack. Security and Communication Networks Article 9675050 (2018) 27 pages.","DOI":"10.1155\/2018\/9675050"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18082575"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908780"},{"key":"e_1_2_1_21_1","unstructured":"S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https:\/\/bitcoin.org\/bitcoin.pdf.  S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_2_1_22_1","unstructured":"S. Popov. The Tangle. Retrieved from https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf.  S. Popov. The Tangle. Retrieved from https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf."},{"key":"e_1_2_1_23_1","unstructured":"A. Churyumov. Byteball: A Decentralized System for Storage and Transfer of Value. Retrieved from https:\/\/byteball.org\/Byteball.pdf.  A. Churyumov. Byteball: A Decentralized System for Storage and Transfer of Value. Retrieved from https:\/\/byteball.org\/Byteball.pdf."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00171"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of 1st IEEE International Conference on Peer-to-Peer Computing. 101--102","author":"Schollmeier R.","year":"2001"},{"key":"e_1_2_1_26_1","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media","author":"Antonopoulos A. M.","year":"2014"},{"key":"e_1_2_1_27_1","volume-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published paper","author":"King S.","year":"2012"},{"key":"e_1_2_1_28_1","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"Nguyen G. T.","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"e_1_2_1_29_1","unstructured":"Bitcoin Energy Consumption Index. Retrieved from https:\/\/digiconomist.net\/bitcoin-energy-consumption.  Bitcoin Energy Consumption Index. Retrieved from https:\/\/digiconomist.net\/bitcoin-energy-consumption."},{"key":"e_1_2_1_30_1","unstructured":"V. Buterin. On Stake. Retrieved from https:\/\/blog.ethereum.org\/2014\/07\/05\/stake\/.  V. Buterin. On Stake. Retrieved from https:\/\/blog.ethereum.org\/2014\/07\/05\/stake\/."},{"key":"e_1_2_1_31_1","unstructured":"Nxt Whitepaper. Retrieved from https:\/\/bravenewcoin.com\/assets\/Whitepapers\/NxtWhitepaper-v122-rev4.pdf.  Nxt Whitepaper. Retrieved from https:\/\/bravenewcoin.com\/assets\/Whitepapers\/NxtWhitepaper-v122-rev4.pdf."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs\u201914)","author":"Ghosh M.","year":"2014"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. 173--186","author":"Castro M."},{"key":"e_1_2_1_34_1","unstructured":"Hyperledger. Retrieved from https:\/\/www.hyperledger.org\/.  Hyperledger. Retrieved from https:\/\/www.hyperledger.org\/."},{"key":"e_1_2_1_35_1","volume-title":"The Ripple protocol consensus algorithm","author":"Schwartz D."},{"key":"e_1_2_1_36_1","unstructured":"R3. Retrieved from https:\/\/www.r3.com\/.  R3. Retrieved from https:\/\/www.r3.com\/."},{"key":"e_1_2_1_37_1","unstructured":"Stellar. Retrieved from https:\/\/www.stellar.org\/.  Stellar. Retrieved from https:\/\/www.stellar.org\/."},{"key":"e_1_2_1_38_1","unstructured":"BigChainDB. Retrieved from https:\/\/www.bigchaindb.com\/.  BigChainDB. Retrieved from https:\/\/www.bigchaindb.com\/."},{"key":"e_1_2_1_39_1","unstructured":"Hashgraph. Retrieved from https:\/\/www.hederahashgraph.com\/.  Hashgraph. Retrieved from https:\/\/www.hederahashgraph.com\/."},{"key":"e_1_2_1_40_1","unstructured":"Dagcoin. Retrieved from https:\/\/dogecoin.com\/.  Dagcoin. Retrieved from https:\/\/dogecoin.com\/."},{"key":"e_1_2_1_41_1","unstructured":"V. Buterin V. Griffith. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437.  V. Buterin V. Griffith. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437."},{"key":"e_1_2_1_42_1","unstructured":"The Mixin Network. Retrieved from https:\/\/mixin.one\/.  The Mixin Network. Retrieved from https:\/\/mixin.one\/."},{"key":"e_1_2_1_43_1","volume-title":"Formalizing and securing relationships on public networks. First Monday 2, 9","author":"Szabo N.","year":"1997"},{"key":"e_1_2_1_44_1","unstructured":"V. Buterin. A next-generation smart contract and decentralized application platform. Retrieved from https:\/\/cryptorating.eu\/whitepapers\/Ethereum\/Ethereum_white_paper.pdf.  V. Buterin. A next-generation smart contract and decentralized application platform. Retrieved from https:\/\/cryptorating.eu\/whitepapers\/Ethereum\/Ethereum_white_paper.pdf."},{"key":"e_1_2_1_45_1","unstructured":"Deloitte Blockchain Technology\u2014A game-changer in accounting? Research Reports. Retrieved from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/de\/Documents\/Innovation\/Blockchain_A%20game-changer%20in%20accounting.pdf.  Deloitte Blockchain Technology\u2014A game-changer in accounting? Research Reports. Retrieved from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/de\/Documents\/Innovation\/Blockchain_A%20game-changer%20in%20accounting.pdf."},{"key":"e_1_2_1_46_1","first-page":"1250","article-title":"A survey on security and privacy issues in internet-of-things","volume":"4","author":"Yang Y.","year":"2017","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406325"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021659"},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR\u201918)","author":"Pinto G."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.54"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems. Springer, Cham, 206--220","author":"Maesa D. D. F."},{"key":"e_1_2_1_54_1","first-page":"137","article-title":"A blockchain-based access control for big data","volume":"5","author":"Es-Samaali H.","year":"2017","journal-title":"Int. J. Comput. Netw. Commun. Secur."},{"key":"e_1_2_1_55_1","doi-asserted-by":"crossref","unstructured":"A. Ouaddah A. A. Elkalam and A. A. Ouahman. 2017. Towards a novel privacy-preserving access control model based on blockchain technology. In IoT[M]\/\/Europe and MENA Cooperation: Advances in Information and Communication Technologies. Springer Cham 523--533.  A. Ouaddah A. A. Elkalam and A. A. Ouahman. 2017. Towards a novel privacy-preserving access control model based on blockchain technology. In IoT[M]\/\/Europe and MENA Cooperation: Advances in Information and Communication Technologies. Springer Cham 523--533.","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the 2nd International Conference on the Internet of Things and Data Cloud Computing (ICC\u201917)","author":"Ouaddah A.","year":"2017"},{"key":"e_1_2_1_58_1","first-page":"1594","article-title":"Smart contract-based access control for the Internet of Things","volume":"6","author":"Zhang Y.","year":"2019","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2017.8251003"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"e_1_2_1_61_1","first-page":"1184","article-title":"Blockchain meets IoT: An architecture for scalable access management in IoT","volume":"5","author":"Novo O.","year":"2018","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254521"},{"key":"e_1_2_1_63_1","volume-title":"LSB: A lightweight scalable blockchain for IoT security and privacy. arXiv preprint arXiv:1712.02969","author":"Dorri A.","year":"2017"},{"key":"e_1_2_1_64_1","volume-title":"Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471","author":"Zyskind G.","year":"2015"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 29--36","author":"Hardjono T."},{"key":"e_1_2_1_66_1","unstructured":"A. Moinet B. Darties and J. L. Baril. 2017. Blockchain based trust 8 authentication for decentralized sensor networks. arXiv preprint arXiv:1706.01730 (2017).  A. Moinet B. Darties and J. L. Baril. 2017. Blockchain based trust 8 authentication for decentralized sensor networks. arXiv preprint arXiv:1706.01730 (2017)."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205993"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229569"},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the 2nd International Conference on Crowd Science and Engineering. ACM, 38--43","author":"Lin J."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"e_1_2_1_71_1","unstructured":"J. Groopman and J. Owyang. The Internet of Trusted Things: Blockchain as the Foundation for Autonomous Products 8 Ecosystem Services. Retrieved from http:\/\/www.kaleidoinsights.com\/.  J. Groopman and J. Owyang. The Internet of Trusted Things: Blockchain as the Foundation for Autonomous Products 8 Ecosystem Services. Retrieved from http:\/\/www.kaleidoinsights.com\/."},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the Conference on Security and Privacy in Communication Networks (SecureComm\u201918)","author":"Bochem A."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the Global Internet of Things Summit (GIoTS\u201917)","author":"Kravitz D. W."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2837650"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2853167"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2013.11.007"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2017.1407445"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.06.020"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140649.3140656"},{"key":"e_1_2_1_80_1","volume-title":"Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC\u201917)","author":"Suzuki S."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.50"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.09.074"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0456-1"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016254"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"e_1_2_1_86_1","unstructured":"A. Dorri S. S. Kanhere and R. Jurdak. 2016. Blockchain in internet of things: Challenges and solutions. arXiv preprint arXiv:1608.05187 (2016).  A. Dorri S. S. Kanhere and R. Jurdak. 2016. Blockchain in internet of things: Challenges and solutions. arXiv preprint arXiv:1608.05187 (2016)."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the 2nd International Conference on Internet-of-Things Design and Implementation. ACM, 173--178","author":"Dorri A."},{"key":"e_1_2_1_89_1","volume-title":"Proceedings of the IEEE 2nd International Conference on Information Technology (INCIT\u201917)","author":"Aung Y. N."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18092784"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"e_1_2_1_92_1","first-page":"1832","article-title":"Blockchain-based dynamic key management for heterogeneous intelligent transportation systems","volume":"4","author":"Lei A.","year":"2017","journal-title":"IEEE IoT. J."},{"key":"e_1_2_1_93_1","doi-asserted-by":"crossref","unstructured":"R. A. Michelin A. Dorri R. C. Lunardi etal 2018. SpeedyChain: A framework for decoupling data from blockchain for smart cities. arXiv preprint arXiv:1807.01980 (2018).  R. A. Michelin A. Dorri R. C. Lunardi et al. 2018. SpeedyChain: A framework for decoupling data from blockchain for smart cities. arXiv preprint arXiv:1807.01980 (2018).","DOI":"10.1145\/3286978.3287019"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2777990"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2813422"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.08.016"},{"key":"e_1_2_1_97_1","doi-asserted-by":"crossref","unstructured":"Z. Lu Q. Wang G. Qu etal 2018. Bars: A blockchain-based anonymous reputation system for trust management in vanets. In Proceedings of the 2018 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE\u201918). IEEE 98--103.  Z. Lu Q. Wang G. Qu et al. 2018. Bars: A blockchain-based anonymous reputation system for trust management in vanets. In Proceedings of the 2018 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE\u201918). IEEE 98--103.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292724"},{"key":"e_1_2_1_100_1","first-page":"4601","article-title":"A secure charging scheme for electric vehicles with smart communities in energy blockchain","volume":"6","author":"Su Z.","year":"2018","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_101_1","first-page":"25656","article-title":"Adaptive blockchain-based electric vehicle participation scheme in smart grid platform","volume":"6","author":"Liu C.","year":"2018","journal-title":"IEEE Access"},{"key":"e_1_2_1_102_1","first-page":"1","article-title":"Lnsc: A security model for electric vehicle and charging pile management based on blockchain ecosystem","volume":"99","author":"Huang X.","year":"2018","journal-title":"IEEE Access"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2709784"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700344"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-017-0348-5"},{"key":"e_1_2_1_106_1","doi-asserted-by":"crossref","unstructured":"F. Lamberti V. Gatteschi C. Demartini etal Blockchain or not blockchain that is the question of the insurance and other sectors. IT Pro. (Early Access). DOI: 10.1109\/MITP.2017.265110355    10.1109\/MITP.2017.265110355\nF. Lamberti V. Gatteschi C. Demartini et al. Blockchain or not blockchain that is the question of the insurance and other sectors. IT Pro. (Early Access). DOI: 10.1109\/MITP.2017.265110355","DOI":"10.1109\/MITP.2017.265110355"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2816247"},{"key":"e_1_2_1_108_1","unstructured":"C. Oham S. S. Kanhere R. Jurdak etal 2018. A blockchain based liability attribution framework for autonomous vehicles. arXiv preprint arXiv:1802.05050 (2018).  C. Oham S. S. Kanhere R. Jurdak et al. 2018. A blockchain based liability attribution framework for autonomous vehicles. arXiv preprint arXiv:1802.05050 (2018)."},{"key":"e_1_2_1_109_1","doi-asserted-by":"crossref","unstructured":"C. Oham R. Jurdak S. S. Kanhere etal 2018. B-FICA: BlockChain based framework for auto-insurance claim and adjudication. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) Halifax NS Canada (2018) 1171--1180.  C. Oham R. Jurdak S. S. Kanhere et al. 2018. B-FICA: BlockChain based framework for auto-insurance claim and adjudication. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) Halifax NS Canada (2018) 1171--1180.","DOI":"10.1109\/Cybermatics_2018.2018.00210"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501742"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4121227"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-018-1816-5"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.3390\/info8040137"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.061"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trac.2018.08.011"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph15081627"},{"key":"e_1_2_1_118_1","unstructured":"Skuchain Brackets\u2014Blockchain Technology for Collaborative Commerce. Retrieved from https:\/\/www.skuchain.com\/.  Skuchain Brackets\u2014Blockchain Technology for Collaborative Commerce. Retrieved from https:\/\/www.skuchain.com\/."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0993-7"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0995-5"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2645904"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0982-x"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292361"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846779"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2816306"},{"key":"e_1_2_1_129_1","first-page":"1","article-title":"Secure attribute-based signature scheme with multiple authorities for Blockchain in electronic health records systems","volume":"776","author":"Guo R.","year":"2018","journal-title":"IEEE Access"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806303"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700401"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2727552"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616861"},{"key":"e_1_2_1_134_1","first-page":"3690","article-title":"Consortium blockchain for secure energy trading in industrial internet of things","volume":"14","author":"Li Z.","year":"2018","journal-title":"IEEE Trans. Industr. Inf."},{"key":"e_1_2_1_135_1","doi-asserted-by":"crossref","unstructured":"K. Biswas and V. Muthukkumarasamy. 2016. Securing smart cities using blockchain technology. In Proceedings of the Conference on High Performance Computing and Communications the IEEE 14th International Conference on Smart City and the IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS\u201916). 1392--1393.  K. Biswas and V. Muthukkumarasamy. 2016. Securing smart cities using blockchain technology. In Proceedings of the Conference on High Performance Computing and Communications the IEEE 14th International Conference on Smart City and the IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS\u201916). 1392--1393.","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3120459.3120472"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2816745"},{"key":"e_1_2_1_138_1","volume-title":"Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP\u201918)","author":"Tapas N."},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0528-5"},{"key":"e_1_2_1_140_1","unstructured":"R. M. Parizi A. Dehghantanha K. K. R. Choo etal 2018. Empirical vulnerability analysis of automated smart contracts security testing on blockchains. arXiv preprint arXiv:1809.02702 (2018).  R. M. Parizi A. Dehghantanha K. K. R. Choo et al. 2018. Empirical vulnerability analysis of automated smart contracts security testing on blockchains. arXiv preprint arXiv:1809.02702 (2018)."},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1134\/S1995080218070028"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2018.127"},{"key":"e_1_2_1_143_1","volume-title":"Proceedings of the IEEE International Solid- State Circuits Conference (ISSCC\u201919)","author":"Banerjee U."},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"e_1_2_1_145_1","first-page":"3","article-title":"Standard lattice-based key encapsulation on embedded devices","volume":"2018","author":"Howe James","year":"2018","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3226062"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.3390\/quantum1010002"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2016.40"},{"key":"e_1_2_1_150_1","unstructured":"Dapp statistics. Retrieved from https:\/\/www.stateofthedapps.com\/stats.  Dapp statistics. Retrieved from https:\/\/www.stateofthedapps.com\/stats."},{"key":"e_1_2_1_151_1","unstructured":"Hyperledger Fabric. Retrieved from https:\/\/www.hyperledger.org\/projects\/fabric.  Hyperledger Fabric. Retrieved from https:\/\/www.hyperledger.org\/projects\/fabric."},{"key":"e_1_2_1_152_1","unstructured":"IBM Watson IoT Platform. Retrieved from https:\/\/www.ibm.com\/internet-of-things\/solutions\/iot-platform\/watson-iot-platform.  IBM Watson IoT Platform. Retrieved from https:\/\/www.ibm.com\/internet-of-things\/solutions\/iot-platform\/watson-iot-platform."},{"key":"e_1_2_1_153_1","unstructured":"Hyperledger Burrow. Retrieved from https:\/\/www.hyperledger.org\/projects\/hyperledger-burrow.  Hyperledger Burrow. Retrieved from https:\/\/www.hyperledger.org\/projects\/hyperledger-burrow."},{"key":"e_1_2_1_154_1","unstructured":"Hyperledger Indy. Retrieved from https:\/\/www.hyperledger.org\/projects\/hyperledger-indy.  Hyperledger Indy. Retrieved from https:\/\/www.hyperledger.org\/projects\/hyperledger-indy."},{"key":"e_1_2_1_155_1","unstructured":"Hyperledger Iroha. Retrieved from https:\/\/www.hyperledger.org\/projects\/iroha.  Hyperledger Iroha. Retrieved from https:\/\/www.hyperledger.org\/projects\/iroha."},{"key":"e_1_2_1_156_1","unstructured":"Hyperledger Sawtooth. Retrieved from https:\/\/www.hyperledger.org\/projects\/sawtooth.  Hyperledger Sawtooth. Retrieved from https:\/\/www.hyperledger.org\/projects\/sawtooth."},{"key":"e_1_2_1_157_1","unstructured":"Hyperledger Grid. Retrieved from https:\/\/www.hyperledger.org\/projects\/grid.  Hyperledger Grid. Retrieved from https:\/\/www.hyperledger.org\/projects\/grid."},{"key":"e_1_2_1_158_1","unstructured":"Statistics of IOTA. Retrieved from https:\/\/thetangle.org\/live.  Statistics of IOTA. Retrieved from https:\/\/thetangle.org\/live."},{"key":"e_1_2_1_159_1","unstructured":"IoT Chain. Retrieved from https:\/\/iotchain.io\/.  IoT Chain. Retrieved from https:\/\/iotchain.io\/."},{"key":"e_1_2_1_160_1","unstructured":"IoTex. Retrieved from https:\/\/iotex.io\/.  IoTex. Retrieved from https:\/\/iotex.io\/."},{"key":"e_1_2_1_161_1","unstructured":"Bitshares. Retrieved from https:\/\/bitshares.org\/.  Bitshares. Retrieved from https:\/\/bitshares.org\/."},{"key":"e_1_2_1_162_1","volume-title":"Proceedings of the 40th Annual Symposium on Foundations of Computer Science. IEEE, 120--130","author":"Micali S."},{"key":"e_1_2_1_163_1","unstructured":"HDAC. Retrieved from https:\/\/www.hdactech.com\/en\/ index.do.  HDAC. Retrieved from https:\/\/www.hdactech.com\/en\/ index.do."},{"key":"e_1_2_1_164_1","unstructured":"Streamr. Retrieved from https:\/\/www.streamr.com\/.  Streamr. Retrieved from https:\/\/www.streamr.com\/."},{"key":"e_1_2_1_165_1","unstructured":"Atonomi. Retrieved from https:\/\/atonomi.io\/.  Atonomi. Retrieved from https:\/\/atonomi.io\/."},{"key":"e_1_2_1_166_1","unstructured":"Ambrosus. Retrieved from https:\/\/ambrosus.com\/.  Ambrosus. Retrieved from https:\/\/ambrosus.com\/."},{"key":"e_1_2_1_167_1","unstructured":"OriginTrail. Retrieved from https:\/\/origintrail.io\/.  OriginTrail. Retrieved from https:\/\/origintrail.io\/."},{"key":"e_1_2_1_168_1","unstructured":"Grid+. Retrieved from https:\/\/gridplus.io\/.  Grid+. Retrieved from https:\/\/gridplus.io\/."},{"key":"e_1_2_1_169_1","unstructured":"Power Ledger. Retrieved from https:\/\/www.powerledger.io\/.  Power Ledger. Retrieved from https:\/\/www.powerledger.io\/."},{"key":"e_1_2_1_170_1","unstructured":"EcoChain. Retrieved from https:\/\/ecochain.com\/.  EcoChain. Retrieved from https:\/\/ecochain.com\/."},{"key":"e_1_2_1_171_1","unstructured":"Doc.ai. Retrieved from https:\/\/doc.ai\/.  Doc.ai. Retrieved from https:\/\/doc.ai\/."},{"key":"e_1_2_1_172_1","unstructured":"How Bumble Bee Uses Blockchain to Track and Trace Your Fish? Retrieved from https:\/\/www.forbes.com\/sites\/sap\/2019\/03\/11\/video-how-bumble-bee-uses-blockchain-to-track-and-trace-your-fish\/#5c05ae7f3690.  How Bumble Bee Uses Blockchain to Track and Trace Your Fish? Retrieved from https:\/\/www.forbes.com\/sites\/sap\/2019\/03\/11\/video-how-bumble-bee-uses-blockchain-to-track-and-trace-your-fish\/#5c05ae7f3690."},{"key":"e_1_2_1_173_1","unstructured":"Veracity Protocol. Retrieved from https:\/\/veracityprotocol.org\/.  Veracity Protocol. Retrieved from https:\/\/veracityprotocol.org\/."},{"key":"e_1_2_1_174_1","unstructured":"Pairing AI with Optical Scanning for Real-World Product Authentication. Retrieved from https:\/\/www.ibm.com\/blogs\/research\/2018\/05\/ai-authentication-verifier\/.  Pairing AI with Optical Scanning for Real-World Product Authentication. Retrieved from https:\/\/www.ibm.com\/blogs\/research\/2018\/05\/ai-authentication-verifier\/."},{"key":"e_1_2_1_175_1","unstructured":"Different Types of Blockchains in the Market and Why We Need Them? Retrieved from https:\/\/coinsutra.com\/different-types-blockchains\/.  Different Types of Blockchains in the Market and Why We Need Them? Retrieved from https:\/\/coinsutra.com\/different-types-blockchains\/."},{"key":"e_1_2_1_176_1","unstructured":"ISO\/TC 307. Retrieved from https:\/\/www.iso.org\/committee\/6266604.html.  ISO\/TC 307. Retrieved from https:\/\/www.iso.org\/committee\/6266604.html."},{"key":"e_1_2_1_177_1","unstructured":"IEEE Standrds. Retrieved from https:\/\/blockchain.ieee.org\/standards.  IEEE Standrds. Retrieved from https:\/\/blockchain.ieee.org\/standards."},{"key":"e_1_2_1_178_1","unstructured":"Blocknet. Retrieved from https:\/\/blocknet.co\/.  Blocknet. Retrieved from https:\/\/blocknet.co\/."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:27Z","timestamp":1750202007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359982"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":177,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11,30]]}},"alternative-id":["10.1145\/3359982"],"URL":"https:\/\/doi.org\/10.1145\/3359982","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}