{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:50:20Z","timestamp":1774536620278,"version":"3.50.1"},"reference-count":106,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T00:00:00Z","timestamp":1746835200000},"content-version":"vor","delay-in-days":129,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Blockchain technology, renowned for its foundational attributes of decentralization, security, and immutability, offers substantial potential for diverse applications. At the heart of blockchain functionality are consensus mechanisms, crucial for preserving the decentralized integrity of the network. However, traditional consensus algorithms like Proof of Work (PoW), Proof of Stake (PoS), and Byzantine Fault Tolerance (BFT) typically require significant computational and communication resources, which may not be feasible for resource\u2010limited environments. The purpose of this paper is to explore hybrid consensus algorithms that integrate conventional consensus mechanisms with advanced nonlinear data structures. We comprehensively analyze a wide range of hybrid consensus mechanisms, emphasizing their architectural design, operational efficiencies, and ability to address both consensus\u2010specific vulnerabilities and network\u2010level threats, such as Sybil attacks, double\u2010spending, and partitioning attacks. To achieve this, we employ a set of comprehensive evaluation criteria for blockchain technologies, namely, validation, IoT, real\u2010time processing, application suitability, security, and implementation. These criteria help assess the adaptability and efficacy of each mechanism in diverse operational contexts. Through this examination, the paper seeks to illuminate the significant contributions and implications of hybrid consensus mechanisms, guiding stakeholders, researchers, and developers toward making informed decisions about optimizing blockchain technology for their specific needs and inspiring the development of innovative solutions.<\/jats:p>","DOI":"10.1155\/int\/5821997","type":"journal-article","created":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T03:55:12Z","timestamp":1746849312000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Hybrid Consensus Mechanisms in Blockchain: A Comprehensive Review"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2585-4841","authenticated-orcid":false,"given":"Ali Ahmed","family":"Al-awamy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1705-5756","authenticated-orcid":false,"given":"Nagi","family":"Al-shaibany","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0878-2919","authenticated-orcid":false,"given":"Axel","family":"Sikora","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0641-6974","authenticated-orcid":false,"given":"Dominik","family":"Welte","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,5,10]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2023.3302955"},{"key":"e_1_2_10_2_2","unstructured":"HeoH. WooS. YoonT. KangM. andShinS. Partitioning Ethereum Without Eclipsing it Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS) 2023 The Internet Society https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2023\/02\/ndss2023_f465_paper.pdf."},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2020.3048853"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114384"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/cmsf2023006007"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13042604"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100585"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22041304"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-323-99199-5.00007-0"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2981415"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1049\/blc2.12007"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22218188"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.006"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100212"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.09.004"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21229-1_19"},{"key":"e_1_2_10_18_2","first-page":"101","article-title":"A Survey about Consensus Algorithms Used in Blockchain","volume":"14","author":"Nguyen G. T.","year":"2018","journal-title":"Journal of Information Processing Systems"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2023.0140296"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.23032"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"GedamM. G.andKarmoreS. Blockchain-Based IoT: A Comprehensive Review of Technology Integration Security and Scalability Proceedings of the Conference on Advances in Computing and Communication 2024 395\u2013406 https:\/\/doi.org\/10.1007\/978-981-97-0180-3_31.","DOI":"10.1007\/978-981-97-0180-3_31"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100344"},{"key":"e_1_2_10_23_2","first-page":"48798","article-title":"Blockchain Consensus Algorithms: A Survey","volume":"8","author":"Ferdous M. S.","year":"2020","journal-title":"IEEE Access"},{"key":"e_1_2_10_24_2","first-page":"15","article-title":"Survey on Private Blockchain Consensus Algorithms","volume":"176","author":"Pahlajani S.","year":"2020","journal-title":"International Journal of Computer Applications"},{"key":"e_1_2_10_25_2","first-page":"12","article-title":"A Survey of Consensus Algorithms for Blockchain Technology","volume":"3","author":"Alsunaidi S. J.","year":"2022","journal-title":"International Journal of Blockchain and Distributed Ledger Technology"},{"key":"e_1_2_10_26_2","first-page":"312","article-title":"A Survey of Consensus Algorithms in Public Blockchain Systems for Cryptocurrencies","volume":"12848","author":"Ferdous M. S.","year":"2022","journal-title":"Springer Lecture Notes in Computer Science"},{"key":"e_1_2_10_27_2","first-page":"15","article-title":"Consensus Algorithms in Blockchain Technology: A Survey","volume":"15","author":"Sharma K.","year":"2021","journal-title":"International Journal of Information Security and Privacy"},{"key":"e_1_2_10_28_2","volume-title":"Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform","author":"Buterin V.","year":"2013"},{"key":"e_1_2_10_29_2","volume-title":"Bitcoin: A Peer-To-Peer Electronic Cash System","author":"Nakamoto S."},{"key":"e_1_2_10_30_2","volume-title":"Bitcoin and Cryptocurrency Technologies: Introduction to the Book","author":"Narayanan A.","year":"2016"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.3390\/math11102248"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2973178"},{"key":"e_1_2_10_33_2","article-title":"A Survey of Blockchain Consensus Algorithms Performance Evaluation Criteria","volume":"154","author":"Bamakan S. M. H.","year":"2023","journal-title":"Expert Systems With Applications"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4148"},{"key":"e_1_2_10_35_2","volume-title":"Feasibility of Proof of Authority as a Consensus Protocol Model","author":"Joshi S.","year":"2021"},{"key":"e_1_2_10_36_2","first-page":"395","volume-title":"Advances in Intelligent Systems and Computing","author":"Sriman B.","year":"2021"},{"key":"e_1_2_10_37_2","doi-asserted-by":"crossref","unstructured":"NatoliC.andGramoliV. The Balance Attack or Why Forkable Blockchains Are Ill-Suited for Consortium Proceedings-47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks DSN 2017 2017 IEEE 579\u2013590.","DOI":"10.1109\/DSN.2017.44"},{"key":"e_1_2_10_38_2","article-title":"Hybrid Consensus Algorithm Optimization: A Mathematical Method Based on POS and PBFT and its Application in Blockchain","author":"Wu Y.","year":"2020","journal-title":"Mathematical Problems in Engineering 2020"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"key":"e_1_2_10_40_2","volume-title":"Algorand: The Efficient and Democratic Ledger","author":"Micali S.","year":"2016"},{"key":"e_1_2_10_41_2","first-page":"173","article-title":"Practical Byzantine Fault Tolerance","volume":"99","author":"Castro M.","year":"1999","journal-title":"OSDI"},{"key":"e_1_2_10_42_2","volume-title":"Tendermint: Byzantine Fault Tolerance in the Age of Blockchains","author":"Buchman E.","year":"2018"},{"key":"e_1_2_10_43_2","doi-asserted-by":"crossref","unstructured":"WesterkampM.andDiezM. Verilay: A Verifiable Proof of Stake Chain Relay IEEE International Conference on Blockchain and Cryptocurrency ICBC 2022 2022 IEEE 7\u201310.","DOI":"10.1109\/ICBC54727.2022.9805554"},{"key":"e_1_2_10_44_2","volume-title":"Towards a Fully Decentralized Cross-Blockchain Transfer Protocol","author":"Zhang R.","year":"2020"},{"key":"e_1_2_10_45_2","first-page":"759","article-title":"Interledger Protocol for Blockchain Interoperability","volume":"9","author":"Kochovski P.","year":"2021","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_2_10_46_2","volume-title":"Verilay: A Verifiable Proof of Stake Chain Relay","author":"Li Y.","year":"2020"},{"key":"e_1_2_10_47_2","first-page":"85","article-title":"Performance Analysis of Blockchain-Based Systems: Current Status and Future Perspectives","volume":"136","author":"Wang H.","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"e_1_2_10_49_2","volume-title":"SoK: Decentralized Finance (DeFi)","author":"Werner S.","year":"2021"},{"key":"e_1_2_10_50_2","first-page":"91","article-title":"Cryptocurrencies and Decentralized Finance","volume":"36","author":"Makarov I.","year":"2022","journal-title":"The Journal of Economic Perspectives"},{"key":"e_1_2_10_51_2","volume-title":"Non-Fungible Tokens (NFTs): Applications and Challenges","author":"Ali H.","year":"2021"},{"key":"e_1_2_10_52_2","first-page":"20","article-title":"Blockchain and Multi-Access Edge Computing: Emerging Trends and Challenges","volume":"58","author":"Zhang H.","year":"2020","journal-title":"IEEE Communications Magazine"},{"key":"e_1_2_10_53_2","unstructured":"KimM. SeoJ. AslamM. NaW. andKimS. Blockchain-Based Data Provenance for IoT Applications in Smart Home Environments Proceedings of the IEEE Conference on Blockchain 2018 1350\u20131355."},{"key":"e_1_2_10_54_2","article-title":"Hedera Hashgraph: Applications and Performance in the Real World","author":"Baird L.","year":"2019","journal-title":"IEEE Blockchain"},{"key":"e_1_2_10_55_2","first-page":"123","article-title":"Performance and Scalability Analysis of Blockchain Consensus Mechanisms","volume":"9","author":"Garg A.","year":"2020","journal-title":"Journal of Emerging Technologies"},{"key":"e_1_2_10_56_2","first-page":"1","article-title":"Hashgraph vs Blockchain: A Comprehensive Analysis of Consensus Algorithms","volume":"4","author":"Wang M.","year":"2020","journal-title":"Journal of Distributed Ledger Technology"},{"key":"e_1_2_10_57_2","first-page":"16520","article-title":"Blockchain-Based MEC Networks: Enhancing Security and Scalability","volume":"9","author":"Xu K.","year":"2021","journal-title":"IEEE Access"},{"key":"e_1_2_10_58_2","unstructured":"SharmaP.andKumarR. Integration of MEC and Blockchain for Secure and Scalable IoT Applications Proceedings of the 2020 International Conference on Internet of Things (IoT) ACM 2020 56\u201361."},{"key":"e_1_2_10_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3279108"},{"key":"e_1_2_10_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109337"},{"key":"e_1_2_10_61_2","first-page":"3602","article-title":"Blockchain for IoT: An Energy-Efficient Consensus Algorithm for Resource-Constrained Devices","volume":"8","author":"Zhang J.","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_2_10_62_2","first-page":"345","article-title":"Combining Proof-of-Work and Proof-of-Authority for Scalable and Secure IoT Blockchain Applications","volume":"100","author":"Wang Y.","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"e_1_2_10_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/percomw.2017.7917634"},{"key":"e_1_2_10_64_2","first-page":"1046","article-title":"Security and Privacy Challenges in IoT: Blockchain-Based Solutions","volume":"22","author":"Gao L.","year":"2020","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_2_10_65_2","article-title":"Secure Blockchain-Based Framework for IoT Data Integrity and Efficiency","volume":"21","author":"Ali M.","year":"2021","journal-title":"Sensors"},{"key":"e_1_2_10_66_2","article-title":"Efficient Blockchain Consensus for IoT Networks: A Comparative Study","volume":"159","author":"Xu W.","year":"2020","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_2_10_67_2","article-title":"Lightweight Blockchain Protocols for Secure IoT Systems: A Survey","volume":"110","author":"Zhang B.","year":"2021","journal-title":"Computers & Security"},{"key":"e_1_2_10_68_2","volume-title":"Data Quality Challenges in Blockchain. Blockchain: Technologies and Applications for Industry 40","author":"Xu X.","year":"2019"},{"key":"e_1_2_10_69_2","first-page":"2524","article-title":"Verifiable Random Function (VRF) Based Committee Selection for Lightweight IoT Consensus","volume":"17","author":"Wang Q.","year":"2020","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"e_1_2_10_70_2","first-page":"103422","article-title":"Blockchain for IoT: A Survey on Lightweight Consensus Mechanisms","volume":"9","author":"Mukherjee S.","year":"2021","journal-title":"IEEE Access"},{"key":"e_1_2_10_71_2","article-title":"A Lightweight and Secure Blockchain Framework for IoT-Based Applications","volume":"182","author":"Gao L.","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_2_10_72_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11172694"},{"key":"e_1_2_10_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1488-1_9"},{"key":"e_1_2_10_74_2","doi-asserted-by":"crossref","unstructured":"KumarR. LachureJ. andDoriyaR. Hybrid Consensus Approach for Blockchain Based Vehicular Communication 2022 Second International Conference on Power Control and Computing Technologies (ICPC2T) 2022 IEEE 1\u20136.","DOI":"10.1109\/ICPC2T53885.2022.9776995"},{"key":"e_1_2_10_75_2","doi-asserted-by":"crossref","unstructured":"PutraD. S. K.andAmiruddinA. A Proposed Architecture for the Indonesia\u2019s National Blockchain 2023 IEEE International Conference on Cryptography Informatics and Cybersecurity (ICoCICs) 2023 230\u2013235 https:\/\/doi.org\/10.1109\/icocics58778.2023.10277291.","DOI":"10.1109\/ICoCICs58778.2023.10277291"},{"key":"e_1_2_10_76_2","first-page":"45","article-title":"The IOTA Consensus Mechanism: Exploring DAG and Proof of Stake for IoT Networks","volume":"5","author":"Popov S.","year":"2023","journal-title":"Journal of Blockchain Technology"},{"key":"e_1_2_10_77_2","volume-title":"Casper the Friendly Finality Gadget","author":"Buterin V.","year":"2017"},{"key":"e_1_2_10_78_2","volume-title":"Master\u2019s Thesis","author":"Buchman E.","year":"2016"},{"key":"e_1_2_10_79_2","volume-title":"The Tangle","author":"Popov S.","year":"2017"},{"key":"e_1_2_10_80_2","doi-asserted-by":"crossref","unstructured":"AndroulakiE. BargerA. BortnikovV.et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains Proceedings of the 13th EuroSys Conference 2018 1\u201315 https:\/\/dl.acm.org\/doi\/10.1145\/3190508.3190538.","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_2_10_81_2","first-page":"3258","article-title":"Hierarchical Lightweight High-Throughput Blockchain for Industrial Internet Data Security, Computer Integrated Manufacturing Systems","volume":"25","author":"Xu X.","year":"2019","journal-title":"Computer Integrated Manufacturing System"},{"key":"e_1_2_10_82_2","article-title":"Vechain Blockchain Technology for Supply Chain Management","volume":"10","author":"Hou H.","year":"2018","journal-title":"Future Internet"},{"key":"e_1_2_10_83_2","doi-asserted-by":"crossref","unstructured":"DorriA.andJurdakR. Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications 2020 IEEE 45th Conference on Local Computer Networks (LCN) 2020 369\u2013372 https:\/\/doi.org\/10.1109\/lcn48667.2020.9314831.","DOI":"10.1109\/LCN48667.2020.9314831"},{"key":"e_1_2_10_84_2","doi-asserted-by":"publisher","DOI":"10.3390\/app112211011"},{"key":"e_1_2_10_85_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-022-00880-6"},{"key":"e_1_2_10_86_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi12080122"},{"key":"e_1_2_10_87_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25734-6_16"},{"key":"e_1_2_10_88_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym15061264"},{"key":"e_1_2_10_89_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2665925"},{"key":"e_1_2_10_90_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi13110285"},{"key":"e_1_2_10_91_2","volume-title":"A New Hybrid Consensus Protocol: Deterministic Proof of Work","author":"Cheng Z.","year":"2018"},{"key":"e_1_2_10_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59016-1_66"},{"key":"e_1_2_10_93_2","doi-asserted-by":"crossref","unstructured":"DingZ. DongX. ShenJ. andCaoZ. A Hybrid Double-Layer BFT Consensus Protocol for Large-Scale IoT Blockchain 2022 2nd International Conference on Frontiers of Electronics Information and Computation Technologies (ICFEICT) 2022 354\u2013361 https:\/\/doi.org\/10.1109\/icfeict57213.2022.00071.","DOI":"10.1109\/ICFEICT57213.2022.00071"},{"key":"e_1_2_10_94_2","doi-asserted-by":"crossref","unstructured":"PanY. WeiW. LiuY. andZhuC. Hybrid Consensus Algorithm Based on Hierarchy Authority 2021 IEEE International Conference on Electronic Technology Communication and Information (ICETCI) 2021 553\u2013559 https:\/\/doi.org\/10.1109\/icetci53161.2021.9563559.","DOI":"10.1109\/ICETCI53161.2021.9563559"},{"key":"e_1_2_10_95_2","doi-asserted-by":"crossref","unstructured":"LiuY. TanT. andZhuoY. Hybrid Consensus Protocols and Security Analysis for Blockchain 2022 International Conference on Data Analytics Computing and Artificial Intelligence (ICDACAI) 2022 IEEE 191\u2013195.","DOI":"10.1109\/ICDACAI57211.2022.00046"},{"key":"e_1_2_10_96_2","volume-title":"The Swirlds Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerant","author":"Baird L.","year":"2016"},{"key":"e_1_2_10_97_2","doi-asserted-by":"crossref","unstructured":"SaadM. AnwarA. RaviS. andMohaisenD. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021 988\u20131005 https:\/\/doi.org\/10.1145\/3460120.3484561.","DOI":"10.1145\/3460120.3484561"},{"key":"e_1_2_10_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2975999"},{"key":"e_1_2_10_99_2","unstructured":"De AngelisS. AnielloL. BaldoniR. LombardiF. MargheriA. andSassoneV. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain Proceedings of Italian Conference on Cyber Security (ITASEC) 2018 Milan Italy."},{"key":"e_1_2_10_100_2","volume-title":"SoK: Consensus in the Age of Blockchains","author":"Bano S.","year":"2017"},{"key":"e_1_2_10_101_2","article-title":"The Swirlds Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerance","author":"Baird L.","year":"2016","journal-title":"Swirlds Tech Report"},{"key":"e_1_2_10_102_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4413290"},{"key":"e_1_2_10_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.10539974"},{"key":"e_1_2_10_104_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03746-5"},{"key":"e_1_2_10_105_2","doi-asserted-by":"crossref","unstructured":"SaadM. ChenS. andMohaisenD. SyncAttack: Double-Spending in Bitcoin Without Mining Power Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021 1668\u20131685 https:\/\/doi.org\/10.1145\/3460120.3484568.","DOI":"10.1145\/3460120.3484568"},{"key":"e_1_2_10_106_2","article-title":"Secure and Efficient Blockchain-Based IoT Framework Using Consensus Mechanism","volume":"20","author":"Liu Y.","year":"2020","journal-title":"Sensors"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/5821997","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/int\/5821997","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/5821997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T18:00:17Z","timestamp":1772992817000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/5821997"}},"subtitle":[],"editor":[{"given":"Stefano","family":"Cirillo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":106,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/int\/5821997"],"URL":"https:\/\/doi.org\/10.1155\/int\/5821997","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-07-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5821997"}}