{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:35:56Z","timestamp":1773804956350,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2024,1,1]]},"DOI":"10.1587\/transcom.2023ebp3059","type":"journal-article","created":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T22:28:02Z","timestamp":1694471282000},"page":"185-196","source":"Crossref","is-referenced-by-count":2,"title":["MSLT: A Scalable Solution for Blockchain Network Transport Layer Based on Multi-Scale Node Management"],"prefix":"10.23919","volume":"E107.B","author":[{"given":"Longle","family":"CHENG","sequence":"first","affiliation":[{"name":"Hefei Institute of Physical Science, Chinese Academy of Sciences"}]},{"given":"Xiaofeng","family":"LI","sequence":"additional","affiliation":[{"name":"Hefei Institute of Physical Science, Chinese Academy of Sciences"}]},{"given":"Haibo","family":"TAN","sequence":"additional","affiliation":[{"name":"Hefei Institute of Physical Science, Chinese Academy of Sciences"}]},{"given":"He","family":"ZHAO","sequence":"additional","affiliation":[{"name":"Hefei Institute of Physical Science, Chinese Academy of Sciences"}]},{"given":"Bin","family":"YU","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] Y. Yuan and F. Wang, \u201cBlockchain: The state of the art and future trends,\u201d Acta Automatica Sinica, vol.42, no.4, pp.481-494 2016. https:\/\/doi.org\/10.16383\/j.aas.2016.c160158 10.16383\/j.aas.2016.c160158"},{"key":"2","unstructured":"[2] H.B. Tan, T. Zhou, H. Zhao, Z. Zhao, W.D. Wang, Z.X. Zhang, N.Z. Sheng, and X.F. Li, \u201cArchival data protection and sharing method based on blockchain,\u201d J. Softw. (China), vol.30, no.9, pp.2620-2635 2019. https:\/\/doi.org\/10.13328\/j.cnki.jos.005770 10.13328\/j.cnki.jos.005770"},{"key":"3","unstructured":"[3] S. Zeng, R. Huo, T. Huang, J. Liu, S. Wang, and W. Feng, \u201cSurvey of blockchain: Principle, progress and application,\u201d Journal on Communications, vol.41, no.1, pp.134-151, 2020. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2020027 10.11959\/j.issn.1000-436x.2020027"},{"key":"4","unstructured":"[4] C. Pan, Z. Liu, Z. Liu, and Y. Long, \u201cResearch on scalability of blockchain technology: Problems and methods,\u201d Journal of Computer Research and Development, vol.55, no.10, pp.2099-2110, 2018. https:\/\/doi.org\/10.7544\/issn1000-1239.2018.20180440 10.7544\/issn1000-1239.2018.20180440"},{"key":"5","unstructured":"[5] Z. Sun, X. Zhang, F. Xiang, and L. Chen, \u201cSurvey of storage scalability on blockchain,\u201d J. Softw. (China), vol.32, no.1, pp.1-20, 2021. https:\/\/doi.org\/10.13328\/j.cnki.jos.006111 10.13328\/j.cnki.jos.006111"},{"key":"6","unstructured":"[6] Y. Wu and J. Li, \u201cEvolution process of blockchain P2P network protocol,\u201d Application Research of Computers, vol.36, no.10, pp.2881-2886, 2019. https:\/\/doi.org\/10.19734\/j.issn.1001-3695.2018.07.0365 10.19734\/j.issn.1001-3695.2018.07.0365"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] H. Barjini, M. Othman, H. Ibrahim, and N.I. Udzir, \u201cShortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks,\u201d Peer-to-Peer Netw. Appl., vol.5, no.1, pp.1-13, 2012. https:\/\/doi.org\/10.1007\/s12083-011-0101-y 10.1007\/s12083-011-0101-y","DOI":"10.1007\/s12083-011-0101-y"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] R. Gaeta and M. Sereno, \u201cGeneralized probabilistic flooding in unstructured peer-to-peer networks,\u201d IEEE Trans. Parallel Distrib. Syst., vol.22, no.12, pp.2055-2062, 2011. https:\/\/doi.org\/10.1109\/TPDS.2011.82 10.1109\/TPDS.2011.82","DOI":"10.1109\/TPDS.2011.82"},{"key":"9","unstructured":"[9] A.D. Liu, X.H. Du, N, Wang, and S.Z. Li, \u201cResearch progress of blockchain technology and its application in information security,\u201d J. Softw. (China), vol.29, no.7, pp.2092-2115, 2018. https:\/\/doi.org\/10.13328\/j.cnki.jos.005589 10.13328\/j.cnki.jos.005589"},{"key":"10","unstructured":"[10] S. Nakamoto, \u201cBitcoin: A peer-to-peer electronic cash system,\u201d Technical Report, Manubot, 2019."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] S. Delgado-Segura, C. Perez-Sola, J. Herrera-Joancomarti, G. Navarro-Arribas, and J. Borrell, \u201cCryptocurrency networks: A new P2P paradigm,\u201d Mobile Information Systems, vol.2018, pp.1-16, 2018. https:\/\/doi.org\/10.1155\/2018\/2159082 10.1155\/2018\/2159082","DOI":"10.1155\/2018\/2159082"},{"key":"12","unstructured":"[12] A. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies, O&apos;Reilly Media, pp.32-40, 2014."},{"key":"13","unstructured":"[13] P2P Network, 2018. [Online]. Available: https:\/\/developer.bitcoin.org\/reference\/p2p_networking.html"},{"key":"14","unstructured":"[14] G. Wood, \u201cEthereum: A secure decentralised generalised transaction ledger,\u201d Ethereum Project Yellow Paper, vol.151, no.2014, pp.1-32, 2014. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"key":"15","unstructured":"[15] Y. Yan, K. Zheng, and Z. Guo, Detailed Explanation and Actual Combat of Ethereum Technology, China Machine Press, pp.1-14, 2018."},{"key":"16","unstructured":"[16] S. Katkuri, \u201cA survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements,\u201d arXiv preprint arXiv:1808.03380, 2018. https:\/\/doi.org\/10.48550\/arXiv.1808.03380 10.48550\/arXiv.1808.03380"},{"key":"17","unstructured":"[17] A. Clifford, Towards Massive On-Chain Scaling: Block Propagation Results with Xthin, Medium, Np, 4, 2016."},{"key":"18","unstructured":"[18] D. Ding, X. Jiang, J. Wang, H. Wang, X. Zhang, and Y. Sun, \u201cTxilm: Lossy block compression with salted short hashing,\u201d arXiv. arXiv:1906.06500, 2019. 10.48550\/arXiv.1906.06500"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] D. Leung, A. Suhl, Y. Gilad, and N. Zeldovich, \u201cVault: Fast bootstrapping for the algorand cryptocurrency,\u201d 26th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA2019, pp.24-27, Feb. 2019. 10.14722\/ndss.2019.23313","DOI":"10.14722\/ndss.2019.23313"},{"key":"20","unstructured":"[20] R. Matheson, \u201cA faster, more efficient cryptocurrency,\u201d 2019. [Online]. Available: http:\/\/news.mit.edu\/2019\/vault-faster-more-efficient-cryptocurrency-0124"},{"key":"21","unstructured":"[21] Harmony Technical Whitepaper, 2020. [Online]. Available: https:\/\/harmony.one\/whitepaper.pdf"},{"key":"22","unstructured":"[22] QUIC, a multiplexed transport over UDP. [Online]. Available: https:\/\/www.chromium.org\/quic\/"},{"key":"23","unstructured":"[23] EOS Whitepaper. [Online]. Available: https:\/\/eos.io\/documents\/EOS_An_Introduction.pdf"},{"key":"24","unstructured":"[24] Bitcoin&apos;s \u2018Nervous System\u2019 Gets an Upgrade with FIBRE Network. [Online]. Available: https:\/\/www.coindesk.com\/markets\/2016\/07\/21\/bitcoins-nervous-system-gets-an-upgrade-with-fibre-network\/"},{"key":"25","unstructured":"[25] U. Klarman, S. Basu, A. Kuzmanovic, and E. Sirer, \u201cbloXroute: A scalable trustless blockchain distribution network whitepaper,\u201d IEEE Internet Things J., 2018."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] H. Yang, M.D. Liu, B.C. Li, and Z.Q. Dong, \u201cA P2P network framework for interactive streaming media,\u201d 11th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, pp.288-292, Aug. 2019. 10.1109\/ihmsc.2019.10162","DOI":"10.1109\/IHMSC.2019.10162"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] R.T. Frahat, M.M. Monowar, and S.M. Buhari, \u201cSecure and scalable trust management model for IoT P2P network,\u201d 2nd International Conference on Computer Applications and Information Security (ICCAIS), Riyadh, Saudi Arabia, pp.1-6, May 2019. 10.1109\/cais.2019.8769467","DOI":"10.1109\/CAIS.2019.8769467"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] B. Yu, X.F. Li, H. Zhao, and T. Zhou, \u201cA scalable blockchain network model with transmission paths and neighbor node subareas,\u201d Computing, vol.104, no.10, pp.2253-2277, 2022. https:\/\/doi.org\/10.1007\/s00607-021-00913-1 10.1007\/s00607-021-00913-1","DOI":"10.1007\/s00607-021-00913-1"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] J.Z. Li, X.F. Li, H. Zhao, B. Yu, T. Zhou, H.T. Cheng, and N.Z. Sheng, \u201cMANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm,\u201d Peer-to-Peer Netw. Appl., vol.16, pp.226-244, 2023. https:\/\/doi.org\/10.1007\/s12083-022-01373-w 10.1007\/s12083-022-01373-w","DOI":"10.1007\/s12083-022-01373-w"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] M.E.J. Newman, \u201cDetecting community structure in networks,\u201d Eur. Phys. J. B, vol.38, no.2, pp.321-330, 2004. 10.1140\/epjb\/e2004-00124-y","DOI":"10.1140\/epjb\/e2004-00124-y"},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] H.Y. Shen and C.Z. Xu, \u201cElastic routing table with provable performance for congestion control in DHT networks,\u201d IEEE Trans. Parallel Distrib. Syst., vol.21, no.2, pp.242-256 2010. https:\/\/doi.org\/10.1109\/TPDS.2009.51 10.1109\/TPDS.2009.51","DOI":"10.1109\/TPDS.2009.51"},{"key":"32","unstructured":"[32] Golang. [Online]. Available: https:\/\/golang.org\/"},{"key":"33","doi-asserted-by":"publisher","unstructured":"[33] M. Li, R.-R. Liu, L. L\u00fc, M.-B. Hu, S. Xu, Y.-C. Zhang \u201cPercolation on complex networks: Theory and application,\u201d Physics Reports, vol.907, no.1, pp.1-68, 2021. https:\/\/doi.org\/10.1016\/j.physrep.2020.12.003 10.1016\/j.physrep.2020.12.003","DOI":"10.1016\/j.physrep.2020.12.003"},{"key":"34","unstructured":"[34] Ethereum (ETH) Blockchain Explorer. [Online]. Available: https:\/\/etherscan.io\/"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] T. Baumeister, Y.F. Dong, G.Y. Tian, and Z.H. Duan, \u201cUsing randomized routing to counter routing table insertion attack on freenet,\u201d IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, pp.754-759, Dec. 2013. https:\/\/doi.org\/10.1109\/GLOCOM.2013.6831163 10.1109\/GLOCOM.2013.6831163","DOI":"10.1109\/GLOCOM.2013.6831163"},{"key":"36","unstructured":"[36] DDoS. [Online]. Available: https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E107.B\/1\/E107.B_2023EBP3059\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:02:30Z","timestamp":1704898950000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E107.B\/1\/E107.B_2023EBP3059\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2023ebp3059","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"2023EBP3059"}}