{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:41Z","timestamp":1773615761424,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700731","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:00Z","timestamp":1741962180000},"page":"1114-1118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Concept of Secure Distributed Ledger Technology in the Digital Environment of a Smart City"],"prefix":"10.3103","volume":"58","author":[{"given":"M. O.","family":"Kalinin","sequence":"first","affiliation":[]},{"given":"A. S.","family":"Konoplev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7772_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.2478\/emj-2019-0012","volume":"11","author":"J. Winkowska","year":"2019","unstructured":"Winkowska, J., Szpilko, D., and Peji\u0107, S., Smart city concept in the light of the literature review, Engineering Management in Production and Services, 2019, vol. 11, no. 2, pp. 70\u201386. https:\/\/doi.org\/10.2478\/emj-2019-0012","journal-title":"Engineering Management in Production and Services"},{"key":"7772_CR2","doi-asserted-by":"publisher","first-page":"86448","DOI":"10.1109\/access.2020.2992441","volume":"8","author":"A. Kirimtat","year":"2020","unstructured":"Kirimtat, A., Krejcar, O., Kertesz, A., and Tasgetiren, M.F., Future trends and current state of smart city concepts: A survey, IEEE Access, 2020, vol. 8, pp. 86448\u201386467. https:\/\/doi.org\/10.1109\/access.2020.2992441","journal-title":"IEEE Access"},{"key":"7772_CR3","doi-asserted-by":"publisher","first-page":"386","DOI":"10.33581\/1561-4085-2020-23-4-386-396","volume":"23","author":"A.D. Dakhnovich","year":"2020","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Approach for securing network communications modelling based on smart multipath routing, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 386\u2013396. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-386-396","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7772_CR4","doi-asserted-by":"publisher","first-page":"405","DOI":"10.33581\/1561-4085-2020-23-4-405-413","volume":"23","author":"E.B. Aleksandrova","year":"2019","unstructured":"Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Post-quantum group-oriented authentication in IoT, Nonlinear Phenom. Complex Syst., 2019, vol. 23, no. 4, pp. 405\u2013413. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-405-413","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7772_CR5","doi-asserted-by":"publisher","unstructured":"Li, Sh., Application of blockchain technology in smart city infrastructure, 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), Xi\u2019an, China, 2018, IEEE, 2018, pp. 276\u20132766. https:\/\/doi.org\/10.1109\/smartiot.2018.00056","DOI":"10.1109\/smartiot.2018.00056"},{"key":"7772_CR6","doi-asserted-by":"publisher","unstructured":"Majdoubi, D.E., El Bakkali, H., and Sadki, S., Towards smart blockchain-based system for privacy and security in a smart city environment, 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), Marrakesh, Morocco, 2020, IEEE, 2020, pp. 1\u20137. https:\/\/doi.org\/10.1109\/cloudtech49835.2020.9365905","DOI":"10.1109\/cloudtech49835.2020.9365905"},{"key":"7772_CR7","doi-asserted-by":"publisher","unstructured":"El Ioini, N. and Pahl, C., A review of distributed ledger technologies, on the move to meaningful internet systems, On the Move to Meaningful Internet Systems, OTM 2018 Conferences, Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., and Meersman, R., Eds., Lecture Notes in Computer Science, vol. 11230, Cham: Springer, 2018, pp. 277\u2013288. https:\/\/doi.org\/10.1007\/978-3-030-02671-4_16","DOI":"10.1007\/978-3-030-02671-4_16"},{"key":"7772_CR8","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.3390\/sym13122425","volume":"13","author":"M. Poltavtseva","year":"2021","unstructured":"Poltavtseva, M., Shelupanov, A., Bragin, D., Zegzhda, D., and Alexandrova, E., Key concepts of systemological approach to CPS adaptive information security monitoring, Symmetry, 2021, vol. 13, no. 12, p. 2425. https:\/\/doi.org\/10.3390\/sym13122425","journal-title":"Symmetry"},{"key":"7772_CR9","doi-asserted-by":"publisher","unstructured":"Chinnasamy, P., Vinothini, C., Arun Kumar, S., Allwyn Sundarraj, A., Annlin Jeba, S.V., and Praveena, V., Blockchain technology in smartcities, blockchain technology: Applications and challenges, Blockchain Technology: Applications and Challenges, Panda, S.K., Jena, A.K., Swain, S.K., and Satapathy, S.C., Eds., Intelligent Systems Reference Library, vol. 203, Cham: Springer, 2021, pp. 179\u2013200. https:\/\/doi.org\/10.1007\/978-3-030-69395-4_11","DOI":"10.1007\/978-3-030-69395-4_11"},{"key":"7772_CR10","doi-asserted-by":"publisher","first-page":"993","DOI":"10.3103\/s0146411618080308","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993\u2013999. https:\/\/doi.org\/10.3103\/s0146411618080308","journal-title":"Autom. Control Comput. Sci."},{"key":"7772_CR11","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.3390\/app9091788","volume":"9","author":"S. Sayeed","year":"2019","unstructured":"Sayeed, S. and Marco-Gisbert, H., Assessing blockchain consensus and security mechanisms against the 51%\u00a0attack, Appl. Sci., 2019, vol. 9, no. 9, p. 1788. https:\/\/doi.org\/10.3390\/app9091788","journal-title":"Appl. Sci."},{"key":"7772_CR12","doi-asserted-by":"publisher","unstructured":"Nair, P.R. and Dorai, D.R., Evaluation of performance and security of proof of work and proof of stake using blockchain, Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, Tirunelveli, India, 2021, IEEE, 2021, pp. 279\u2013283. https:\/\/doi.org\/10.1109\/ICICV50876.2021.9388487","DOI":"10.1109\/ICICV50876.2021.9388487"},{"key":"7772_CR13","doi-asserted-by":"publisher","unstructured":"Praveen, G., Anand, M., Singh, P.K., and Ranjan, P., An overview of blockchain consensus and vulnerability, Information and Communication Technology for Intelligent Systems (ICTIS 2020), Senjyu, T., Mahalle, P.N., Perumal, T., and Joshi, A., Eds., Smart Innovation, Systems and Technologies, vol. 195, Singapore: Springer, 2020, pp. 459\u2013468. https:\/\/doi.org\/10.1007\/978-981-15-7078-0_44","DOI":"10.1007\/978-981-15-7078-0_44"},{"key":"7772_CR14","doi-asserted-by":"publisher","unstructured":"Ekparinya, P., Gramoli, V., and Jourjon, G., The attack of the clones against proof-of-authority, arXiv Preprint, 2019. https:\/\/doi.org\/10.48550\/arXiv.1902.10244","DOI":"10.48550\/arXiv.1902.10244"},{"key":"7772_CR15","first-page":"6","volume":"2058","author":"S. De Angelis","year":"2018","unstructured":"De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V., PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain, CEUR Workshops, 2018, vol. 2058, p. 6.","journal-title":"CEUR Workshops"},{"key":"7772_CR16","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zegzhda, D., A necessary condition for industrial internet of things sustainability, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, T.Y., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 79\u201389. https:\/\/doi.org\/10.1007\/978-981-16-9576-6_7","DOI":"10.1007\/978-981-16-9576-6_7"},{"key":"7772_CR17","unstructured":"Popov, S., The Tangle. https:\/\/tinyurl.com\/y55h5w2n. Cited April 20, 2024."},{"key":"7772_CR18","doi-asserted-by":"publisher","unstructured":"Tekeoglu, A. and Ahmed, N., TangoChain: A lightweight distributed ledger for Internet of Things devices in smart cities, 2019 IEEE International Smart Cities Conference (ISC2), Casablanca, Morocco, 2019, IEEE, 2019, pp. 18\u201321. https:\/\/doi.org\/10.1109\/isc246665.2019.9071753","DOI":"10.1109\/isc246665.2019.9071753"},{"key":"7772_CR19","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11432-010-0069-x","volume":"53","author":"Ch. Shen","year":"2010","unstructured":"Shen, Ch., Zhang, H., Wang, H., Wang, J., Zhao, B., Yan, F., Yu, F., Zhang, L., and Xu, M., Research on trusted computing and its development, Sci. China: Inf. Sci., 2010, vol. 53, no. 3, pp. 405\u2013433. https:\/\/doi.org\/10.1007\/s11432-010-0069-x","journal-title":"Sci. China: Inf. Sci."},{"key":"7772_CR20","doi-asserted-by":"publisher","first-page":"703","DOI":"10.3103\/s0146411616080162","volume":"50","author":"M.A. Poltavtseva","year":"2016","unstructured":"Poltavtseva, M.A., Lavrova, D.S., and Pechenkin, A.I., Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster, Autom. Control Comput. Sci., 2016, vol. 50, no.\u00a08, pp. 703\u2013711. https:\/\/doi.org\/10.3103\/s0146411616080162","journal-title":"Autom. Control Comput. Sci."},{"key":"7772_CR21","unstructured":"Remote attestation. https:\/\/tpm2-sofiware.github.io\/tpm2-tss\/gettmg-started\/2019\/12\/18\/Remote-Attestation.html. Cited April 20, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700731.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700731","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700731.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:14Z","timestamp":1773612254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7772"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700731","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"28 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}