{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T14:51:44Z","timestamp":1775919104305,"version":"3.50.1"},"reference-count":28,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055908","type":"journal-article","created":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T08:38:58Z","timestamp":1728117538000},"page":"1215-1233","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Sharding-Based Hybrid Consensus for Blockchain"],"prefix":"10.32604","volume":"81","author":[{"given":"Hind","family":"Baageel","sequence":"first","affiliation":[]},{"given":"Md Mahfuzur","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","series-title":"presented at the 16th Int. Conf. Adv. Technol., Syst., Serv. in Telecommun. (TELSIKS)","first-page":"219","article-title":"The blockchain SSD trilemma or chasing three birds with one stone","author":"Kustov","year":"2023"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"14155","DOI":"10.1109\/ACCESS.2020.2965147","article-title":"Survey: Sharding in blockchains","volume":"8","author":"Yu","year":"2020","journal-title":"IEEE Access"},{"key":"ref3","series-title":"presented at the IEEE 32nd Annu. Int. Symp. on Pers., Indoor, Mobile Radio Commun. (PIMRC)","first-page":"1030","article-title":"Security analysis of sharding in the blockchain system","author":"Yu","year":"2021"},{"key":"ref4","series-title":"Proc. 16th USENIX Conf. Netw. Syst. Design and Implementation, NSDI\u201919","first-page":"95","article-title":"Monoxide: Scale-out blockchain with asynchronous consensus zones","author":"Wang","year":"2019"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1109\/TNSM.2018.2822668","article-title":"A practical byzantine-based approach for faulty switch tolerance in software-defined networks","volume":"15","author":"Yuan","year":"2018","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102507","article-title":"Proof-of-contribution consensus mechanism for blockchain and its application in intellectual property protection","volume":"58","author":"Song","year":"2021","journal-title":"Inf. Process. Manage."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/j.procs.2022.01.071","article-title":"Decision making using the blockchain proof of authority consensus","volume":"199","author":"Manolache","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref8","series-title":"Proc. 2nd Int. Recent Trends Eng., Adv. Comput. and Technol. Conf.","article-title":"Data authentication mechanism using blockchain\u2019s proof-of-trust mechanism in named data networking","author":"Rosli","year":"2023"},{"key":"ref9","series-title":"presented at the 2nd Conf. Blockchain Res. Appl. for Innov. Netw. and Serv. (BRAINS)","first-page":"57","article-title":"Proof of Experience: Empowering proof of work protocol with miner previous work","author":"Masseport","year":"2020"},{"key":"ref10","series-title":"presented at the 9th Int. Conf. Comput. for Sustain. Glob. Dev. (INDIACom)","first-page":"349","article-title":"Two-tiered consensus mechanism based on proof of work and proof of stake","author":"Endurthi","year":"2022"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/LNET.2022.3213971","article-title":"Novel consensus algorithm for blockchain using proof-of-majority (PoM)","volume":"4","author":"Praveen","year":"2022","journal-title":"IEEE Netw. Lett."},{"key":"ref12","series-title":"presented at the 24th Int. Conf.","first-page":"523","article-title":"Proof-of-burn. In financial cryptography and data security","author":"Karantias","year":"2020"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1186\/s42400-023-00163-y","article-title":"Evolution of blockchain consensus algorithms: A review on the latest milestones of blockchain consensus algorithms","volume":"6","author":"Hussein","year":"2023","journal-title":"Cybersecurity"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/app9091788","article-title":"Assessing blockchain consensus and security mechanisms against the 51% attack","volume":"9","author":"Sayeed","year":"2019","journal-title":"Appl. Sci."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"856","DOI":"10.20965\/jaciii.2019.p0856","article-title":"Scalable blockchain protocol based on proof of stake and sharding","volume":"23","author":"Gao","year":"2019","journal-title":"J. Adv. Comput. Intell. Intell. Informat."},{"key":"ref16","series-title":"presented at the 2022 14th Int. Conf. Wireless Commun. Signal Process. (WCSP)","first-page":"12","article-title":"Location-based reliable sharding in blockchain-enabled fog computing networks","author":"Huang","year":"2022"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"14896","DOI":"10.1109\/JIOT.2023.3294234","article-title":"A blockchain dynamic sharding scheme based on hidden Markov model in collaborative IoT","volume":"10","author":"Xi","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref18","series-title":"presented at the 2023 5th Conf. Blockchain Res. Appl. for Innov. Netw. Serv. (BRAINS)","first-page":"1","article-title":"Prioritised sharding: A novel approach to enhance blockchain scalability","author":"Rahman","year":"2023"},{"key":"ref19","series-title":"presented at the IEEE 2nd Int. Conf. Data Sci. Comput. Appl. (ICDSCA)","first-page":"1324","article-title":"Secure sharding scheme of blockchain-based on reputation","author":"Huang","year":"2022"},{"key":"ref20","series-title":"presented at the 2021 IEEE 37th Int. Conf. Data Eng. (ICDE)","first-page":"1847","article-title":"Meepo: Sharded consortium blockchain","author":"Zheng","year":"2021"},{"key":"ref21","series-title":"presented at the 2022 Int. Conf. Smart Generation Comput., Commun. Netw. (SMART GENCON)","first-page":"1","article-title":"Sharding in blockchain systems: Concepts and challenges","author":"Vinodha","year":"2022"},{"key":"ref22","series-title":"2018 IEEE Symp. Security and Privacy (SP)","first-page":"583","article-title":"OmniLedger: A secure, scale-out, decentralized ledger via sharding","author":"Kokoris-Kogias","year":"2018"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.3389\/fbloc.2020.00028","article-title":"BlockSim: An extensible simulation tool for blockchain systems","volume":"3","author":"Alharby","year":"2020","journal-title":"Front. Blockchain"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.3390\/s23052819","article-title":"Sharding-based proof-of-stake blockchain protocols: Key components and probabilistic security analysis","volume":"23","author":"Hafid","year":"2023","journal-title":"Sensors"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.119606","article-title":"Long-range attack detection on permissionless blockchains using deep learning","volume":"218","author":"Sanda","year":"2023","journal-title":"Expert. Syst. Appl."},{"key":"ref26","first-page":"258","volume":"23","author":"Bsson","year":"1999","journal-title":"Secure Information Networks. IFIP\u2014The International Federation for Information Processing"},{"key":"ref27","article-title":"A survey on the adoption of blockchain in IoT: Challenges and solutions","volume":"2","author":"Uddin","year":"2021","journal-title":"Blockchain: Res. Appl."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"125244","DOI":"10.1109\/ACCESS.2020.3007251","article-title":"Scaling blockchains: A comprehensive survey","volume":"8","author":"Hafid","year":"2020","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_55908\/TSP_CMC_55908.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:42:57Z","timestamp":1741315377000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055908","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}