{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:35:42Z","timestamp":1763343342862,"version":"3.45.0"},"reference-count":28,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064654","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:06:46Z","timestamp":1745471206000},"page":"4393-4409","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment: Advancing Big Data Intelligence in Control Systems"],"prefix":"10.32604","volume":"83","author":[{"given":"Peiying","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yihong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chong","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Lizhuang","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yulin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"6010","DOI":"10.1109\/JIOT.2019.2951593","article-title":"Trusted cloud-edge network resource management: DRL-driven service function chain orchestration for IoT","volume":"7","author":"Guo","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/MNET.001.1900554","article-title":"Service function chaining in 5G & beyond networks: challenges and open research issues","volume":"34","author":"Hantouti","year":"2020","journal-title":"IEEE Netw"},{"key":"ref3","series-title":"IEEE INFOCOM 2022-IEEE Conference on Computer Communications","first-page":"170","article-title":"Joint resource management and flow scheduling for SFC deployment in hybrid edge-and-cloud network","author":"Mao","year":"2022"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2733","DOI":"10.3390\/s21082733","article-title":"Reliable service function chain deployment method based on deep reinforcement learning","volume":"21","author":"Qu","year":"2021","journal-title":"Sensors"},{"key":"ref5","series-title":"2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","first-page":"31","article-title":"Trust-aware service function chain embedding: a path-based approach","author":"Torkzaban","year":"2020"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s12083-024-01839-z","article-title":"An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT","volume":"18","author":"Wu","year":"2025","journal-title":"Peer Peer Netw Appl"},{"key":"ref7","first-page":"300","article-title":"Anomaly detection through outsourced revocable identity-based signcryption with equality test for sensitive data in consumer IoT environments","volume":"1\u20131","author":"Tsai","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TC.2021.3051681","article-title":"Endogenous trusted DRL-based service function chain orchestration for IoT","volume":"71","author":"Guo","year":"2021","journal-title":"IEEE Trans Comput"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4590","DOI":"10.3390\/s22124590","article-title":"Optimization of PBFT algorithm based on QoS-aware trust service evaluation","volume":"22","author":"Liu","year":"2022","journal-title":"Sensors"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"4296","DOI":"10.1109\/TMC.2021.3074934","article-title":"DPoS: decentralized, privacy-preserving, and low-complexity online slicing for multi-tenant networks","volume":"21","author":"Zhao","year":"2021","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/TPDS.2020.3043768","article-title":"On the effective parallelization and near-optimal deployment of service function chains","volume":"32","author":"Luo","year":"2020","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1109\/TPDS.2020.3042392","article-title":"A scalable multi-layer PBFT consensus for blockchain","volume":"32","author":"Li","year":"2020","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TNSM.2023.3293027","article-title":"Robust and reliable SFC placement in resource-constrained multi-tenant MEC-enabled networks","volume":"21","author":"Manias","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.future.2022.05.021","article-title":"A reinforcement learning-based approach for availability-aware service function chain placement in large-scale networks","volume":"136","author":"Santos","year":"2022","journal-title":"Fut Gener Comput Syst"},{"key":"ref15","series-title":"IEEE INFOCOM 2023\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","first-page":"1","article-title":"SFC deployment in space-air-ground integrated networks based on matching game","author":"Cao","year":"2023"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.jnca.2016.09.001","article-title":"A survey on service function chaining","volume":"75","author":"Bhamare","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"15674","DOI":"10.1109\/JIOT.2022.3151134","article-title":"Multiagent reinforcement-learning-aided service function chain deployment for internet of things","volume":"9","author":"Zhu","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1758","DOI":"10.1109\/TNSM.2021.3055494","article-title":"DRL-QOR: deep reinforcement learning-based QoS\/QoE-aware adaptive online orchestration in NFV-enabled networks","volume":"18","author":"Chen","year":"2021","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"100147","DOI":"10.1109\/ACCESS.2019.2930295","article-title":"Online parallelized service function chain orchestration in data center networks","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"109451","DOI":"10.1016\/j.comnet.2022.109451","article-title":"Edge intelligence for service function chain deployment in NFV-enabled networks","volume":"219","author":"Khoshkholghi","year":"2022","journal-title":"Comput Netw"},{"key":"ref21","series-title":"2022 8th International Conference on Big Data and Information Analytics (BigDIA)","first-page":"317","article-title":"Synchronous deep reinforcement learning (SDRL) algorithm for small batch image recognition","author":"Juan","year":"2022"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1109\/TEM.2019.2921736","article-title":"Enhancing medical smartphone networks via blockchain-based trust management against insider attacks","volume":"67","author":"Meng","year":"2019","journal-title":"IEEE Trans Eng Manag"},{"key":"ref23","first-page":"1","article-title":"Acceleration for deep reinforcement learning using parallel and distributed computing: a survey","volume":"57","author":"Liu","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref24","series-title":"2018 IEEE International Symposium on High Performance Computer Architecture (HPCA)","first-page":"27","article-title":"Enabling efficient network service function chain deployment on heterogeneous server platform","author":"Hu","year":"2018"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s41650-018-0029-y","article-title":"Reinforcement learning-based control for unmanned aerial vehicles","volume":"3","author":"Sheng","year":"2018","journal-title":"J Commun Infor Netw"},{"key":"ref26","unstructured":"Stooke A, Abbeel P. Accelerated methods for deep reinforcement learning. arXiv:180302811. 2018."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2018.01.025","article-title":"A novel reinforcement learning algorithm for virtual network embedding","volume":"284","author":"Yao","year":"2018","journal-title":"Neurocomputing"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1109\/TNSE.2020.2995863","article-title":"Security-aware virtual network embedding algorithm based on reinforcement learning","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Trans Netw Sci Eng"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_64654\/TSP_CMC_64654.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:32:07Z","timestamp":1763343127000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064654","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}