{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:03:32Z","timestamp":1771700612814,"version":"3.50.1"},"reference-count":59,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672448"],"award-info":[{"award-number":["61672448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802106"],"award-info":[{"award-number":["61802106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2020201016"],"award-info":[{"award-number":["F2020201016"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Project of Hebei Education Department","award":["QN2019212"],"award-info":[{"award-number":["QN2019212"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Changing the store layout of a shopping mall is usually costly in terms of time, resources, and money. Balancing customer flow is obviously an economical way to rationalize the store layout without displacing stores or changing their locations. However, it has long been a big challenge for managers of shopping malls, because it is difficult to build trust among stores for the sake of regulating customer flow. This trust depends on a multi-party cooperation model, of which the agreements are implemented on asymmetric information. Unfortunately, any form of endorsement with human intervention cannot support building trust on asymmetric information. To solve this problem technically, this paper proposes a diversion-point system to dynamically divert part of customer flow from popular stores to less popular ones. The system operates diversion-points and -vouchers on an asymmetric basis. It also employs a Blockchain subsystem to replace the centralized endorsement and preserve the information asymmetry, thereby building trust into the cooperation among customers, the shopping mall, and the stores therein. The evaluation shows that the proposed system is effective in remedying imperfect store layout of the shopping mall.<\/jats:p>","DOI":"10.3390\/sym12121946","type":"journal-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T21:55:06Z","timestamp":1606341306000},"page":"1946","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Blockchain-Based Diversion-Point System for Balancing Customer Flow in Shopping Mall"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2839-0832","authenticated-orcid":false,"given":"Liang","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory on Software Engineering in Hebei Province, Yanshan University, Qinhuangdao 066004, China"},{"name":"Key Laboratory on High Trusted Information System in Hebei Province, Hebei University, Baoding 071002, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8533-8745","authenticated-orcid":false,"given":"Jiayan","family":"Liu","sequence":"additional","affiliation":[{"name":"Key Laboratory on Software Engineering in Hebei Province, Yanshan University, Qinhuangdao 066004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8728-2703","authenticated-orcid":false,"given":"Wenyuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Key Laboratory on Software Engineering in Hebei Province, Yanshan University, Qinhuangdao 066004, China"},{"name":"YSUSOFT Research Institute, YSUSOFT Information System Ltd., Chengmai, Haikou 571900, China"}]},{"given":"Changwu","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory on Software Engineering in Hebei Province, Yanshan University, Qinhuangdao 066004, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Shen, L., He, Y., Li, L., and Chau, K. (2020). Impacts of online shopping convenience and physical retail proximity on housing prices in Shenzhen, 2016\u20132018. J. Hous. Built Environ.","DOI":"10.1007\/s10901-020-09732-w"},{"key":"ref_2","first-page":"637","article-title":"User experience improvement design of shopping mall based on crowd classification research","volume":"Volume 972","author":"Ahram","year":"2020","journal-title":"Advances in Intelligent Systems and Computing, Proceedings of the 10th International Conference on Applied Human Factors and Ergonomics\/AHFE International Conferences on Usability and User Experience, and Human Factors and Assistive Technology, Washington, DC, USA, 24\u201328 July 2019"},{"key":"ref_3","first-page":"274","article-title":"Store layout as a determinant of consumer shopping behaviour in case of modern retail outlets","volume":"2","author":"Ruchi","year":"2011","journal-title":"Asia Pac. J. Res. Bus. Manag."},{"key":"ref_4","first-page":"36","article-title":"A study on the influence of situational factors on the shopper\u2019s behaviour with reference to the selected shopping mall, Bangalore","volume":"6","author":"Ramadevi","year":"2015","journal-title":"Int. J. Manag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1108\/IJRDM-05-2019-0157","article-title":"Loyalty cards, credit options and economic market development","volume":"48","author":"Zielke","year":"2020","journal-title":"Int. J. Retail. Distrib. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"B\u00fclb\u00fcl, \u015e., and \u0130nce, G. (2018, January 20\u201323). Blockchain-based framework for customer loyalty program. Proceedings of the 3rd International Conference on Computer Science and Engineering (UBMK\u201918), Sarajevo, Bosnia-Herzegovina.","DOI":"10.1109\/UBMK.2018.8566642"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1108\/MIP-02-2019-0095","article-title":"Brand trust and brand loyalty in mall shoppers","volume":"38","author":"Atulkar","year":"2020","journal-title":"Mark. Intell. Plan."},{"key":"ref_8","first-page":"369","article-title":"Game stories","volume":"22","author":"Rose","year":"2010","journal-title":"Yale J. Law Humanit."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1111\/1468-0262.00212","article-title":"Optimization incentives and coordination failure in laboratory stag hunt games","volume":"69","author":"Battalio","year":"2001","journal-title":"Econometrica"},{"key":"ref_10","unstructured":"(2020, November 19). ISO 22739:2020. Blockchain and Distributed Ledger Technologies\u2014Vocabulary. Available online: https:\/\/www.iso.org\/standard\/73771.html."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.bushor.2019.01.009","article-title":"How blockchain technologies impact your business model","volume":"62","author":"Morkunas","year":"2019","journal-title":"Bus. Horiz."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Chen, C., Sun, X., Lu, G., Kang, H., and Shen, Y. (2018, January 12\u201314). Bonus points alliance based on the block chain. Proceedings of the 14th International Conference on Semantics, Knowledge and Grids (SKG\u201818), Guangzhou, China.","DOI":"10.1109\/SKG.2018.00045"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"120817","DOI":"10.1109\/ACCESS.2019.2937669","article-title":"A privacy-preserving system for targeted coupon service","volume":"7","author":"Yao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3849","DOI":"10.1007\/s13369-018-03715-4","article-title":"Blockchain-based framework for protecting author royalty of digital assets","volume":"44","author":"Nizamuddin","year":"2019","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_16","first-page":"45","article-title":"TPM-based protection for mobile agents","volume":"4","year":"2010","journal-title":"Secur. Commun. Netw."},{"key":"ref_17","first-page":"338","article-title":"Providing source-location privacy in wireless sensor networks","volume":"Volume 5682","author":"Liu","year":"2009","journal-title":"Lecture Notes in Computer Science, Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications (WASA), Boston, MA, USA, 16\u201318 August 2009"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Van Tilborg, H.C.A., and Jajodia, S. (2011). Trusted platform module. Encyclopedia of Cryptography and Security, Springer. [2011 ed.].","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"ref_19","unstructured":"Abraham, I., and Malkhi, D. (2016, January 25). BVP: Byzantine vertical paxos. Proceedings of the Distributed Cryptocurrencies and Consensus Ledger (DCCL), Chicago, IL, USA. Available online: https:\/\/www.zurich.ibm.com\/dccl\/papers\/abraham_dccl.pdf."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ins.2015.01.016","article-title":"Probabilistic receiver-location privacy protection in wireless sensor networks","volume":"321","author":"Rios","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_21","unstructured":"(2020, November 19). Hyperledger Fabric. Available online: https:\/\/www.hyperledger.org\/use\/fabric."},{"key":"ref_22","unstructured":"(2020, November 19). Ethereum. Available online: https:\/\/ethereum.org."},{"key":"ref_23","unstructured":"Nakamoto, S. (2020, November 19). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/en\/bitcoin-paper."},{"key":"ref_24","unstructured":"Nomura Research Institute, Ltd. (2006). 2010NEN NO KIGYO TSUUKA, Toyo Keizai Inc."},{"key":"ref_25","unstructured":"(2020, November 19). Bitcoin Developer. Available online: https:\/\/developer.bitcoin.org\/glossary.html."},{"key":"ref_26","first-page":"152","article-title":"Distributed double spending prevention","volume":"Volume 5964","author":"Christianson","year":"2007","journal-title":"Lecture Notes in Computer Science, Proceedings of the 15th International Workshop on Security Protocols, Brno, Czech Republic, 18\u201320 April 2007"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Chen, C.W., Su, J.W., Kuo, T.W., and Chen, K. (2018, January 11\u201313). MSig-BFT: A witness-based consensus algorithm for private Blockchains. Proceedings of the IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS\u201818), Singapore.","DOI":"10.1109\/PADSW.2018.8644609"},{"key":"ref_28","first-page":"369","article-title":"A digital signature based on a conventional encryption function","volume":"Volume 293","author":"Pomerance","year":"1987","journal-title":"Lecture Notes in Computer Science, Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (CRYPTO\u201987), Santa Barbara, CA, USA, 16\u201320 August 1987"},{"key":"ref_29","unstructured":"Gentry, C. (June, January 31). Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC\u201909), Bethesda, MD, USA."},{"key":"ref_30","unstructured":"Yu, P., Zhang, S., and Zhong, J. (2019, January 15\u201318). Block-chain privacy protection based on fully homomorphic encryption. Proceedings of the 3rd International Conference on Innovation in Artificial Intelligence (ICIAI\u201919), Suzhou, China."},{"key":"ref_31","unstructured":"(2020, November 19). Simulator for Balancing Customer Flow (SBCF). Available online: https:\/\/github.com\/lyonwong1982\/SBCF\/tree\/master."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The byzantine generals problem","volume":"4","author":"Lamport","year":"1982","journal-title":"ACM Trans. Progr. Lang Syst."},{"key":"ref_33","unstructured":"Castro, M., and Liskov, B. (1999, January 22\u201325). Practical Byzantine fault tolerance. Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI\u201999), New Orleans, LA, USA."},{"key":"ref_34","unstructured":"Xu, H., Long, Y., Liu, Z., Liu, Z., and Gu, D. (June, January 30). Dynamic practical Byzantine fault tolerance. Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS\u201918), Beijing, China."},{"key":"ref_35","unstructured":"Gueta, G.G., Abraham, I., Grossman, S., Malkhi, D., Pinkas, B., Reiter, M.K., Seredinschi, D.A., Tamir, O., and Tomescu, A. (2018). SBFT: A scalable decentralized trust infrastructure for Blockchains. arXiv, Available online: https:\/\/arxiv.org\/pdf\/1804.01626.pdf."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Crain, T., Gramoli, V., Larrea, M., and Raynal, M. (2018, January 1\u20133). DBFT: Efficient leaderless Byzantine consensus and its application to Blockchains. Proceedings of the IEEE 17th International Symposium on Network Computing and Applications (NCA\u201918), Cambridge, MA, USA.","DOI":"10.1109\/NCA.2018.8548057"},{"key":"ref_37","unstructured":"(2020, November 19). Multithreaded Distributed Application Testbed (MDAT). Available online: https:\/\/github.com\/lyonwong1982\/MDAT\/tree\/master."},{"key":"ref_38","unstructured":"(2020, November 19). Satoshi Client Node Discovery. Available online: https:\/\/en.bitcoin.it\/wiki\/Satoshi_Client_Node_Discovery."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.future.2018.10.012","article-title":"A secure versatile light payment system based on blockchain","volume":"93","author":"Zhong","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Koens, T., van Aubel, P., and Poll, E. (2020). Blockchain adoption drivers: The rationality of irrational choices. Concurr. Comput. Pract. Exper., e5843.","DOI":"10.1002\/cpe.5843"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10916-018-1121-4","article-title":"Blockchain-based medical records secure storage and medical service framework","volume":"43","author":"Chen","year":"2019","journal-title":"J. Med. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ma, S., Wang, H., Dai, H.N., Cheng, S., Yi, R., and Wang, T. (2018, January 12\u201315). A blockchain-based risk and information system control framework. Proceedings of the IEEE 16th International Conference on Dependable, Autonomic and Secure Computing (DASC\u201918), 16th International Conference on Pervasive Intelligence and Computing (PiCom\u201918), 4th International Conference on Big Data Intelligence and Computing (DataCom\u201918) and Cyber Science and Technology Congress (CyberSciTech\u201918), Athens, Greece.","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00031"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"24477","DOI":"10.1109\/ACCESS.2019.2895670","article-title":"Trustworthy electronic voting using adjusted blockchain technology","volume":"7","author":"Shahzad","year":"2019","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"e5490","DOI":"10.1002\/cpe.5490","article-title":"BArt: Trading digital contents through digital assets","volume":"32","year":"2020","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Xuan, S., Zhang, Y., Tang, H., Chung, I., Wang, W., and Yang, W. (2019). Hierarchically authorized transactions for massive Internet-of-Things data sharing based on multilayer Blockchain. Appl. Sci., 9.","DOI":"10.3390\/app9235159"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Zhang, C., Wu, C., and Wang, X. (2020, January 29\u201331). Overview of Blockchain consensus mechanism. Proceedings of the 2nd International Conference on Big Data Engineering (BDE\u201920), Shanghai, China.","DOI":"10.1145\/3404512.3404522"},{"key":"ref_47","unstructured":"King, S., and Nadal, S. (2020, November 19). PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Available online: https:\/\/www.peercoin.net\/assets\/paper\/peercoin-paper-nl.pdf."},{"key":"ref_48","unstructured":"(2020, November 19). Delegated Proof of Stake (DPOS). Available online: https:\/\/how.bitshares.works\/en\/master\/technology\/dpos.html."},{"key":"ref_49","unstructured":"(2020, November 19). Proof of Authority (PoA). Available online: https:\/\/openethereum.github.io\/wiki\/Proof-of-Authority-Chains."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.future.2019.08.005","article-title":"PoRX: A reputation incentive scheme for blockchain consensus of IIoT","volume":"102","author":"Wang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_51","first-page":"666","article-title":"Proof of reputation: A reputation-based consensus protocol for peer-to-peer network","volume":"Volume 10828","author":"Pei","year":"2018","journal-title":"Lecture Notes in Computer Science, Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA\u201918), Gold Coast, Australia, 21\u201324 May 2018"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/279227.279229","article-title":"The part-time parliament","volume":"16","author":"Lamport","year":"1998","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_53","unstructured":"Gibson, G., and Zeldovich, N. (2014, January 19\u201320). In search of an understandable consensus algorithm. Proceedings of the 2014 USENIX Conference on USENIX Annual Technical (USENIX ATC\u201914), Philadelphia, PA, USA."},{"key":"ref_54","first-page":"211","article-title":"Byzantizing Paxos by refinement","volume":"Volume 6950","author":"Peleg","year":"2011","journal-title":"Lecture Notes in Computer Science, Proceedings of the International Symposium on Distributed Computing, Rome, Italy, 20\u201322 September 2011"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Lamport, L., Malkhi, D., and Zhou, L. (2009, January 10\u201312). Vertical Paxos and primary-backup replication. Proceedings of the 28th ACM Symposium on Principles of Distributed Computing, Calgary, AB, Canada.","DOI":"10.1145\/1582716.1582783"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/TC.2018.2860009","article-title":"Scalable Byzantine consensus via hardware-assisted secret sharing","volume":"68","author":"Liu","year":"2019","journal-title":"IEEE Trans. Comput."},{"key":"ref_57","unstructured":"(2020, November 19). Intel SGX. Available online: https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/topics\/software-guard-extensions.html."},{"key":"ref_58","unstructured":"(2020, November 19). Apache Kafka. Available online: http:\/\/kafka.apache.org."},{"key":"ref_59","unstructured":"(2020, November 19). Apache ZooKeeper. Available online: https:\/\/zookeeper.apache.org."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/12\/1946\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:37:20Z","timestamp":1760179040000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/12\/1946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,25]]},"references-count":59,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2020,12]]}},"alternative-id":["sym12121946"],"URL":"https:\/\/doi.org\/10.3390\/sym12121946","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,25]]}}}