Survey on blockchain for Internet of Things
The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at differe...
Saved in:
Published in | Computer communications Vol. 136; pp. 10 - 29 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.02.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at different locations, and has the potential to address the data security concern in IoT networks. While providing data security to the IoT, Blockchain also encounters a number of critical challenges inherent in the IoT, such as a huge number of IoT devices, non-homogeneous network structure, limited computing power, low communication bandwidth, and error-prone radio links. This paper presents a comprehensive survey on existing Blockchain technologies with an emphasis on the IoT applications. The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures. Future research directions are collated for effective integration of Blockchain into the IoT networks. |
---|---|
AbstractList | The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at different locations, and has the potential to address the data security concern in IoT networks. While providing data security to the IoT, Blockchain also encounters a number of critical challenges inherent in the IoT, such as a huge number of IoT devices, non-homogeneous network structure, limited computing power, low communication bandwidth, and error-prone radio links. This paper presents a comprehensive survey on existing Blockchain technologies with an emphasis on the IoT applications. The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures. Future research directions are collated for effective integration of Blockchain into the IoT networks. |
Author | Guo, Y. Jay Zheng, Kangfeng Ni, Wei Wang, Xu Zha, Xuan Liu, Ren Ping Niu, Xinxin |
Author_xml | – sequence: 1 givenname: Xu surname: Wang fullname: Wang, Xu organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China – sequence: 2 givenname: Xuan surname: Zha fullname: Zha, Xuan email: xuan.zha@student.uts.edu.au organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China – sequence: 3 givenname: Wei surname: Ni fullname: Ni, Wei organization: Cyber-Physical System (CPS), Data 61, CSIRO, Sydney, NSW, Australia – sequence: 4 givenname: Ren Ping surname: Liu fullname: Liu, Ren Ping organization: Global Big Data Technologies Centre, University of Technology Sydney, Australia – sequence: 5 givenname: Y. Jay surname: Guo fullname: Guo, Y. Jay organization: Global Big Data Technologies Centre, University of Technology Sydney, Australia – sequence: 6 givenname: Xinxin surname: Niu fullname: Niu, Xinxin organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China – sequence: 7 givenname: Kangfeng surname: Zheng fullname: Zheng, Kangfeng organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China |
BookMark | eNqFj01LAzEQhoNUsK3-Aw97l10nm91N1oMgxY9CwYMVvIXd7MSmtokksdB_b0o9eVAYmOGF52WeCRlZZ5GQSwoFBdpcrwvltmmKEmhbAC0AmhMypoKznAN7G5Ex0Apy1jTVGZmEsAaAinM2JlcvX36H-8zZrN849aFWnbGZdj6b24jeYsyczpYrY9_DOTnV3Sbgxc-ekteH--XsKV88P85nd4tcMV7GvAIBNVAmsNE9572qWjYgSwGta-h1y5lQbcnLQdRCixo1okgfY51u1iObkptjr_IuBI9aKhO7aJyNvjMbSUEetOVaHrXlQVsClakkwdUv-NObbef3_2G3RwyT2M6gl0EZtAoH41FFOTjzd8E3D_900A |
CitedBy_id | crossref_primary_10_1108_BPMJ_04_2022_0207 crossref_primary_10_1016_j_compeleceng_2020_106646 crossref_primary_10_1109_ACCESS_2021_3069737 crossref_primary_10_1109_ACCESS_2022_3179690 crossref_primary_10_1145_3427097 crossref_primary_10_1016_j_eswa_2022_118704 crossref_primary_10_4108_eetiot_v8i3_1402 crossref_primary_10_3390_s24216835 crossref_primary_10_1016_j_iot_2024_101187 crossref_primary_10_1002_cpe_6934 crossref_primary_10_1002_ett_4338 crossref_primary_10_1109_ACCESS_2022_3224222 crossref_primary_10_1016_j_vehcom_2023_100607 crossref_primary_10_1002_ett_4333 crossref_primary_10_1109_ACCESS_2022_3186892 crossref_primary_10_1145_3503042 crossref_primary_10_1590_1679_395120220020x crossref_primary_10_3390_electronics10080951 crossref_primary_10_1016_j_procs_2023_01_446 crossref_primary_10_1155_2022_1038526 crossref_primary_10_1145_3417987 crossref_primary_10_3390_logistics8040109 crossref_primary_10_56532_mjsat_v1i3_17 crossref_primary_10_1007_s11227_023_05525_4 crossref_primary_10_1016_j_autcon_2022_104339 crossref_primary_10_1007_s11276_023_03458_7 crossref_primary_10_1016_j_comcom_2021_06_019 crossref_primary_10_1109_JSEN_2024_3370146 crossref_primary_10_7906_indecs_22_6_8 crossref_primary_10_1016_j_jksuci_2023_101674 crossref_primary_10_1109_JSEN_2023_3277525 crossref_primary_10_1109_TCC_2022_3217856 crossref_primary_10_3233_JID_210021 crossref_primary_10_1016_j_phycom_2023_102223 crossref_primary_10_3390_math12081133 crossref_primary_10_1016_j_iot_2024_101080 crossref_primary_10_26599_TST_2023_9010014 crossref_primary_10_1109_JIOT_2022_3191881 crossref_primary_10_1007_s11277_024_11672_5 crossref_primary_10_1016_j_compeleceng_2022_108287 crossref_primary_10_1109_JIOT_2024_3422242 crossref_primary_10_1155_2022_2566615 crossref_primary_10_3233_JIFS_233462 crossref_primary_10_1109_JIOT_2021_3060508 crossref_primary_10_1038_s41598_025_93913_6 crossref_primary_10_1002_ett_4235 crossref_primary_10_1016_j_jnca_2019_02_027 crossref_primary_10_1080_09540091_2022_2026888 crossref_primary_10_1145_3558779 crossref_primary_10_3390_su12041540 crossref_primary_10_1109_JIOT_2022_3165666 crossref_primary_10_1080_17517575_2021_1930189 crossref_primary_10_1016_j_csa_2024_100057 crossref_primary_10_1109_TITS_2020_3019101 crossref_primary_10_1007_s00500_021_06041_4 crossref_primary_10_1109_ACCESS_2021_3092192 crossref_primary_10_1109_JIOT_2021_3109313 crossref_primary_10_1016_j_comcom_2024_05_012 crossref_primary_10_1145_3704741 crossref_primary_10_29048_makufebed_1005776 crossref_primary_10_1016_j_comnet_2023_109893 crossref_primary_10_1016_j_heliyon_2024_e38917 crossref_primary_10_3390_fi15060200 crossref_primary_10_3390_electronics10141732 crossref_primary_10_3390_jcp1010002 crossref_primary_10_3390_electronics9101682 crossref_primary_10_3390_fi14070216 crossref_primary_10_3390_fi12060107 crossref_primary_10_1016_j_autcon_2022_104379 crossref_primary_10_3390_app12157694 crossref_primary_10_1007_s10207_023_00808_6 crossref_primary_10_1631_FITEE_2300215 crossref_primary_10_3390_fi13120313 crossref_primary_10_1145_3644369 crossref_primary_10_3390_s23073566 crossref_primary_10_1016_j_iot_2020_100212 crossref_primary_10_1109_JPROC_2024_3386257 crossref_primary_10_3390_systems11010038 crossref_primary_10_1007_s11277_024_11382_y crossref_primary_10_1155_2024_9006405 crossref_primary_10_3390_s22208022 crossref_primary_10_1109_TCSS_2024_3382582 crossref_primary_10_1016_j_dcan_2021_07_004 crossref_primary_10_1016_j_jpdc_2021_04_003 crossref_primary_10_3390_info11120570 crossref_primary_10_1080_1206212X_2023_2284443 crossref_primary_10_3390_s24237688 crossref_primary_10_3390_s22041411 crossref_primary_10_3390_app13021079 crossref_primary_10_1016_j_adhoc_2022_102882 crossref_primary_10_46963_jam_v6i1_1031 crossref_primary_10_1145_3718082 crossref_primary_10_1007_s11704_024_3278_y crossref_primary_10_1002_dac_5014 crossref_primary_10_1016_j_bar_2025_101588 crossref_primary_10_1016_j_comcom_2020_12_028 crossref_primary_10_1016_j_cosrev_2023_100585 crossref_primary_10_1590_1679_395120220020 crossref_primary_10_1016_j_comcom_2019_12_037 crossref_primary_10_1016_j_cosrev_2023_100589 crossref_primary_10_3233_HSM_230148 crossref_primary_10_1186_s40854_024_00737_w crossref_primary_10_3280_EFE2024_002006 crossref_primary_10_1016_j_jnca_2022_103511 crossref_primary_10_1109_ACCESS_2020_3000571 crossref_primary_10_1016_j_jnca_2021_103232 crossref_primary_10_1109_ACCESS_2020_3017891 crossref_primary_10_1016_j_future_2024_05_008 crossref_primary_10_1109_ACCESS_2021_3093633 crossref_primary_10_1080_02564602_2020_1827308 crossref_primary_10_1109_ACCESS_2024_3521428 crossref_primary_10_1016_j_ipm_2021_102492 crossref_primary_10_32604_csse_2022_017941 crossref_primary_10_1007_s10614_024_10775_2 crossref_primary_10_1016_j_iotcps_2023_06_003 crossref_primary_10_1109_ACCESS_2020_3003020 crossref_primary_10_1109_TBDATA_2024_3362191 crossref_primary_10_3390_bdcc8120174 crossref_primary_10_3390_s22031094 crossref_primary_10_3390_s22114182 crossref_primary_10_1016_j_sysarc_2023_102897 crossref_primary_10_1109_TCOMM_2022_3194138 crossref_primary_10_1002_int_23032 crossref_primary_10_1016_j_comcom_2021_03_005 crossref_primary_10_1109_TII_2021_3051607 crossref_primary_10_1145_3376915 crossref_primary_10_1016_j_dcan_2020_09_001 crossref_primary_10_1002_spy2_131 crossref_primary_10_3390_computers13120329 crossref_primary_10_1109_COMST_2024_3361451 crossref_primary_10_3390_su15075660 crossref_primary_10_1109_ACCESS_2020_3030491 crossref_primary_10_3390_s22124394 crossref_primary_10_1002_cpe_7987 crossref_primary_10_1016_j_ijepes_2021_106811 crossref_primary_10_1007_s10776_020_00483_7 crossref_primary_10_1016_j_physrep_2021_10_005 crossref_primary_10_1109_JIOT_2023_3263582 crossref_primary_10_1109_OJCS_2022_3183003 crossref_primary_10_3390_s21154955 crossref_primary_10_1007_s42979_022_01543_w crossref_primary_10_1016_j_jss_2020_110891 crossref_primary_10_1007_s11042_024_19580_3 crossref_primary_10_1016_j_jpdc_2019_12_019 crossref_primary_10_1109_ACCESS_2023_3252030 crossref_primary_10_7717_peerj_cs_1678 crossref_primary_10_3390_s23052664 crossref_primary_10_1016_j_jnca_2022_103371 crossref_primary_10_1016_j_bcra_2024_100211 crossref_primary_10_1109_ACCESS_2022_3188311 crossref_primary_10_1007_s11831_020_09457_7 crossref_primary_10_3390_s23146265 crossref_primary_10_1016_j_micpro_2022_104632 crossref_primary_10_1109_ACCESS_2024_3408868 crossref_primary_10_1016_j_comcom_2022_07_035 crossref_primary_10_3390_app11209372 crossref_primary_10_1109_COMST_2020_2973314 crossref_primary_10_3390_s24185863 crossref_primary_10_3390_electronics11040630 crossref_primary_10_1109_ACCESS_2019_2914223 crossref_primary_10_3390_bdcc4040028 crossref_primary_10_1109_ACCESS_2020_3005509 crossref_primary_10_1186_s42400_020_00068_0 crossref_primary_10_1016_j_cie_2019_07_006 crossref_primary_10_1016_j_cie_2020_107001 crossref_primary_10_1109_TII_2019_2903342 crossref_primary_10_1016_j_iot_2019_100109 crossref_primary_10_1109_JIOT_2020_2993216 crossref_primary_10_1109_ACCESS_2020_2998951 crossref_primary_10_1109_TEM_2022_3231057 crossref_primary_10_1016_j_jnca_2020_102936 crossref_primary_10_1007_s10207_023_00719_6 crossref_primary_10_3390_s22197433 crossref_primary_10_3233_JIFS_223381 crossref_primary_10_1109_TNSM_2024_3372049 crossref_primary_10_3390_electronics10202493 crossref_primary_10_1109_ACCESS_2022_3174865 crossref_primary_10_1080_03772063_2022_2048706 crossref_primary_10_1080_17445760_2021_2004411 crossref_primary_10_3390_fi11070161 crossref_primary_10_1016_j_compeleceng_2020_106581 crossref_primary_10_1155_2021_2067137 crossref_primary_10_3390_s20113068 crossref_primary_10_1016_j_jnca_2019_102481 crossref_primary_10_1016_j_aej_2019_11_001 crossref_primary_10_1109_ACCESS_2023_3245046 crossref_primary_10_1109_JIOT_2019_2960526 crossref_primary_10_1109_TITS_2021_3126566 crossref_primary_10_3390_jtaer16050072 crossref_primary_10_1109_ACCESS_2020_2988579 crossref_primary_10_1109_TNNLS_2023_3329249 crossref_primary_10_1016_j_comnet_2021_108005 crossref_primary_10_1007_s10922_020_09532_1 crossref_primary_10_1145_3441692 crossref_primary_10_1109_TSMC_2019_2899626 crossref_primary_10_1016_j_sysarc_2022_102677 crossref_primary_10_1155_2021_5547530 crossref_primary_10_1016_j_iot_2024_101254 crossref_primary_10_1007_s11276_020_02445_6 crossref_primary_10_1109_ACCESS_2020_2998012 crossref_primary_10_1002_jsc_2620 crossref_primary_10_1016_j_comcom_2024_107964 crossref_primary_10_3390_su12125161 crossref_primary_10_1109_MSEC_2020_3012059 crossref_primary_10_1109_JIOT_2020_2971736 crossref_primary_10_1016_j_jnca_2020_102918 crossref_primary_10_3390_fi15090317 crossref_primary_10_1016_j_comnet_2023_109726 crossref_primary_10_4018_IJSWIS_341233 crossref_primary_10_1007_s11280_020_00854_3 crossref_primary_10_1016_j_jnca_2021_103050 crossref_primary_10_1109_TVT_2024_3462708 crossref_primary_10_4018_IJSWIS_334704 crossref_primary_10_47933_ijeir_851109 crossref_primary_10_1016_j_comcom_2021_09_003 crossref_primary_10_1016_j_future_2020_05_047 crossref_primary_10_3390_s20010207 crossref_primary_10_3390_info13100463 crossref_primary_10_3390_su15064978 crossref_primary_10_1109_ACCESS_2021_3131562 crossref_primary_10_13106_jafeb_2019_vol6_no3_283 crossref_primary_10_1007_s11227_023_05196_1 crossref_primary_10_3390_su13052548 crossref_primary_10_3390_vehicles5030054 crossref_primary_10_1016_j_iot_2025_101532 crossref_primary_10_2478_ias_2024_0003 crossref_primary_10_1007_s40860_020_00116_z crossref_primary_10_3917_jie_pr1_0114 crossref_primary_10_1109_ACCESS_2020_2995481 crossref_primary_10_1016_j_technovation_2022_102589 crossref_primary_10_1016_j_ipm_2021_102511 crossref_primary_10_1080_17512549_2023_2208117 crossref_primary_10_31590_ejosat_823102 crossref_primary_10_1016_j_bcra_2021_100036 crossref_primary_10_1145_3549910 crossref_primary_10_1080_07366981_2025_2454095 crossref_primary_10_1109_ACCESS_2020_2965147 crossref_primary_10_1016_j_future_2020_05_033 crossref_primary_10_1002_spy2_308 crossref_primary_10_1016_j_comcom_2021_11_005 crossref_primary_10_1109_ACCESS_2019_2930774 crossref_primary_10_35940_ijese_B2591_13040325 crossref_primary_10_1109_TSMC_2023_3296614 crossref_primary_10_1016_j_cose_2020_101934 crossref_primary_10_1016_j_comnet_2024_110343 crossref_primary_10_1016_j_iot_2022_100551 crossref_primary_10_2298_CSIS220921056L crossref_primary_10_2139_ssrn_5076952 crossref_primary_10_1016_j_jii_2020_100194 crossref_primary_10_1016_j_future_2022_10_029 crossref_primary_10_1109_ACCESS_2023_3240237 crossref_primary_10_3390_electronics12204322 crossref_primary_10_1109_ACCESS_2020_2999715 crossref_primary_10_1007_s11227_023_05657_7 crossref_primary_10_1155_2021_5483243 crossref_primary_10_47130_bitlissos_1166839 crossref_primary_10_1016_j_ipm_2020_102468 crossref_primary_10_3390_s22072449 crossref_primary_10_1002_cpe_8009 crossref_primary_10_1145_3560816 crossref_primary_10_1109_COMST_2021_3131711 crossref_primary_10_1016_j_future_2021_02_016 crossref_primary_10_1007_s11227_021_04203_7 crossref_primary_10_1007_s10586_024_04387_6 crossref_primary_10_1109_TEM_2020_2966643 crossref_primary_10_3390_fi15090308 crossref_primary_10_1016_j_comcom_2021_01_017 crossref_primary_10_1109_ACCESS_2021_3070023 crossref_primary_10_1002_ett_4607 crossref_primary_10_1186_s40854_024_00623_5 crossref_primary_10_1016_j_jii_2021_100261 crossref_primary_10_1049_cje_2021_02_008 crossref_primary_10_1109_TII_2019_2925898 crossref_primary_10_1108_JEIM_12_2020_0533 crossref_primary_10_1016_j_iot_2023_100984 crossref_primary_10_1007_s12083_024_01778_9 crossref_primary_10_3390_machines10100858 |
Cites_doi | 10.1016/j.comnet.2015.12.023 10.1109/MWC.2012.6155876 10.1109/GLOCOMW.2018.8644251 10.1007/978-3-662-44774-1_5 10.1016/j.clsr.2009.11.008 10.1109/ACCESS.2016.2566339 10.1109/JETCAS.2013.2243631 10.1109/JIOT.2018.2872442 10.1155/2016/8789397 10.1109/EuroSP.2016.32 10.1109/JIOT.2018.2867481 10.1007/11424826_65 10.1007/BFb0056479 10.23919/ICACT.2017.7890132 10.1109/COMST.2018.2874978 10.1145/2695533.2695545 10.1007/978-3-642-19325-5_11 10.1007/3-540-44647-8_31 10.1007/s00446-009-0084-6 10.1016/j.comnet.2010.05.010 10.1145/3098954.3098958 10.1145/357172.357176 10.1109/WF-IoT.2016.7845447 10.24251/HICSS.2017.506 10.1007/978-3-662-45472-5_28 10.1109/ICC.2016.7511197 10.1109/JIOT.2014.2344013 10.1007/978-3-662-54455-6_8 10.1109/SPW.2015.27 10.1109/JIOT.2017.2683200 10.1109/TIFS.2017.2705584 10.1109/TIFS.2018.2812714 10.1109/ICC.2002.997008 10.1155/2016/8178417 10.1007/978-3-642-39884-1_2 10.1109/ACCESS.2017.2728681 10.1016/j.accinf.2005.07.001 10.1109/DCOSS.2012.55 10.1145/357369.357371 10.1145/322186.322188 10.1109/MWC.2010.5675777 10.2298/CSIS110303056C 10.1145/2504730.2504747 10.1109/COMST.2015.2444095 10.1109/EST.2012.15 10.14257/ijhit.2015.8.12.28 10.1109/INFCOM.2010.5462173 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.105 10.1109/IECON.2007.4460126 10.1109/ANTS.2017.8384164 10.1109/EuroSPW.2017.50 10.1109/ICC.2017.7996641 10.1137/0212045 10.1109/VTCFall.2016.7880946 10.1109/COMST.2016.2535718 10.1007/BF02351717 10.1109/IMIS.2015.48 10.1002/sec.1748 10.1109/ITAP.2011.6006307 10.1109/GLOCOM.2016.7841922 10.1145/1538788.1538816 10.1145/1323293.1294267 10.1109/MCOM.2017.1700041 10.1109/TII.2014.2300753 10.1109/EEM.2014.6861213 10.1109/SAHCN.2016.7732970 10.1109/SURV.2013.103013.00206 10.1109/EuroSP.2017.37 10.1109/HPCC-SmartCity-DSS.2016.0198 10.1007/978-3-662-47854-7_32 10.1109/TII.2017.2751640 10.1109/JSAC.2017.2760186 10.5195/LEDGER.2016.34 10.1109/GLOCOMW.2018.8644498 10.1109/GIOTS.2017.8016280 10.1109/SP.1980.10006 10.1145/279227.279229 10.1145/2968219.2971409 10.1109/TIFS.2016.2581305 10.1109/MSP.2011.67 10.1109/TMC.2011.32 10.1006/inco.1995.1060 10.3390/fi9030027 10.1109/COMST.2018.2818623 10.1109/WCNCW.2016.7552737 10.1109/ICSEng.2017.43 10.1109/TSE.1986.6312888 10.1007/s11036-013-0489-0 10.1016/j.comnet.2004.03.007 10.1109/PERCOMW.2017.7917634 10.1109/MITP.2017.3051335 10.1109/MC.2011.291 10.1109/MCOM.2017.1700154 10.1109/SURV.2013.042313.00197 10.1155/2017/9324035 10.1145/4221.214134 10.1109/TETC.2016.2606384 |
ContentType | Journal Article |
Copyright | 2019 Elsevier B.V. |
Copyright_xml | – notice: 2019 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.comcom.2019.01.006 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1873-703X |
EndPage | 29 |
ExternalDocumentID | 10_1016_j_comcom_2019_01_006 S0140366418306881 |
GroupedDBID | --K --M .DC .~1 07C 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 77K 8P~ 9JN AABNK AACTN AAEDT AAEDW AAGJQ AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AI. AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE UHS VH1 VOH WH7 WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c372t-408050138e6fb77bc493de31381550bf9738c9272d858f85efee8006e585e3be3 |
IEDL.DBID | .~1 |
ISSN | 0140-3664 |
IngestDate | Tue Jul 01 02:43:04 EDT 2025 Thu Apr 24 23:11:18 EDT 2025 Fri Feb 23 02:23:48 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Consensus protocol Data structure Blockchain Internet of things (IoT) |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c372t-408050138e6fb77bc493de31381550bf9738c9272d858f85efee8006e585e3be3 |
PageCount | 20 |
ParticipantIDs | crossref_citationtrail_10_1016_j_comcom_2019_01_006 crossref_primary_10_1016_j_comcom_2019_01_006 elsevier_sciencedirect_doi_10_1016_j_comcom_2019_01_006 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | February 2019 2019-02-00 |
PublicationDateYYYYMMDD | 2019-02-01 |
PublicationDate_xml | – month: 02 year: 2019 text: February 2019 |
PublicationDecade | 2010 |
PublicationTitle | Computer communications |
PublicationYear | 2019 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Cristian, Aghili, Strong, Dolev (b79) 1995; 118 Marandi, Primi, Pedone (b87) 2011 Bitcoin, 2017-05-20, URL Dai, Vasarhelyi (b151) 2017; 31 R.C. Merkle, Protocols for public key cryptosystems, in: Proc. 1st IEEE Symp. Secur. Privacy, SP’ 80, 1980, pp. 122–122 Reid, Harrigan (b162) 2013 D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm, in: 2014 Proc. USENIX Annu. Tech. Conf., USENIX ATC 14, Philadelphia, PA, pp. 305–319. Pease, Shostak, Lamport (b85) 1980; 27 F. Al-Doghman, Z. Chaczko, J. Jiang, A review of aggregation algorithms for the internet of things, in: Proc. 25th Int. Conf. Syst. Eng., ICSEng’17, 2017, pp. 480–487. Group (b213) 2015 Team (b100) 2018 Ethereum homestead documentation–the homestead release, 2016, URL Booth, Soknacki, Somayaji (b8) 2013 R. Kotla, L. Alvisi, M. Dahlin, A. Clement, E. Wong, Zyzzyva: Speculative byzantine fault tolerance, in: Proc. 21st ACM SIGOPS Symp. Operating Syst. Principles, SOSP ’07, Vol. 41, pp. 45–58. J. Chen, S.H.G. Chan, S.C. Liew, Mixed-mode WLAN: The integration of ad hoc mode with wireless LAN infrastructure, in: 2003 Proc. IEEE Global Telecommun. Conf., GLOBECOM ’03, Vol. 1, pp. 231–235. Peters, Panayi (b189) 2016 Sawtooth lake documentation, 2017, URL Kwon (b214) 2014 Mosenia, Jha (b59) 2017; 5 R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, NB-IoT system for M2M communication, in: 2016 Proc. IEEE Wireless Commun. and Netw. Conf. Workshops, WCNCW’16, pp. 1–5. Miller, Xia, Croman, Shi, Song (b221) 2016 Sharma, Singh, Jeong, Park (b195) 2017; 55 Lewis (b32) 2015 C. Cachin, K. Kursawe, F. Petzold, V. Shoup, Secure and efficient asynchronous broadcast protocols, in: 2001 Proc. Annu. Int. Cryptology Conf., CRYPTO ’01, Springer, pp. 524–541. Kabessa (b234) 2017 . Yuval Marcus, Goldberg (b98) 2018 Vukolić (b193) 2015 Liu, Dong, Guo, Yang, Peng (b5) 2015; 8 Zhang, Cecchetti, Croman, Juels, Shi (b111) 2016 M. Lauridsen, I.Z. Kovacs, P. Mogensen, M. Sorensen, S. Holst, Coverage and capacity analysis of LTE-M and NB-IoT in a rural area, in: Proc. 84th IEEE Vehicular Technol. Conf., VTC-Fall’16, 2016, pp. 1–5. Gentry (b184) 2009 M. Katagi, S. Moriai, Lightweight cryptography for the Internet of Things. H.F. Atlam, A. Alenezi, A. Alharthi, R.J. Walters, G.B. Wills, Integration of cloud computing with Internet of Things: Challenges and open issues, in: 2017 Proc. IEEE Int. Conf. Internet of Things (iThings) and IEEE Green Comput. Commun. (GreenCom) and IEEE Cyber, Physical Social Comput. (CPSCom) and IEEE Smart Data (SmartData), pp. 670–675 Buterin (b142) 2014 Popov (b228) 2016 Ethereum, 2017, URL S. Huh, S. Cho, S. Kim, Managing IoT devices using Blockchain platform, in: Proc. 19th Int. Conf. Advanced Commun. Technol., ICACT’ 17, 2017, pp. 464–467. Brody, Pureswaran (b25) 2014 Zorzi, Gluhak, Lange, Bassi (b138) 2010; 17 Koshy, Koshy, McDaniel (b169) 2014 Vbuterin, On sharding blockchains, 2017, URL Chen, Mao, Liu (b29) 2014; 19 R. Neisse, G. Steri, I. Nai-Fovino, A blockchain-based approach for data accountability and provenance tracking, 2017, arXiv preprint URL Androulaki, Karame, Roeschlin, Scherer, Capkun (b163) 2013 Makhdoom, Abolhasan, Lipman, Liu, Ni (b49) 2018 Xu, He, Li (b36) 2014; 10 Ethereum mining hardware, 2017, URL Schlichting, Schneider (b81) 1983; 1 MONERO, 2017, URL A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in internet of things: Challenges and solutions, 2016 Al-Fuqaha, Guizani, Mohammadi, Aledhari, Ayyash (b37) 2015; 17 Poledna (b77) 2007 M. Conti, C. Lal, S. Ruj, et al. A survey on security and privacy issues of bitcoin, 2017, arXiv preprint URL Biryukov, Khovratovich, Pustogarov (b167) 2014 Demirel, Lancrenon (b182) 2015; 2015 Oki, Liskov (b218) 1988 Guerraoui, Knežević, Quéma, Vukolić (b220) 2010 Rathore, Ahmad, Paul, Rho (b140) 2016; 101 Crosby, Pattanayak (b33) 2016; 2 Perry, Toueg (b80) 1986; SE-12 Y. Rahulamathavan, R.C.W. Phan, S. Misra, M. Rajarajan, Privacy-preserving Blockchain based IoT Ecosystem using attribute-based encryption, in: 2017 Proc. IEEE Int. Conf. Advanced Netw. Telecommun. Syst, Odisha, India. K.H. Wang, B. Li, Group mobility and partition prediction in wireless ad-hoc networks, in: 2002 Proc. IEEE Int. Conf. Commun., ICC’ 02, Vol. 2, pp. 1017–1021. Fedak (b28) 2016 Kosba, Miller, Shi, Wen, Papamanthou (b171) 2016 Pilkington (b192) 2016 Universa (b150) 2017 Liu, Wei, Wong (b177) 2004; vol. 4 I.B.M., Watson Internet of Things, 2017, URL Eyal (b207) 2015 Hertig (b154) 2018 Golle, Greene, Staddon (b113) 2004 Vermesan, Friess, Guillemin (b45) 2011; 1 Why 0chain, not IOTA, is ideal for IOT apps, Dec, 2017, URL Karame, Androulaki, Capkun (b92) 2012 Oraclize, 2018, URL Luu, Narayanan, Zheng, Baweja, Gilbert, Saxena (b199) 2016 Pticek, Podobnik, Jezic (b34) 2016; 12 Jaffe, Mata, Kamvar (b143) 2017 Rackoff, Simon (b173) 1992 Stale block, 2017, URL Elements project, 2017, URL Khalilov, Levi (b19) 2018; 20 Lamport (b82) 1998; 16 G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 2014, URL Burrow, 2017, URL Tanenbaum, Wetherall (b204) 2011 Liu, Zhao, Li, Zhang, Trappe (b52) 2017; 9 Bastiaan (b94) 2015 N. van Saberhagen, Cryptonote v 2. 0, 2013. Nakamoto (b68) 2008 Blockchain-oracles, 2018, URL Back, Corallo, Dashjr (b240) 2014 Perera, Zaslavsky, Christen, Georgakopoulos (b35) 2014; 16 Szabo (b149) 1996 Laszka, Johnson, Grossklags (b206) 2015 Y. Guo, C. Mate, Jr., Crysto: A Scalable and Permission-less Blockchain Platform, URL Sompolinsky, Zohar (b229) 2013; 2013 Noether, Mackenzie (b181) 2016; 1 X. Wang, X. Zha, G. Yu, W. Ni, R.P. Liu, Y.J. Guo, X. Niu, K. Zheng, Attack and defence of ethereum remote APIs, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018. Christidis, Devetsikiotis (b12) 2016; 4 T. Crain, V. Gramoli, M. Larrea, M. Raynal, (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains, 2017, arXiv preprint URL Y. Sompolinsky, A. Zohar, Secure high-rate transaction processing in bitcoin, in: 2015 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’15, Springer, pp. 507–527. Hou, Kumar (b133) 2012; 19 D. Ron, A. Shamir, Quantitative analysis of the full bitcoin transaction graph, in: 2013 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’13, Springer, pp. 6–24. N. Namvar, W. Saad, N. Bahadori, B. Kelley, Jamming in the Internet of Things: A game-theoretic perspective, in: 2016 IEEE Global Commun. Conf., GLOBECOM, 2016, pp. 1–6. Protocol rules, 2016, URL Yang, Liu, Deng (b106) 2017; 14 Bentov, Lee, Mizrahi, Rosenfeld (b211) 2014; 42 RSK, 2018, URL M. Smache, N.E. Mrabet, J.J. Gilquijano, A. Tria, E. Riou, C. Gregory, Modeling a node capture attack in a secure wireless sensor networks, in: 2016 Proc IEEE 3rd World Forum on Internet of Things, WF-IoT’16, 2016, pp. 188–193. G. Gan, Z. Lu, J. Jiang, Internet of Things security analysis, in: 2011 Int. Conf. Internet Technol. and Appl, 2011, pp. 1–4. B. Leiding, P. Memarmoshrefi, D. Hogrefe, Self-managed and blockchain-based vehicular ad-hoc networks, in: 2016 Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput.: Adjunct, New York, NY, USA, pp. 137–140. K. Biswas, V. Muthukkumarasamy, Securing smart cities using blockchain technology, in: Proc. 18th IEEE Int. Conf. High Performance Comput. Commun.; 14th IEEE Int. Conf. Smart City; 2nd IEEE Int. Conf. Data Sci. Syst., HPCC/SmartCity/DSS’16, 2016, pp. 1392–1393. Maymounkov, Mazières (b161) 2002 I. Eyal, A.E. Gencer, E.G. Sirer, R. Van Renesse, Bitcoin-ng: A scalable blockchain protocol, in: Proc. 13th USENIX Symp. on Networked Syst. Design Implementation, NSDI’16, 2016, pp. 45–59. G. Yu, X. Wang, X. Zha, J.A. Zhang, R.P. Liu, An optimized round-robin scheduling of speakers for peers-to-peers-based byzantine faulty tolerance, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018. Al Khalil, Ceci, O’Brien, Butler (b152) 2017 Z. Zheng, S. Xie, H.-N. Dai, H. Wang, Blockchain challenges and opportunities: A survey, Int. J. Web Grid Services. Dorri, Kanhere, Jurdak (b121) 2017 Miller, Juels, Shi, Parno, Katz (b209) 2014 King, Nadal (b88) 2012 Miers, Garman, Green, Rubin (b174) 2013 Lin, Yu, Zhang, Yang, Zhang, Zhao (b54) 2017; 4 M. Vasek, M. Thornton, T. Moore, Empirical analysis of denial-of-service attacks in the bitcoin ecosystem, in: 2014 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’14, Springer, pp. 57–71. Chidambaram, Raj, Thenmozhi, Amirtharajan (b9) 2016; 2016 Ren, Lyu, Ni, Tian, Liu (b46) 2018 Boritz (b63) 2005; 6 Etherscan, 2017, URL Hyperledger, 2015, URL Charron-Bost, Schiper (b84) 2009; 22 V. Daza, R.D. Pietro, I. Klimek, M. Signorini, CONNECT: CONtextual name discovery for Blockchain-based services in the IoT, in: 2017 Proc. IEEE Int. Conf. Commun., ICC’17, pp. 1–6. N. Atzei, M. Bartoletti, T. Cimoli, A survey of attacks on ethereum smart contracts (SoK), in: Proc. 6th Int. Conf. Principles Secur. Trust, 2017, pp. 164–186. A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, in: 2017 Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, pp. 618–623. H.C. Pöhls, JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application, in: Proc. 9th Int. Conf. Innovative Mobile Internet Serv. in Ubiquitous Comput., IMIS’15, 2015, pp. 306–312. Buterin (b231) 2014 Cui, Wang, Chen, Ni, Lin, Tao, Zhang (b40) 2018 Miller, Kosba, Katz, Shi (b208) 2015 Fitzi, Maurer (b86) 1998 Szabo (b210) 1997 Tan, Wang (b239) 2010; vol. 5 S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, S. Savage, A fistful of bitcoins: Characterizing payments among men with no names, in: 2013 Proc. Conf. Internet measurement, ACM, pp. 127–140. Rose, Eldridge, Chapin (b3) 2015 X. Wang, K. Zheng, X. Niu, B. Wu, C. Wu, Detection of command and control in advanced persistent threat based on independent access, in: Proc. 2016 IEEE Int. Conf. Commun., ICC’ 16, 2016, pp. 1–6. Blockchain, 2017, URL Ouaddah, Abou Elkalam, Ait Ouahman (b188) 2016; 9 Zha, Wang, Ni, Liu, Guo, Niu, Zheng (b15) 2017; 1 Lamport, Shostak, Peas Stewart (10.1016/j.comcom.2019.01.006_b215) 2012 Wyman (10.1016/j.comcom.2019.01.006_b72) 2016 Miller (10.1016/j.comcom.2019.01.006_b70) 2015 10.1016/j.comcom.2019.01.006_b105 10.1016/j.comcom.2019.01.006_b226 10.1016/j.comcom.2019.01.006_b227 10.1016/j.comcom.2019.01.006_b109 Schiener (10.1016/j.comcom.2019.01.006_b116) 2017 Goland (10.1016/j.comcom.2019.01.006_b132) 2017 10.1016/j.comcom.2019.01.006_b224 (10.1016/j.comcom.2019.01.006_b44) 2016 10.1016/j.comcom.2019.01.006_b104 10.1016/j.comcom.2019.01.006_b225 10.1016/j.comcom.2019.01.006_b101 Liu (10.1016/j.comcom.2019.01.006_b177) 2004; vol. 4 10.1016/j.comcom.2019.01.006_b222 Cristian (10.1016/j.comcom.2019.01.006_b79) 1995; 118 10.1016/j.comcom.2019.01.006_b102 10.1016/j.comcom.2019.01.006_b223 Kogias (10.1016/j.comcom.2019.01.006_b89) 2016 10.1016/j.comcom.2019.01.006_b11 Vermesan (10.1016/j.comcom.2019.01.006_b45) 2011; 1 Pilkington (10.1016/j.comcom.2019.01.006_b192) 2016 10.1016/j.comcom.2019.01.006_b217 Brody (10.1016/j.comcom.2019.01.006_b25) 2014 10.1016/j.comcom.2019.01.006_b17 10.1016/j.comcom.2019.01.006_b18 10.1016/j.comcom.2019.01.006_b216 10.1016/j.comcom.2019.01.006_b13 10.1016/j.comcom.2019.01.006_b14 Luu (10.1016/j.comcom.2019.01.006_b199) 2016 Xu (10.1016/j.comcom.2019.01.006_b55) 2017; 5 Douceur (10.1016/j.comcom.2019.01.006_b201) 2002 Szabo (10.1016/j.comcom.2019.01.006_b210) 1997 Sasson (10.1016/j.comcom.2019.01.006_b175) 2014 Kshetri (10.1016/j.comcom.2019.01.006_b10) 2017; 19 Tan (10.1016/j.comcom.2019.01.006_b239) 2010; vol. 5 10.1016/j.comcom.2019.01.006_b22 10.1016/j.comcom.2019.01.006_b23 Rose (10.1016/j.comcom.2019.01.006_b3) 2015 10.1016/j.comcom.2019.01.006_b20 10.1016/j.comcom.2019.01.006_b21 Perry (10.1016/j.comcom.2019.01.006_b80) 1986; SE-12 Pease (10.1016/j.comcom.2019.01.006_b85) 1980; 27 10.1016/j.comcom.2019.01.006_b129 Weber (10.1016/j.comcom.2019.01.006_b4) 2010; 26 10.1016/j.comcom.2019.01.006_b127 10.1016/j.comcom.2019.01.006_b128 10.1016/j.comcom.2019.01.006_b26 Marandi (10.1016/j.comcom.2019.01.006_b87) 2011 10.1016/j.comcom.2019.01.006_b122 10.1016/j.comcom.2019.01.006_b243 10.1016/j.comcom.2019.01.006_b120 10.1016/j.comcom.2019.01.006_b125 10.1016/j.comcom.2019.01.006_b126 10.1016/j.comcom.2019.01.006_b123 10.1016/j.comcom.2019.01.006_b244 10.1016/j.comcom.2019.01.006_b124 Lyu (10.1016/j.comcom.2019.01.006_b7) 2017; 35 Koshy (10.1016/j.comcom.2019.01.006_b169) 2014 10.1016/j.comcom.2019.01.006_b119 Kwon (10.1016/j.comcom.2019.01.006_b214) 2014 10.1016/j.comcom.2019.01.006_b237 10.1016/j.comcom.2019.01.006_b117 10.1016/j.comcom.2019.01.006_b238 10.1016/j.comcom.2019.01.006_b110 Ouaddah (10.1016/j.comcom.2019.01.006_b188) 2016; 9 Mosenia (10.1016/j.comcom.2019.01.006_b59) 2017; 5 Bentov (10.1016/j.comcom.2019.01.006_b211) 2014; 42 10.1016/j.comcom.2019.01.006_b232 10.1016/j.comcom.2019.01.006_b230 10.1016/j.comcom.2019.01.006_b114 10.1016/j.comcom.2019.01.006_b235 10.1016/j.comcom.2019.01.006_b115 Feige (10.1016/j.comcom.2019.01.006_b172) 1988; 1 10.1016/j.comcom.2019.01.006_b236 10.1016/j.comcom.2019.01.006_b112 10.1016/j.comcom.2019.01.006_b233 Ren (10.1016/j.comcom.2019.01.006_b46) 2018 Zorzi (10.1016/j.comcom.2019.01.006_b138) 2010; 17 Fedak (10.1016/j.comcom.2019.01.006_b28) 2016 Pticek (10.1016/j.comcom.2019.01.006_b34) 2016; 12 Fitzi (10.1016/j.comcom.2019.01.006_b86) 1998 Peters (10.1016/j.comcom.2019.01.006_b189) 2016 Laszka (10.1016/j.comcom.2019.01.006_b206) 2015 Wang (10.1016/j.comcom.2019.01.006_b61) 2016; 11 Finney (10.1016/j.comcom.2019.01.006_b93) 2011 Raval (10.1016/j.comcom.2019.01.006_b148) 2016 bitcoinwiki (10.1016/j.comcom.2019.01.006_b170) 2017 Mostéfaoui (10.1016/j.comcom.2019.01.006_b83) 2001 Group (10.1016/j.comcom.2019.01.006_b213) 2015 10.1016/j.comcom.2019.01.006_b144 10.1016/j.comcom.2019.01.006_b141 Perera (10.1016/j.comcom.2019.01.006_b35) 2014; 16 10.1016/j.comcom.2019.01.006_b146 Sompolinsky (10.1016/j.comcom.2019.01.006_b229) 2013; 2013 10.1016/j.comcom.2019.01.006_b139 Schlichting (10.1016/j.comcom.2019.01.006_b81) 1983; 1 10.1016/j.comcom.2019.01.006_b130 10.1016/j.comcom.2019.01.006_b131 10.1016/j.comcom.2019.01.006_b136 10.1016/j.comcom.2019.01.006_b137 10.1016/j.comcom.2019.01.006_b134 Roman (10.1016/j.comcom.2019.01.006_b53) 2011; 44 Bastiaan (10.1016/j.comcom.2019.01.006_b94) 2015 Miers (10.1016/j.comcom.2019.01.006_b174) 2013 Jaffe (10.1016/j.comcom.2019.01.006_b143) 2017 Zha (10.1016/j.comcom.2019.01.006_b15) 2017; 1 Androulaki (10.1016/j.comcom.2019.01.006_b163) 2013 Chin (10.1016/j.comcom.2019.01.006_b107) 2017; 55 10.1016/j.comcom.2019.01.006_b165 10.1016/j.comcom.2019.01.006_b166 Kabessa (10.1016/j.comcom.2019.01.006_b234) 2017 10.1016/j.comcom.2019.01.006_b168 Tschorsch (10.1016/j.comcom.2019.01.006_b30) 2016; 18 Golle (10.1016/j.comcom.2019.01.006_b113) 2004 Al-Fuqaha (10.1016/j.comcom.2019.01.006_b37) 2015; 17 10.1016/j.comcom.2019.01.006_b160 Eyal (10.1016/j.comcom.2019.01.006_b207) 2015 Dolev (10.1016/j.comcom.2019.01.006_b78) 1983; 12 Liu (10.1016/j.comcom.2019.01.006_b5) 2015; 8 Charron-Bost (10.1016/j.comcom.2019.01.006_b84) 2009; 22 Universa (10.1016/j.comcom.2019.01.006_b150) 2017 Biryukov (10.1016/j.comcom.2019.01.006_b167) 2014 10.1016/j.comcom.2019.01.006_b158 10.1016/j.comcom.2019.01.006_b159 10.1016/j.comcom.2019.01.006_b156 10.1016/j.comcom.2019.01.006_b157 Liu (10.1016/j.comcom.2019.01.006_b52) 2017; 9 Guerraoui (10.1016/j.comcom.2019.01.006_b220) 2010 Bracha (10.1016/j.comcom.2019.01.006_b219) 1985; 32 Sharma (10.1016/j.comcom.2019.01.006_b16) 2017; 13 Maymounkov (10.1016/j.comcom.2019.01.006_b161) 2002 Hou (10.1016/j.comcom.2019.01.006_b133) 2012; 19 Chidambaram (10.1016/j.comcom.2019.01.006_b9) 2016; 2016 Dai (10.1016/j.comcom.2019.01.006_b151) 2017; 31 Zhang (10.1016/j.comcom.2019.01.006_b58) 2014; 1 10.1016/j.comcom.2019.01.006_b185 10.1016/j.comcom.2019.01.006_b186 10.1016/j.comcom.2019.01.006_b91 10.1016/j.comcom.2019.01.006_b180 Boritz (10.1016/j.comcom.2019.01.006_b63) 2005; 6 King (10.1016/j.comcom.2019.01.006_b88) 2012 Buterin (10.1016/j.comcom.2019.01.006_b142) 2014 10.1016/j.comcom.2019.01.006_b99 10.1016/j.comcom.2019.01.006_b97 10.1016/j.comcom.2019.01.006_b95 10.1016/j.comcom.2019.01.006_b96 Sethi (10.1016/j.comcom.2019.01.006_b41) 2017 Team (10.1016/j.comcom.2019.01.006_b100) 2018 He (10.1016/j.comcom.2019.01.006_b147) 2004; vol. 2 10.1016/j.comcom.2019.01.006_b178 10.1016/j.comcom.2019.01.006_b179 Ron (10.1016/j.comcom.2019.01.006_b164) 2013 Makhdoom (10.1016/j.comcom.2019.01.006_b49) 2018 Chen (10.1016/j.comcom.2019.01.006_b145) 2011; 8 Eastlake 3rd (10.1016/j.comcom.2019.01.006_b203) 2011 Romero (10.1016/j.comcom.2019.01.006_b242) 2017; 11 Davidson (10.1016/j.comcom.2019.01.006_b67) 2016 Luu (10.1016/j.comcom.2019.01.006_b198) 2015; 2015 Buterin (10.1016/j.comcom.2019.01.006_b90) 2015 Tanenbaum (10.1016/j.comcom.2019.01.006_b204) 2011 Vuran (10.1016/j.comcom.2019.01.006_b241) 2004; 45 Perry (10.1016/j.comcom.2019.01.006_b60) 2017 Rackoff (10.1016/j.comcom.2019.01.006_b173) 1992 Dagher (10.1016/j.comcom.2019.01.006_b176) 2015 Crosby (10.1016/j.comcom.2019.01.006_b33) 2016; 2 Atzori (10.1016/j.comcom.2019.01.006_b38) 2010; 54 Fabian (10.1016/j.comcom.2019.01.006_b2) 2009; 52 10.1016/j.comcom.2019.01.006_b6 Vasin (10.1016/j.comcom.2019.01.006_b212) 2014 Lewis (10.1016/j.comcom.2019.01.006_b32) 2015 Liang (10.1016/j.comcom.2019.01.006_b135) 2013; 3 O’Connor (10.1016/j.comcom.2019.01.006_b27) 2017 Cui (10.1016/j.comcom.2019.01.006_b40) 2018 Booth (10.1016/j.comcom.2019.01.006_b8) 2013 Hertig (10.1016/j.comcom.2019.01.006_b154) 2018 10.1016/j.comcom.2019.01.006_b196 10.1016/j.comcom.2019.01.006_b197 Rathore (10.1016/j.comcom.2019.01.006_b140) 2016; 101 10.1016/j.comcom.2019.01.006_b190 10.1016/j.comcom.2019.01.006_b191 10.1016/j.comcom.2019.01.006_b1 Zhang (10.1016/j.comcom.2019.01.006_b111) 2016 10.1016/j.comcom.2019.01.006_b194 Miller (10.1016/j.comcom.2019.01.006_b221) 2016 10.1016/j.comcom.2019.01.006_b42 10.1016/j.comcom.2019.01.006_b43 Goyal (10.1016/j.comcom.2019.01.006_b183) 2006 Karame (10.1016/j.comcom.2019.01.006_b92) 2012 Miller (10.1016/j.comcom.2019.01.006_b209) 2014 Gentry (10.1016/j.comcom.2019.01.006_b184) 2009 Vukolić (10.1016/j.comcom.2019.01.006_b193) 2015 Christidis (10.1016/j.comcom.2019.01.006_b12) 2016; 4 Mehta (10.1016/j.comcom.2019.01.006_b56) 2012; 11 Panikkar (10.1016/j.comcom.2019.01.006_b24) 2014 Xu (10.1016/j.comcom.2019.01.006_b36) 2014; 10 Szabo (10.1016/j.comcom.2019.01.006_b149) 1996 Back (10.1016/j.comcom.2019.01.006_b240) 2014 10.1016/j.comcom.2019.01.006_b50 Nakamoto (10.1016/j.comcom.2019.01.006_b68) 2008 McKinney (10.1016/j.comcom.2019.01.006_b118) 2017 10.1016/j.comcom.2019.01.006_b57 Poledna (10.1016/j.comcom.2019.01.006_b77) 2007 Kosba (10.1016/j.comcom.2019.01.006_b171) 2016 Dorri (10.1016/j.comcom.2019.01.006_b121) 2017 Sharma (10.1016/j.comcom.2019.01.006_b195) 2017; 55 Swan (10.1016/j.comcom.2019.01.006_b31) 2015 Lamport (10.1016/j.comcom.2019.01.006_b82) 1998; 16 Kaiser (10.1016/j.comcom.2019.01.006_b153) 2017 Yang (10.1016/j.comcom.2019.01.006_b106) 2017; 14 Demirel (10.1016/j.comcom.2019.01.006_b182) 2015; 2015 Lin (10.1016/j.comcom.2019.01.006_b54) 2017; 4 10.1016/j.comcom.2019.01.006_b66 10.1016/j.comcom.2019.01.006_b64 10.1016/j.comcom.2019.01.006_b65 10.1016/j.comcom.2019.01.006_b62 Meegan (10.1016/j.comcom.2019.01.006_b103) 2016 Ouaddah (10.1016/j.comcom.2019.01.006_b187) 2017 10.1016/j.comcom.2019.01.006_b205 Lamport (10.1016/j.comcom.2019.01.006_b76) 1982; 4 Popov (10.1016/j.comcom.2019.01.006_b228) 2016 10.1016/j.comcom.2019.01.006_b69 Oki (10.1016/j.comcom.2019.01.006_b218) 1988 Reid (10.1016/j.comcom.2019.01.006_b162) 2013 10.1016/j.comcom.2019.01.006_b202 10.1016/j.comcom.2019.01.006_b200 Zha (10.1016/j.comcom.2019.01.006_b39) 2018; 13 10.1016/j.comcom.2019.01.006_b75 10.1016/j.comcom.2019.01.006_b73 10.1016/j.comcom.2019.01.006_b74 10.1016/j.comcom.2019.01.006_b71 Langner (10.1016/j.comcom.2019.01.006_b108) 2011; 9 Yuval Marcus (10.1016/j.comcom.2019.01.006_b98) 2018 Tsai (10.1016/j.comcom.2019.01.006_b47) 2014; 16 Chen (10.1016/j.comcom.2019.01.006_b29) 2014; 19 Miller (10.1016/j.comcom.2019.01.006_b208) 2015 Khalilov (10.1016/j.comcom.2019.01.006_b19) 2018; 20 Buterin (10.1016/j.comcom.2019.01.006_b231) 2 |
References_xml | – year: 2008 ident: b68 article-title: Bitcoin: A peer-to-peer electronic cash system – reference: I. Eyal, A.E. Gencer, E.G. Sirer, R. Van Renesse, Bitcoin-ng: A scalable blockchain protocol, in: Proc. 13th USENIX Symp. on Networked Syst. Design Implementation, NSDI’16, 2016, pp. 45–59. – reference: Iroha, 2017, URL – year: 2012 ident: b88 article-title: Ppcoin: Peer-To-Peer Crypto-Currency with Proof-Of-Stake – reference: This is how smart contracts and ethereum work, 2017, URL – start-page: 112 year: 2015 end-page: 125 ident: b193 article-title: The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication publication-title: Int. Workshop on Open Problems in Network Secur – year: 2018 ident: b49 article-title: Anatomy of threats to the Internet of Things publication-title: IEEE Commun. Surv. Tutor. – year: 2017 ident: b153 article-title: Yes, Bitcoin Can Do Smart Contracts and Particl Demonstrates How – reference: C. Wang, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in: Proc. 29th Annu. IEEE Int. Conf. Comput. Commun., INFOCOM’10, 2010, pp. 1–9. – reference: I. Eyal, E.G. Sirer, Majority is not enough: Bitcoin mining is vulnerable, in: 2014 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’14, Springer, pp. 436–454. – start-page: 270 year: 2016 end-page: 282 ident: b111 article-title: Town crier: an authenticated data feed for smart contracts publication-title: Proc. 23rd ACM Conf. Comput. Commun. Secur., CCS’ 16 – volume: 54 start-page: 2787 year: 2010 end-page: 2805 ident: b38 article-title: The Internet of Things: A survey publication-title: Comput. Netw. – reference: R. Kotla, L. Alvisi, M. Dahlin, A. Clement, E. Wong, Zyzzyva: Speculative byzantine fault tolerance, in: Proc. 21st ACM SIGOPS Symp. Operating Syst. Principles, SOSP ’07, Vol. 41, pp. 45–58. – start-page: 4 year: 2013 end-page: 5 ident: b8 article-title: Cloud security: Attacks and current defenses publication-title: Pro. 8th Annu. Symp. Informat. Assurance, ASIA13 – reference: . I.O.T.A, IOTA, 2017, URL – reference: K. Korpela, J. Hallikas, T. Dahlberg, Digital supply chain transformation toward Blockchain integration, in: Proc. 50th Hawaii Int. Conf. Syst. Sci, 2017. – year: 2016 ident: b67 article-title: Economics of Blockchain – reference: X. Wang, K. Zheng, X. Niu, B. Wu, C. Wu, Detection of command and control in advanced persistent threat based on independent access, in: Proc. 2016 IEEE Int. Conf. Commun., ICC’ 16, 2016, pp. 1–6. – volume: 16 start-page: 133 year: 1998 end-page: 169 ident: b82 article-title: The part-time parliament publication-title: ACM Trans. Comput. Syst. – reference: Ethereum, 2017, URL – volume: 13 start-page: 2240 year: 2018 end-page: 2255 ident: b39 article-title: The impact of link duration on the integrity of distributed mobile networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 9 start-page: 5943 year: 2016 end-page: 5964 ident: b188 article-title: FairAccess: A new Blockchain-based access control framework for the Internet of Things publication-title: Secur. Commun. Netw. – reference: M. Vasek, M. Thornton, T. Moore, Empirical analysis of denial-of-service attacks in the bitcoin ecosystem, in: 2014 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’14, Springer, pp. 57–71. – reference: Fabric, 2017, URL – start-page: 459 year: 2014 end-page: 474 ident: b175 article-title: Zerocash: Decentralized anonymous payments from Bitcoin publication-title: Proc. 35th IEEE Symp. Secur. Privacy, SP’ 14 – reference: E. Heilman, A. Kendler, A. Zohar, S. Goldberg, Eclipse attacks on bitcoin’s peer-to-peer network, in: Proc. 24th USENIX Secur. Symp., USENIX Secur.’ 15, Washington, D.C., 2015, pp. 129–144. – reference: M. Katagi, S. Moriai, Lightweight cryptography for the Internet of Things. – start-page: 475 year: 2014 end-page: 490 ident: b209 article-title: Permacoin: Repurposing bitcoin work for data preservation publication-title: Proc. 35th IEEE Symp. Secur. Privacy, SP’ 14 – reference: . Vbuterin, On sharding blockchains, 2017, URL – year: 2017 ident: b150 article-title: How Smart Contracts Will Kill Bureaucracy – year: 2016 ident: b44 article-title: Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) – reference: M. Smache, N.E. Mrabet, J.J. Gilquijano, A. Tria, E. Riou, C. Gregory, Modeling a node capture attack in a secure wireless sensor networks, in: 2016 Proc IEEE 3rd World Forum on Internet of Things, WF-IoT’16, 2016, pp. 188–193. – volume: 32 start-page: 824 year: 1985 end-page: 840 ident: b219 article-title: Asynchronous consensus and broadcast protocols publication-title: J. ACM – reference: G. Zyskind, O. Nathan, A.S. Pentland, Decentralizing privacy: Using blockchain to protect personal data, in: 2015 Proc. IEEE Secur. and Privacy Workshops, SPW’15, IEEE, pp. 180–184. – year: 2014 ident: b231 article-title: Toward a 12-second block time – year: 2007 ident: b77 article-title: Fault-Tolerant Real-Time Systems: The Problem of Replica Determinism, vol. 345 – volume: 2015 start-page: 584 year: 2015 ident: b182 article-title: How to securely prolong the computational bindingness of pedersen commitments publication-title: IACR Cryptol. EPrint Archive – start-page: 523 year: 2017 end-page: 533 ident: b187 article-title: Towards a novel privacy-preserving access control model based on blockchain technology in IoT publication-title: Europe and MENA Cooperation Advances in Inf. and Communication Technologies – reference: A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, in: 2017 Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, pp. 618–623. – reference: MONERO, 2017, URL – year: 2011 ident: b204 article-title: Computer Networks – volume: 27 start-page: 228 year: 1980 end-page: 234 ident: b85 article-title: Reaching agreement in the presence of faults publication-title: J. ACM – year: 2015 ident: b31 article-title: Blockchain – volume: vol. 2 start-page: 825 year: 2004 end-page: 830 ident: b147 article-title: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks publication-title: 2004 IEEE Wireless Commun. and Networking Conf., IEEE Cat. No.04TH8733 – volume: 17 start-page: 2347 year: 2015 end-page: 2376 ident: b37 article-title: Internet of things: A survey on enabling technologies, protocols, and applications publication-title: IEEE Commun. Surv. Tutor. – start-page: 169 year: 2009 end-page: 178 ident: b184 article-title: Fully homomorphic encryption using ideal lattices publication-title: Proc. of the 41st Annu. ACM Symp. on Theory of Computing – reference: Sawtooth, 2017, URL – reference: H.F. Atlam, A. Alenezi, A. Alharthi, R.J. Walters, G.B. Wills, Integration of cloud computing with Internet of Things: Challenges and open issues, in: 2017 Proc. IEEE Int. Conf. Internet of Things (iThings) and IEEE Green Comput. Commun. (GreenCom) and IEEE Cyber, Physical Social Comput. (CPSCom) and IEEE Smart Data (SmartData), pp. 670–675, – reference: D. Ghosh, How the byzantine general sacked the castle: A look into blockchain, 2016-04-06, URL – reference: G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain - or-rewriting history in bitcoin and friends, in: 2017 IEEE Eur. Symp. Secur. Privacy, EuroSP’ 17, 2017, pp. 111–126. – volume: 1 start-page: 21 year: 2017 ident: b15 article-title: Blockchain for IoT: The tradeoff between consistency and capacity publication-title: Chin. J. Internet of Things – reference: M. Castro, B. Liskov, Practical Byzantine fault tolerance, in: Proc. 3rd Symp. Operating Syst. Des. Implementation, OSDI’99, New Orleans, USA, 1999. – reference: G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 2014, URL – reference: K. Nayak, S. Kumar, A. Miller, E. Shi, Stubborn mining: Generalizing selfish mining and combining with an eclipse attack, in: 2016 Proc. IEEE Eur. Symp. Secur. Privacy, EuroSP’ 16, pp. 305–320. – reference: Difficulty, 2017, URL – year: 2017 ident: b234 article-title: PoW vs. PoS – reference: N. Namvar, W. Saad, N. Bahadori, B. Kelley, Jamming in the Internet of Things: A game-theoretic perspective, in: 2016 IEEE Global Commun. Conf., GLOBECOM, 2016, pp. 1–6. – volume: 2016 start-page: 1 year: 2016 ident: b9 article-title: Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique publication-title: Int. J. Digit. Multimed. Broadcast. – volume: 44 start-page: 51 year: 2011 end-page: 58 ident: b53 article-title: Securing the Internet of Things publication-title: Comput. – reference: B. Westermann, D. Gligoroski, S. Knapskog, Comparison of the power consumption of the 2nd round SHA-3 candidates, in: in: M. Gusev, P. Mitrevski (Eds.) Proc. 2nd Int. Conf. ICT Innovations, Berlin, Heidelberg, 2010, pp. 102–113. – reference: Sawtooth lake documentation, 2017, URL – reference: M. Lauridsen, I.Z. Kovacs, P. Mogensen, M. Sorensen, S. Holst, Coverage and capacity analysis of LTE-M and NB-IoT in a rural area, in: Proc. 84th IEEE Vehicular Technol. Conf., VTC-Fall’16, 2016, pp. 1–5. – start-page: 53 year: 2002 end-page: 65 ident: b161 article-title: Kademlia: A peer-to-peer information system based on the XOR metric publication-title: Peer-to-Peer Syst.: 1st Int. Workshop, IPTPS’ 02 – start-page: 31 year: 2016 end-page: 42 ident: b221 article-title: The honey badger of bft protocols publication-title: Proc. 23rd ACM Conf. Comput. Commun. Secur., CCS’ 16 – volume: 2015 start-page: 1168 year: 2015 ident: b198 article-title: SCP: A computationally-scalable Byzantine consensus protocol for Blockchains publication-title: IACR Cryptol. EPrint Archive – reference: Y. Sompolinsky, A. Zohar, Secure high-rate transaction processing in bitcoin, in: 2015 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’15, Springer, pp. 507–527. – start-page: 197 year: 2013 end-page: 223 ident: b162 article-title: An analysis of anonymity in the bitcoin system publication-title: Secur. and Privacy in Social Networks – year: 2016 ident: b28 article-title: How can Blockchain Improve Cloud Computing – reference: A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in internet of things: Challenges and solutions, 2016, – volume: 1 start-page: 9 year: 2011 end-page: 52 ident: b45 article-title: Internet of Things strategic research roadmap publication-title: Internet of Things-Global Technol. Soc. Trends – reference: Nxt, 2018, URL – year: 2018 ident: b100 article-title: Billions of Tokens Theft Case cause by ETH Ecological Defects – reference: Blockchain, 2017, URL – reference: C. Cachin, K. Kursawe, F. Petzold, V. Shoup, Secure and efficient asynchronous broadcast protocols, in: 2001 Proc. Annu. Int. Cryptology Conf., CRYPTO ’01, Springer, pp. 524–541. – volume: vol. 5 start-page: V5 year: 2010 end-page: 376 ident: b239 article-title: Future internet: The Internet of Things publication-title: Proc. 3rd Int. Conf. Advanced Comput. Theory Eng., ICACTE’ 10 – reference: B. Leiding, P. Memarmoshrefi, D. Hogrefe, Self-managed and blockchain-based vehicular ad-hoc networks, in: 2016 Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput.: Adjunct, New York, NY, USA, pp. 137–140. – reference: Bitcoin, 2017-05-20, URL – volume: SE-12 start-page: 477 year: 1986 end-page: 482 ident: b80 article-title: Distributed agreement in the presence of processor and communication faults publication-title: IEEE Trans. Softw. Eng. – reference: H.C. Pöhls, JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application, in: Proc. 9th Int. Conf. Innovative Mobile Internet Serv. in Ubiquitous Comput., IMIS’15, 2015, pp. 306–312. – volume: 5 start-page: 586 year: 2017 end-page: 602 ident: b59 article-title: A comprehensive study of security of Internet-of-Things publication-title: IEEE Trans. Emerg. Top. Comput. – year: 2018 ident: b46 article-title: Distributed online learning of fog computing under non-uniform device cardinality publication-title: IEEE Internet of Things J. – volume: 12 start-page: 656 year: 1983 end-page: 666 ident: b78 article-title: Authenticated algorithms for Byzantine agreement publication-title: SIAM J. Comput. – year: 2017 ident: b41 article-title: Internet of Things: Architectures, protocols, and applications publication-title: J. Electr. Comput. Eng. – reference: Protocol rules, 2016, URL – reference: S. Raza, D. Trabalza, T. Voigt, 6LoWPAN Compressed DTLS for CoAP, in: Proc. 8th IEEE Int. Conf. Distributed Computing in Sensor Syst., DCOSS’12, 2012, pp. 287–289. – reference: N. Atzei, M. Bartoletti, T. Cimoli, A survey of attacks on ethereum smart contracts (SoK), in: Proc. 6th Int. Conf. Principles Secur. Trust, 2017, pp. 164–186. – year: 2011 ident: b203 article-title: US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) – volume: 12 year: 2016 ident: b34 article-title: Beyond the internet of things: The social networking of machines publication-title: Int. J. Distrib. Sens. Netw. – volume: 10 start-page: 2233 year: 2014 end-page: 2243 ident: b36 article-title: Internet of things in industries: A survey publication-title: IEEE Trans. Ind. Inf. – volume: 16 start-page: 77 year: 2014 end-page: 97 ident: b47 article-title: Data mining for Internet of Things: A survey publication-title: IEEE Commun. Surv. Tutor. – year: 2017 ident: b27 article-title: What Blockchain Means for You, and the Internet of Things – reference: M. Conti, C. Lal, S. Ruj, et al. A survey on security and privacy issues of bitcoin, 2017, arXiv preprint URL – reference: Ethereum homestead documentation–the homestead release, 2016, URL – start-page: 6 year: 2013 end-page: 24 ident: b164 article-title: Quantitative Analysis of the Full Bitcoin Transaction Graph – volume: 45 start-page: 245 year: 2004 end-page: 259 ident: b241 article-title: Spatio-temporal correlation: Theory and applications for wireless sensor networks publication-title: Comput. Netw. – volume: 35 start-page: 2606 year: 2017 end-page: 2615 ident: b7 article-title: Optimal schedule of mobile edge computing for Internet of Things using partial information publication-title: IEEE J. Sel. Areas Commun. – volume: 52 start-page: 121 year: 2009 end-page: 125 ident: b2 article-title: Security challenges of the EPCglobal network publication-title: Commun. ACM – volume: 19 start-page: 48 year: 2012 end-page: 59 ident: b133 article-title: Real-time communication over unreliable wireless links: A theory and its applications publication-title: IEEE Wirel. Commun. – reference: S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, S. Savage, A fistful of bitcoins: Characterizing payments among men with no names, in: 2013 Proc. Conf. Internet measurement, ACM, pp. 127–140. – reference: Bitcoin developer guide, 2017, URL – start-page: 8 year: 1988 end-page: 17 ident: b218 article-title: Viewstamped replication: A new primary copy method to support highly-available distributed systems publication-title: Proc. 7th Annu. ACM Symp. on Principles Distrib. Comput – year: 2016 ident: b228 article-title: The Tangle – reference: . ethernodes.org, Network number 1, 2017, URL – volume: 1 start-page: 77 year: 1988 end-page: 94 ident: b172 article-title: Zero-knowledge proofs of identity publication-title: J. Cryptology – start-page: 720 year: 2015 end-page: 731 ident: b176 article-title: Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges publication-title: Proc. 22nd ACM Conf. Comput. Commun. Secur., CCS’ 15 – volume: 16 start-page: 414 year: 2014 end-page: 454 ident: b35 article-title: Context aware computing for the internet of things: A survey publication-title: IEEE Commun. Surv. Tutor. – year: 2012 ident: b215 article-title: Proof of Burn – reference: Blockchain-oracles, 2018, URL – volume: 4 start-page: 2292 year: 2016 end-page: 2303 ident: b12 article-title: Blockchains and smart contracts for the Internet of Things publication-title: IEEE Access – reference: Y. Rahulamathavan, R.C.W. Phan, S. Misra, M. Rajarajan, Privacy-preserving Blockchain based IoT Ecosystem using attribute-based encryption, in: 2017 Proc. IEEE Int. Conf. Advanced Netw. Telecommun. Syst, Odisha, India. – year: 1996 ident: b149 article-title: Smart contracts: Building blocks for digital markets publication-title: EXTROPY: J. Transhumanist Thought – reference: K.H. Wang, B. Li, Group mobility and partition prediction in wireless ad-hoc networks, in: 2002 Proc. IEEE Int. Conf. Commun., ICC’ 02, Vol. 2, pp. 1017–1021. – reference: A.S.d.P. Crespo, L.I.C. García, Stampery Blockchain Timestamping Architecture (BTA)-Version 6, 2017, arXiv preprint URL – start-page: 89 year: 2015 end-page: 103 ident: b207 article-title: The miner’s dilemma publication-title: Proc. 36th IEEE Symp. Secur. Privacy, SP’ 15 – reference: K. Biswas, V. Muthukkumarasamy, Securing smart cities using blockchain technology, in: Proc. 18th IEEE Int. Conf. High Performance Comput. Commun.; 14th IEEE Int. Conf. Smart City; 2nd IEEE Int. Conf. Data Sci. Syst., HPCC/SmartCity/DSS’16, 2016, pp. 1392–1393. – reference: . – year: 2014 ident: b24 article-title: ADEPT: An IoT Practitioner Perspective – volume: 4 start-page: 1125 year: 2017 end-page: 1142 ident: b54 article-title: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications publication-title: IEEE Internet of Things J. – year: 2016 ident: b103 article-title: Ethereum Continues to Suffer From DDoS Attacks – start-page: 906 year: 2012 end-page: 917 ident: b92 article-title: Double-spending fast payments in bitcoin publication-title: Proc. 19th ACM Conf. Comput. Commun. Secur., CCS’12 – start-page: 81 year: 2017 end-page: 84 ident: b143 article-title: Motivating urban cycling through a blockchain-based financial incentives system publication-title: 2017 Proc. ACM Int. Joint Conf. Pervasive and Ubiquitous Comput. and 2017 Proc ACM Int. Symp. on Wearable Computers, UbiComp ’17 – volume: 9 start-page: 49 year: 2011 end-page: 51 ident: b108 article-title: Stuxnet: Dissecting a cyberwarfare weapon publication-title: IEEE Secur. Privacy – start-page: 433 year: 1992 end-page: 444 ident: b173 article-title: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack – volume: 1 start-page: 222 year: 1983 end-page: 238 ident: b81 article-title: Fail-stop processors: An approach to designing fault-tolerant computing systems publication-title: ACM Trans. Comput. Syst. – start-page: 173 year: 2017 end-page: 178 ident: b121 article-title: Towards an optimized blockchain for IoT publication-title: Proc. 2rd Int. Conf. Internet-of-Things Design Implementation – reference: Wallet knowledge base, 2018, URL – volume: 19 start-page: 68 year: 2017 end-page: 72 ident: b10 article-title: Can Blockchain strengthen the Internet of Things? publication-title: IT Prof. – reference: Z. Zheng, S. Xie, H.-N. Dai, H. Wang, Blockchain challenges and opportunities: A survey, Int. J. Web Grid Services. – reference: X. Wang, X. Zha, G. Yu, W. Ni, R.P. Liu, Y.J. Guo, X. Niu, K. Zheng, Attack and defence of ethereum remote APIs, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018. – reference: D. Ron, A. Shamir, Quantitative analysis of the full bitcoin transaction graph, in: 2013 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’13, Springer, pp. 6–24. – reference: G. Maxwell, Confidential transaction, the initial investigation, URL – year: 2017 ident: b132 article-title: Going Off Chain for Storage – start-page: 89 year: 2006 end-page: 98 ident: b183 article-title: Attribute-based encryption for fine-grained access control of encrypted data publication-title: Proc. 13th ACM Conf. Comput. Commun. Secur – year: 2014 ident: b214 article-title: Tendermint: Consensus without mining – year: 2017 ident: b170 article-title: Mixing Service – volume: 22 start-page: 49 year: 2009 end-page: 71 ident: b84 article-title: The heard-of model: Computing in distributed systems with benign faults publication-title: Distrib. Comput. – year: 2016 ident: b148 article-title: Decentralized Applications: Harnessing Bitcoin’s Blockchain Technology – reference: G. Yu, X. Wang, X. Zha, J.A. Zhang, R.P. Liu, An optimized round-robin scheduling of speakers for peers-to-peers-based byzantine faulty tolerance, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018. – volume: 20 start-page: 2543 year: 2018 end-page: 2585 ident: b19 article-title: A survey on anonymity and privacy in bitcoin-like digital cash systems publication-title: IEEE Commun. Surv. Tutor. – start-page: 15 year: 2018 ident: b98 article-title: Low-Resource Eclipse Attacks on Ethereum’s Peer-To-Peer Network – start-page: 1 year: 2015 end-page: 50 ident: b3 article-title: The Internet of Things: An overview – volume: 4 start-page: 1 year: 2015 end-page: 13 ident: b51 article-title: Internet of Things: Features, challenges, and vulnerabilities publication-title: Int. J. Adv. Comput. Sci. Inf. Technol. – year: 2011 ident: b93 article-title: Best Practice for Fast Transaction Acceptance-How High Is the Risk – start-page: 251 year: 2002 end-page: 260 ident: b201 article-title: The sybil attack publication-title: 2002 Proc. Int. Workshop Peer-to-Peer Syst – year: 2001 ident: b83 article-title: A Versatile and Modular Consensus Protocol – year: 2014 ident: b25 article-title: Device Democracy: Saving the Future of the Internet of Things – reference: , 2017-05-22. – reference: Etherscan, 2017, URL – start-page: 239 year: 2016 end-page: 278 ident: b189 article-title: Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money publication-title: Banking Beyond Banks and Money – volume: 11 start-page: 856 year: 2017 end-page: 869 ident: b242 article-title: Kernel-Based reconstruction of space-time functions on dynamic graphs publication-title: IEEE J. Sel. Topics Signal Process. – volume: 5 start-page: 13787 year: 2017 end-page: 13798 ident: b55 article-title: Achieving efficient detection against false data injection attacks in smart grid publication-title: IEEE Access – year: 2016 ident: b72 article-title: Blockchain in Capital Markets – year: 2017 ident: b118 article-title: Light Client Protocol – start-page: 839 year: 2016 end-page: 858 ident: b171 article-title: Hawk: The Blockchain model of cryptography and privacy-preserving smart contracts publication-title: Proc. 37th IEEE Symp. Secur. Privacy, SP’ 16 – reference: F. Al-Doghman, Z. Chaczko, J. Jiang, A review of aggregation algorithms for the internet of things, in: Proc. 25th Int. Conf. Syst. Eng., ICSEng’17, 2017, pp. 480–487. – start-page: 680 year: 2015 end-page: 691 ident: b208 article-title: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions publication-title: Proc. 22nd ACM Conf. Comput. Commun. Secur., CCS’ 15 – reference: Size of the bitcoin blockchain from 2010 to 2017, by quarter, Dec, 2017, URL – reference: R. Neisse, G. Steri, I. Nai-Fovino, A blockchain-based approach for data accountability and provenance tracking, 2017, arXiv preprint URL – volume: 13 start-page: 184 year: 2017 end-page: 195 ident: b16 article-title: Block-VN: A distributed blockchain based vehicular network architecture in smart city publication-title: J. Inf. Process. Syst. – volume: 2013 year: 2013 ident: b229 article-title: Accelerating bitcoin’s transaction processing. Fast money grows on trees, not chains publication-title: IACR Cryptol. EPrint Archive – volume: 11 start-page: 2241 year: 2016 end-page: 2254 ident: b61 article-title: Virus propagation modeling and convergence analysis in large-scale networks publication-title: IEEE Trans. Inf. Forensics Secur. – reference: J.K. Liu, D.S. Wong, Linkable ring signatures: Security models and new schemes, in: 2005 Proc. Int. Conf. Computational Sci. and Its Appl, Springer, pp. 614–623. – start-page: 225 year: 2016 ident: b192 article-title: Blockchain technology: Principles and applications publication-title: Research Handbook on Digital Transformations – year: 2017 ident: b152 article-title: A Solution for the Problems of Translation and Transparency in Smart Contracts – volume: 11 start-page: 320 year: 2012 end-page: 336 ident: b56 article-title: Protecting location privacy in sensor networks against a global eavesdropper publication-title: IEEE Trans. Mobile Comput. – start-page: 15 year: 2014 end-page: 29 ident: b167 article-title: Deanonymisation of clients in Bitcoin P2P network publication-title: Proc. 21st ACM Conf. Comput. Commun. Secur., CCS’ 14 – reference: Burrow, 2017, URL – year: 2018 ident: b154 article-title: How Do Ethereum Smart Contracts Work? – volume: 1 start-page: 372 year: 2014 end-page: 383 ident: b58 article-title: Sybil attacks and their defenses in the Internet of Things publication-title: IEEE Internet of Things J. – year: 2015 ident: b213 article-title: Proof of Stake versus Proof of Work – reference: A. Boudguiga, N. Bouzerna, L. Granboulan, et al. Towards better availability and accountability for IoT updates by means of a Blockchain, in: Proc. 2017 IEEE Eur. Symp. Secur. Privacy Workshops, EuroSPW, Paris, France, 2017. – year: 2014 ident: b212 article-title: Blackcoin as Proof-Of-Stake Protocol v2 – reference: RSK, 2018, URL – volume: 3 start-page: 13 year: 2013 end-page: 22 ident: b135 article-title: An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for Internet of Things publication-title: IEEE J. Emerg. Sec. Top. Circuits Syst. – volume: 8 start-page: 367 year: 2015 end-page: 376 ident: b5 article-title: Combination of cloud computing and Internet of Things (IOT) in medical monitoring systems publication-title: Int. J. Hybrid Inform. Technol. – reference: Intel software guard extensions, 2017, URL – reference: G. Zyskind, O. Nathan, A. Pentland, Enigma: Decentralized computation platform with guaranteed privacy, 2015, arXiv preprint URL – start-page: 34 year: 2013 end-page: 51 ident: b163 article-title: Evaluating user privacy in bitcoin publication-title: Financial Cryptography and Data Secur.: 17th Int. Conf., FC 2013, Okinawa, Japan, April 1–5, 2013, Revised Selected Papers – reference: D.W. Kravitz, J. Cooper, Securing user identity and transactions symbiotically: IoT meets Blockchain, in: 2017 Proc. Global Internet Things Summit, GIoTS’17, pp. 1–6. – start-page: 134 year: 1998 end-page: 148 ident: b86 article-title: Efficient byzantine agreement secure against general adversaries publication-title: Distrib. Comput. – start-page: 17 year: 2016 end-page: 30 ident: b199 article-title: A secure sharding protocol for open blockchains publication-title: Proc. 23rd ACM Conf. Comput. Commun. Secur., CCS’ 16 – year: 2018 ident: b40 article-title: Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city publication-title: IEEE Internet of Things J. – reference: How do Bitcoin Transactions Work? 2015-03-20, URL – year: 2015 ident: b94 article-title: Preventing the 51%-Attack: A Stochastic Analysis of Two Phase Proof of Work in Bitcoin – volume: 9 year: 2017 ident: b52 article-title: A security framework for the Internet of Things in the future internet architecture publication-title: Future Internet – year: 2014 ident: b240 article-title: Enabling Blockchain Innovations with Pegged Sidechains – reference: S. Verbücheln, How perfect offline wallets can still leak bitcoin private keys, 2015, arXiv preprint URL – reference: Raspberry pi, 2017, URL – reference: V. Daza, R.D. Pietro, I. Klimek, M. Signorini, CONNECT: CONtextual name discovery for Blockchain-based services in the IoT, in: 2017 Proc. IEEE Int. Conf. Commun., ICC’17, pp. 1–6. – start-page: 29 year: 2004 end-page: 37 ident: b113 article-title: Detecting and correcting malicious data in vanets publication-title: Proc.1st ACM Int. Workshop Vehicular Ad Hoc Netw., VANET ’04 – reference: Y. Guo, C. Mate, Jr., Crysto: A Scalable and Permission-less Blockchain Platform, URL – volume: 17 start-page: 44 year: 2010 end-page: 51 ident: b138 article-title: From today’s INTRAnet of Things to a future INTERnet of Things: A wireless- and mobility-related view publication-title: IEEE Wirel. Commun. – volume: 26 start-page: 23 year: 2010 end-page: 30 ident: b4 article-title: Internet of Things – New security and privacy challenges publication-title: Comput. Law Secur. Review – reference: S. Huh, S. Cho, S. Kim, Managing IoT devices using Blockchain platform, in: Proc. 19th Int. Conf. Advanced Commun. Technol., ICACT’ 17, 2017, pp. 464–467. – volume: 55 start-page: 78 year: 2017 end-page: 85 ident: b195 article-title: DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks publication-title: IEEE Commun. Mag. – volume: 19 start-page: 171 year: 2014 end-page: 209 ident: b29 article-title: Big data: A survey publication-title: Springer Mobile Netw. Appl. – reference: G. Gan, Z. Lu, J. Jiang, Internet of Things security analysis, in: 2011 Int. Conf. Internet Technol. and Appl, 2011, pp. 1–4. – volume: 8 start-page: 1207 year: 2011 end-page: 1228 ident: b145 article-title: TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things publication-title: Comput. Sci. Inf. Syst. – reference: X. Zha, K. Zheng, D. Zhang, Anti-pollution source location privacy preserving scheme in wireless sensor networks, in: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON, 2016, pp. 1–8, URL – reference: Ethereum mining hardware, 2017, URL – start-page: 363 year: 2010 end-page: 376 ident: b220 article-title: The next 700 BFT protocols publication-title: Proc. 5th Eur. Conf. Comput. Syst – start-page: 454 year: 2011 end-page: 465 ident: b87 article-title: High performance state-machine replication publication-title: Proc. 41st Int. Conf. Depend. Syst. Netw., DSN’ 11 – year: 2014 ident: b169 article-title: An Analysis of Anonymity in Bitcoin Using P2P Network Traffic – year: 2017 ident: b116 article-title: The IOTA Lightwallet – year: 2015 ident: b90 article-title: On public and private blockchains publication-title: Ethereum Blog – volume: 1 start-page: 1 year: 2016 end-page: 18 ident: b181 article-title: Ring confidential transactions publication-title: Ledger – volume: 6 start-page: 260 year: 2005 end-page: 279 ident: b63 article-title: Is practitioners’ views on core concepts of information integrity publication-title: Int. J. Account. Inf. Syst. – reference: M. Mihaylov, S. Jurado, N. Avellana, K.V. Moffaert, I.M. de Abril, A. Nowé, Nrgcoin: virtual currency for trading of renewable energy in smart grids, in: Proc. 11th Int. Conf. Eur. Energy Market, EEM14, 2014, pp. 1–6. – volume: 2 start-page: 6 year: 2016 end-page: 10 ident: b33 article-title: BlockChain technology: Beyond bitcoin publication-title: Appl. Innov. – reference: R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, NB-IoT system for M2M communication, in: 2016 Proc. IEEE Wireless Commun. and Netw. Conf. Workshops, WCNCW’16, pp. 1–5. – volume: 14 year: 2017 ident: b106 article-title: Lightweight break-glass access control system for healthcare Internet-of-Things publication-title: IEEE Trans. Ind. Inf. – reference: Hyperledger, 2015, URL – reference: . I.B.M., Watson Internet of Things, 2017, URL – volume: 12 start-page: 2261 year: 2017 end-page: 2275 ident: b48 article-title: Collaborative authentication in decentralized dense mobile networks with key predistribution publication-title: IEEE Trans. Inf. Forensics Secur. – reference: Stale block, 2017, URL – volume: 42 start-page: 34 year: 2014 end-page: 37 ident: b211 article-title: Proof of activity: Extending Bitcoin’s proof of work via proof of stake publication-title: SIGMETRICS Perform. Eval. Rev. – year: 2017 ident: b60 article-title: Anatomy of an IoT malware attack – reference: T. Crain, V. Gramoli, M. Larrea, M. Raynal, (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains, 2017, arXiv preprint URL – reference: R.C. Merkle, Protocols for public key cryptosystems, in: Proc. 1st IEEE Symp. Secur. Privacy, SP’ 80, 1980, pp. 122–122, – reference: Oraclize, 2018, URL – start-page: 397 year: 2013 end-page: 411 ident: b174 article-title: Zerocoin: Anonymous distributed e-cash from Bitcoin publication-title: Proc. 34th IEEE Symp. Secur. Privacy, SP’ 13 – reference: Mining bitcoin only with raspberry pi, 2016, URL – year: 2015 ident: b70 article-title: Discovering Bitcoin’s public topology and influential nodes – volume: 31 start-page: 5 year: 2017 end-page: 21 ident: b151 article-title: Toward blockchain-based accounting and assurance publication-title: J. Inf. Syst. – reference: B. Betts, Blockchain and the promise of cooperative cloud storage, URL – reference: J.S. Lee, Y.W. Su, C.C. Shen, A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi, in: Proc. 33rd Annu. Conf. the IEEE Ind. Elect. Soc., IECON’07, 2007, pp. 46–51. – volume: 118 start-page: 158 year: 1995 end-page: 179 ident: b79 article-title: Atomic broadcast: From simple message diffusion to Byzantine agreement publication-title: Inform. and Comput. – year: 1997 ident: b210 article-title: The Idea of Smart Contracts – reference: Elements project, 2017, URL – year: 2015 ident: b32 article-title: A Gentle Introduction to Blockchain Technology – reference: J. Chen, S.H.G. Chan, S.C. Liew, Mixed-mode WLAN: The integration of ad hoc mode with wireless LAN infrastructure, in: 2003 Proc. IEEE Global Telecommun. Conf., GLOBECOM ’03, Vol. 1, pp. 231–235. – start-page: 63 year: 2015 end-page: 77 ident: b206 article-title: When bitcoin mining pools run dry publication-title: 2015 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’15 – reference: A. Fongen, Identity management and integrity protection in the Internet of Things, in: Proc. 3rd Int. Conf. Emerg. Secur. Technol., EST’12, 2012, pp. 111–114. – volume: 55 start-page: 70 year: 2017 end-page: 75 ident: b107 article-title: Energy big data security threats in IoT-based smart grid communications publication-title: IEEE Commun. Mag. – volume: 101 start-page: 63 year: 2016 end-page: 80 ident: b140 article-title: Urban planning and building smart cities based on the internet of things using big data analytics publication-title: Comput. Netw. – volume: 4 start-page: 382 year: 1982 end-page: 401 ident: b76 article-title: The Byzantine generals problem publication-title: ACM Trans. Program. Lang. Syst. – volume: vol. 4 start-page: 325 year: 2004 end-page: 335 ident: b177 article-title: Linkable spontaneous anonymous group signature for ad hoc groups publication-title: ACISP – reference: M. Rosenfeld, Analysis of bitcoin pooled mining reward systems, 2011, arXiv preprint URL – year: 2014 ident: b142 article-title: Ethereum: A next-generation smart contract and decentralized application platform – reference: D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm, in: 2014 Proc. USENIX Annu. Tech. Conf., USENIX ATC 14, Philadelphia, PA, pp. 305–319. – volume: 18 start-page: 2084 year: 2016 end-page: 2123 ident: b30 article-title: Bitcoin and beyond: A technical survey on decentralized digital currencies publication-title: IEEE Commun. Surv. Tutor. – start-page: 279 year: 2016 end-page: 296 ident: b89 article-title: Enhancing bitcoin security and performance with strong consistency via collective signing publication-title: Proc. 25th USENIX Secur. Symp., USENIX Secur. 16 – reference: N. van Saberhagen, Cryptonote v 2. 0, 2013. – reference: Why 0chain, not IOTA, is ideal for IOT apps, Dec, 2017, URL – reference: . I.O.T.A, Light vs. Full Node, URL – year: Feb, 2015 ident: b155 article-title: ABOUT – volume: 101 start-page: 63 issue: Supplement C year: 2016 ident: 10.1016/j.comcom.2019.01.006_b140 article-title: Urban planning and building smart cities based on the internet of things using big data analytics publication-title: Comput. Netw. doi: 10.1016/j.comnet.2015.12.023 – start-page: 15 year: 2018 ident: 10.1016/j.comcom.2019.01.006_b98 – volume: 19 start-page: 48 issue: 1 year: 2012 ident: 10.1016/j.comcom.2019.01.006_b133 article-title: Real-time communication over unreliable wireless links: A theory and its applications publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2012.6155876 – start-page: 53 year: 2002 ident: 10.1016/j.comcom.2019.01.006_b161 article-title: Kademlia: A peer-to-peer information system based on the XOR metric – ident: 10.1016/j.comcom.2019.01.006_b190 doi: 10.1109/GLOCOMW.2018.8644251 – year: 2016 ident: 10.1016/j.comcom.2019.01.006_b228 – ident: 10.1016/j.comcom.2019.01.006_b102 doi: 10.1007/978-3-662-44774-1_5 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b234 – volume: 26 start-page: 23 issue: 1 year: 2010 ident: 10.1016/j.comcom.2019.01.006_b4 article-title: Internet of Things – New security and privacy challenges publication-title: Comput. Law Secur. Review doi: 10.1016/j.clsr.2009.11.008 – year: 2015 ident: 10.1016/j.comcom.2019.01.006_b213 – volume: 31 start-page: 5 issue: 3 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b151 article-title: Toward blockchain-based accounting and assurance publication-title: J. Inf. Syst. – ident: 10.1016/j.comcom.2019.01.006_b137 – volume: 4 start-page: 2292 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b12 article-title: Blockchains and smart contracts for the Internet of Things publication-title: IEEE Access doi: 10.1109/ACCESS.2016.2566339 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b152 – ident: 10.1016/j.comcom.2019.01.006_b235 – start-page: 29 year: 2004 ident: 10.1016/j.comcom.2019.01.006_b113 article-title: Detecting and correcting malicious data in vanets – start-page: 251 year: 2002 ident: 10.1016/j.comcom.2019.01.006_b201 article-title: The sybil attack – ident: 10.1016/j.comcom.2019.01.006_b126 – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b25 – ident: 10.1016/j.comcom.2019.01.006_b200 – year: 2018 ident: 10.1016/j.comcom.2019.01.006_b100 – ident: 10.1016/j.comcom.2019.01.006_b69 – volume: 3 start-page: 13 issue: 1 year: 2013 ident: 10.1016/j.comcom.2019.01.006_b135 article-title: An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for Internet of Things publication-title: IEEE J. Emerg. Sec. Top. Circuits Syst. doi: 10.1109/JETCAS.2013.2243631 – year: 2018 ident: 10.1016/j.comcom.2019.01.006_b40 article-title: Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city publication-title: IEEE Internet of Things J. doi: 10.1109/JIOT.2018.2872442 – volume: 2016 start-page: 1 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b9 article-title: Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique publication-title: Int. J. Digit. Multimed. Broadcast. doi: 10.1155/2016/8789397 – ident: 10.1016/j.comcom.2019.01.006_b97 doi: 10.1109/EuroSP.2016.32 – year: 2018 ident: 10.1016/j.comcom.2019.01.006_b46 article-title: Distributed online learning of fog computing under non-uniform device cardinality publication-title: IEEE Internet of Things J. doi: 10.1109/JIOT.2018.2867481 – ident: 10.1016/j.comcom.2019.01.006_b115 – ident: 10.1016/j.comcom.2019.01.006_b178 doi: 10.1007/11424826_65 – start-page: 134 year: 1998 ident: 10.1016/j.comcom.2019.01.006_b86 article-title: Efficient byzantine agreement secure against general adversaries publication-title: Distrib. Comput. doi: 10.1007/BFb0056479 – ident: 10.1016/j.comcom.2019.01.006_b141 doi: 10.23919/ICACT.2017.7890132 – start-page: 397 year: 2013 ident: 10.1016/j.comcom.2019.01.006_b174 article-title: Zerocoin: Anonymous distributed e-cash from Bitcoin – year: 2016 ident: 10.1016/j.comcom.2019.01.006_b28 – year: 2018 ident: 10.1016/j.comcom.2019.01.006_b49 article-title: Anatomy of threats to the Internet of Things publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2018.2874978 – ident: 10.1016/j.comcom.2019.01.006_b75 – volume: 42 start-page: 34 issue: 3 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b211 article-title: Proof of activity: Extending Bitcoin’s proof of work via proof of stake publication-title: SIGMETRICS Perform. Eval. Rev. doi: 10.1145/2695533.2695545 – year: 2011 ident: 10.1016/j.comcom.2019.01.006_b93 – ident: 10.1016/j.comcom.2019.01.006_b217 – ident: 10.1016/j.comcom.2019.01.006_b136 doi: 10.1007/978-3-642-19325-5_11 – ident: 10.1016/j.comcom.2019.01.006_b222 doi: 10.1007/3-540-44647-8_31 – volume: 22 start-page: 49 issue: 1 year: 2009 ident: 10.1016/j.comcom.2019.01.006_b84 article-title: The heard-of model: Computing in distributed systems with benign faults publication-title: Distrib. Comput. doi: 10.1007/s00446-009-0084-6 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b27 – volume: 54 start-page: 2787 issue: 15 year: 2010 ident: 10.1016/j.comcom.2019.01.006_b38 article-title: The Internet of Things: A survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2010.05.010 – ident: 10.1016/j.comcom.2019.01.006_b186 doi: 10.1145/3098954.3098958 – year: 2008 ident: 10.1016/j.comcom.2019.01.006_b68 – ident: 10.1016/j.comcom.2019.01.006_b223 – ident: 10.1016/j.comcom.2019.01.006_b11 – volume: 4 start-page: 382 issue: 3 year: 1982 ident: 10.1016/j.comcom.2019.01.006_b76 article-title: The Byzantine generals problem publication-title: ACM Trans. Program. Lang. Syst. doi: 10.1145/357172.357176 – start-page: 89 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b207 article-title: The miner’s dilemma – ident: 10.1016/j.comcom.2019.01.006_b21 – ident: 10.1016/j.comcom.2019.01.006_b105 doi: 10.1109/WF-IoT.2016.7845447 – ident: 10.1016/j.comcom.2019.01.006_b109 doi: 10.24251/HICSS.2017.506 – volume: 2015 start-page: 1168 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b198 article-title: SCP: A computationally-scalable Byzantine consensus protocol for Blockchains publication-title: IACR Cryptol. EPrint Archive – start-page: 34 year: 2013 ident: 10.1016/j.comcom.2019.01.006_b163 article-title: Evaluating user privacy in bitcoin – ident: 10.1016/j.comcom.2019.01.006_b159 – ident: 10.1016/j.comcom.2019.01.006_b95 doi: 10.1007/978-3-662-45472-5_28 – year: 2011 ident: 10.1016/j.comcom.2019.01.006_b204 – ident: 10.1016/j.comcom.2019.01.006_b62 doi: 10.1109/ICC.2016.7511197 – volume: 1 start-page: 372 issue: 5 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b58 article-title: Sybil attacks and their defenses in the Internet of Things publication-title: IEEE Internet of Things J. doi: 10.1109/JIOT.2014.2344013 – ident: 10.1016/j.comcom.2019.01.006_b99 doi: 10.1007/978-3-662-54455-6_8 – year: 2016 ident: 10.1016/j.comcom.2019.01.006_b103 – ident: 10.1016/j.comcom.2019.01.006_b22 doi: 10.1109/SPW.2015.27 – volume: 4 start-page: 1125 issue: 5 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b54 article-title: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications publication-title: IEEE Internet of Things J. doi: 10.1109/JIOT.2017.2683200 – ident: 10.1016/j.comcom.2019.01.006_b1 – volume: 12 start-page: 2261 issue: 10 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b48 article-title: Collaborative authentication in decentralized dense mobile networks with key predistribution publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2017.2705584 – ident: 10.1016/j.comcom.2019.01.006_b104 – ident: 10.1016/j.comcom.2019.01.006_b236 – volume: 13 start-page: 2240 issue: 9 year: 2018 ident: 10.1016/j.comcom.2019.01.006_b39 article-title: The impact of link duration on the integrity of distributed mobile networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2812714 – ident: 10.1016/j.comcom.2019.01.006_b139 doi: 10.1109/ICC.2002.997008 – volume: vol. 2 start-page: 825 year: 2004 ident: 10.1016/j.comcom.2019.01.006_b147 article-title: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks – volume: 12 issue: 6 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b34 article-title: Beyond the internet of things: The social networking of machines publication-title: Int. J. Distrib. Sens. Netw. doi: 10.1155/2016/8178417 – ident: 10.1016/j.comcom.2019.01.006_b165 doi: 10.1007/978-3-642-39884-1_2 – year: 2012 ident: 10.1016/j.comcom.2019.01.006_b215 – start-page: 173 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b121 article-title: Towards an optimized blockchain for IoT – volume: 5 start-page: 13787 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b55 article-title: Achieving efficient detection against false data injection attacks in smart grid publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2728681 – start-page: 433 year: 1992 ident: 10.1016/j.comcom.2019.01.006_b173 – volume: 6 start-page: 260 issue: 4 year: 2005 ident: 10.1016/j.comcom.2019.01.006_b63 article-title: Is practitioners’ views on core concepts of information integrity publication-title: Int. J. Account. Inf. Syst. doi: 10.1016/j.accinf.2005.07.001 – ident: 10.1016/j.comcom.2019.01.006_b144 doi: 10.1109/DCOSS.2012.55 – volume: 1 start-page: 222 issue: 3 year: 1983 ident: 10.1016/j.comcom.2019.01.006_b81 article-title: Fail-stop processors: An approach to designing fault-tolerant computing systems publication-title: ACM Trans. Comput. Syst. doi: 10.1145/357369.357371 – year: 1997 ident: 10.1016/j.comcom.2019.01.006_b210 – ident: 10.1016/j.comcom.2019.01.006_b225 – volume: 27 start-page: 228 issue: 2 year: 1980 ident: 10.1016/j.comcom.2019.01.006_b85 article-title: Reaching agreement in the presence of faults publication-title: J. ACM doi: 10.1145/322186.322188 – volume: 17 start-page: 44 issue: 6 year: 2010 ident: 10.1016/j.comcom.2019.01.006_b138 article-title: From today’s INTRAnet of Things to a future INTERnet of Things: A wireless- and mobility-related view publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2010.5675777 – volume: 8 start-page: 1207 issue: 4 year: 2011 ident: 10.1016/j.comcom.2019.01.006_b145 article-title: TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things publication-title: Comput. Sci. Inf. Syst. doi: 10.2298/CSIS110303056C – ident: 10.1016/j.comcom.2019.01.006_b71 – ident: 10.1016/j.comcom.2019.01.006_b166 doi: 10.1145/2504730.2504747 – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b212 – ident: 10.1016/j.comcom.2019.01.006_b119 – volume: 17 start-page: 2347 issue: 4 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b37 article-title: Internet of things: A survey on enabling technologies, protocols, and applications publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2015.2444095 – ident: 10.1016/j.comcom.2019.01.006_b224 – ident: 10.1016/j.comcom.2019.01.006_b64 doi: 10.1109/EST.2012.15 – start-page: 270 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b111 article-title: Town crier: an authenticated data feed for smart contracts – volume: 8 start-page: 367 issue: 12 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b5 article-title: Combination of cloud computing and Internet of Things (IOT) in medical monitoring systems publication-title: Int. J. Hybrid Inform. Technol. doi: 10.14257/ijhit.2015.8.12.28 – ident: 10.1016/j.comcom.2019.01.006_b125 – year: 2015 ident: 10.1016/j.comcom.2019.01.006_b32 – ident: 10.1016/j.comcom.2019.01.006_b66 doi: 10.1109/INFCOM.2010.5462173 – volume: 1 start-page: 9 issue: 2011 year: 2011 ident: 10.1016/j.comcom.2019.01.006_b45 article-title: Internet of Things strategic research roadmap publication-title: Internet of Things-Global Technol. Soc. Trends – volume: 4 start-page: 1 issue: 1 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b51 article-title: Internet of Things: Features, challenges, and vulnerabilities publication-title: Int. J. Adv. Comput. Sci. Inf. Technol. – ident: 10.1016/j.comcom.2019.01.006_b131 – start-page: 112 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b193 article-title: The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication – ident: 10.1016/j.comcom.2019.01.006_b26 – ident: 10.1016/j.comcom.2019.01.006_b6 doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.105 – ident: 10.1016/j.comcom.2019.01.006_b114 – volume: 2013 issue: 881 year: 2013 ident: 10.1016/j.comcom.2019.01.006_b229 article-title: Accelerating bitcoin’s transaction processing. Fast money grows on trees, not chains publication-title: IACR Cryptol. EPrint Archive – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b118 – start-page: 81 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b143 article-title: Motivating urban cycling through a blockchain-based financial incentives system – start-page: 720 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b176 article-title: Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges – ident: 10.1016/j.comcom.2019.01.006_b202 – ident: 10.1016/j.comcom.2019.01.006_b120 – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b24 – ident: 10.1016/j.comcom.2019.01.006_b42 doi: 10.1109/IECON.2007.4460126 – ident: 10.1016/j.comcom.2019.01.006_b122 doi: 10.1109/ANTS.2017.8384164 – volume: vol. 4 start-page: 325 year: 2004 ident: 10.1016/j.comcom.2019.01.006_b177 article-title: Linkable spontaneous anonymous group signature for ad hoc groups – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b214 – volume: 13 start-page: 184 issue: 1 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b16 article-title: Block-VN: A distributed blockchain based vehicular network architecture in smart city publication-title: J. Inf. Process. Syst. – year: 2001 ident: 10.1016/j.comcom.2019.01.006_b83 – ident: 10.1016/j.comcom.2019.01.006_b160 doi: 10.1109/EuroSPW.2017.50 – ident: 10.1016/j.comcom.2019.01.006_b185 doi: 10.1109/ICC.2017.7996641 – volume: 12 start-page: 656 issue: 4 year: 1983 ident: 10.1016/j.comcom.2019.01.006_b78 article-title: Authenticated algorithms for Byzantine agreement publication-title: SIAM J. Comput. doi: 10.1137/0212045 – ident: 10.1016/j.comcom.2019.01.006_b134 doi: 10.1109/VTCFall.2016.7880946 – volume: 18 start-page: 2084 issue: 3 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b30 article-title: Bitcoin and beyond: A technical survey on decentralized digital currencies publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2016.2535718 – year: 2011 ident: 10.1016/j.comcom.2019.01.006_b203 – volume: 1 start-page: 77 issue: 2 year: 1988 ident: 10.1016/j.comcom.2019.01.006_b172 article-title: Zero-knowledge proofs of identity publication-title: J. Cryptology doi: 10.1007/BF02351717 – ident: 10.1016/j.comcom.2019.01.006_b65 doi: 10.1109/IMIS.2015.48 – ident: 10.1016/j.comcom.2019.01.006_b117 – volume: 9 start-page: 5943 issue: 18 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b188 article-title: FairAccess: A new Blockchain-based access control framework for the Internet of Things publication-title: Secur. Commun. Netw. doi: 10.1002/sec.1748 – ident: 10.1016/j.comcom.2019.01.006_b50 doi: 10.1109/ITAP.2011.6006307 – ident: 10.1016/j.comcom.2019.01.006_b226 – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b231 – year: 2012 ident: 10.1016/j.comcom.2019.01.006_b88 – ident: 10.1016/j.comcom.2019.01.006_b232 – ident: 10.1016/j.comcom.2019.01.006_b57 doi: 10.1109/GLOCOM.2016.7841922 – start-page: 89 year: 2006 ident: 10.1016/j.comcom.2019.01.006_b183 article-title: Attribute-based encryption for fine-grained access control of encrypted data – volume: 11 start-page: 856 issue: 6 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b242 article-title: Kernel-Based reconstruction of space-time functions on dynamic graphs publication-title: IEEE J. Sel. Topics Signal Process. – volume: 52 start-page: 121 issue: 7 year: 2009 ident: 10.1016/j.comcom.2019.01.006_b2 article-title: Security challenges of the EPCglobal network publication-title: Commun. ACM doi: 10.1145/1538788.1538816 – ident: 10.1016/j.comcom.2019.01.006_b194 doi: 10.1145/1323293.1294267 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b153 – ident: 10.1016/j.comcom.2019.01.006_b158 – start-page: 169 year: 2009 ident: 10.1016/j.comcom.2019.01.006_b184 article-title: Fully homomorphic encryption using ideal lattices – ident: 10.1016/j.comcom.2019.01.006_b112 – volume: 55 start-page: 78 issue: 9 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b195 article-title: DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2017.1700041 – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b142 – volume: vol. 5 start-page: V5 year: 2010 ident: 10.1016/j.comcom.2019.01.006_b239 article-title: Future internet: The Internet of Things – volume: 10 start-page: 2233 issue: 4 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b36 article-title: Internet of things in industries: A survey publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2014.2300753 – ident: 10.1016/j.comcom.2019.01.006_b146 doi: 10.1109/EEM.2014.6861213 – ident: 10.1016/j.comcom.2019.01.006_b20 doi: 10.1109/SAHCN.2016.7732970 – volume: 16 start-page: 77 issue: 1 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b47 article-title: Data mining for Internet of Things: A survey publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2013.103013.00206 – ident: 10.1016/j.comcom.2019.01.006_b244 doi: 10.1109/EuroSP.2017.37 – year: 2015 ident: 10.1016/j.comcom.2019.01.006_b70 – start-page: 523 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b187 article-title: Towards a novel privacy-preserving access control model based on blockchain technology in IoT – ident: 10.1016/j.comcom.2019.01.006_b13 – ident: 10.1016/j.comcom.2019.01.006_b110 doi: 10.1109/HPCC-SmartCity-DSS.2016.0198 – ident: 10.1016/j.comcom.2019.01.006_b230 doi: 10.1007/978-3-662-47854-7_32 – ident: 10.1016/j.comcom.2019.01.006_b243 – volume: 14 issue: 8 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b106 article-title: Lightweight break-glass access control system for healthcare Internet-of-Things publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2017.2751640 – volume: 35 start-page: 2606 issue: 11 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b7 article-title: Optimal schedule of mobile edge computing for Internet of Things using partial information publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2017.2760186 – ident: 10.1016/j.comcom.2019.01.006_b130 – year: 2015 ident: 10.1016/j.comcom.2019.01.006_b90 article-title: On public and private blockchains publication-title: Ethereum Blog – volume: 1 start-page: 1 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b181 article-title: Ring confidential transactions publication-title: Ledger doi: 10.5195/LEDGER.2016.34 – ident: 10.1016/j.comcom.2019.01.006_b157 – start-page: 17 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b199 article-title: A secure sharding protocol for open blockchains – ident: 10.1016/j.comcom.2019.01.006_b101 doi: 10.1109/GLOCOMW.2018.8644498 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b150 – year: 1996 ident: 10.1016/j.comcom.2019.01.006_b149 article-title: Smart contracts: Building blocks for digital markets publication-title: EXTROPY: J. Transhumanist Thought – year: 2016 ident: 10.1016/j.comcom.2019.01.006_b67 – ident: 10.1016/j.comcom.2019.01.006_b191 doi: 10.1109/GIOTS.2017.8016280 – ident: 10.1016/j.comcom.2019.01.006_b129 – ident: 10.1016/j.comcom.2019.01.006_b14 – year: 2015 ident: 10.1016/j.comcom.2019.01.006_b155 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b132 – ident: 10.1016/j.comcom.2019.01.006_b74 doi: 10.1109/SP.1980.10006 – year: 2016 ident: 10.1016/j.comcom.2019.01.006_b72 – year: 2007 ident: 10.1016/j.comcom.2019.01.006_b77 – volume: 16 start-page: 133 issue: 2 year: 1998 ident: 10.1016/j.comcom.2019.01.006_b82 article-title: The part-time parliament publication-title: ACM Trans. Comput. Syst. doi: 10.1145/279227.279229 – start-page: 225 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b192 article-title: Blockchain technology: Principles and applications – start-page: 15 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b167 article-title: Deanonymisation of clients in Bitcoin P2P network – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b169 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b170 – year: 2014 ident: 10.1016/j.comcom.2019.01.006_b240 – start-page: 454 year: 2011 ident: 10.1016/j.comcom.2019.01.006_b87 article-title: High performance state-machine replication – volume: 2015 start-page: 584 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b182 article-title: How to securely prolong the computational bindingness of pedersen commitments publication-title: IACR Cryptol. EPrint Archive – start-page: 1 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b3 – ident: 10.1016/j.comcom.2019.01.006_b197 – ident: 10.1016/j.comcom.2019.01.006_b17 doi: 10.1145/2968219.2971409 – volume: 11 start-page: 2241 issue: 10 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b61 article-title: Virus propagation modeling and convergence analysis in large-scale networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2581305 – ident: 10.1016/j.comcom.2019.01.006_b237 – start-page: 4 year: 2013 ident: 10.1016/j.comcom.2019.01.006_b8 article-title: Cloud security: Attacks and current defenses – start-page: 459 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b175 article-title: Zerocash: Decentralized anonymous payments from Bitcoin – volume: 9 start-page: 49 issue: 3 year: 2011 ident: 10.1016/j.comcom.2019.01.006_b108 article-title: Stuxnet: Dissecting a cyberwarfare weapon publication-title: IEEE Secur. Privacy doi: 10.1109/MSP.2011.67 – start-page: 197 year: 2013 ident: 10.1016/j.comcom.2019.01.006_b162 article-title: An analysis of anonymity in the bitcoin system – ident: 10.1016/j.comcom.2019.01.006_b73 – ident: 10.1016/j.comcom.2019.01.006_b96 – ident: 10.1016/j.comcom.2019.01.006_b216 – start-page: 363 year: 2010 ident: 10.1016/j.comcom.2019.01.006_b220 article-title: The next 700 BFT protocols – volume: 11 start-page: 320 issue: 2 year: 2012 ident: 10.1016/j.comcom.2019.01.006_b56 article-title: Protecting location privacy in sensor networks against a global eavesdropper publication-title: IEEE Trans. Mobile Comput. doi: 10.1109/TMC.2011.32 – volume: 118 start-page: 158 issue: 1 year: 1995 ident: 10.1016/j.comcom.2019.01.006_b79 article-title: Atomic broadcast: From simple message diffusion to Byzantine agreement publication-title: Inform. and Comput. doi: 10.1006/inco.1995.1060 – year: 2018 ident: 10.1016/j.comcom.2019.01.006_b154 – start-page: 31 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b221 article-title: The honey badger of bft protocols – volume: 9 issue: 3 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b52 article-title: A security framework for the Internet of Things in the future internet architecture publication-title: Future Internet doi: 10.3390/fi9030027 – start-page: 6 year: 2013 ident: 10.1016/j.comcom.2019.01.006_b164 – start-page: 839 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b171 article-title: Hawk: The Blockchain model of cryptography and privacy-preserving smart contracts – ident: 10.1016/j.comcom.2019.01.006_b127 – ident: 10.1016/j.comcom.2019.01.006_b180 – volume: 2 start-page: 6 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b33 article-title: BlockChain technology: Beyond bitcoin publication-title: Appl. Innov. – volume: 1 start-page: 21 issue: 1 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b15 article-title: Blockchain for IoT: The tradeoff between consistency and capacity publication-title: Chin. J. Internet of Things – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b60 – volume: 20 start-page: 2543 issue: 3 year: 2018 ident: 10.1016/j.comcom.2019.01.006_b19 article-title: A survey on anonymity and privacy in bitcoin-like digital cash systems publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2018.2818623 – year: 2016 ident: 10.1016/j.comcom.2019.01.006_b148 – ident: 10.1016/j.comcom.2019.01.006_b43 doi: 10.1109/WCNCW.2016.7552737 – ident: 10.1016/j.comcom.2019.01.006_b124 doi: 10.1109/ICSEng.2017.43 – volume: SE-12 start-page: 477 issue: 3 year: 1986 ident: 10.1016/j.comcom.2019.01.006_b80 article-title: Distributed agreement in the presence of processor and communication faults publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.1986.6312888 – ident: 10.1016/j.comcom.2019.01.006_b179 – start-page: 680 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b208 article-title: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions – start-page: 63 year: 2015 ident: 10.1016/j.comcom.2019.01.006_b206 article-title: When bitcoin mining pools run dry – year: 2015 ident: 10.1016/j.comcom.2019.01.006_b31 – volume: 19 start-page: 171 issue: 2 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b29 article-title: Big data: A survey publication-title: Springer Mobile Netw. Appl. doi: 10.1007/s11036-013-0489-0 – volume: 45 start-page: 245 issue: 3 year: 2004 ident: 10.1016/j.comcom.2019.01.006_b241 article-title: Spatio-temporal correlation: Theory and applications for wireless sensor networks publication-title: Comput. Netw. doi: 10.1016/j.comnet.2004.03.007 – ident: 10.1016/j.comcom.2019.01.006_b123 doi: 10.1109/PERCOMW.2017.7917634 – volume: 19 start-page: 68 issue: 4 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b10 article-title: Can Blockchain strengthen the Internet of Things? publication-title: IT Prof. doi: 10.1109/MITP.2017.3051335 – ident: 10.1016/j.comcom.2019.01.006_b168 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b116 – start-page: 239 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b189 article-title: Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money – volume: 44 start-page: 51 issue: 9 year: 2011 ident: 10.1016/j.comcom.2019.01.006_b53 article-title: Securing the Internet of Things publication-title: Comput. doi: 10.1109/MC.2011.291 – ident: 10.1016/j.comcom.2019.01.006_b23 – volume: 55 start-page: 70 issue: 10 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b107 article-title: Energy big data security threats in IoT-based smart grid communications publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2017.1700154 – ident: 10.1016/j.comcom.2019.01.006_b205 – year: 2016 ident: 10.1016/j.comcom.2019.01.006_b44 – ident: 10.1016/j.comcom.2019.01.006_b196 – ident: 10.1016/j.comcom.2019.01.006_b18 – ident: 10.1016/j.comcom.2019.01.006_b238 – ident: 10.1016/j.comcom.2019.01.006_b91 – start-page: 279 year: 2016 ident: 10.1016/j.comcom.2019.01.006_b89 article-title: Enhancing bitcoin security and performance with strong consistency via collective signing – start-page: 906 year: 2012 ident: 10.1016/j.comcom.2019.01.006_b92 article-title: Double-spending fast payments in bitcoin – volume: 16 start-page: 414 issue: 1 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b35 article-title: Context aware computing for the internet of things: A survey publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2013.042313.00197 – year: 2017 ident: 10.1016/j.comcom.2019.01.006_b41 article-title: Internet of Things: Architectures, protocols, and applications publication-title: J. Electr. Comput. Eng. doi: 10.1155/2017/9324035 – ident: 10.1016/j.comcom.2019.01.006_b156 – start-page: 475 year: 2014 ident: 10.1016/j.comcom.2019.01.006_b209 article-title: Permacoin: Repurposing bitcoin work for data preservation – volume: 32 start-page: 824 issue: 4 year: 1985 ident: 10.1016/j.comcom.2019.01.006_b219 article-title: Asynchronous consensus and broadcast protocols publication-title: J. ACM doi: 10.1145/4221.214134 – ident: 10.1016/j.comcom.2019.01.006_b227 – ident: 10.1016/j.comcom.2019.01.006_b233 – ident: 10.1016/j.comcom.2019.01.006_b128 – volume: 5 start-page: 586 issue: 4 year: 2017 ident: 10.1016/j.comcom.2019.01.006_b59 article-title: A comprehensive study of security of Internet-of-Things publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2016.2606384 – year: 2015 ident: 10.1016/j.comcom.2019.01.006_b94 – start-page: 8 year: 1988 ident: 10.1016/j.comcom.2019.01.006_b218 article-title: Viewstamped replication: A new primary copy method to support highly-available distributed systems |
SSID | ssj0004773 |
Score | 2.651701 |
SecondaryResourceType | review_article |
Snippet | The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 10 |
SubjectTerms | Blockchain Consensus protocol Data structure Internet of things (IoT) |
Title | Survey on blockchain for Internet of Things |
URI | https://dx.doi.org/10.1016/j.comcom.2019.01.006 |
Volume | 136 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLYmuMAB8RTjMeXAtaxr0iY9ThPTALETk3aLmtYRA7RNU0Hiwm_HaVoYEgKJY6OkD9e1_TWfbYALFAp5JuNAIspARL08UEaFgY0IbhlusqJqB3Q3TkYTcTONpy0YNLkwjlZZ235v0ytrXY90a2l2l7NZt6Il8SQRpJSuc0qVwS6k0_LL9y-ah5B-l9nRGN3sJn2u4njRuR1nhJxgWhXvdH2PfnJPay5nuAs7dazI-v529qCF833YXqsgeAD04a9e8Y0t5syQW3rKHwjpMwpEmf_VhyVbWOabcx7CZHh1PxgFdf-DIOcyKgnaqTB2O4mYWCOlyUXKC-Q04HCFsankKk8jGRUqVlbFaBEp_kuQIAByg_wINuaLOR4DI1SWJ4ktuOSZ4NZkhMKUDeMstGlBEKwNvHlsndfFwV2PimfdsMAetReWdsLSYU_ThdoQfK5a-uIYf8yXjUT1t5esyX7_uvLk3ytPYcsdeaL1GWyUqxc8pziiNJ1KUTqw2b--HY0_AEq3xZM |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLam7QAcEE8xnj1wrdY1bZMep4mpsMdpk3aLmtYRA7RNU0Hi3-M0LQwJgcQ1rftwU9tf8tkGuMVAIEt56HJE7gZ-N3OFEp6rfYJbiqk0L9sBjSdRMgse5uG8Af06F8bQKivbb216aa2rkU6lzc56seiUtCQWRQFNStM5hSBQy1SnCpvQ6t0Pk8lXeiS3G82GyWgE6gy6kuZFlze0EfKDcVm_07Q--slDbXmdwQHsV-Gi07NPdAgNXB7B3lYRwWOgf3_zhu_Oauko8kzP2SOBfYdiUceu9mHhrLRj-3OewGxwN-0nbtUCwc0Y9wtCd8ILzWYiRlpxrrIgZjkyGjDQQumYM5HFPvdzEQotQtSIFAJGSCgAmUJ2Cs3laoln4BAwy6JI54yzNGBapQTEhPbC1NNxTiisDax-bZlV9cFNm4oXWRPBnqRVljTKkl5X0o3a4H5KrW19jD_O57VG5bfvLMmE_yp5_m_JG9hJpuORHN1Phhewa45Y3vUlNIvNK15RWFGo62rafAAqaMhE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Survey+on+blockchain+for+Internet+of+Things&rft.jtitle=Computer+communications&rft.au=Wang%2C+Xu&rft.au=Zha%2C+Xuan&rft.au=Ni%2C+Wei&rft.au=Liu%2C+Ren+Ping&rft.date=2019-02-01&rft.issn=0140-3664&rft.volume=136&rft.spage=10&rft.epage=29&rft_id=info:doi/10.1016%2Fj.comcom.2019.01.006&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comcom_2019_01_006 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon |