Survey on blockchain for Internet of Things

The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at differe...

Full description

Saved in:
Bibliographic Details
Published inComputer communications Vol. 136; pp. 10 - 29
Main Authors Wang, Xu, Zha, Xuan, Ni, Wei, Liu, Ren Ping, Guo, Y. Jay, Niu, Xinxin, Zheng, Kangfeng
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.02.2019
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at different locations, and has the potential to address the data security concern in IoT networks. While providing data security to the IoT, Blockchain also encounters a number of critical challenges inherent in the IoT, such as a huge number of IoT devices, non-homogeneous network structure, limited computing power, low communication bandwidth, and error-prone radio links. This paper presents a comprehensive survey on existing Blockchain technologies with an emphasis on the IoT applications. The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures. Future research directions are collated for effective integration of Blockchain into the IoT networks.
AbstractList The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at different locations, and has the potential to address the data security concern in IoT networks. While providing data security to the IoT, Blockchain also encounters a number of critical challenges inherent in the IoT, such as a huge number of IoT devices, non-homogeneous network structure, limited computing power, low communication bandwidth, and error-prone radio links. This paper presents a comprehensive survey on existing Blockchain technologies with an emphasis on the IoT applications. The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures. Future research directions are collated for effective integration of Blockchain into the IoT networks.
Author Guo, Y. Jay
Zheng, Kangfeng
Ni, Wei
Wang, Xu
Zha, Xuan
Liu, Ren Ping
Niu, Xinxin
Author_xml – sequence: 1
  givenname: Xu
  surname: Wang
  fullname: Wang, Xu
  organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China
– sequence: 2
  givenname: Xuan
  surname: Zha
  fullname: Zha, Xuan
  email: xuan.zha@student.uts.edu.au
  organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China
– sequence: 3
  givenname: Wei
  surname: Ni
  fullname: Ni, Wei
  organization: Cyber-Physical System (CPS), Data 61, CSIRO, Sydney, NSW, Australia
– sequence: 4
  givenname: Ren Ping
  surname: Liu
  fullname: Liu, Ren Ping
  organization: Global Big Data Technologies Centre, University of Technology Sydney, Australia
– sequence: 5
  givenname: Y. Jay
  surname: Guo
  fullname: Guo, Y. Jay
  organization: Global Big Data Technologies Centre, University of Technology Sydney, Australia
– sequence: 6
  givenname: Xinxin
  surname: Niu
  fullname: Niu, Xinxin
  organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China
– sequence: 7
  givenname: Kangfeng
  surname: Zheng
  fullname: Zheng, Kangfeng
  organization: School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China
BookMark eNqFj01LAzEQhoNUsK3-Aw97l10nm91N1oMgxY9CwYMVvIXd7MSmtokksdB_b0o9eVAYmOGF52WeCRlZZ5GQSwoFBdpcrwvltmmKEmhbAC0AmhMypoKznAN7G5Ex0Apy1jTVGZmEsAaAinM2JlcvX36H-8zZrN849aFWnbGZdj6b24jeYsyczpYrY9_DOTnV3Sbgxc-ekteH--XsKV88P85nd4tcMV7GvAIBNVAmsNE9572qWjYgSwGta-h1y5lQbcnLQdRCixo1okgfY51u1iObkptjr_IuBI9aKhO7aJyNvjMbSUEetOVaHrXlQVsClakkwdUv-NObbef3_2G3RwyT2M6gl0EZtAoH41FFOTjzd8E3D_900A
CitedBy_id crossref_primary_10_1108_BPMJ_04_2022_0207
crossref_primary_10_1016_j_compeleceng_2020_106646
crossref_primary_10_1109_ACCESS_2021_3069737
crossref_primary_10_1109_ACCESS_2022_3179690
crossref_primary_10_1145_3427097
crossref_primary_10_1016_j_eswa_2022_118704
crossref_primary_10_4108_eetiot_v8i3_1402
crossref_primary_10_3390_s24216835
crossref_primary_10_1016_j_iot_2024_101187
crossref_primary_10_1002_cpe_6934
crossref_primary_10_1002_ett_4338
crossref_primary_10_1109_ACCESS_2022_3224222
crossref_primary_10_1016_j_vehcom_2023_100607
crossref_primary_10_1002_ett_4333
crossref_primary_10_1109_ACCESS_2022_3186892
crossref_primary_10_1145_3503042
crossref_primary_10_1590_1679_395120220020x
crossref_primary_10_3390_electronics10080951
crossref_primary_10_1016_j_procs_2023_01_446
crossref_primary_10_1155_2022_1038526
crossref_primary_10_1145_3417987
crossref_primary_10_3390_logistics8040109
crossref_primary_10_56532_mjsat_v1i3_17
crossref_primary_10_1007_s11227_023_05525_4
crossref_primary_10_1016_j_autcon_2022_104339
crossref_primary_10_1007_s11276_023_03458_7
crossref_primary_10_1016_j_comcom_2021_06_019
crossref_primary_10_1109_JSEN_2024_3370146
crossref_primary_10_7906_indecs_22_6_8
crossref_primary_10_1016_j_jksuci_2023_101674
crossref_primary_10_1109_JSEN_2023_3277525
crossref_primary_10_1109_TCC_2022_3217856
crossref_primary_10_3233_JID_210021
crossref_primary_10_1016_j_phycom_2023_102223
crossref_primary_10_3390_math12081133
crossref_primary_10_1016_j_iot_2024_101080
crossref_primary_10_26599_TST_2023_9010014
crossref_primary_10_1109_JIOT_2022_3191881
crossref_primary_10_1007_s11277_024_11672_5
crossref_primary_10_1016_j_compeleceng_2022_108287
crossref_primary_10_1109_JIOT_2024_3422242
crossref_primary_10_1155_2022_2566615
crossref_primary_10_3233_JIFS_233462
crossref_primary_10_1109_JIOT_2021_3060508
crossref_primary_10_1038_s41598_025_93913_6
crossref_primary_10_1002_ett_4235
crossref_primary_10_1016_j_jnca_2019_02_027
crossref_primary_10_1080_09540091_2022_2026888
crossref_primary_10_1145_3558779
crossref_primary_10_3390_su12041540
crossref_primary_10_1109_JIOT_2022_3165666
crossref_primary_10_1080_17517575_2021_1930189
crossref_primary_10_1016_j_csa_2024_100057
crossref_primary_10_1109_TITS_2020_3019101
crossref_primary_10_1007_s00500_021_06041_4
crossref_primary_10_1109_ACCESS_2021_3092192
crossref_primary_10_1109_JIOT_2021_3109313
crossref_primary_10_1016_j_comcom_2024_05_012
crossref_primary_10_1145_3704741
crossref_primary_10_29048_makufebed_1005776
crossref_primary_10_1016_j_comnet_2023_109893
crossref_primary_10_1016_j_heliyon_2024_e38917
crossref_primary_10_3390_fi15060200
crossref_primary_10_3390_electronics10141732
crossref_primary_10_3390_jcp1010002
crossref_primary_10_3390_electronics9101682
crossref_primary_10_3390_fi14070216
crossref_primary_10_3390_fi12060107
crossref_primary_10_1016_j_autcon_2022_104379
crossref_primary_10_3390_app12157694
crossref_primary_10_1007_s10207_023_00808_6
crossref_primary_10_1631_FITEE_2300215
crossref_primary_10_3390_fi13120313
crossref_primary_10_1145_3644369
crossref_primary_10_3390_s23073566
crossref_primary_10_1016_j_iot_2020_100212
crossref_primary_10_1109_JPROC_2024_3386257
crossref_primary_10_3390_systems11010038
crossref_primary_10_1007_s11277_024_11382_y
crossref_primary_10_1155_2024_9006405
crossref_primary_10_3390_s22208022
crossref_primary_10_1109_TCSS_2024_3382582
crossref_primary_10_1016_j_dcan_2021_07_004
crossref_primary_10_1016_j_jpdc_2021_04_003
crossref_primary_10_3390_info11120570
crossref_primary_10_1080_1206212X_2023_2284443
crossref_primary_10_3390_s24237688
crossref_primary_10_3390_s22041411
crossref_primary_10_3390_app13021079
crossref_primary_10_1016_j_adhoc_2022_102882
crossref_primary_10_46963_jam_v6i1_1031
crossref_primary_10_1145_3718082
crossref_primary_10_1007_s11704_024_3278_y
crossref_primary_10_1002_dac_5014
crossref_primary_10_1016_j_bar_2025_101588
crossref_primary_10_1016_j_comcom_2020_12_028
crossref_primary_10_1016_j_cosrev_2023_100585
crossref_primary_10_1590_1679_395120220020
crossref_primary_10_1016_j_comcom_2019_12_037
crossref_primary_10_1016_j_cosrev_2023_100589
crossref_primary_10_3233_HSM_230148
crossref_primary_10_1186_s40854_024_00737_w
crossref_primary_10_3280_EFE2024_002006
crossref_primary_10_1016_j_jnca_2022_103511
crossref_primary_10_1109_ACCESS_2020_3000571
crossref_primary_10_1016_j_jnca_2021_103232
crossref_primary_10_1109_ACCESS_2020_3017891
crossref_primary_10_1016_j_future_2024_05_008
crossref_primary_10_1109_ACCESS_2021_3093633
crossref_primary_10_1080_02564602_2020_1827308
crossref_primary_10_1109_ACCESS_2024_3521428
crossref_primary_10_1016_j_ipm_2021_102492
crossref_primary_10_32604_csse_2022_017941
crossref_primary_10_1007_s10614_024_10775_2
crossref_primary_10_1016_j_iotcps_2023_06_003
crossref_primary_10_1109_ACCESS_2020_3003020
crossref_primary_10_1109_TBDATA_2024_3362191
crossref_primary_10_3390_bdcc8120174
crossref_primary_10_3390_s22031094
crossref_primary_10_3390_s22114182
crossref_primary_10_1016_j_sysarc_2023_102897
crossref_primary_10_1109_TCOMM_2022_3194138
crossref_primary_10_1002_int_23032
crossref_primary_10_1016_j_comcom_2021_03_005
crossref_primary_10_1109_TII_2021_3051607
crossref_primary_10_1145_3376915
crossref_primary_10_1016_j_dcan_2020_09_001
crossref_primary_10_1002_spy2_131
crossref_primary_10_3390_computers13120329
crossref_primary_10_1109_COMST_2024_3361451
crossref_primary_10_3390_su15075660
crossref_primary_10_1109_ACCESS_2020_3030491
crossref_primary_10_3390_s22124394
crossref_primary_10_1002_cpe_7987
crossref_primary_10_1016_j_ijepes_2021_106811
crossref_primary_10_1007_s10776_020_00483_7
crossref_primary_10_1016_j_physrep_2021_10_005
crossref_primary_10_1109_JIOT_2023_3263582
crossref_primary_10_1109_OJCS_2022_3183003
crossref_primary_10_3390_s21154955
crossref_primary_10_1007_s42979_022_01543_w
crossref_primary_10_1016_j_jss_2020_110891
crossref_primary_10_1007_s11042_024_19580_3
crossref_primary_10_1016_j_jpdc_2019_12_019
crossref_primary_10_1109_ACCESS_2023_3252030
crossref_primary_10_7717_peerj_cs_1678
crossref_primary_10_3390_s23052664
crossref_primary_10_1016_j_jnca_2022_103371
crossref_primary_10_1016_j_bcra_2024_100211
crossref_primary_10_1109_ACCESS_2022_3188311
crossref_primary_10_1007_s11831_020_09457_7
crossref_primary_10_3390_s23146265
crossref_primary_10_1016_j_micpro_2022_104632
crossref_primary_10_1109_ACCESS_2024_3408868
crossref_primary_10_1016_j_comcom_2022_07_035
crossref_primary_10_3390_app11209372
crossref_primary_10_1109_COMST_2020_2973314
crossref_primary_10_3390_s24185863
crossref_primary_10_3390_electronics11040630
crossref_primary_10_1109_ACCESS_2019_2914223
crossref_primary_10_3390_bdcc4040028
crossref_primary_10_1109_ACCESS_2020_3005509
crossref_primary_10_1186_s42400_020_00068_0
crossref_primary_10_1016_j_cie_2019_07_006
crossref_primary_10_1016_j_cie_2020_107001
crossref_primary_10_1109_TII_2019_2903342
crossref_primary_10_1016_j_iot_2019_100109
crossref_primary_10_1109_JIOT_2020_2993216
crossref_primary_10_1109_ACCESS_2020_2998951
crossref_primary_10_1109_TEM_2022_3231057
crossref_primary_10_1016_j_jnca_2020_102936
crossref_primary_10_1007_s10207_023_00719_6
crossref_primary_10_3390_s22197433
crossref_primary_10_3233_JIFS_223381
crossref_primary_10_1109_TNSM_2024_3372049
crossref_primary_10_3390_electronics10202493
crossref_primary_10_1109_ACCESS_2022_3174865
crossref_primary_10_1080_03772063_2022_2048706
crossref_primary_10_1080_17445760_2021_2004411
crossref_primary_10_3390_fi11070161
crossref_primary_10_1016_j_compeleceng_2020_106581
crossref_primary_10_1155_2021_2067137
crossref_primary_10_3390_s20113068
crossref_primary_10_1016_j_jnca_2019_102481
crossref_primary_10_1016_j_aej_2019_11_001
crossref_primary_10_1109_ACCESS_2023_3245046
crossref_primary_10_1109_JIOT_2019_2960526
crossref_primary_10_1109_TITS_2021_3126566
crossref_primary_10_3390_jtaer16050072
crossref_primary_10_1109_ACCESS_2020_2988579
crossref_primary_10_1109_TNNLS_2023_3329249
crossref_primary_10_1016_j_comnet_2021_108005
crossref_primary_10_1007_s10922_020_09532_1
crossref_primary_10_1145_3441692
crossref_primary_10_1109_TSMC_2019_2899626
crossref_primary_10_1016_j_sysarc_2022_102677
crossref_primary_10_1155_2021_5547530
crossref_primary_10_1016_j_iot_2024_101254
crossref_primary_10_1007_s11276_020_02445_6
crossref_primary_10_1109_ACCESS_2020_2998012
crossref_primary_10_1002_jsc_2620
crossref_primary_10_1016_j_comcom_2024_107964
crossref_primary_10_3390_su12125161
crossref_primary_10_1109_MSEC_2020_3012059
crossref_primary_10_1109_JIOT_2020_2971736
crossref_primary_10_1016_j_jnca_2020_102918
crossref_primary_10_3390_fi15090317
crossref_primary_10_1016_j_comnet_2023_109726
crossref_primary_10_4018_IJSWIS_341233
crossref_primary_10_1007_s11280_020_00854_3
crossref_primary_10_1016_j_jnca_2021_103050
crossref_primary_10_1109_TVT_2024_3462708
crossref_primary_10_4018_IJSWIS_334704
crossref_primary_10_47933_ijeir_851109
crossref_primary_10_1016_j_comcom_2021_09_003
crossref_primary_10_1016_j_future_2020_05_047
crossref_primary_10_3390_s20010207
crossref_primary_10_3390_info13100463
crossref_primary_10_3390_su15064978
crossref_primary_10_1109_ACCESS_2021_3131562
crossref_primary_10_13106_jafeb_2019_vol6_no3_283
crossref_primary_10_1007_s11227_023_05196_1
crossref_primary_10_3390_su13052548
crossref_primary_10_3390_vehicles5030054
crossref_primary_10_1016_j_iot_2025_101532
crossref_primary_10_2478_ias_2024_0003
crossref_primary_10_1007_s40860_020_00116_z
crossref_primary_10_3917_jie_pr1_0114
crossref_primary_10_1109_ACCESS_2020_2995481
crossref_primary_10_1016_j_technovation_2022_102589
crossref_primary_10_1016_j_ipm_2021_102511
crossref_primary_10_1080_17512549_2023_2208117
crossref_primary_10_31590_ejosat_823102
crossref_primary_10_1016_j_bcra_2021_100036
crossref_primary_10_1145_3549910
crossref_primary_10_1080_07366981_2025_2454095
crossref_primary_10_1109_ACCESS_2020_2965147
crossref_primary_10_1016_j_future_2020_05_033
crossref_primary_10_1002_spy2_308
crossref_primary_10_1016_j_comcom_2021_11_005
crossref_primary_10_1109_ACCESS_2019_2930774
crossref_primary_10_35940_ijese_B2591_13040325
crossref_primary_10_1109_TSMC_2023_3296614
crossref_primary_10_1016_j_cose_2020_101934
crossref_primary_10_1016_j_comnet_2024_110343
crossref_primary_10_1016_j_iot_2022_100551
crossref_primary_10_2298_CSIS220921056L
crossref_primary_10_2139_ssrn_5076952
crossref_primary_10_1016_j_jii_2020_100194
crossref_primary_10_1016_j_future_2022_10_029
crossref_primary_10_1109_ACCESS_2023_3240237
crossref_primary_10_3390_electronics12204322
crossref_primary_10_1109_ACCESS_2020_2999715
crossref_primary_10_1007_s11227_023_05657_7
crossref_primary_10_1155_2021_5483243
crossref_primary_10_47130_bitlissos_1166839
crossref_primary_10_1016_j_ipm_2020_102468
crossref_primary_10_3390_s22072449
crossref_primary_10_1002_cpe_8009
crossref_primary_10_1145_3560816
crossref_primary_10_1109_COMST_2021_3131711
crossref_primary_10_1016_j_future_2021_02_016
crossref_primary_10_1007_s11227_021_04203_7
crossref_primary_10_1007_s10586_024_04387_6
crossref_primary_10_1109_TEM_2020_2966643
crossref_primary_10_3390_fi15090308
crossref_primary_10_1016_j_comcom_2021_01_017
crossref_primary_10_1109_ACCESS_2021_3070023
crossref_primary_10_1002_ett_4607
crossref_primary_10_1186_s40854_024_00623_5
crossref_primary_10_1016_j_jii_2021_100261
crossref_primary_10_1049_cje_2021_02_008
crossref_primary_10_1109_TII_2019_2925898
crossref_primary_10_1108_JEIM_12_2020_0533
crossref_primary_10_1016_j_iot_2023_100984
crossref_primary_10_1007_s12083_024_01778_9
crossref_primary_10_3390_machines10100858
Cites_doi 10.1016/j.comnet.2015.12.023
10.1109/MWC.2012.6155876
10.1109/GLOCOMW.2018.8644251
10.1007/978-3-662-44774-1_5
10.1016/j.clsr.2009.11.008
10.1109/ACCESS.2016.2566339
10.1109/JETCAS.2013.2243631
10.1109/JIOT.2018.2872442
10.1155/2016/8789397
10.1109/EuroSP.2016.32
10.1109/JIOT.2018.2867481
10.1007/11424826_65
10.1007/BFb0056479
10.23919/ICACT.2017.7890132
10.1109/COMST.2018.2874978
10.1145/2695533.2695545
10.1007/978-3-642-19325-5_11
10.1007/3-540-44647-8_31
10.1007/s00446-009-0084-6
10.1016/j.comnet.2010.05.010
10.1145/3098954.3098958
10.1145/357172.357176
10.1109/WF-IoT.2016.7845447
10.24251/HICSS.2017.506
10.1007/978-3-662-45472-5_28
10.1109/ICC.2016.7511197
10.1109/JIOT.2014.2344013
10.1007/978-3-662-54455-6_8
10.1109/SPW.2015.27
10.1109/JIOT.2017.2683200
10.1109/TIFS.2017.2705584
10.1109/TIFS.2018.2812714
10.1109/ICC.2002.997008
10.1155/2016/8178417
10.1007/978-3-642-39884-1_2
10.1109/ACCESS.2017.2728681
10.1016/j.accinf.2005.07.001
10.1109/DCOSS.2012.55
10.1145/357369.357371
10.1145/322186.322188
10.1109/MWC.2010.5675777
10.2298/CSIS110303056C
10.1145/2504730.2504747
10.1109/COMST.2015.2444095
10.1109/EST.2012.15
10.14257/ijhit.2015.8.12.28
10.1109/INFCOM.2010.5462173
10.1109/iThings-GreenCom-CPSCom-SmartData.2017.105
10.1109/IECON.2007.4460126
10.1109/ANTS.2017.8384164
10.1109/EuroSPW.2017.50
10.1109/ICC.2017.7996641
10.1137/0212045
10.1109/VTCFall.2016.7880946
10.1109/COMST.2016.2535718
10.1007/BF02351717
10.1109/IMIS.2015.48
10.1002/sec.1748
10.1109/ITAP.2011.6006307
10.1109/GLOCOM.2016.7841922
10.1145/1538788.1538816
10.1145/1323293.1294267
10.1109/MCOM.2017.1700041
10.1109/TII.2014.2300753
10.1109/EEM.2014.6861213
10.1109/SAHCN.2016.7732970
10.1109/SURV.2013.103013.00206
10.1109/EuroSP.2017.37
10.1109/HPCC-SmartCity-DSS.2016.0198
10.1007/978-3-662-47854-7_32
10.1109/TII.2017.2751640
10.1109/JSAC.2017.2760186
10.5195/LEDGER.2016.34
10.1109/GLOCOMW.2018.8644498
10.1109/GIOTS.2017.8016280
10.1109/SP.1980.10006
10.1145/279227.279229
10.1145/2968219.2971409
10.1109/TIFS.2016.2581305
10.1109/MSP.2011.67
10.1109/TMC.2011.32
10.1006/inco.1995.1060
10.3390/fi9030027
10.1109/COMST.2018.2818623
10.1109/WCNCW.2016.7552737
10.1109/ICSEng.2017.43
10.1109/TSE.1986.6312888
10.1007/s11036-013-0489-0
10.1016/j.comnet.2004.03.007
10.1109/PERCOMW.2017.7917634
10.1109/MITP.2017.3051335
10.1109/MC.2011.291
10.1109/MCOM.2017.1700154
10.1109/SURV.2013.042313.00197
10.1155/2017/9324035
10.1145/4221.214134
10.1109/TETC.2016.2606384
ContentType Journal Article
Copyright 2019 Elsevier B.V.
Copyright_xml – notice: 2019 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.comcom.2019.01.006
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1873-703X
EndPage 29
ExternalDocumentID 10_1016_j_comcom_2019_01_006
S0140366418306881
GroupedDBID --K
--M
.DC
.~1
07C
0R~
1B1
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
77K
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAGJQ
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AI.
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F0J
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
UHS
VH1
VOH
WH7
WUQ
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c372t-408050138e6fb77bc493de31381550bf9738c9272d858f85efee8006e585e3be3
IEDL.DBID .~1
ISSN 0140-3664
IngestDate Tue Jul 01 02:43:04 EDT 2025
Thu Apr 24 23:11:18 EDT 2025
Fri Feb 23 02:23:48 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Consensus protocol
Data structure
Blockchain
Internet of things (IoT)
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c372t-408050138e6fb77bc493de31381550bf9738c9272d858f85efee8006e585e3be3
PageCount 20
ParticipantIDs crossref_citationtrail_10_1016_j_comcom_2019_01_006
crossref_primary_10_1016_j_comcom_2019_01_006
elsevier_sciencedirect_doi_10_1016_j_comcom_2019_01_006
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate February 2019
2019-02-00
PublicationDateYYYYMMDD 2019-02-01
PublicationDate_xml – month: 02
  year: 2019
  text: February 2019
PublicationDecade 2010
PublicationTitle Computer communications
PublicationYear 2019
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Cristian, Aghili, Strong, Dolev (b79) 1995; 118
Marandi, Primi, Pedone (b87) 2011
Bitcoin, 2017-05-20, URL
Dai, Vasarhelyi (b151) 2017; 31
R.C. Merkle, Protocols for public key cryptosystems, in: Proc. 1st IEEE Symp. Secur. Privacy, SP’ 80, 1980, pp. 122–122
Reid, Harrigan (b162) 2013
D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm, in: 2014 Proc. USENIX Annu. Tech. Conf., USENIX ATC 14, Philadelphia, PA, pp. 305–319.
Pease, Shostak, Lamport (b85) 1980; 27
F. Al-Doghman, Z. Chaczko, J. Jiang, A review of aggregation algorithms for the internet of things, in: Proc. 25th Int. Conf. Syst. Eng., ICSEng’17, 2017, pp. 480–487.
Group (b213) 2015
Team (b100) 2018
Ethereum homestead documentation–the homestead release, 2016, URL
Booth, Soknacki, Somayaji (b8) 2013
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, E. Wong, Zyzzyva: Speculative byzantine fault tolerance, in: Proc. 21st ACM SIGOPS Symp. Operating Syst. Principles, SOSP ’07, Vol. 41, pp. 45–58.
J. Chen, S.H.G. Chan, S.C. Liew, Mixed-mode WLAN: The integration of ad hoc mode with wireless LAN infrastructure, in: 2003 Proc. IEEE Global Telecommun. Conf., GLOBECOM ’03, Vol. 1, pp. 231–235.
Peters, Panayi (b189) 2016
Sawtooth lake documentation, 2017, URL
Kwon (b214) 2014
Mosenia, Jha (b59) 2017; 5
R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, NB-IoT system for M2M communication, in: 2016 Proc. IEEE Wireless Commun. and Netw. Conf. Workshops, WCNCW’16, pp. 1–5.
Miller, Xia, Croman, Shi, Song (b221) 2016
Sharma, Singh, Jeong, Park (b195) 2017; 55
Lewis (b32) 2015
C. Cachin, K. Kursawe, F. Petzold, V. Shoup, Secure and efficient asynchronous broadcast protocols, in: 2001 Proc. Annu. Int. Cryptology Conf., CRYPTO ’01, Springer, pp. 524–541.
Kabessa (b234) 2017
.
Yuval Marcus, Goldberg (b98) 2018
Vukolić (b193) 2015
Liu, Dong, Guo, Yang, Peng (b5) 2015; 8
Zhang, Cecchetti, Croman, Juels, Shi (b111) 2016
M. Lauridsen, I.Z. Kovacs, P. Mogensen, M. Sorensen, S. Holst, Coverage and capacity analysis of LTE-M and NB-IoT in a rural area, in: Proc. 84th IEEE Vehicular Technol. Conf., VTC-Fall’16, 2016, pp. 1–5.
Gentry (b184) 2009
M. Katagi, S. Moriai, Lightweight cryptography for the Internet of Things.
H.F. Atlam, A. Alenezi, A. Alharthi, R.J. Walters, G.B. Wills, Integration of cloud computing with Internet of Things: Challenges and open issues, in: 2017 Proc. IEEE Int. Conf. Internet of Things (iThings) and IEEE Green Comput. Commun. (GreenCom) and IEEE Cyber, Physical Social Comput. (CPSCom) and IEEE Smart Data (SmartData), pp. 670–675
Buterin (b142) 2014
Popov (b228) 2016
Ethereum, 2017, URL
S. Huh, S. Cho, S. Kim, Managing IoT devices using Blockchain platform, in: Proc. 19th Int. Conf. Advanced Commun. Technol., ICACT’ 17, 2017, pp. 464–467.
Brody, Pureswaran (b25) 2014
Zorzi, Gluhak, Lange, Bassi (b138) 2010; 17
Koshy, Koshy, McDaniel (b169) 2014
Vbuterin, On sharding blockchains, 2017, URL
Chen, Mao, Liu (b29) 2014; 19
R. Neisse, G. Steri, I. Nai-Fovino, A blockchain-based approach for data accountability and provenance tracking, 2017, arXiv preprint URL
Androulaki, Karame, Roeschlin, Scherer, Capkun (b163) 2013
Makhdoom, Abolhasan, Lipman, Liu, Ni (b49) 2018
Xu, He, Li (b36) 2014; 10
Ethereum mining hardware, 2017, URL
Schlichting, Schneider (b81) 1983; 1
MONERO, 2017, URL
A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in internet of things: Challenges and solutions, 2016
Al-Fuqaha, Guizani, Mohammadi, Aledhari, Ayyash (b37) 2015; 17
Poledna (b77) 2007
M. Conti, C. Lal, S. Ruj, et al. A survey on security and privacy issues of bitcoin, 2017, arXiv preprint URL
Biryukov, Khovratovich, Pustogarov (b167) 2014
Demirel, Lancrenon (b182) 2015; 2015
Oki, Liskov (b218) 1988
Guerraoui, Knežević, Quéma, Vukolić (b220) 2010
Rathore, Ahmad, Paul, Rho (b140) 2016; 101
Crosby, Pattanayak (b33) 2016; 2
Perry, Toueg (b80) 1986; SE-12
Y. Rahulamathavan, R.C.W. Phan, S. Misra, M. Rajarajan, Privacy-preserving Blockchain based IoT Ecosystem using attribute-based encryption, in: 2017 Proc. IEEE Int. Conf. Advanced Netw. Telecommun. Syst, Odisha, India.
K.H. Wang, B. Li, Group mobility and partition prediction in wireless ad-hoc networks, in: 2002 Proc. IEEE Int. Conf. Commun., ICC’ 02, Vol. 2, pp. 1017–1021.
Fedak (b28) 2016
Kosba, Miller, Shi, Wen, Papamanthou (b171) 2016
Pilkington (b192) 2016
Universa (b150) 2017
Liu, Wei, Wong (b177) 2004; vol. 4
I.B.M., Watson Internet of Things, 2017, URL
Eyal (b207) 2015
Hertig (b154) 2018
Golle, Greene, Staddon (b113) 2004
Vermesan, Friess, Guillemin (b45) 2011; 1
Why 0chain, not IOTA, is ideal for IOT apps, Dec, 2017, URL
Karame, Androulaki, Capkun (b92) 2012
Oraclize, 2018, URL
Luu, Narayanan, Zheng, Baweja, Gilbert, Saxena (b199) 2016
Pticek, Podobnik, Jezic (b34) 2016; 12
Jaffe, Mata, Kamvar (b143) 2017
Rackoff, Simon (b173) 1992
Stale block, 2017, URL
Elements project, 2017, URL
Khalilov, Levi (b19) 2018; 20
Lamport (b82) 1998; 16
G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 2014, URL
Burrow, 2017, URL
Tanenbaum, Wetherall (b204) 2011
Liu, Zhao, Li, Zhang, Trappe (b52) 2017; 9
Bastiaan (b94) 2015
N. van Saberhagen, Cryptonote v 2. 0, 2013.
Nakamoto (b68) 2008
Blockchain-oracles, 2018, URL
Back, Corallo, Dashjr (b240) 2014
Perera, Zaslavsky, Christen, Georgakopoulos (b35) 2014; 16
Szabo (b149) 1996
Laszka, Johnson, Grossklags (b206) 2015
Y. Guo, C. Mate, Jr., Crysto: A Scalable and Permission-less Blockchain Platform, URL
Sompolinsky, Zohar (b229) 2013; 2013
Noether, Mackenzie (b181) 2016; 1
X. Wang, X. Zha, G. Yu, W. Ni, R.P. Liu, Y.J. Guo, X. Niu, K. Zheng, Attack and defence of ethereum remote APIs, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018.
Christidis, Devetsikiotis (b12) 2016; 4
T. Crain, V. Gramoli, M. Larrea, M. Raynal, (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains, 2017, arXiv preprint URL
Y. Sompolinsky, A. Zohar, Secure high-rate transaction processing in bitcoin, in: 2015 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’15, Springer, pp. 507–527.
Hou, Kumar (b133) 2012; 19
D. Ron, A. Shamir, Quantitative analysis of the full bitcoin transaction graph, in: 2013 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’13, Springer, pp. 6–24.
N. Namvar, W. Saad, N. Bahadori, B. Kelley, Jamming in the Internet of Things: A game-theoretic perspective, in: 2016 IEEE Global Commun. Conf., GLOBECOM, 2016, pp. 1–6.
Protocol rules, 2016, URL
Yang, Liu, Deng (b106) 2017; 14
Bentov, Lee, Mizrahi, Rosenfeld (b211) 2014; 42
RSK, 2018, URL
M. Smache, N.E. Mrabet, J.J. Gilquijano, A. Tria, E. Riou, C. Gregory, Modeling a node capture attack in a secure wireless sensor networks, in: 2016 Proc IEEE 3rd World Forum on Internet of Things, WF-IoT’16, 2016, pp. 188–193.
G. Gan, Z. Lu, J. Jiang, Internet of Things security analysis, in: 2011 Int. Conf. Internet Technol. and Appl, 2011, pp. 1–4.
B. Leiding, P. Memarmoshrefi, D. Hogrefe, Self-managed and blockchain-based vehicular ad-hoc networks, in: 2016 Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput.: Adjunct, New York, NY, USA, pp. 137–140.
K. Biswas, V. Muthukkumarasamy, Securing smart cities using blockchain technology, in: Proc. 18th IEEE Int. Conf. High Performance Comput. Commun.; 14th IEEE Int. Conf. Smart City; 2nd IEEE Int. Conf. Data Sci. Syst., HPCC/SmartCity/DSS’16, 2016, pp. 1392–1393.
Maymounkov, Mazières (b161) 2002
I. Eyal, A.E. Gencer, E.G. Sirer, R. Van Renesse, Bitcoin-ng: A scalable blockchain protocol, in: Proc. 13th USENIX Symp. on Networked Syst. Design Implementation, NSDI’16, 2016, pp. 45–59.
G. Yu, X. Wang, X. Zha, J.A. Zhang, R.P. Liu, An optimized round-robin scheduling of speakers for peers-to-peers-based byzantine faulty tolerance, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018.
Al Khalil, Ceci, O’Brien, Butler (b152) 2017
Z. Zheng, S. Xie, H.-N. Dai, H. Wang, Blockchain challenges and opportunities: A survey, Int. J. Web Grid Services.
Dorri, Kanhere, Jurdak (b121) 2017
Miller, Juels, Shi, Parno, Katz (b209) 2014
King, Nadal (b88) 2012
Miers, Garman, Green, Rubin (b174) 2013
Lin, Yu, Zhang, Yang, Zhang, Zhao (b54) 2017; 4
M. Vasek, M. Thornton, T. Moore, Empirical analysis of denial-of-service attacks in the bitcoin ecosystem, in: 2014 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’14, Springer, pp. 57–71.
Chidambaram, Raj, Thenmozhi, Amirtharajan (b9) 2016; 2016
Ren, Lyu, Ni, Tian, Liu (b46) 2018
Boritz (b63) 2005; 6
Etherscan, 2017, URL
Hyperledger, 2015, URL
Charron-Bost, Schiper (b84) 2009; 22
V. Daza, R.D. Pietro, I. Klimek, M. Signorini, CONNECT: CONtextual name discovery for Blockchain-based services in the IoT, in: 2017 Proc. IEEE Int. Conf. Commun., ICC’17, pp. 1–6.
N. Atzei, M. Bartoletti, T. Cimoli, A survey of attacks on ethereum smart contracts (SoK), in: Proc. 6th Int. Conf. Principles Secur. Trust, 2017, pp. 164–186.
A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, in: 2017 Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, pp. 618–623.
H.C. Pöhls, JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application, in: Proc. 9th Int. Conf. Innovative Mobile Internet Serv. in Ubiquitous Comput., IMIS’15, 2015, pp. 306–312.
Buterin (b231) 2014
Cui, Wang, Chen, Ni, Lin, Tao, Zhang (b40) 2018
Miller, Kosba, Katz, Shi (b208) 2015
Fitzi, Maurer (b86) 1998
Szabo (b210) 1997
Tan, Wang (b239) 2010; vol. 5
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, S. Savage, A fistful of bitcoins: Characterizing payments among men with no names, in: 2013 Proc. Conf. Internet measurement, ACM, pp. 127–140.
Rose, Eldridge, Chapin (b3) 2015
X. Wang, K. Zheng, X. Niu, B. Wu, C. Wu, Detection of command and control in advanced persistent threat based on independent access, in: Proc. 2016 IEEE Int. Conf. Commun., ICC’ 16, 2016, pp. 1–6.
Blockchain, 2017, URL
Ouaddah, Abou Elkalam, Ait Ouahman (b188) 2016; 9
Zha, Wang, Ni, Liu, Guo, Niu, Zheng (b15) 2017; 1
Lamport, Shostak, Peas
Stewart (10.1016/j.comcom.2019.01.006_b215) 2012
Wyman (10.1016/j.comcom.2019.01.006_b72) 2016
Miller (10.1016/j.comcom.2019.01.006_b70) 2015
10.1016/j.comcom.2019.01.006_b105
10.1016/j.comcom.2019.01.006_b226
10.1016/j.comcom.2019.01.006_b227
10.1016/j.comcom.2019.01.006_b109
Schiener (10.1016/j.comcom.2019.01.006_b116) 2017
Goland (10.1016/j.comcom.2019.01.006_b132) 2017
10.1016/j.comcom.2019.01.006_b224
(10.1016/j.comcom.2019.01.006_b44) 2016
10.1016/j.comcom.2019.01.006_b104
10.1016/j.comcom.2019.01.006_b225
10.1016/j.comcom.2019.01.006_b101
Liu (10.1016/j.comcom.2019.01.006_b177) 2004; vol. 4
10.1016/j.comcom.2019.01.006_b222
Cristian (10.1016/j.comcom.2019.01.006_b79) 1995; 118
10.1016/j.comcom.2019.01.006_b102
10.1016/j.comcom.2019.01.006_b223
Kogias (10.1016/j.comcom.2019.01.006_b89) 2016
10.1016/j.comcom.2019.01.006_b11
Vermesan (10.1016/j.comcom.2019.01.006_b45) 2011; 1
Pilkington (10.1016/j.comcom.2019.01.006_b192) 2016
10.1016/j.comcom.2019.01.006_b217
Brody (10.1016/j.comcom.2019.01.006_b25) 2014
10.1016/j.comcom.2019.01.006_b17
10.1016/j.comcom.2019.01.006_b18
10.1016/j.comcom.2019.01.006_b216
10.1016/j.comcom.2019.01.006_b13
10.1016/j.comcom.2019.01.006_b14
Luu (10.1016/j.comcom.2019.01.006_b199) 2016
Xu (10.1016/j.comcom.2019.01.006_b55) 2017; 5
Douceur (10.1016/j.comcom.2019.01.006_b201) 2002
Szabo (10.1016/j.comcom.2019.01.006_b210) 1997
Sasson (10.1016/j.comcom.2019.01.006_b175) 2014
Kshetri (10.1016/j.comcom.2019.01.006_b10) 2017; 19
Tan (10.1016/j.comcom.2019.01.006_b239) 2010; vol. 5
10.1016/j.comcom.2019.01.006_b22
10.1016/j.comcom.2019.01.006_b23
Rose (10.1016/j.comcom.2019.01.006_b3) 2015
10.1016/j.comcom.2019.01.006_b20
10.1016/j.comcom.2019.01.006_b21
Perry (10.1016/j.comcom.2019.01.006_b80) 1986; SE-12
Pease (10.1016/j.comcom.2019.01.006_b85) 1980; 27
10.1016/j.comcom.2019.01.006_b129
Weber (10.1016/j.comcom.2019.01.006_b4) 2010; 26
10.1016/j.comcom.2019.01.006_b127
10.1016/j.comcom.2019.01.006_b128
10.1016/j.comcom.2019.01.006_b26
Marandi (10.1016/j.comcom.2019.01.006_b87) 2011
10.1016/j.comcom.2019.01.006_b122
10.1016/j.comcom.2019.01.006_b243
10.1016/j.comcom.2019.01.006_b120
10.1016/j.comcom.2019.01.006_b125
10.1016/j.comcom.2019.01.006_b126
10.1016/j.comcom.2019.01.006_b123
10.1016/j.comcom.2019.01.006_b244
10.1016/j.comcom.2019.01.006_b124
Lyu (10.1016/j.comcom.2019.01.006_b7) 2017; 35
Koshy (10.1016/j.comcom.2019.01.006_b169) 2014
10.1016/j.comcom.2019.01.006_b119
Kwon (10.1016/j.comcom.2019.01.006_b214) 2014
10.1016/j.comcom.2019.01.006_b237
10.1016/j.comcom.2019.01.006_b117
10.1016/j.comcom.2019.01.006_b238
10.1016/j.comcom.2019.01.006_b110
Ouaddah (10.1016/j.comcom.2019.01.006_b188) 2016; 9
Mosenia (10.1016/j.comcom.2019.01.006_b59) 2017; 5
Bentov (10.1016/j.comcom.2019.01.006_b211) 2014; 42
10.1016/j.comcom.2019.01.006_b232
10.1016/j.comcom.2019.01.006_b230
10.1016/j.comcom.2019.01.006_b114
10.1016/j.comcom.2019.01.006_b235
10.1016/j.comcom.2019.01.006_b115
Feige (10.1016/j.comcom.2019.01.006_b172) 1988; 1
10.1016/j.comcom.2019.01.006_b236
10.1016/j.comcom.2019.01.006_b112
10.1016/j.comcom.2019.01.006_b233
Ren (10.1016/j.comcom.2019.01.006_b46) 2018
Zorzi (10.1016/j.comcom.2019.01.006_b138) 2010; 17
Fedak (10.1016/j.comcom.2019.01.006_b28) 2016
Pticek (10.1016/j.comcom.2019.01.006_b34) 2016; 12
Fitzi (10.1016/j.comcom.2019.01.006_b86) 1998
Peters (10.1016/j.comcom.2019.01.006_b189) 2016
Laszka (10.1016/j.comcom.2019.01.006_b206) 2015
Wang (10.1016/j.comcom.2019.01.006_b61) 2016; 11
Finney (10.1016/j.comcom.2019.01.006_b93) 2011
Raval (10.1016/j.comcom.2019.01.006_b148) 2016
bitcoinwiki (10.1016/j.comcom.2019.01.006_b170) 2017
Mostéfaoui (10.1016/j.comcom.2019.01.006_b83) 2001
Group (10.1016/j.comcom.2019.01.006_b213) 2015
10.1016/j.comcom.2019.01.006_b144
10.1016/j.comcom.2019.01.006_b141
Perera (10.1016/j.comcom.2019.01.006_b35) 2014; 16
10.1016/j.comcom.2019.01.006_b146
Sompolinsky (10.1016/j.comcom.2019.01.006_b229) 2013; 2013
10.1016/j.comcom.2019.01.006_b139
Schlichting (10.1016/j.comcom.2019.01.006_b81) 1983; 1
10.1016/j.comcom.2019.01.006_b130
10.1016/j.comcom.2019.01.006_b131
10.1016/j.comcom.2019.01.006_b136
10.1016/j.comcom.2019.01.006_b137
10.1016/j.comcom.2019.01.006_b134
Roman (10.1016/j.comcom.2019.01.006_b53) 2011; 44
Bastiaan (10.1016/j.comcom.2019.01.006_b94) 2015
Miers (10.1016/j.comcom.2019.01.006_b174) 2013
Jaffe (10.1016/j.comcom.2019.01.006_b143) 2017
Zha (10.1016/j.comcom.2019.01.006_b15) 2017; 1
Androulaki (10.1016/j.comcom.2019.01.006_b163) 2013
Chin (10.1016/j.comcom.2019.01.006_b107) 2017; 55
10.1016/j.comcom.2019.01.006_b165
10.1016/j.comcom.2019.01.006_b166
Kabessa (10.1016/j.comcom.2019.01.006_b234) 2017
10.1016/j.comcom.2019.01.006_b168
Tschorsch (10.1016/j.comcom.2019.01.006_b30) 2016; 18
Golle (10.1016/j.comcom.2019.01.006_b113) 2004
Al-Fuqaha (10.1016/j.comcom.2019.01.006_b37) 2015; 17
10.1016/j.comcom.2019.01.006_b160
Eyal (10.1016/j.comcom.2019.01.006_b207) 2015
Dolev (10.1016/j.comcom.2019.01.006_b78) 1983; 12
Liu (10.1016/j.comcom.2019.01.006_b5) 2015; 8
Charron-Bost (10.1016/j.comcom.2019.01.006_b84) 2009; 22
Universa (10.1016/j.comcom.2019.01.006_b150) 2017
Biryukov (10.1016/j.comcom.2019.01.006_b167) 2014
10.1016/j.comcom.2019.01.006_b158
10.1016/j.comcom.2019.01.006_b159
10.1016/j.comcom.2019.01.006_b156
10.1016/j.comcom.2019.01.006_b157
Liu (10.1016/j.comcom.2019.01.006_b52) 2017; 9
Guerraoui (10.1016/j.comcom.2019.01.006_b220) 2010
Bracha (10.1016/j.comcom.2019.01.006_b219) 1985; 32
Sharma (10.1016/j.comcom.2019.01.006_b16) 2017; 13
Maymounkov (10.1016/j.comcom.2019.01.006_b161) 2002
Hou (10.1016/j.comcom.2019.01.006_b133) 2012; 19
Chidambaram (10.1016/j.comcom.2019.01.006_b9) 2016; 2016
Dai (10.1016/j.comcom.2019.01.006_b151) 2017; 31
Zhang (10.1016/j.comcom.2019.01.006_b58) 2014; 1
10.1016/j.comcom.2019.01.006_b185
10.1016/j.comcom.2019.01.006_b186
10.1016/j.comcom.2019.01.006_b91
10.1016/j.comcom.2019.01.006_b180
Boritz (10.1016/j.comcom.2019.01.006_b63) 2005; 6
King (10.1016/j.comcom.2019.01.006_b88) 2012
Buterin (10.1016/j.comcom.2019.01.006_b142) 2014
10.1016/j.comcom.2019.01.006_b99
10.1016/j.comcom.2019.01.006_b97
10.1016/j.comcom.2019.01.006_b95
10.1016/j.comcom.2019.01.006_b96
Sethi (10.1016/j.comcom.2019.01.006_b41) 2017
Team (10.1016/j.comcom.2019.01.006_b100) 2018
He (10.1016/j.comcom.2019.01.006_b147) 2004; vol. 2
10.1016/j.comcom.2019.01.006_b178
10.1016/j.comcom.2019.01.006_b179
Ron (10.1016/j.comcom.2019.01.006_b164) 2013
Makhdoom (10.1016/j.comcom.2019.01.006_b49) 2018
Chen (10.1016/j.comcom.2019.01.006_b145) 2011; 8
Eastlake 3rd (10.1016/j.comcom.2019.01.006_b203) 2011
Romero (10.1016/j.comcom.2019.01.006_b242) 2017; 11
Davidson (10.1016/j.comcom.2019.01.006_b67) 2016
Luu (10.1016/j.comcom.2019.01.006_b198) 2015; 2015
Buterin (10.1016/j.comcom.2019.01.006_b90) 2015
Tanenbaum (10.1016/j.comcom.2019.01.006_b204) 2011
Vuran (10.1016/j.comcom.2019.01.006_b241) 2004; 45
Perry (10.1016/j.comcom.2019.01.006_b60) 2017
Rackoff (10.1016/j.comcom.2019.01.006_b173) 1992
Dagher (10.1016/j.comcom.2019.01.006_b176) 2015
Crosby (10.1016/j.comcom.2019.01.006_b33) 2016; 2
Atzori (10.1016/j.comcom.2019.01.006_b38) 2010; 54
Fabian (10.1016/j.comcom.2019.01.006_b2) 2009; 52
10.1016/j.comcom.2019.01.006_b6
Vasin (10.1016/j.comcom.2019.01.006_b212) 2014
Lewis (10.1016/j.comcom.2019.01.006_b32) 2015
Liang (10.1016/j.comcom.2019.01.006_b135) 2013; 3
O’Connor (10.1016/j.comcom.2019.01.006_b27) 2017
Cui (10.1016/j.comcom.2019.01.006_b40) 2018
Booth (10.1016/j.comcom.2019.01.006_b8) 2013
Hertig (10.1016/j.comcom.2019.01.006_b154) 2018
10.1016/j.comcom.2019.01.006_b196
10.1016/j.comcom.2019.01.006_b197
Rathore (10.1016/j.comcom.2019.01.006_b140) 2016; 101
10.1016/j.comcom.2019.01.006_b190
10.1016/j.comcom.2019.01.006_b191
10.1016/j.comcom.2019.01.006_b1
Zhang (10.1016/j.comcom.2019.01.006_b111) 2016
10.1016/j.comcom.2019.01.006_b194
Miller (10.1016/j.comcom.2019.01.006_b221) 2016
10.1016/j.comcom.2019.01.006_b42
10.1016/j.comcom.2019.01.006_b43
Goyal (10.1016/j.comcom.2019.01.006_b183) 2006
Karame (10.1016/j.comcom.2019.01.006_b92) 2012
Miller (10.1016/j.comcom.2019.01.006_b209) 2014
Gentry (10.1016/j.comcom.2019.01.006_b184) 2009
Vukolić (10.1016/j.comcom.2019.01.006_b193) 2015
Christidis (10.1016/j.comcom.2019.01.006_b12) 2016; 4
Mehta (10.1016/j.comcom.2019.01.006_b56) 2012; 11
Panikkar (10.1016/j.comcom.2019.01.006_b24) 2014
Xu (10.1016/j.comcom.2019.01.006_b36) 2014; 10
Szabo (10.1016/j.comcom.2019.01.006_b149) 1996
Back (10.1016/j.comcom.2019.01.006_b240) 2014
10.1016/j.comcom.2019.01.006_b50
Nakamoto (10.1016/j.comcom.2019.01.006_b68) 2008
McKinney (10.1016/j.comcom.2019.01.006_b118) 2017
10.1016/j.comcom.2019.01.006_b57
Poledna (10.1016/j.comcom.2019.01.006_b77) 2007
Kosba (10.1016/j.comcom.2019.01.006_b171) 2016
Dorri (10.1016/j.comcom.2019.01.006_b121) 2017
Sharma (10.1016/j.comcom.2019.01.006_b195) 2017; 55
Swan (10.1016/j.comcom.2019.01.006_b31) 2015
Lamport (10.1016/j.comcom.2019.01.006_b82) 1998; 16
Kaiser (10.1016/j.comcom.2019.01.006_b153) 2017
Yang (10.1016/j.comcom.2019.01.006_b106) 2017; 14
Demirel (10.1016/j.comcom.2019.01.006_b182) 2015; 2015
Lin (10.1016/j.comcom.2019.01.006_b54) 2017; 4
10.1016/j.comcom.2019.01.006_b66
10.1016/j.comcom.2019.01.006_b64
10.1016/j.comcom.2019.01.006_b65
10.1016/j.comcom.2019.01.006_b62
Meegan (10.1016/j.comcom.2019.01.006_b103) 2016
Ouaddah (10.1016/j.comcom.2019.01.006_b187) 2017
10.1016/j.comcom.2019.01.006_b205
Lamport (10.1016/j.comcom.2019.01.006_b76) 1982; 4
Popov (10.1016/j.comcom.2019.01.006_b228) 2016
10.1016/j.comcom.2019.01.006_b69
Oki (10.1016/j.comcom.2019.01.006_b218) 1988
Reid (10.1016/j.comcom.2019.01.006_b162) 2013
10.1016/j.comcom.2019.01.006_b202
10.1016/j.comcom.2019.01.006_b200
Zha (10.1016/j.comcom.2019.01.006_b39) 2018; 13
10.1016/j.comcom.2019.01.006_b75
10.1016/j.comcom.2019.01.006_b73
10.1016/j.comcom.2019.01.006_b74
10.1016/j.comcom.2019.01.006_b71
Langner (10.1016/j.comcom.2019.01.006_b108) 2011; 9
Yuval Marcus (10.1016/j.comcom.2019.01.006_b98) 2018
Tsai (10.1016/j.comcom.2019.01.006_b47) 2014; 16
Chen (10.1016/j.comcom.2019.01.006_b29) 2014; 19
Miller (10.1016/j.comcom.2019.01.006_b208) 2015
Khalilov (10.1016/j.comcom.2019.01.006_b19) 2018; 20
Buterin (10.1016/j.comcom.2019.01.006_b231) 2
References_xml – year: 2008
  ident: b68
  article-title: Bitcoin: A peer-to-peer electronic cash system
– reference: I. Eyal, A.E. Gencer, E.G. Sirer, R. Van Renesse, Bitcoin-ng: A scalable blockchain protocol, in: Proc. 13th USENIX Symp. on Networked Syst. Design Implementation, NSDI’16, 2016, pp. 45–59.
– reference: Iroha, 2017, URL
– year: 2012
  ident: b88
  article-title: Ppcoin: Peer-To-Peer Crypto-Currency with Proof-Of-Stake
– reference: This is how smart contracts and ethereum work, 2017, URL
– start-page: 112
  year: 2015
  end-page: 125
  ident: b193
  article-title: The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication
  publication-title: Int. Workshop on Open Problems in Network Secur
– year: 2018
  ident: b49
  article-title: Anatomy of threats to the Internet of Things
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2017
  ident: b153
  article-title: Yes, Bitcoin Can Do Smart Contracts and Particl Demonstrates How
– reference: C. Wang, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in: Proc. 29th Annu. IEEE Int. Conf. Comput. Commun., INFOCOM’10, 2010, pp. 1–9.
– reference: I. Eyal, E.G. Sirer, Majority is not enough: Bitcoin mining is vulnerable, in: 2014 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’14, Springer, pp. 436–454.
– start-page: 270
  year: 2016
  end-page: 282
  ident: b111
  article-title: Town crier: an authenticated data feed for smart contracts
  publication-title: Proc. 23rd ACM Conf. Comput. Commun. Secur., CCS’ 16
– volume: 54
  start-page: 2787
  year: 2010
  end-page: 2805
  ident: b38
  article-title: The Internet of Things: A survey
  publication-title: Comput. Netw.
– reference: R. Kotla, L. Alvisi, M. Dahlin, A. Clement, E. Wong, Zyzzyva: Speculative byzantine fault tolerance, in: Proc. 21st ACM SIGOPS Symp. Operating Syst. Principles, SOSP ’07, Vol. 41, pp. 45–58.
– start-page: 4
  year: 2013
  end-page: 5
  ident: b8
  article-title: Cloud security: Attacks and current defenses
  publication-title: Pro. 8th Annu. Symp. Informat. Assurance, ASIA13
– reference: . I.O.T.A, IOTA, 2017, URL
– reference: K. Korpela, J. Hallikas, T. Dahlberg, Digital supply chain transformation toward Blockchain integration, in: Proc. 50th Hawaii Int. Conf. Syst. Sci, 2017.
– year: 2016
  ident: b67
  article-title: Economics of Blockchain
– reference: X. Wang, K. Zheng, X. Niu, B. Wu, C. Wu, Detection of command and control in advanced persistent threat based on independent access, in: Proc. 2016 IEEE Int. Conf. Commun., ICC’ 16, 2016, pp. 1–6.
– volume: 16
  start-page: 133
  year: 1998
  end-page: 169
  ident: b82
  article-title: The part-time parliament
  publication-title: ACM Trans. Comput. Syst.
– reference: Ethereum, 2017, URL
– volume: 13
  start-page: 2240
  year: 2018
  end-page: 2255
  ident: b39
  article-title: The impact of link duration on the integrity of distributed mobile networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 9
  start-page: 5943
  year: 2016
  end-page: 5964
  ident: b188
  article-title: FairAccess: A new Blockchain-based access control framework for the Internet of Things
  publication-title: Secur. Commun. Netw.
– reference: M. Vasek, M. Thornton, T. Moore, Empirical analysis of denial-of-service attacks in the bitcoin ecosystem, in: 2014 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’14, Springer, pp. 57–71.
– reference: Fabric, 2017, URL
– start-page: 459
  year: 2014
  end-page: 474
  ident: b175
  article-title: Zerocash: Decentralized anonymous payments from Bitcoin
  publication-title: Proc. 35th IEEE Symp. Secur. Privacy, SP’ 14
– reference: E. Heilman, A. Kendler, A. Zohar, S. Goldberg, Eclipse attacks on bitcoin’s peer-to-peer network, in: Proc. 24th USENIX Secur. Symp., USENIX Secur.’ 15, Washington, D.C., 2015, pp. 129–144.
– reference: M. Katagi, S. Moriai, Lightweight cryptography for the Internet of Things.
– start-page: 475
  year: 2014
  end-page: 490
  ident: b209
  article-title: Permacoin: Repurposing bitcoin work for data preservation
  publication-title: Proc. 35th IEEE Symp. Secur. Privacy, SP’ 14
– reference: . Vbuterin, On sharding blockchains, 2017, URL
– year: 2017
  ident: b150
  article-title: How Smart Contracts Will Kill Bureaucracy
– year: 2016
  ident: b44
  article-title: Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions)
– reference: M. Smache, N.E. Mrabet, J.J. Gilquijano, A. Tria, E. Riou, C. Gregory, Modeling a node capture attack in a secure wireless sensor networks, in: 2016 Proc IEEE 3rd World Forum on Internet of Things, WF-IoT’16, 2016, pp. 188–193.
– volume: 32
  start-page: 824
  year: 1985
  end-page: 840
  ident: b219
  article-title: Asynchronous consensus and broadcast protocols
  publication-title: J. ACM
– reference: G. Zyskind, O. Nathan, A.S. Pentland, Decentralizing privacy: Using blockchain to protect personal data, in: 2015 Proc. IEEE Secur. and Privacy Workshops, SPW’15, IEEE, pp. 180–184.
– year: 2014
  ident: b231
  article-title: Toward a 12-second block time
– year: 2007
  ident: b77
  article-title: Fault-Tolerant Real-Time Systems: The Problem of Replica Determinism, vol. 345
– volume: 2015
  start-page: 584
  year: 2015
  ident: b182
  article-title: How to securely prolong the computational bindingness of pedersen commitments
  publication-title: IACR Cryptol. EPrint Archive
– start-page: 523
  year: 2017
  end-page: 533
  ident: b187
  article-title: Towards a novel privacy-preserving access control model based on blockchain technology in IoT
  publication-title: Europe and MENA Cooperation Advances in Inf. and Communication Technologies
– reference: A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, in: 2017 Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, pp. 618–623.
– reference: MONERO, 2017, URL
– year: 2011
  ident: b204
  article-title: Computer Networks
– volume: 27
  start-page: 228
  year: 1980
  end-page: 234
  ident: b85
  article-title: Reaching agreement in the presence of faults
  publication-title: J. ACM
– year: 2015
  ident: b31
  article-title: Blockchain
– volume: vol. 2
  start-page: 825
  year: 2004
  end-page: 830
  ident: b147
  article-title: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
  publication-title: 2004 IEEE Wireless Commun. and Networking Conf., IEEE Cat. No.04TH8733
– volume: 17
  start-page: 2347
  year: 2015
  end-page: 2376
  ident: b37
  article-title: Internet of things: A survey on enabling technologies, protocols, and applications
  publication-title: IEEE Commun. Surv. Tutor.
– start-page: 169
  year: 2009
  end-page: 178
  ident: b184
  article-title: Fully homomorphic encryption using ideal lattices
  publication-title: Proc. of the 41st Annu. ACM Symp. on Theory of Computing
– reference: Sawtooth, 2017, URL
– reference: H.F. Atlam, A. Alenezi, A. Alharthi, R.J. Walters, G.B. Wills, Integration of cloud computing with Internet of Things: Challenges and open issues, in: 2017 Proc. IEEE Int. Conf. Internet of Things (iThings) and IEEE Green Comput. Commun. (GreenCom) and IEEE Cyber, Physical Social Comput. (CPSCom) and IEEE Smart Data (SmartData), pp. 670–675,
– reference: D. Ghosh, How the byzantine general sacked the castle: A look into blockchain, 2016-04-06, URL
– reference: G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain - or-rewriting history in bitcoin and friends, in: 2017 IEEE Eur. Symp. Secur. Privacy, EuroSP’ 17, 2017, pp. 111–126.
– volume: 1
  start-page: 21
  year: 2017
  ident: b15
  article-title: Blockchain for IoT: The tradeoff between consistency and capacity
  publication-title: Chin. J. Internet of Things
– reference: M. Castro, B. Liskov, Practical Byzantine fault tolerance, in: Proc. 3rd Symp. Operating Syst. Des. Implementation, OSDI’99, New Orleans, USA, 1999.
– reference: G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 2014, URL
– reference: K. Nayak, S. Kumar, A. Miller, E. Shi, Stubborn mining: Generalizing selfish mining and combining with an eclipse attack, in: 2016 Proc. IEEE Eur. Symp. Secur. Privacy, EuroSP’ 16, pp. 305–320.
– reference: Difficulty, 2017, URL
– year: 2017
  ident: b234
  article-title: PoW vs. PoS
– reference: N. Namvar, W. Saad, N. Bahadori, B. Kelley, Jamming in the Internet of Things: A game-theoretic perspective, in: 2016 IEEE Global Commun. Conf., GLOBECOM, 2016, pp. 1–6.
– volume: 2016
  start-page: 1
  year: 2016
  ident: b9
  article-title: Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
  publication-title: Int. J. Digit. Multimed. Broadcast.
– volume: 44
  start-page: 51
  year: 2011
  end-page: 58
  ident: b53
  article-title: Securing the Internet of Things
  publication-title: Comput.
– reference: B. Westermann, D. Gligoroski, S. Knapskog, Comparison of the power consumption of the 2nd round SHA-3 candidates, in: in: M. Gusev, P. Mitrevski (Eds.) Proc. 2nd Int. Conf. ICT Innovations, Berlin, Heidelberg, 2010, pp. 102–113.
– reference: Sawtooth lake documentation, 2017, URL
– reference: M. Lauridsen, I.Z. Kovacs, P. Mogensen, M. Sorensen, S. Holst, Coverage and capacity analysis of LTE-M and NB-IoT in a rural area, in: Proc. 84th IEEE Vehicular Technol. Conf., VTC-Fall’16, 2016, pp. 1–5.
– start-page: 53
  year: 2002
  end-page: 65
  ident: b161
  article-title: Kademlia: A peer-to-peer information system based on the XOR metric
  publication-title: Peer-to-Peer Syst.: 1st Int. Workshop, IPTPS’ 02
– start-page: 31
  year: 2016
  end-page: 42
  ident: b221
  article-title: The honey badger of bft protocols
  publication-title: Proc. 23rd ACM Conf. Comput. Commun. Secur., CCS’ 16
– volume: 2015
  start-page: 1168
  year: 2015
  ident: b198
  article-title: SCP: A computationally-scalable Byzantine consensus protocol for Blockchains
  publication-title: IACR Cryptol. EPrint Archive
– reference: Y. Sompolinsky, A. Zohar, Secure high-rate transaction processing in bitcoin, in: 2015 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’15, Springer, pp. 507–527.
– start-page: 197
  year: 2013
  end-page: 223
  ident: b162
  article-title: An analysis of anonymity in the bitcoin system
  publication-title: Secur. and Privacy in Social Networks
– year: 2016
  ident: b28
  article-title: How can Blockchain Improve Cloud Computing
– reference: A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in internet of things: Challenges and solutions, 2016,
– volume: 1
  start-page: 9
  year: 2011
  end-page: 52
  ident: b45
  article-title: Internet of Things strategic research roadmap
  publication-title: Internet of Things-Global Technol. Soc. Trends
– reference: Nxt, 2018, URL
– year: 2018
  ident: b100
  article-title: Billions of Tokens Theft Case cause by ETH Ecological Defects
– reference: Blockchain, 2017, URL
– reference: C. Cachin, K. Kursawe, F. Petzold, V. Shoup, Secure and efficient asynchronous broadcast protocols, in: 2001 Proc. Annu. Int. Cryptology Conf., CRYPTO ’01, Springer, pp. 524–541.
– volume: vol. 5
  start-page: V5
  year: 2010
  end-page: 376
  ident: b239
  article-title: Future internet: The Internet of Things
  publication-title: Proc. 3rd Int. Conf. Advanced Comput. Theory Eng., ICACTE’ 10
– reference: B. Leiding, P. Memarmoshrefi, D. Hogrefe, Self-managed and blockchain-based vehicular ad-hoc networks, in: 2016 Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput.: Adjunct, New York, NY, USA, pp. 137–140.
– reference: Bitcoin, 2017-05-20, URL
– volume: SE-12
  start-page: 477
  year: 1986
  end-page: 482
  ident: b80
  article-title: Distributed agreement in the presence of processor and communication faults
  publication-title: IEEE Trans. Softw. Eng.
– reference: H.C. Pöhls, JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application, in: Proc. 9th Int. Conf. Innovative Mobile Internet Serv. in Ubiquitous Comput., IMIS’15, 2015, pp. 306–312.
– volume: 5
  start-page: 586
  year: 2017
  end-page: 602
  ident: b59
  article-title: A comprehensive study of security of Internet-of-Things
  publication-title: IEEE Trans. Emerg. Top. Comput.
– year: 2018
  ident: b46
  article-title: Distributed online learning of fog computing under non-uniform device cardinality
  publication-title: IEEE Internet of Things J.
– volume: 12
  start-page: 656
  year: 1983
  end-page: 666
  ident: b78
  article-title: Authenticated algorithms for Byzantine agreement
  publication-title: SIAM J. Comput.
– year: 2017
  ident: b41
  article-title: Internet of Things: Architectures, protocols, and applications
  publication-title: J. Electr. Comput. Eng.
– reference: Protocol rules, 2016, URL
– reference: S. Raza, D. Trabalza, T. Voigt, 6LoWPAN Compressed DTLS for CoAP, in: Proc. 8th IEEE Int. Conf. Distributed Computing in Sensor Syst., DCOSS’12, 2012, pp. 287–289.
– reference: N. Atzei, M. Bartoletti, T. Cimoli, A survey of attacks on ethereum smart contracts (SoK), in: Proc. 6th Int. Conf. Principles Secur. Trust, 2017, pp. 164–186.
– year: 2011
  ident: b203
  article-title: US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)
– volume: 12
  year: 2016
  ident: b34
  article-title: Beyond the internet of things: The social networking of machines
  publication-title: Int. J. Distrib. Sens. Netw.
– volume: 10
  start-page: 2233
  year: 2014
  end-page: 2243
  ident: b36
  article-title: Internet of things in industries: A survey
  publication-title: IEEE Trans. Ind. Inf.
– volume: 16
  start-page: 77
  year: 2014
  end-page: 97
  ident: b47
  article-title: Data mining for Internet of Things: A survey
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2017
  ident: b27
  article-title: What Blockchain Means for You, and the Internet of Things
– reference: M. Conti, C. Lal, S. Ruj, et al. A survey on security and privacy issues of bitcoin, 2017, arXiv preprint URL
– reference: Ethereum homestead documentation–the homestead release, 2016, URL
– start-page: 6
  year: 2013
  end-page: 24
  ident: b164
  article-title: Quantitative Analysis of the Full Bitcoin Transaction Graph
– volume: 45
  start-page: 245
  year: 2004
  end-page: 259
  ident: b241
  article-title: Spatio-temporal correlation: Theory and applications for wireless sensor networks
  publication-title: Comput. Netw.
– volume: 35
  start-page: 2606
  year: 2017
  end-page: 2615
  ident: b7
  article-title: Optimal schedule of mobile edge computing for Internet of Things using partial information
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 52
  start-page: 121
  year: 2009
  end-page: 125
  ident: b2
  article-title: Security challenges of the EPCglobal network
  publication-title: Commun. ACM
– volume: 19
  start-page: 48
  year: 2012
  end-page: 59
  ident: b133
  article-title: Real-time communication over unreliable wireless links: A theory and its applications
  publication-title: IEEE Wirel. Commun.
– reference: S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, S. Savage, A fistful of bitcoins: Characterizing payments among men with no names, in: 2013 Proc. Conf. Internet measurement, ACM, pp. 127–140.
– reference: Bitcoin developer guide, 2017, URL
– start-page: 8
  year: 1988
  end-page: 17
  ident: b218
  article-title: Viewstamped replication: A new primary copy method to support highly-available distributed systems
  publication-title: Proc. 7th Annu. ACM Symp. on Principles Distrib. Comput
– year: 2016
  ident: b228
  article-title: The Tangle
– reference: . ethernodes.org, Network number 1, 2017, URL
– volume: 1
  start-page: 77
  year: 1988
  end-page: 94
  ident: b172
  article-title: Zero-knowledge proofs of identity
  publication-title: J. Cryptology
– start-page: 720
  year: 2015
  end-page: 731
  ident: b176
  article-title: Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges
  publication-title: Proc. 22nd ACM Conf. Comput. Commun. Secur., CCS’ 15
– volume: 16
  start-page: 414
  year: 2014
  end-page: 454
  ident: b35
  article-title: Context aware computing for the internet of things: A survey
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2012
  ident: b215
  article-title: Proof of Burn
– reference: Blockchain-oracles, 2018, URL
– volume: 4
  start-page: 2292
  year: 2016
  end-page: 2303
  ident: b12
  article-title: Blockchains and smart contracts for the Internet of Things
  publication-title: IEEE Access
– reference: Y. Rahulamathavan, R.C.W. Phan, S. Misra, M. Rajarajan, Privacy-preserving Blockchain based IoT Ecosystem using attribute-based encryption, in: 2017 Proc. IEEE Int. Conf. Advanced Netw. Telecommun. Syst, Odisha, India.
– year: 1996
  ident: b149
  article-title: Smart contracts: Building blocks for digital markets
  publication-title: EXTROPY: J. Transhumanist Thought
– reference: K.H. Wang, B. Li, Group mobility and partition prediction in wireless ad-hoc networks, in: 2002 Proc. IEEE Int. Conf. Commun., ICC’ 02, Vol. 2, pp. 1017–1021.
– reference: A.S.d.P. Crespo, L.I.C. García, Stampery Blockchain Timestamping Architecture (BTA)-Version 6, 2017, arXiv preprint URL
– start-page: 89
  year: 2015
  end-page: 103
  ident: b207
  article-title: The miner’s dilemma
  publication-title: Proc. 36th IEEE Symp. Secur. Privacy, SP’ 15
– reference: K. Biswas, V. Muthukkumarasamy, Securing smart cities using blockchain technology, in: Proc. 18th IEEE Int. Conf. High Performance Comput. Commun.; 14th IEEE Int. Conf. Smart City; 2nd IEEE Int. Conf. Data Sci. Syst., HPCC/SmartCity/DSS’16, 2016, pp. 1392–1393.
– reference: .
– year: 2014
  ident: b24
  article-title: ADEPT: An IoT Practitioner Perspective
– volume: 4
  start-page: 1125
  year: 2017
  end-page: 1142
  ident: b54
  article-title: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
  publication-title: IEEE Internet of Things J.
– year: 2016
  ident: b103
  article-title: Ethereum Continues to Suffer From DDoS Attacks
– start-page: 906
  year: 2012
  end-page: 917
  ident: b92
  article-title: Double-spending fast payments in bitcoin
  publication-title: Proc. 19th ACM Conf. Comput. Commun. Secur., CCS’12
– start-page: 81
  year: 2017
  end-page: 84
  ident: b143
  article-title: Motivating urban cycling through a blockchain-based financial incentives system
  publication-title: 2017 Proc. ACM Int. Joint Conf. Pervasive and Ubiquitous Comput. and 2017 Proc ACM Int. Symp. on Wearable Computers, UbiComp ’17
– volume: 9
  start-page: 49
  year: 2011
  end-page: 51
  ident: b108
  article-title: Stuxnet: Dissecting a cyberwarfare weapon
  publication-title: IEEE Secur. Privacy
– start-page: 433
  year: 1992
  end-page: 444
  ident: b173
  article-title: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
– volume: 1
  start-page: 222
  year: 1983
  end-page: 238
  ident: b81
  article-title: Fail-stop processors: An approach to designing fault-tolerant computing systems
  publication-title: ACM Trans. Comput. Syst.
– start-page: 173
  year: 2017
  end-page: 178
  ident: b121
  article-title: Towards an optimized blockchain for IoT
  publication-title: Proc. 2rd Int. Conf. Internet-of-Things Design Implementation
– reference: Wallet knowledge base, 2018, URL
– volume: 19
  start-page: 68
  year: 2017
  end-page: 72
  ident: b10
  article-title: Can Blockchain strengthen the Internet of Things?
  publication-title: IT Prof.
– reference: Z. Zheng, S. Xie, H.-N. Dai, H. Wang, Blockchain challenges and opportunities: A survey, Int. J. Web Grid Services.
– reference: X. Wang, X. Zha, G. Yu, W. Ni, R.P. Liu, Y.J. Guo, X. Niu, K. Zheng, Attack and defence of ethereum remote APIs, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018.
– reference: D. Ron, A. Shamir, Quantitative analysis of the full bitcoin transaction graph, in: 2013 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’13, Springer, pp. 6–24.
– reference: G. Maxwell, Confidential transaction, the initial investigation, URL
– year: 2017
  ident: b132
  article-title: Going Off Chain for Storage
– start-page: 89
  year: 2006
  end-page: 98
  ident: b183
  article-title: Attribute-based encryption for fine-grained access control of encrypted data
  publication-title: Proc. 13th ACM Conf. Comput. Commun. Secur
– year: 2014
  ident: b214
  article-title: Tendermint: Consensus without mining
– year: 2017
  ident: b170
  article-title: Mixing Service
– volume: 22
  start-page: 49
  year: 2009
  end-page: 71
  ident: b84
  article-title: The heard-of model: Computing in distributed systems with benign faults
  publication-title: Distrib. Comput.
– year: 2016
  ident: b148
  article-title: Decentralized Applications: Harnessing Bitcoin’s Blockchain Technology
– reference: G. Yu, X. Wang, X. Zha, J.A. Zhang, R.P. Liu, An optimized round-robin scheduling of speakers for peers-to-peers-based byzantine faulty tolerance, in: 2018 Proc. IEEE Globecom Workshops, GC Wkshps’18, 2018.
– volume: 20
  start-page: 2543
  year: 2018
  end-page: 2585
  ident: b19
  article-title: A survey on anonymity and privacy in bitcoin-like digital cash systems
  publication-title: IEEE Commun. Surv. Tutor.
– start-page: 15
  year: 2018
  ident: b98
  article-title: Low-Resource Eclipse Attacks on Ethereum’s Peer-To-Peer Network
– start-page: 1
  year: 2015
  end-page: 50
  ident: b3
  article-title: The Internet of Things: An overview
– volume: 4
  start-page: 1
  year: 2015
  end-page: 13
  ident: b51
  article-title: Internet of Things: Features, challenges, and vulnerabilities
  publication-title: Int. J. Adv. Comput. Sci. Inf. Technol.
– year: 2011
  ident: b93
  article-title: Best Practice for Fast Transaction Acceptance-How High Is the Risk
– start-page: 251
  year: 2002
  end-page: 260
  ident: b201
  article-title: The sybil attack
  publication-title: 2002 Proc. Int. Workshop Peer-to-Peer Syst
– year: 2001
  ident: b83
  article-title: A Versatile and Modular Consensus Protocol
– year: 2014
  ident: b25
  article-title: Device Democracy: Saving the Future of the Internet of Things
– reference: , 2017-05-22.
– reference: Etherscan, 2017, URL
– start-page: 239
  year: 2016
  end-page: 278
  ident: b189
  article-title: Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money
  publication-title: Banking Beyond Banks and Money
– volume: 11
  start-page: 856
  year: 2017
  end-page: 869
  ident: b242
  article-title: Kernel-Based reconstruction of space-time functions on dynamic graphs
  publication-title: IEEE J. Sel. Topics Signal Process.
– volume: 5
  start-page: 13787
  year: 2017
  end-page: 13798
  ident: b55
  article-title: Achieving efficient detection against false data injection attacks in smart grid
  publication-title: IEEE Access
– year: 2016
  ident: b72
  article-title: Blockchain in Capital Markets
– year: 2017
  ident: b118
  article-title: Light Client Protocol
– start-page: 839
  year: 2016
  end-page: 858
  ident: b171
  article-title: Hawk: The Blockchain model of cryptography and privacy-preserving smart contracts
  publication-title: Proc. 37th IEEE Symp. Secur. Privacy, SP’ 16
– reference: F. Al-Doghman, Z. Chaczko, J. Jiang, A review of aggregation algorithms for the internet of things, in: Proc. 25th Int. Conf. Syst. Eng., ICSEng’17, 2017, pp. 480–487.
– start-page: 680
  year: 2015
  end-page: 691
  ident: b208
  article-title: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions
  publication-title: Proc. 22nd ACM Conf. Comput. Commun. Secur., CCS’ 15
– reference: Size of the bitcoin blockchain from 2010 to 2017, by quarter, Dec, 2017, URL
– reference: R. Neisse, G. Steri, I. Nai-Fovino, A blockchain-based approach for data accountability and provenance tracking, 2017, arXiv preprint URL
– volume: 13
  start-page: 184
  year: 2017
  end-page: 195
  ident: b16
  article-title: Block-VN: A distributed blockchain based vehicular network architecture in smart city
  publication-title: J. Inf. Process. Syst.
– volume: 2013
  year: 2013
  ident: b229
  article-title: Accelerating bitcoin’s transaction processing. Fast money grows on trees, not chains
  publication-title: IACR Cryptol. EPrint Archive
– volume: 11
  start-page: 2241
  year: 2016
  end-page: 2254
  ident: b61
  article-title: Virus propagation modeling and convergence analysis in large-scale networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: J.K. Liu, D.S. Wong, Linkable ring signatures: Security models and new schemes, in: 2005 Proc. Int. Conf. Computational Sci. and Its Appl, Springer, pp. 614–623.
– start-page: 225
  year: 2016
  ident: b192
  article-title: Blockchain technology: Principles and applications
  publication-title: Research Handbook on Digital Transformations
– year: 2017
  ident: b152
  article-title: A Solution for the Problems of Translation and Transparency in Smart Contracts
– volume: 11
  start-page: 320
  year: 2012
  end-page: 336
  ident: b56
  article-title: Protecting location privacy in sensor networks against a global eavesdropper
  publication-title: IEEE Trans. Mobile Comput.
– start-page: 15
  year: 2014
  end-page: 29
  ident: b167
  article-title: Deanonymisation of clients in Bitcoin P2P network
  publication-title: Proc. 21st ACM Conf. Comput. Commun. Secur., CCS’ 14
– reference: Burrow, 2017, URL
– year: 2018
  ident: b154
  article-title: How Do Ethereum Smart Contracts Work?
– volume: 1
  start-page: 372
  year: 2014
  end-page: 383
  ident: b58
  article-title: Sybil attacks and their defenses in the Internet of Things
  publication-title: IEEE Internet of Things J.
– year: 2015
  ident: b213
  article-title: Proof of Stake versus Proof of Work
– reference: A. Boudguiga, N. Bouzerna, L. Granboulan, et al. Towards better availability and accountability for IoT updates by means of a Blockchain, in: Proc. 2017 IEEE Eur. Symp. Secur. Privacy Workshops, EuroSPW, Paris, France, 2017.
– year: 2014
  ident: b212
  article-title: Blackcoin as Proof-Of-Stake Protocol v2
– reference: RSK, 2018, URL
– volume: 3
  start-page: 13
  year: 2013
  end-page: 22
  ident: b135
  article-title: An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for Internet of Things
  publication-title: IEEE J. Emerg. Sec. Top. Circuits Syst.
– volume: 8
  start-page: 367
  year: 2015
  end-page: 376
  ident: b5
  article-title: Combination of cloud computing and Internet of Things (IOT) in medical monitoring systems
  publication-title: Int. J. Hybrid Inform. Technol.
– reference: Intel software guard extensions, 2017, URL
– reference: G. Zyskind, O. Nathan, A. Pentland, Enigma: Decentralized computation platform with guaranteed privacy, 2015, arXiv preprint URL
– start-page: 34
  year: 2013
  end-page: 51
  ident: b163
  article-title: Evaluating user privacy in bitcoin
  publication-title: Financial Cryptography and Data Secur.: 17th Int. Conf., FC 2013, Okinawa, Japan, April 1–5, 2013, Revised Selected Papers
– reference: D.W. Kravitz, J. Cooper, Securing user identity and transactions symbiotically: IoT meets Blockchain, in: 2017 Proc. Global Internet Things Summit, GIoTS’17, pp. 1–6.
– start-page: 134
  year: 1998
  end-page: 148
  ident: b86
  article-title: Efficient byzantine agreement secure against general adversaries
  publication-title: Distrib. Comput.
– start-page: 17
  year: 2016
  end-page: 30
  ident: b199
  article-title: A secure sharding protocol for open blockchains
  publication-title: Proc. 23rd ACM Conf. Comput. Commun. Secur., CCS’ 16
– year: 2018
  ident: b40
  article-title: Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city
  publication-title: IEEE Internet of Things J.
– reference: How do Bitcoin Transactions Work? 2015-03-20, URL
– year: 2015
  ident: b94
  article-title: Preventing the 51%-Attack: A Stochastic Analysis of Two Phase Proof of Work in Bitcoin
– volume: 9
  year: 2017
  ident: b52
  article-title: A security framework for the Internet of Things in the future internet architecture
  publication-title: Future Internet
– year: 2014
  ident: b240
  article-title: Enabling Blockchain Innovations with Pegged Sidechains
– reference: S. Verbücheln, How perfect offline wallets can still leak bitcoin private keys, 2015, arXiv preprint URL
– reference: Raspberry pi, 2017, URL
– reference: V. Daza, R.D. Pietro, I. Klimek, M. Signorini, CONNECT: CONtextual name discovery for Blockchain-based services in the IoT, in: 2017 Proc. IEEE Int. Conf. Commun., ICC’17, pp. 1–6.
– start-page: 29
  year: 2004
  end-page: 37
  ident: b113
  article-title: Detecting and correcting malicious data in vanets
  publication-title: Proc.1st ACM Int. Workshop Vehicular Ad Hoc Netw., VANET ’04
– reference: Y. Guo, C. Mate, Jr., Crysto: A Scalable and Permission-less Blockchain Platform, URL
– volume: 17
  start-page: 44
  year: 2010
  end-page: 51
  ident: b138
  article-title: From today’s INTRAnet of Things to a future INTERnet of Things: A wireless- and mobility-related view
  publication-title: IEEE Wirel. Commun.
– volume: 26
  start-page: 23
  year: 2010
  end-page: 30
  ident: b4
  article-title: Internet of Things – New security and privacy challenges
  publication-title: Comput. Law Secur. Review
– reference: S. Huh, S. Cho, S. Kim, Managing IoT devices using Blockchain platform, in: Proc. 19th Int. Conf. Advanced Commun. Technol., ICACT’ 17, 2017, pp. 464–467.
– volume: 55
  start-page: 78
  year: 2017
  end-page: 85
  ident: b195
  article-title: DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks
  publication-title: IEEE Commun. Mag.
– volume: 19
  start-page: 171
  year: 2014
  end-page: 209
  ident: b29
  article-title: Big data: A survey
  publication-title: Springer Mobile Netw. Appl.
– reference: G. Gan, Z. Lu, J. Jiang, Internet of Things security analysis, in: 2011 Int. Conf. Internet Technol. and Appl, 2011, pp. 1–4.
– volume: 8
  start-page: 1207
  year: 2011
  end-page: 1228
  ident: b145
  article-title: TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things
  publication-title: Comput. Sci. Inf. Syst.
– reference: X. Zha, K. Zheng, D. Zhang, Anti-pollution source location privacy preserving scheme in wireless sensor networks, in: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON, 2016, pp. 1–8, URL
– reference: Ethereum mining hardware, 2017, URL
– start-page: 363
  year: 2010
  end-page: 376
  ident: b220
  article-title: The next 700 BFT protocols
  publication-title: Proc. 5th Eur. Conf. Comput. Syst
– start-page: 454
  year: 2011
  end-page: 465
  ident: b87
  article-title: High performance state-machine replication
  publication-title: Proc. 41st Int. Conf. Depend. Syst. Netw., DSN’ 11
– year: 2014
  ident: b169
  article-title: An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
– year: 2017
  ident: b116
  article-title: The IOTA Lightwallet
– year: 2015
  ident: b90
  article-title: On public and private blockchains
  publication-title: Ethereum Blog
– volume: 1
  start-page: 1
  year: 2016
  end-page: 18
  ident: b181
  article-title: Ring confidential transactions
  publication-title: Ledger
– volume: 6
  start-page: 260
  year: 2005
  end-page: 279
  ident: b63
  article-title: Is practitioners’ views on core concepts of information integrity
  publication-title: Int. J. Account. Inf. Syst.
– reference: M. Mihaylov, S. Jurado, N. Avellana, K.V. Moffaert, I.M. de Abril, A. Nowé, Nrgcoin: virtual currency for trading of renewable energy in smart grids, in: Proc. 11th Int. Conf. Eur. Energy Market, EEM14, 2014, pp. 1–6.
– volume: 2
  start-page: 6
  year: 2016
  end-page: 10
  ident: b33
  article-title: BlockChain technology: Beyond bitcoin
  publication-title: Appl. Innov.
– reference: R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, NB-IoT system for M2M communication, in: 2016 Proc. IEEE Wireless Commun. and Netw. Conf. Workshops, WCNCW’16, pp. 1–5.
– volume: 14
  year: 2017
  ident: b106
  article-title: Lightweight break-glass access control system for healthcare Internet-of-Things
  publication-title: IEEE Trans. Ind. Inf.
– reference: Hyperledger, 2015, URL
– reference: . I.B.M., Watson Internet of Things, 2017, URL
– volume: 12
  start-page: 2261
  year: 2017
  end-page: 2275
  ident: b48
  article-title: Collaborative authentication in decentralized dense mobile networks with key predistribution
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: Stale block, 2017, URL
– volume: 42
  start-page: 34
  year: 2014
  end-page: 37
  ident: b211
  article-title: Proof of activity: Extending Bitcoin’s proof of work via proof of stake
  publication-title: SIGMETRICS Perform. Eval. Rev.
– year: 2017
  ident: b60
  article-title: Anatomy of an IoT malware attack
– reference: T. Crain, V. Gramoli, M. Larrea, M. Raynal, (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains, 2017, arXiv preprint URL
– reference: R.C. Merkle, Protocols for public key cryptosystems, in: Proc. 1st IEEE Symp. Secur. Privacy, SP’ 80, 1980, pp. 122–122,
– reference: Oraclize, 2018, URL
– start-page: 397
  year: 2013
  end-page: 411
  ident: b174
  article-title: Zerocoin: Anonymous distributed e-cash from Bitcoin
  publication-title: Proc. 34th IEEE Symp. Secur. Privacy, SP’ 13
– reference: Mining bitcoin only with raspberry pi, 2016, URL
– year: 2015
  ident: b70
  article-title: Discovering Bitcoin’s public topology and influential nodes
– volume: 31
  start-page: 5
  year: 2017
  end-page: 21
  ident: b151
  article-title: Toward blockchain-based accounting and assurance
  publication-title: J. Inf. Syst.
– reference: B. Betts, Blockchain and the promise of cooperative cloud storage, URL
– reference: J.S. Lee, Y.W. Su, C.C. Shen, A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi, in: Proc. 33rd Annu. Conf. the IEEE Ind. Elect. Soc., IECON’07, 2007, pp. 46–51.
– volume: 118
  start-page: 158
  year: 1995
  end-page: 179
  ident: b79
  article-title: Atomic broadcast: From simple message diffusion to Byzantine agreement
  publication-title: Inform. and Comput.
– year: 1997
  ident: b210
  article-title: The Idea of Smart Contracts
– reference: Elements project, 2017, URL
– year: 2015
  ident: b32
  article-title: A Gentle Introduction to Blockchain Technology
– reference: J. Chen, S.H.G. Chan, S.C. Liew, Mixed-mode WLAN: The integration of ad hoc mode with wireless LAN infrastructure, in: 2003 Proc. IEEE Global Telecommun. Conf., GLOBECOM ’03, Vol. 1, pp. 231–235.
– start-page: 63
  year: 2015
  end-page: 77
  ident: b206
  article-title: When bitcoin mining pools run dry
  publication-title: 2015 Proc. Int. Conf. Financial Cryptography Data Secur., FC ’15
– reference: A. Fongen, Identity management and integrity protection in the Internet of Things, in: Proc. 3rd Int. Conf. Emerg. Secur. Technol., EST’12, 2012, pp. 111–114.
– volume: 55
  start-page: 70
  year: 2017
  end-page: 75
  ident: b107
  article-title: Energy big data security threats in IoT-based smart grid communications
  publication-title: IEEE Commun. Mag.
– volume: 101
  start-page: 63
  year: 2016
  end-page: 80
  ident: b140
  article-title: Urban planning and building smart cities based on the internet of things using big data analytics
  publication-title: Comput. Netw.
– volume: 4
  start-page: 382
  year: 1982
  end-page: 401
  ident: b76
  article-title: The Byzantine generals problem
  publication-title: ACM Trans. Program. Lang. Syst.
– volume: vol. 4
  start-page: 325
  year: 2004
  end-page: 335
  ident: b177
  article-title: Linkable spontaneous anonymous group signature for ad hoc groups
  publication-title: ACISP
– reference: M. Rosenfeld, Analysis of bitcoin pooled mining reward systems, 2011, arXiv preprint URL
– year: 2014
  ident: b142
  article-title: Ethereum: A next-generation smart contract and decentralized application platform
– reference: D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm, in: 2014 Proc. USENIX Annu. Tech. Conf., USENIX ATC 14, Philadelphia, PA, pp. 305–319.
– volume: 18
  start-page: 2084
  year: 2016
  end-page: 2123
  ident: b30
  article-title: Bitcoin and beyond: A technical survey on decentralized digital currencies
  publication-title: IEEE Commun. Surv. Tutor.
– start-page: 279
  year: 2016
  end-page: 296
  ident: b89
  article-title: Enhancing bitcoin security and performance with strong consistency via collective signing
  publication-title: Proc. 25th USENIX Secur. Symp., USENIX Secur. 16
– reference: N. van Saberhagen, Cryptonote v 2. 0, 2013.
– reference: Why 0chain, not IOTA, is ideal for IOT apps, Dec, 2017, URL
– reference: . I.O.T.A, Light vs. Full Node, URL
– year: Feb, 2015
  ident: b155
  article-title: ABOUT
– volume: 101
  start-page: 63
  issue: Supplement C
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b140
  article-title: Urban planning and building smart cities based on the internet of things using big data analytics
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2015.12.023
– start-page: 15
  year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b98
– volume: 19
  start-page: 48
  issue: 1
  year: 2012
  ident: 10.1016/j.comcom.2019.01.006_b133
  article-title: Real-time communication over unreliable wireless links: A theory and its applications
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.2012.6155876
– start-page: 53
  year: 2002
  ident: 10.1016/j.comcom.2019.01.006_b161
  article-title: Kademlia: A peer-to-peer information system based on the XOR metric
– ident: 10.1016/j.comcom.2019.01.006_b190
  doi: 10.1109/GLOCOMW.2018.8644251
– year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b228
– ident: 10.1016/j.comcom.2019.01.006_b102
  doi: 10.1007/978-3-662-44774-1_5
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b234
– volume: 26
  start-page: 23
  issue: 1
  year: 2010
  ident: 10.1016/j.comcom.2019.01.006_b4
  article-title: Internet of Things – New security and privacy challenges
  publication-title: Comput. Law Secur. Review
  doi: 10.1016/j.clsr.2009.11.008
– year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b213
– volume: 31
  start-page: 5
  issue: 3
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b151
  article-title: Toward blockchain-based accounting and assurance
  publication-title: J. Inf. Syst.
– ident: 10.1016/j.comcom.2019.01.006_b137
– volume: 4
  start-page: 2292
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b12
  article-title: Blockchains and smart contracts for the Internet of Things
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2016.2566339
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b152
– ident: 10.1016/j.comcom.2019.01.006_b235
– start-page: 29
  year: 2004
  ident: 10.1016/j.comcom.2019.01.006_b113
  article-title: Detecting and correcting malicious data in vanets
– start-page: 251
  year: 2002
  ident: 10.1016/j.comcom.2019.01.006_b201
  article-title: The sybil attack
– ident: 10.1016/j.comcom.2019.01.006_b126
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b25
– ident: 10.1016/j.comcom.2019.01.006_b200
– year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b100
– ident: 10.1016/j.comcom.2019.01.006_b69
– volume: 3
  start-page: 13
  issue: 1
  year: 2013
  ident: 10.1016/j.comcom.2019.01.006_b135
  article-title: An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for Internet of Things
  publication-title: IEEE J. Emerg. Sec. Top. Circuits Syst.
  doi: 10.1109/JETCAS.2013.2243631
– year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b40
  article-title: Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city
  publication-title: IEEE Internet of Things J.
  doi: 10.1109/JIOT.2018.2872442
– volume: 2016
  start-page: 1
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b9
  article-title: Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
  publication-title: Int. J. Digit. Multimed. Broadcast.
  doi: 10.1155/2016/8789397
– ident: 10.1016/j.comcom.2019.01.006_b97
  doi: 10.1109/EuroSP.2016.32
– year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b46
  article-title: Distributed online learning of fog computing under non-uniform device cardinality
  publication-title: IEEE Internet of Things J.
  doi: 10.1109/JIOT.2018.2867481
– ident: 10.1016/j.comcom.2019.01.006_b115
– ident: 10.1016/j.comcom.2019.01.006_b178
  doi: 10.1007/11424826_65
– start-page: 134
  year: 1998
  ident: 10.1016/j.comcom.2019.01.006_b86
  article-title: Efficient byzantine agreement secure against general adversaries
  publication-title: Distrib. Comput.
  doi: 10.1007/BFb0056479
– ident: 10.1016/j.comcom.2019.01.006_b141
  doi: 10.23919/ICACT.2017.7890132
– start-page: 397
  year: 2013
  ident: 10.1016/j.comcom.2019.01.006_b174
  article-title: Zerocoin: Anonymous distributed e-cash from Bitcoin
– year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b28
– year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b49
  article-title: Anatomy of threats to the Internet of Things
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2018.2874978
– ident: 10.1016/j.comcom.2019.01.006_b75
– volume: 42
  start-page: 34
  issue: 3
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b211
  article-title: Proof of activity: Extending Bitcoin’s proof of work via proof of stake
  publication-title: SIGMETRICS Perform. Eval. Rev.
  doi: 10.1145/2695533.2695545
– year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b93
– ident: 10.1016/j.comcom.2019.01.006_b217
– ident: 10.1016/j.comcom.2019.01.006_b136
  doi: 10.1007/978-3-642-19325-5_11
– ident: 10.1016/j.comcom.2019.01.006_b222
  doi: 10.1007/3-540-44647-8_31
– volume: 22
  start-page: 49
  issue: 1
  year: 2009
  ident: 10.1016/j.comcom.2019.01.006_b84
  article-title: The heard-of model: Computing in distributed systems with benign faults
  publication-title: Distrib. Comput.
  doi: 10.1007/s00446-009-0084-6
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b27
– volume: 54
  start-page: 2787
  issue: 15
  year: 2010
  ident: 10.1016/j.comcom.2019.01.006_b38
  article-title: The Internet of Things: A survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2010.05.010
– ident: 10.1016/j.comcom.2019.01.006_b186
  doi: 10.1145/3098954.3098958
– year: 2008
  ident: 10.1016/j.comcom.2019.01.006_b68
– ident: 10.1016/j.comcom.2019.01.006_b223
– ident: 10.1016/j.comcom.2019.01.006_b11
– volume: 4
  start-page: 382
  issue: 3
  year: 1982
  ident: 10.1016/j.comcom.2019.01.006_b76
  article-title: The Byzantine generals problem
  publication-title: ACM Trans. Program. Lang. Syst.
  doi: 10.1145/357172.357176
– start-page: 89
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b207
  article-title: The miner’s dilemma
– ident: 10.1016/j.comcom.2019.01.006_b21
– ident: 10.1016/j.comcom.2019.01.006_b105
  doi: 10.1109/WF-IoT.2016.7845447
– ident: 10.1016/j.comcom.2019.01.006_b109
  doi: 10.24251/HICSS.2017.506
– volume: 2015
  start-page: 1168
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b198
  article-title: SCP: A computationally-scalable Byzantine consensus protocol for Blockchains
  publication-title: IACR Cryptol. EPrint Archive
– start-page: 34
  year: 2013
  ident: 10.1016/j.comcom.2019.01.006_b163
  article-title: Evaluating user privacy in bitcoin
– ident: 10.1016/j.comcom.2019.01.006_b159
– ident: 10.1016/j.comcom.2019.01.006_b95
  doi: 10.1007/978-3-662-45472-5_28
– year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b204
– ident: 10.1016/j.comcom.2019.01.006_b62
  doi: 10.1109/ICC.2016.7511197
– volume: 1
  start-page: 372
  issue: 5
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b58
  article-title: Sybil attacks and their defenses in the Internet of Things
  publication-title: IEEE Internet of Things J.
  doi: 10.1109/JIOT.2014.2344013
– ident: 10.1016/j.comcom.2019.01.006_b99
  doi: 10.1007/978-3-662-54455-6_8
– year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b103
– ident: 10.1016/j.comcom.2019.01.006_b22
  doi: 10.1109/SPW.2015.27
– volume: 4
  start-page: 1125
  issue: 5
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b54
  article-title: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
  publication-title: IEEE Internet of Things J.
  doi: 10.1109/JIOT.2017.2683200
– ident: 10.1016/j.comcom.2019.01.006_b1
– volume: 12
  start-page: 2261
  issue: 10
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b48
  article-title: Collaborative authentication in decentralized dense mobile networks with key predistribution
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2017.2705584
– ident: 10.1016/j.comcom.2019.01.006_b104
– ident: 10.1016/j.comcom.2019.01.006_b236
– volume: 13
  start-page: 2240
  issue: 9
  year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b39
  article-title: The impact of link duration on the integrity of distributed mobile networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2812714
– ident: 10.1016/j.comcom.2019.01.006_b139
  doi: 10.1109/ICC.2002.997008
– volume: vol. 2
  start-page: 825
  year: 2004
  ident: 10.1016/j.comcom.2019.01.006_b147
  article-title: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
– volume: 12
  issue: 6
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b34
  article-title: Beyond the internet of things: The social networking of machines
  publication-title: Int. J. Distrib. Sens. Netw.
  doi: 10.1155/2016/8178417
– ident: 10.1016/j.comcom.2019.01.006_b165
  doi: 10.1007/978-3-642-39884-1_2
– year: 2012
  ident: 10.1016/j.comcom.2019.01.006_b215
– start-page: 173
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b121
  article-title: Towards an optimized blockchain for IoT
– volume: 5
  start-page: 13787
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b55
  article-title: Achieving efficient detection against false data injection attacks in smart grid
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2728681
– start-page: 433
  year: 1992
  ident: 10.1016/j.comcom.2019.01.006_b173
– volume: 6
  start-page: 260
  issue: 4
  year: 2005
  ident: 10.1016/j.comcom.2019.01.006_b63
  article-title: Is practitioners’ views on core concepts of information integrity
  publication-title: Int. J. Account. Inf. Syst.
  doi: 10.1016/j.accinf.2005.07.001
– ident: 10.1016/j.comcom.2019.01.006_b144
  doi: 10.1109/DCOSS.2012.55
– volume: 1
  start-page: 222
  issue: 3
  year: 1983
  ident: 10.1016/j.comcom.2019.01.006_b81
  article-title: Fail-stop processors: An approach to designing fault-tolerant computing systems
  publication-title: ACM Trans. Comput. Syst.
  doi: 10.1145/357369.357371
– year: 1997
  ident: 10.1016/j.comcom.2019.01.006_b210
– ident: 10.1016/j.comcom.2019.01.006_b225
– volume: 27
  start-page: 228
  issue: 2
  year: 1980
  ident: 10.1016/j.comcom.2019.01.006_b85
  article-title: Reaching agreement in the presence of faults
  publication-title: J. ACM
  doi: 10.1145/322186.322188
– volume: 17
  start-page: 44
  issue: 6
  year: 2010
  ident: 10.1016/j.comcom.2019.01.006_b138
  article-title: From today’s INTRAnet of Things to a future INTERnet of Things: A wireless- and mobility-related view
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.2010.5675777
– volume: 8
  start-page: 1207
  issue: 4
  year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b145
  article-title: TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things
  publication-title: Comput. Sci. Inf. Syst.
  doi: 10.2298/CSIS110303056C
– ident: 10.1016/j.comcom.2019.01.006_b71
– ident: 10.1016/j.comcom.2019.01.006_b166
  doi: 10.1145/2504730.2504747
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b212
– ident: 10.1016/j.comcom.2019.01.006_b119
– volume: 17
  start-page: 2347
  issue: 4
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b37
  article-title: Internet of things: A survey on enabling technologies, protocols, and applications
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2015.2444095
– ident: 10.1016/j.comcom.2019.01.006_b224
– ident: 10.1016/j.comcom.2019.01.006_b64
  doi: 10.1109/EST.2012.15
– start-page: 270
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b111
  article-title: Town crier: an authenticated data feed for smart contracts
– volume: 8
  start-page: 367
  issue: 12
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b5
  article-title: Combination of cloud computing and Internet of Things (IOT) in medical monitoring systems
  publication-title: Int. J. Hybrid Inform. Technol.
  doi: 10.14257/ijhit.2015.8.12.28
– ident: 10.1016/j.comcom.2019.01.006_b125
– year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b32
– ident: 10.1016/j.comcom.2019.01.006_b66
  doi: 10.1109/INFCOM.2010.5462173
– volume: 1
  start-page: 9
  issue: 2011
  year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b45
  article-title: Internet of Things strategic research roadmap
  publication-title: Internet of Things-Global Technol. Soc. Trends
– volume: 4
  start-page: 1
  issue: 1
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b51
  article-title: Internet of Things: Features, challenges, and vulnerabilities
  publication-title: Int. J. Adv. Comput. Sci. Inf. Technol.
– ident: 10.1016/j.comcom.2019.01.006_b131
– start-page: 112
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b193
  article-title: The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication
– ident: 10.1016/j.comcom.2019.01.006_b26
– ident: 10.1016/j.comcom.2019.01.006_b6
  doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.105
– ident: 10.1016/j.comcom.2019.01.006_b114
– volume: 2013
  issue: 881
  year: 2013
  ident: 10.1016/j.comcom.2019.01.006_b229
  article-title: Accelerating bitcoin’s transaction processing. Fast money grows on trees, not chains
  publication-title: IACR Cryptol. EPrint Archive
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b118
– start-page: 81
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b143
  article-title: Motivating urban cycling through a blockchain-based financial incentives system
– start-page: 720
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b176
  article-title: Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges
– ident: 10.1016/j.comcom.2019.01.006_b202
– ident: 10.1016/j.comcom.2019.01.006_b120
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b24
– ident: 10.1016/j.comcom.2019.01.006_b42
  doi: 10.1109/IECON.2007.4460126
– ident: 10.1016/j.comcom.2019.01.006_b122
  doi: 10.1109/ANTS.2017.8384164
– volume: vol. 4
  start-page: 325
  year: 2004
  ident: 10.1016/j.comcom.2019.01.006_b177
  article-title: Linkable spontaneous anonymous group signature for ad hoc groups
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b214
– volume: 13
  start-page: 184
  issue: 1
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b16
  article-title: Block-VN: A distributed blockchain based vehicular network architecture in smart city
  publication-title: J. Inf. Process. Syst.
– year: 2001
  ident: 10.1016/j.comcom.2019.01.006_b83
– ident: 10.1016/j.comcom.2019.01.006_b160
  doi: 10.1109/EuroSPW.2017.50
– ident: 10.1016/j.comcom.2019.01.006_b185
  doi: 10.1109/ICC.2017.7996641
– volume: 12
  start-page: 656
  issue: 4
  year: 1983
  ident: 10.1016/j.comcom.2019.01.006_b78
  article-title: Authenticated algorithms for Byzantine agreement
  publication-title: SIAM J. Comput.
  doi: 10.1137/0212045
– ident: 10.1016/j.comcom.2019.01.006_b134
  doi: 10.1109/VTCFall.2016.7880946
– volume: 18
  start-page: 2084
  issue: 3
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b30
  article-title: Bitcoin and beyond: A technical survey on decentralized digital currencies
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2016.2535718
– year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b203
– volume: 1
  start-page: 77
  issue: 2
  year: 1988
  ident: 10.1016/j.comcom.2019.01.006_b172
  article-title: Zero-knowledge proofs of identity
  publication-title: J. Cryptology
  doi: 10.1007/BF02351717
– ident: 10.1016/j.comcom.2019.01.006_b65
  doi: 10.1109/IMIS.2015.48
– ident: 10.1016/j.comcom.2019.01.006_b117
– volume: 9
  start-page: 5943
  issue: 18
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b188
  article-title: FairAccess: A new Blockchain-based access control framework for the Internet of Things
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1748
– ident: 10.1016/j.comcom.2019.01.006_b50
  doi: 10.1109/ITAP.2011.6006307
– ident: 10.1016/j.comcom.2019.01.006_b226
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b231
– year: 2012
  ident: 10.1016/j.comcom.2019.01.006_b88
– ident: 10.1016/j.comcom.2019.01.006_b232
– ident: 10.1016/j.comcom.2019.01.006_b57
  doi: 10.1109/GLOCOM.2016.7841922
– start-page: 89
  year: 2006
  ident: 10.1016/j.comcom.2019.01.006_b183
  article-title: Attribute-based encryption for fine-grained access control of encrypted data
– volume: 11
  start-page: 856
  issue: 6
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b242
  article-title: Kernel-Based reconstruction of space-time functions on dynamic graphs
  publication-title: IEEE J. Sel. Topics Signal Process.
– volume: 52
  start-page: 121
  issue: 7
  year: 2009
  ident: 10.1016/j.comcom.2019.01.006_b2
  article-title: Security challenges of the EPCglobal network
  publication-title: Commun. ACM
  doi: 10.1145/1538788.1538816
– ident: 10.1016/j.comcom.2019.01.006_b194
  doi: 10.1145/1323293.1294267
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b153
– ident: 10.1016/j.comcom.2019.01.006_b158
– start-page: 169
  year: 2009
  ident: 10.1016/j.comcom.2019.01.006_b184
  article-title: Fully homomorphic encryption using ideal lattices
– ident: 10.1016/j.comcom.2019.01.006_b112
– volume: 55
  start-page: 78
  issue: 9
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b195
  article-title: DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2017.1700041
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b142
– volume: vol. 5
  start-page: V5
  year: 2010
  ident: 10.1016/j.comcom.2019.01.006_b239
  article-title: Future internet: The Internet of Things
– volume: 10
  start-page: 2233
  issue: 4
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b36
  article-title: Internet of things in industries: A survey
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2014.2300753
– ident: 10.1016/j.comcom.2019.01.006_b146
  doi: 10.1109/EEM.2014.6861213
– ident: 10.1016/j.comcom.2019.01.006_b20
  doi: 10.1109/SAHCN.2016.7732970
– volume: 16
  start-page: 77
  issue: 1
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b47
  article-title: Data mining for Internet of Things: A survey
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2013.103013.00206
– ident: 10.1016/j.comcom.2019.01.006_b244
  doi: 10.1109/EuroSP.2017.37
– year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b70
– start-page: 523
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b187
  article-title: Towards a novel privacy-preserving access control model based on blockchain technology in IoT
– ident: 10.1016/j.comcom.2019.01.006_b13
– ident: 10.1016/j.comcom.2019.01.006_b110
  doi: 10.1109/HPCC-SmartCity-DSS.2016.0198
– ident: 10.1016/j.comcom.2019.01.006_b230
  doi: 10.1007/978-3-662-47854-7_32
– ident: 10.1016/j.comcom.2019.01.006_b243
– volume: 14
  issue: 8
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b106
  article-title: Lightweight break-glass access control system for healthcare Internet-of-Things
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2017.2751640
– volume: 35
  start-page: 2606
  issue: 11
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b7
  article-title: Optimal schedule of mobile edge computing for Internet of Things using partial information
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2017.2760186
– ident: 10.1016/j.comcom.2019.01.006_b130
– year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b90
  article-title: On public and private blockchains
  publication-title: Ethereum Blog
– volume: 1
  start-page: 1
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b181
  article-title: Ring confidential transactions
  publication-title: Ledger
  doi: 10.5195/LEDGER.2016.34
– ident: 10.1016/j.comcom.2019.01.006_b157
– start-page: 17
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b199
  article-title: A secure sharding protocol for open blockchains
– ident: 10.1016/j.comcom.2019.01.006_b101
  doi: 10.1109/GLOCOMW.2018.8644498
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b150
– year: 1996
  ident: 10.1016/j.comcom.2019.01.006_b149
  article-title: Smart contracts: Building blocks for digital markets
  publication-title: EXTROPY: J. Transhumanist Thought
– year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b67
– ident: 10.1016/j.comcom.2019.01.006_b191
  doi: 10.1109/GIOTS.2017.8016280
– ident: 10.1016/j.comcom.2019.01.006_b129
– ident: 10.1016/j.comcom.2019.01.006_b14
– year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b155
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b132
– ident: 10.1016/j.comcom.2019.01.006_b74
  doi: 10.1109/SP.1980.10006
– year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b72
– year: 2007
  ident: 10.1016/j.comcom.2019.01.006_b77
– volume: 16
  start-page: 133
  issue: 2
  year: 1998
  ident: 10.1016/j.comcom.2019.01.006_b82
  article-title: The part-time parliament
  publication-title: ACM Trans. Comput. Syst.
  doi: 10.1145/279227.279229
– start-page: 225
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b192
  article-title: Blockchain technology: Principles and applications
– start-page: 15
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b167
  article-title: Deanonymisation of clients in Bitcoin P2P network
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b169
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b170
– year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b240
– start-page: 454
  year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b87
  article-title: High performance state-machine replication
– volume: 2015
  start-page: 584
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b182
  article-title: How to securely prolong the computational bindingness of pedersen commitments
  publication-title: IACR Cryptol. EPrint Archive
– start-page: 1
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b3
– ident: 10.1016/j.comcom.2019.01.006_b197
– ident: 10.1016/j.comcom.2019.01.006_b17
  doi: 10.1145/2968219.2971409
– volume: 11
  start-page: 2241
  issue: 10
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b61
  article-title: Virus propagation modeling and convergence analysis in large-scale networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2581305
– ident: 10.1016/j.comcom.2019.01.006_b237
– start-page: 4
  year: 2013
  ident: 10.1016/j.comcom.2019.01.006_b8
  article-title: Cloud security: Attacks and current defenses
– start-page: 459
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b175
  article-title: Zerocash: Decentralized anonymous payments from Bitcoin
– volume: 9
  start-page: 49
  issue: 3
  year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b108
  article-title: Stuxnet: Dissecting a cyberwarfare weapon
  publication-title: IEEE Secur. Privacy
  doi: 10.1109/MSP.2011.67
– start-page: 197
  year: 2013
  ident: 10.1016/j.comcom.2019.01.006_b162
  article-title: An analysis of anonymity in the bitcoin system
– ident: 10.1016/j.comcom.2019.01.006_b73
– ident: 10.1016/j.comcom.2019.01.006_b96
– ident: 10.1016/j.comcom.2019.01.006_b216
– start-page: 363
  year: 2010
  ident: 10.1016/j.comcom.2019.01.006_b220
  article-title: The next 700 BFT protocols
– volume: 11
  start-page: 320
  issue: 2
  year: 2012
  ident: 10.1016/j.comcom.2019.01.006_b56
  article-title: Protecting location privacy in sensor networks against a global eavesdropper
  publication-title: IEEE Trans. Mobile Comput.
  doi: 10.1109/TMC.2011.32
– volume: 118
  start-page: 158
  issue: 1
  year: 1995
  ident: 10.1016/j.comcom.2019.01.006_b79
  article-title: Atomic broadcast: From simple message diffusion to Byzantine agreement
  publication-title: Inform. and Comput.
  doi: 10.1006/inco.1995.1060
– year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b154
– start-page: 31
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b221
  article-title: The honey badger of bft protocols
– volume: 9
  issue: 3
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b52
  article-title: A security framework for the Internet of Things in the future internet architecture
  publication-title: Future Internet
  doi: 10.3390/fi9030027
– start-page: 6
  year: 2013
  ident: 10.1016/j.comcom.2019.01.006_b164
– start-page: 839
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b171
  article-title: Hawk: The Blockchain model of cryptography and privacy-preserving smart contracts
– ident: 10.1016/j.comcom.2019.01.006_b127
– ident: 10.1016/j.comcom.2019.01.006_b180
– volume: 2
  start-page: 6
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b33
  article-title: BlockChain technology: Beyond bitcoin
  publication-title: Appl. Innov.
– volume: 1
  start-page: 21
  issue: 1
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b15
  article-title: Blockchain for IoT: The tradeoff between consistency and capacity
  publication-title: Chin. J. Internet of Things
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b60
– volume: 20
  start-page: 2543
  issue: 3
  year: 2018
  ident: 10.1016/j.comcom.2019.01.006_b19
  article-title: A survey on anonymity and privacy in bitcoin-like digital cash systems
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2018.2818623
– year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b148
– ident: 10.1016/j.comcom.2019.01.006_b43
  doi: 10.1109/WCNCW.2016.7552737
– ident: 10.1016/j.comcom.2019.01.006_b124
  doi: 10.1109/ICSEng.2017.43
– volume: SE-12
  start-page: 477
  issue: 3
  year: 1986
  ident: 10.1016/j.comcom.2019.01.006_b80
  article-title: Distributed agreement in the presence of processor and communication faults
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.1986.6312888
– ident: 10.1016/j.comcom.2019.01.006_b179
– start-page: 680
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b208
  article-title: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions
– start-page: 63
  year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b206
  article-title: When bitcoin mining pools run dry
– year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b31
– volume: 19
  start-page: 171
  issue: 2
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b29
  article-title: Big data: A survey
  publication-title: Springer Mobile Netw. Appl.
  doi: 10.1007/s11036-013-0489-0
– volume: 45
  start-page: 245
  issue: 3
  year: 2004
  ident: 10.1016/j.comcom.2019.01.006_b241
  article-title: Spatio-temporal correlation: Theory and applications for wireless sensor networks
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2004.03.007
– ident: 10.1016/j.comcom.2019.01.006_b123
  doi: 10.1109/PERCOMW.2017.7917634
– volume: 19
  start-page: 68
  issue: 4
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b10
  article-title: Can Blockchain strengthen the Internet of Things?
  publication-title: IT Prof.
  doi: 10.1109/MITP.2017.3051335
– ident: 10.1016/j.comcom.2019.01.006_b168
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b116
– start-page: 239
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b189
  article-title: Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money
– volume: 44
  start-page: 51
  issue: 9
  year: 2011
  ident: 10.1016/j.comcom.2019.01.006_b53
  article-title: Securing the Internet of Things
  publication-title: Comput.
  doi: 10.1109/MC.2011.291
– ident: 10.1016/j.comcom.2019.01.006_b23
– volume: 55
  start-page: 70
  issue: 10
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b107
  article-title: Energy big data security threats in IoT-based smart grid communications
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2017.1700154
– ident: 10.1016/j.comcom.2019.01.006_b205
– year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b44
– ident: 10.1016/j.comcom.2019.01.006_b196
– ident: 10.1016/j.comcom.2019.01.006_b18
– ident: 10.1016/j.comcom.2019.01.006_b238
– ident: 10.1016/j.comcom.2019.01.006_b91
– start-page: 279
  year: 2016
  ident: 10.1016/j.comcom.2019.01.006_b89
  article-title: Enhancing bitcoin security and performance with strong consistency via collective signing
– start-page: 906
  year: 2012
  ident: 10.1016/j.comcom.2019.01.006_b92
  article-title: Double-spending fast payments in bitcoin
– volume: 16
  start-page: 414
  issue: 1
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b35
  article-title: Context aware computing for the internet of things: A survey
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2013.042313.00197
– year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b41
  article-title: Internet of Things: Architectures, protocols, and applications
  publication-title: J. Electr. Comput. Eng.
  doi: 10.1155/2017/9324035
– ident: 10.1016/j.comcom.2019.01.006_b156
– start-page: 475
  year: 2014
  ident: 10.1016/j.comcom.2019.01.006_b209
  article-title: Permacoin: Repurposing bitcoin work for data preservation
– volume: 32
  start-page: 824
  issue: 4
  year: 1985
  ident: 10.1016/j.comcom.2019.01.006_b219
  article-title: Asynchronous consensus and broadcast protocols
  publication-title: J. ACM
  doi: 10.1145/4221.214134
– ident: 10.1016/j.comcom.2019.01.006_b227
– ident: 10.1016/j.comcom.2019.01.006_b233
– ident: 10.1016/j.comcom.2019.01.006_b128
– volume: 5
  start-page: 586
  issue: 4
  year: 2017
  ident: 10.1016/j.comcom.2019.01.006_b59
  article-title: A comprehensive study of security of Internet-of-Things
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2016.2606384
– year: 2015
  ident: 10.1016/j.comcom.2019.01.006_b94
– start-page: 8
  year: 1988
  ident: 10.1016/j.comcom.2019.01.006_b218
  article-title: Viewstamped replication: A new primary copy method to support highly-available distributed systems
SSID ssj0004773
Score 2.651701
SecondaryResourceType review_article
Snippet The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 10
SubjectTerms Blockchain
Consensus protocol
Data structure
Internet of things (IoT)
Title Survey on blockchain for Internet of Things
URI https://dx.doi.org/10.1016/j.comcom.2019.01.006
Volume 136
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLYmuMAB8RTjMeXAtaxr0iY9ThPTALETk3aLmtYRA7RNU0Hiwm_HaVoYEgKJY6OkD9e1_TWfbYALFAp5JuNAIspARL08UEaFgY0IbhlusqJqB3Q3TkYTcTONpy0YNLkwjlZZ235v0ytrXY90a2l2l7NZt6Il8SQRpJSuc0qVwS6k0_LL9y-ah5B-l9nRGN3sJn2u4njRuR1nhJxgWhXvdH2PfnJPay5nuAs7dazI-v529qCF833YXqsgeAD04a9e8Y0t5syQW3rKHwjpMwpEmf_VhyVbWOabcx7CZHh1PxgFdf-DIOcyKgnaqTB2O4mYWCOlyUXKC-Q04HCFsankKk8jGRUqVlbFaBEp_kuQIAByg_wINuaLOR4DI1SWJ4ktuOSZ4NZkhMKUDeMstGlBEKwNvHlsndfFwV2PimfdsMAetReWdsLSYU_ThdoQfK5a-uIYf8yXjUT1t5esyX7_uvLk3ytPYcsdeaL1GWyUqxc8pziiNJ1KUTqw2b--HY0_AEq3xZM
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLam7QAcEE8xnj1wrdY1bZMep4mpsMdpk3aLmtYRA7RNU0Hi3-M0LQwJgcQ1rftwU9tf8tkGuMVAIEt56HJE7gZ-N3OFEp6rfYJbiqk0L9sBjSdRMgse5uG8Af06F8bQKivbb216aa2rkU6lzc56seiUtCQWRQFNStM5hSBQy1SnCpvQ6t0Pk8lXeiS3G82GyWgE6gy6kuZFlze0EfKDcVm_07Q--slDbXmdwQHsV-Gi07NPdAgNXB7B3lYRwWOgf3_zhu_Oauko8kzP2SOBfYdiUceu9mHhrLRj-3OewGxwN-0nbtUCwc0Y9wtCd8ILzWYiRlpxrrIgZjkyGjDQQumYM5HFPvdzEQotQtSIFAJGSCgAmUJ2Cs3laoln4BAwy6JI54yzNGBapQTEhPbC1NNxTiisDax-bZlV9cFNm4oXWRPBnqRVljTKkl5X0o3a4H5KrW19jD_O57VG5bfvLMmE_yp5_m_JG9hJpuORHN1Phhewa45Y3vUlNIvNK15RWFGo62rafAAqaMhE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Survey+on+blockchain+for+Internet+of+Things&rft.jtitle=Computer+communications&rft.au=Wang%2C+Xu&rft.au=Zha%2C+Xuan&rft.au=Ni%2C+Wei&rft.au=Liu%2C+Ren+Ping&rft.date=2019-02-01&rft.issn=0140-3664&rft.volume=136&rft.spage=10&rft.epage=29&rft_id=info:doi/10.1016%2Fj.comcom.2019.01.006&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comcom_2019_01_006
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon