{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:14:30Z","timestamp":1726038870348},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3085405","type":"journal-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T03:43:25Z","timestamp":1622691805000},"page":"80559-80570","source":"Crossref","is-referenced-by-count":43,"title":["On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications With Constrained Devices"],"prefix":"10.1109","volume":"9","author":[{"given":"Yaroslav","family":"Meshcheryakov","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6444-7774","authenticated-orcid":false,"given":"Anna","family":"Melman","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8257-2082","authenticated-orcid":false,"given":"Oleg","family":"Evsutin","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8967-5711","authenticated-orcid":false,"given":"Vladimir","family":"Morozov","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3976-297X","authenticated-orcid":false,"given":"Yevgeni","family":"Koucheryavy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761448"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3395331"},{"key":"ref33","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"Proc OSDI"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015382"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP50017.2020.9230612"},{"key":"ref30","first-page":"27","article-title":"Comparative review of the blockchain consensus algorithm between proof of stake (POS) and delegated proof of stake (DPOS)","volume":"10","author":"saad","year":"2020","journal-title":"Int J Innov Comput"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010074"},{"key":"ref36","first-page":"583","article-title":"Data sharing strategy based on PBFT algorithm in VANETs","author":"du","year":"2020","journal-title":"Proc Int Conf Aviation Saf Inf Technol"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.060"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102508"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2020.2981438"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3344341.3368797"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761372"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980917"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106453"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002711"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3027070"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107130"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2969648"},{"key":"ref26","first-page":"237","article-title":"Proof of stake for blockchain based distributed intrusion detecting system","author":"burmaka","year":"2020","journal-title":"Proc Int Sci -Practical Conf"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6693731"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063324"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2898900"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102406"},{"key":"ref12","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s42786-018-00002-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2981286"},{"key":"ref15","article-title":"Blockchain consensus protocols in the wild","author":"cachin","year":"2017","journal-title":"arXiv 1707 01873"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s19153319"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940227"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.02.016"},{"key":"ref4","article-title":"A critical review on blockchain assessment initiatives: A technology evolution viewpoint","volume":"32","author":"colomo-palacios","year":"2020","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1671627"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1142\/S1793830920300015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/su12219179"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1195-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102199"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114384"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref46","article-title":"A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things","volume":"21","author":"latif","year":"2021","journal-title":"J Ind Inf Integr"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2904049"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014287"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/sym12121946"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041689"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102145"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644609"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09445066.pdf?arnumber=9445066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:23Z","timestamp":1639770983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9445066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3085405","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}