{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:52:47Z","timestamp":1726761167998},"reference-count":37,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T00:00:00Z","timestamp":1535500800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772280","61772454","61702236","6171101570","CJ20179027"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2018,8,29]]},"abstract":"In this paper, the blockchain technology is utilized to build the first incentive mechanism of nodes as per data storage for wireless sensor networks (WSNs). In our system, the nodes storing the data are rewarded with digital money. The more the data stored by the node, the more the reward it achieves. Moreover, two blockchains are constructed. One is utilized to store data of each node and another is to control the access of data. In addition, our proposal adopts the provable data possession to replace the proof of work (PoW) in original bitcoins to carry out the mining and storage of new data blocks, which greatly reduces the computing power comparing to the PoW mechanism. Furthermore, the preserving hash functions are used to compare the stored data and the new data block. The new data can be stored in the node which is closest to the existing data, and only the different subblocks are stored. Thus, it can greatly save the storage space of network nodes.<\/jats:p>","DOI":"10.1155\/2018\/6874158","type":"journal-article","created":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T19:53:33Z","timestamp":1535572413000},"page":"1-10","source":"Crossref","is-referenced-by-count":79,"title":["Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6602-9576","authenticated-orcid":true,"given":"Yongjun","family":"Ren","sequence":"first","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"},{"name":"Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science & Technology, Nanjing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7453-2833","authenticated-orcid":true,"given":"Yepeng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"},{"name":"Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science & Technology, Nanjing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9737-3975","authenticated-orcid":true,"given":"Sai","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"},{"name":"Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science & Technology, Nanjing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0229-2460","authenticated-orcid":true,"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[{"name":"School of Computing Science and Engineering, Vellore Institute of Technology (VIT), Vellore, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5473-8738","authenticated-orcid":true,"given":"Jin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha, China"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.004"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1504\/ijsnet.2017.083532"},{"key":"3","first-page":"76","volume":"42","year":"2015","journal-title":"Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1586-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9278701"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2017.2763967"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717713626"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1947-9"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2009.57"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2016.2606441"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/3178119"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.08.021"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-012-9733-2"},{"issue":"1","key":"16","first-page":"243","volume":"55","year":"2018","journal-title":"Computers, Materials and Continua (CMC)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2015.2493779"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-016-0080-3"},{"key":"20","volume":"7","year":"2016","journal-title":"Journal of Convergence"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3745\/jips.03.0032"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e90-b.7.1640"},{"issue":"4","key":"24","first-page":"481","volume":"42","year":"2016","journal-title":"Acta Automatica Sinica"},{"key":"25","year":"2017","journal-title":"Chinese Journal of Computers"},{"issue":"6","key":"26","first-page":"1125","volume":"17","year":"2016","journal-title":"Journal of Internet Technology"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0346-y"},{"key":"29","first-page":"150","volume":"29","year":"2018","journal-title":"Journal of Software"},{"issue":"2","key":"30","first-page":"243","volume":"55","year":"2018","journal-title":"Computers, Materials and Continua (CMC)"},{"issue":"3","key":"31","first-page":"541","volume":"55","year":"2018","journal-title":"Computers, Materials and Continua (CMC)"},{"key":"32","first-page":"57","volume":"45","year":"2018","journal-title":"Computer Science"},{"issue":"1","key":"33","first-page":"1","volume":"55","year":"2018","journal-title":"Computers, Materials and Continua (CMC)"},{"key":"34","first-page":"1","volume":"44","year":"2017","journal-title":"Computer Science"},{"key":"35","first-page":"317","volume":"16","year":"2015","journal-title":"Journal of Internet Technology"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2017.2761806"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015ini0001"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2467-5"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.006"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.010"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.3233\/fi-2017-1464"},{"key":"42","first-page":"23","volume":"2","year":"2017","journal-title":"Journal of Cyber Security"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/6874158.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/6874158.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/6874158.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T19:53:37Z","timestamp":1535572417000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2018\/6874158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,29]]},"references-count":37,"alternative-id":["6874158","6874158"],"URL":"https:\/\/doi.org\/10.1155\/2018\/6874158","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"value":"1574-017X","type":"print"},{"value":"1875-905X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,29]]}}}