{"id":"https://openalex.org/W3049351202","doi":"https://doi.org/10.1109/netsoft48620.2020.9165480","title":"On the Security of Permissioned Blockchain Solutions for IoT Applications","display_name":"On the Security of Permissioned Blockchain Solutions for IoT Applications","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3049351202","doi":"https://doi.org/10.1109/netsoft48620.2020.9165480","mag":"3049351202"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft48620.2020.9165480","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165480","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2109.03621","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sotirios Brotsis","orcid":null},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Sotirios Brotsis","raw_affiliation_strings":["University of Peloponnese, Greece"],"affiliations":[{"raw_affiliation_string":"University of Peloponnese, Greece","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Nicholas Kolokotronis","orcid":null},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Nicholas Kolokotronis","raw_affiliation_strings":["University of Peloponnese, Greece"],"affiliations":[{"raw_affiliation_string":"University of Peloponnese, Greece","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Konstantinos Limniotis","orcid":null},"institutions":[{"id":"https://openalex.org/I2799623607","display_name":"Hellenic Civil Aviation Authority","ror":"https://ror.org/00q3w5456","country_code":"GR","type":"government","lineage":["https://openalex.org/I2799623607","https://openalex.org/I4210132302"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Konstantinos Limniotis","raw_affiliation_strings":["Hellenic Data Protection Authority, Greece"],"affiliations":[{"raw_affiliation_string":"Hellenic Data Protection Authority, Greece","institution_ids":["https://openalex.org/I2799623607"]}]},{"author_position":"last","author":{"id":null,"display_name":"Stavros Shiaeles","orcid":null},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stavros Shiaeles","raw_affiliation_strings":["University of Portsmouth, UK"],"affiliations":[{"raw_affiliation_string":"University of Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I158716096"],"apc_list":null,"apc_paid":null,"fwci":1.1126,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.84400626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"465","last_page":"472"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7694000005722046},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6520000100135803},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5817999839782715},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5221999883651733},{"id":"https://openalex.org/keywords/consensus-algorithm","display_name":"Consensus algorithm","score":0.4377000033855438},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.3919999897480011},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.3682999908924103},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.3650999963283539}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.776199996471405},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7694000005722046},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6520000100135803},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5817999839782715},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5221999883651733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4641000032424927},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.4377000033855438},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3682999908924103},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.3650999963283539},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.36149999499320984},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3192000091075897},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3165000081062317},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.31299999356269836},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30979999899864197},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30799999833106995},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/netsoft48620.2020.9165480","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165480","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2109.03621","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.03621","pdf_url":"https://arxiv.org/pdf/2109.03621","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2109.03621","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.03621","pdf_url":"https://arxiv.org/pdf/2109.03621","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2013608896","https://openalex.org/W2075854425","https://openalex.org/W2098104887","https://openalex.org/W2110880385","https://openalex.org/W2114579022","https://openalex.org/W2152465173","https://openalex.org/W2584120063","https://openalex.org/W2603574138","https://openalex.org/W2754529701","https://openalex.org/W2762888877","https://openalex.org/W2767453162","https://openalex.org/W2883125028","https://openalex.org/W2888563540","https://openalex.org/W2926987861","https://openalex.org/W2952260178","https://openalex.org/W2971648947","https://openalex.org/W3005013321","https://openalex.org/W3137092842","https://openalex.org/W4211068006","https://openalex.org/W6607881844","https://openalex.org/W6629946891","https://openalex.org/W6682904396","https://openalex.org/W6712237015","https://openalex.org/W6729722957","https://openalex.org/W6745833317","https://openalex.org/W6748075632","https://openalex.org/W6754088695","https://openalex.org/W6754758196","https://openalex.org/W6755204305"],"related_works":[],"abstract_inverted_index":{"The":[0,17,144],"blockchain":[1,51,116],"has":[2],"found":[3],"numerous":[4],"applications":[5],"in":[6,75,81,109],"many":[7,50],"areas":[8],"with":[9,29,58,89],"the":[10,59,69,120,133,147,153],"expectation":[11],"to":[12,163],"significantly":[13],"enhance":[14],"their":[15,127,161],"security.":[16],"Internet":[18],"of":[19,27,32,104,146,156],"things":[20],"(IoT)":[21],"constitutes":[22],"a":[23,30,82],"prominent":[24],"application":[25],"domain":[26],"blockchain,":[28],"number":[31],"architectures":[33],"having":[34],"been":[35],"proposed":[36],"for":[37,98,137],"improving":[38],"not":[39,96],"only":[40],"security":[41],"but":[42],"also":[43],"properties":[44],"like":[45],"transparency":[46],"and":[47,77,118,129,160],"auditability.":[48],"However,":[49],"solutions":[52],"suffer":[53],"from":[54],"inherent":[55],"constraints":[56,64],"associated":[57],"consensus":[60,87,121,158],"protocol":[61],"used.":[62],"These":[63],"are":[65,95,106],"mostly":[66],"inherited":[67],"by":[68],"permissionless":[70],"setting,":[71],"e.g.":[72],"computational":[73],"power":[74],"proof-of-work,":[76],"become":[78],"serious":[79],"obstacles":[80],"resource-constrained":[83],"IoT":[84,99,142,165],"environment.":[85],"Moreover,":[86],"protocols":[88,122,159],"low":[90],"throughput":[91],"or":[92],"high":[93],"latency":[94],"suitable":[97],"networks":[100],"where":[101],"massive":[102],"volumes":[103],"data":[105],"generated.":[107],"Thus,":[108],"this":[110],"paper":[111,148],"we":[112],"focus":[113],"on":[114,152],"permissioned":[115],"platforms":[117],"investigate":[119],"used,":[123],"aiming":[124],"at":[125],"evaluating":[126],"performance":[128],"fault":[130],"tolerance":[131],"as":[132],"main":[134],"selection":[135],"criteria":[136],"(in":[138],"principle":[139],"highly":[140],"insecure)":[141],"ecosystem.":[143],"results":[145],"provide":[149],"new":[150],"insights":[151],"essential":[154],"differences":[155],"various":[157],"capacity":[162],"meet":[164],"needs.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2020-08-21T00:00:00"}
