{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:32Z","timestamp":1775912732228,"version":"3.50.1"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272024"],"award-info":[{"award-number":["62272024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1016\/j.comnet.2024.110473","type":"journal-article","created":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T03:31:56Z","timestamp":1714707116000},"page":"110473","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"special_numbering":"C","title":["HL-DPoS: An enhanced anti-long-range attack DPoS algorithm"],"prefix":"10.1016","volume":"249","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5695-4207","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"first","affiliation":[]},{"given":"Chunhe","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Chunyan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0227-9557","authenticated-orcid":false,"given":"Tianbo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2024.110473_b1","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","article-title":"Blockchain","volume":"59","author":"Nofer","year":"2020","journal-title":"Bus. Inf. Syst. Eng."},{"key":"10.1016\/j.comnet.2024.110473_b2","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial iot","volume":"16","author":"Lu","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.comnet.2024.110473_b3","doi-asserted-by":"crossref","first-page":"11960","DOI":"10.1109\/JIOT.2022.3151359","article-title":"A certificateless signcryption mechanism based on blockchain for edge computing","volume":"10","author":"Xu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2024.110473_b4","doi-asserted-by":"crossref","DOI":"10.1145\/3579845","article-title":"A survey of blockchain consensus protocols","author":"Xu","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comnet.2024.110473_b5","article-title":"A fast and secured vehicle-to-vehicle energy trading based on blockchain consensus in the internet of electric vehicles","author":"shun Wang","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2024.110473_b6","doi-asserted-by":"crossref","unstructured":"D. Valdeolmillos, Y.M. Mart\u00edn, A. Gonz\u00e1lez-Briones, J. Prieto, J.M. Corchado, Blockchain technology: A review of the current challenges of cryptocurrency, in: International Congress on Blockchain and Applications, 2019.","DOI":"10.1007\/978-3-030-23813-1_19"},{"key":"10.1016\/j.comnet.2024.110473_b7","doi-asserted-by":"crossref","first-page":"6693731:1","DOI":"10.1155\/2021\/6693731","article-title":"A research survey on applications of consensus protocols in blockchain","volume":"2021","author":"Kaur","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.comnet.2024.110473_b8","doi-asserted-by":"crossref","first-page":"5579","DOI":"10.1007\/s11276-019-02195-0","article-title":"Recent advances in consensus protocols for blockchain: a survey","volume":"26","author":"Wan","year":"2019","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.comnet.2024.110473_b9","doi-asserted-by":"crossref","unstructured":"M. Liu, M. Tan, P. Lei, Research on dpos consensus mechanism improvement, in: 2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology, ICCASIT, 2022, pp. 84\u201388.","DOI":"10.1109\/ICCASIT55263.2022.9986579"},{"key":"10.1016\/j.comnet.2024.110473_b10","series-title":"Bitcoin : A peer-to-peer electronic cash system","author":"Nakamoto","year":"2009"},{"key":"10.1016\/j.comnet.2024.110473_b11","series-title":"Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government","article-title":"A brief analysis of blockchain algorithms and its challenges","author":"Krishnamurthi","year":"2021"},{"key":"10.1016\/j.comnet.2024.110473_b12","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1007\/s12243-021-00896-2","article-title":"A security and performance analysis of proof-based consensus protocols","volume":"77","author":"Rebello","year":"2021","journal-title":"Ann. Telecommun."},{"key":"10.1016\/j.comnet.2024.110473_b13","doi-asserted-by":"crossref","unstructured":"Y. Dodis, A. Yampolskiy, A verifiable random function with short proofs and keys, in: International Conference on Theory and Practice of Public Key Cryptography, 2005.","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"10.1016\/j.comnet.2024.110473_b14","article-title":"Pov: An efficient voting-based consensus algorithm for consortium blockchains","author":"Li","year":"2020","journal-title":"Front. Genet."},{"key":"10.1016\/j.comnet.2024.110473_b15","doi-asserted-by":"crossref","unstructured":"Y. Bai, Y. Zhi, H. Li, H. Wang, P. Lu, C. Ma, On parallel mechanism of consortium blockchain: Take pov as an example, in: 2021 the 3rd International Conference on Blockchain Technology, 2021.","DOI":"10.1145\/3460537.3460560"},{"key":"10.1016\/j.comnet.2024.110473_b16","doi-asserted-by":"crossref","unstructured":"Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain technology: Architecture, consensus, and future trends, in: 2017 IEEE International Congress on Big Data, BigData Congress, 2017, pp. 557\u2013564.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"10.1016\/j.comnet.2024.110473_b17","first-page":"2102","article-title":"Incentive assignment in hybrid consensus blockchain systems in pervasive edge environments","volume":"71","author":"Huang","year":"2022","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.comnet.2024.110473_b18","doi-asserted-by":"crossref","first-page":"15882","DOI":"10.1007\/s11227-022-04514-3","article-title":"Applying the blockchain-based deep reinforcement consensus algorithm to the intelligent manufacturing model under internet of things","volume":"78","author":"Geng","year":"2022","journal-title":"J. Supercomput."},{"key":"10.1016\/j.comnet.2024.110473_b19","doi-asserted-by":"crossref","first-page":"11962","DOI":"10.1109\/JIOT.2021.3132420","article-title":"A dqn-based consensus mechanism for blockchain in iot networks","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2024.110473_b20","doi-asserted-by":"crossref","unstructured":"Y. Jiang, S. Ding, A high performance consensus algorithm for consortium blockchain, in: 2018 IEEE 4th International Conference on Computer and Communications, ICCC, 2018, pp. 2379\u20132386.","DOI":"10.1109\/CompComm.2018.8781067"},{"key":"10.1016\/j.comnet.2024.110473_b21","doi-asserted-by":"crossref","first-page":"118541","DOI":"10.1109\/ACCESS.2019.2935149","article-title":"Delegated proof of stake with downgrade: A secure and efficient blockchain consensus algorithm with downgrade mechanism","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2024.110473_b22","first-page":"1","article-title":"Hybrid consensus algorithm optimization: A mathematical method based on pos and pbft and its application in blockchain","volume":"2020","author":"Wu","year":"2020","journal-title":"Math. Probl. Eng."},{"key":"10.1016\/j.comnet.2024.110473_b23","doi-asserted-by":"crossref","first-page":"8137","DOI":"10.1007\/s13369-021-05427-8","article-title":"An improved blockchain consensus algorithm based on raft","volume":"46","author":"Fu","year":"2021","journal-title":"Arab. J. Sci. Eng."},{"key":"10.1016\/j.comnet.2024.110473_b24","doi-asserted-by":"crossref","unstructured":"M. Zhou, X. Lin, A. Liu, Y. Che, An improved blockchain consensus protocol with distributed verifiable delay function, in: 2021 IEEE International Conference on Electronic Technology, Communication and Information, ICETCI, 2021, pp. 330\u2013337.","DOI":"10.1109\/ICETCI53161.2021.9563378"},{"key":"10.1016\/j.comnet.2024.110473_b25","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/5169259","article-title":"Improved method of blockchain cross-chain consensus algorithm based on weighted pbft","volume":"2022","author":"Lei","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"10.1016\/j.comnet.2024.110473_b26","first-page":"1","article-title":"Blockchain\u2019s role in e-commerce sellers\u2019 decision-making on information disclosure under competition","author":"Song","year":"2022","journal-title":"Ann. Oper. Res."},{"key":"10.1016\/j.comnet.2024.110473_b27","doi-asserted-by":"crossref","DOI":"10.1007\/s10922-022-09669-1","article-title":"Towards a trustful game-theoretic mechanism for data trading in the blockchain-iot ecosystem","volume":"30","author":"Khezr","year":"2022","journal-title":"J. Netw. Syst. Manage."},{"key":"10.1016\/j.comnet.2024.110473_b28","doi-asserted-by":"crossref","first-page":"7613","DOI":"10.1109\/TVT.2022.3170577","article-title":"A blockchain enhanced coexistence of heterogeneous networks on unlicensed spectrum","volume":"71","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2024.110473_b29","doi-asserted-by":"crossref","first-page":"7899","DOI":"10.1109\/TII.2022.3163550","article-title":"Incentive mechanism for edge computing-based blockchain: A sequential game approach","volume":"18","author":"Guo","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.comnet.2024.110473_b30","doi-asserted-by":"crossref","first-page":"5549","DOI":"10.1109\/TVT.2020.2982000","article-title":"Blockchain meets edge computing: Stackelberg game and double auction based task offloading for mobile blockchain","volume":"69","author":"Guo","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2024.110473_b31","doi-asserted-by":"crossref","unstructured":"C. Hou, M. Zhou, Y. Ji, P. Daian, F. Tram\u00e8r, G.C. Fanti, A. Juels, Squirrl: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning, in: Network and Distributed System Security Symposium, 2021.","DOI":"10.14722\/ndss.2021.24188"},{"key":"10.1016\/j.comnet.2024.110473_b32","doi-asserted-by":"crossref","first-page":"185","DOI":"10.2307\/1885620","article-title":"Losses from horizontal merger: The effects of an exogenous change in industry structure on cournot-nash equilibrium","volume":"98","author":"Salant","year":"1983","journal-title":"Q. J. Econ."},{"key":"10.1016\/j.comnet.2024.110473_b33","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1111\/1467-937X.00076","article-title":"Nash equilibrium and welfare optimality","volume":"66","author":"Maskin","year":"1999","journal-title":"Rev. Econ. Stud."},{"key":"10.1016\/j.comnet.2024.110473_b34","article-title":"The complexity of computing a nash equilibrium","volume":"TR05","author":"Daskalakis","year":"2006","journal-title":"Electron. Colloq. Comput. Complex."},{"key":"10.1016\/j.comnet.2024.110473_b35","first-page":"133","article-title":"Efficient construction of (distributed) verifiable random functions","volume":"2002","author":"Dodis","year":"2003","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.comnet.2024.110473_b36","doi-asserted-by":"crossref","DOI":"10.3389\/fbloc.2020.00028","article-title":"Blocksim: An extensible simulation tool for blockchain systems","author":"Alharby","year":"2020","journal-title":"Front. Blockchain"},{"key":"10.1016\/j.comnet.2024.110473_b37","article-title":"Artificial intelligence-enabled science poetry","author":"Kirmani","year":"2022","journal-title":"ACS Energy Lett."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128624003050?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128624003050?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T18:50:40Z","timestamp":1716749440000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128624003050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":37,"alternative-id":["S1389128624003050"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110473","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"HL-DPoS: An enhanced anti-long-range attack DPoS algorithm","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110473","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"110473"}}