Skip to main content
. 2023 Jan 10;23(2):788. doi: 10.3390/s23020788
IoT Internet of Things
IP Internet Protocol
TCP Transmission Control Protocol
UDP User Datagram Protocol
P2P Peer-to-Peer
SPI Serial Peripheral Interface
IGMP Internet Group Management Protocol
ICMP Internet Control Message Protocol
REST Representational State Transfer
DDP Distributed Data Protocol
OSPF Open Shortest Path First
IGP Interior Gateway Protocol
AS Autonomous System
WSN Wireless Sensor Network
RFID Radio Frequency Identification
PoW Proof of Work
PoS Proof of Stake
DPoS Delegated Proof of Stake
TaPoS Transactions as Proof of Stake
BFT Byzantine Fault Tolerance
PBFT Practical Byzantine Fault Tolerance
DBFT Delegated BFT
PoA Proof of Authority
PoSV Proof-of-Stake-Velocity
PoP Proof-of-Personhood
PoB Proof of Bandwidth
PoET Proof of Elapsed Time
SCP Stellar Consensus Protocol
PKC Public Key Cryptography
PKC Public Key Cryptography
THS Threshold signature
TPS Transactions Per Second
PoV Proof of Vote
PoT Proof-of-Trust
LSB Lightweight Scalable Blockchain
ELIB Efficient Lightweight integrated Blockchain
SGD Stochastic Gradient Descent
LSB Least Significant Bit
IPFS InterPlanetary File System
DTC Distributed Time-based
ECC Elliptic Curve Cryptography
PDA Personal Digital Assistance
IHM IoT Health Manager
DAG Directed Acyclic Graph
CV Cardinal Value
DV Data Validity
CD Contact Degree
ACC Access Control Contract
JC Judge Contract
DTM Distributed Throughput Management
CH Cluster Head
OBMs Overlay Block Managers
DAC Discretionary Access Control Models
MAC Mandatory Access Control Model
MSP Membership Service Provider
JCC JointCloud Computing
JCCE JointCloud Collaboration Environment
DO Data Owner
KGC Key Generate Center
ACL Access Control List
ECIES Elliptic Curve Integrated Encryption Scheme
MLNCML Mixed Linear and Nonlinear Spatiotemporal Chaotic Systems
PEP Policy Enforcement Point
CCBCM Consortium Blockchain Manager
AEBCM Aggregated Edge Blockchain Manager
EBCMs Edge Blockchain Managers
PoEoI Proof-of-Epidemiology-of-Interest
IHT Information Hiding Techniques
SSI Self-Sovereign Identity
VC Verifiable Credential
DID Decentralized ID
ABAC Attribute-based Access Control
RBAC Role-based Access Control
DSMAC Decentralized Self-Management of data Access Control
ICN Information-Centric Networking
IBE Identity-Based Encryption
PRE Proxy Re-encryption
ZK-SNARKs Zero-Knowledge Succinct Non-Interactive Argument of Knowledge