**2. Protocol and Network Tier**

Different solutions for PN-Tier have been proposed addressing specific challenges [4,15–19]. We have identified the technological components that are grouped at the protocol and network layers. The security of the entire tier is ensured as a result of integrating the publicprivate key cryptography for locking and unlocking transactions, with the tamper-resistant data structures and consensus algorithms.
