{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T06:58:11Z","timestamp":1770965891596,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030158866","type":"print"},{"value":"9783030158873","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15887-3_12","type":"book-chapter","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T14:02:57Z","timestamp":1563544977000},"page":"289-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)"],"prefix":"10.1007","author":[{"given":"Andino","family":"Maseleno","sequence":"first","affiliation":[]},{"given":"Marini","family":"Othman","sequence":"additional","affiliation":[]},{"given":"P.","family":"Deepalakshmi","sequence":"additional","affiliation":[]},{"given":"K.","family":"Shankar","sequence":"additional","affiliation":[]},{"given":"M.","family":"Ilayaraja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,20]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s11036-018-1017-z","volume":"23","author":"Mohammad Dahman Alshehri","year":"2018","unstructured":"Alshehri, M.D., Hussain, F.K. and Hussain, O.K., 2018. Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT). Mobile Networks and Applications, pp.1-13.","journal-title":"Mobile Networks and Applications"},{"key":"12_CR2","unstructured":"Safi, A., 2017. Improving the Security of the Internet of Things Using Encryption Algorithms. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(5), pp.546-549."},{"key":"12_CR3","unstructured":"Lo\u2019ai, A.T., and Somani, T.F., 2016, November. More secure Internet of Things using robust encryption algorithms against side channel attacks. In Computer Systems and Applications (AICCSA), 2016 IEEE\/ACS 13th International Conference of (pp. 1-6). IEEE."},{"key":"12_CR4","unstructured":"Sundaram, B.V., Ramnath, M., Prasanth, M. and Sundaram, V., 2015, March. Encryption and hash based security in internet of things. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-6). IEEE."},{"key":"12_CR5","unstructured":"Bhatia, S. and Patel, S., 2015. Analysis on different Data mining Techniques and algorithms used in IOT. Int. J. Eng. Res Appl, 2(12), pp.611-615."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Wang, C., Shen, J., Liu, Q., Ren, Y. and Li, T., 2018. A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. Security and Communication Networks, 2018.","DOI":"10.1155\/2018\/3680851"},{"key":"12_CR7","unstructured":"Chhabra, A., Vashishth, V., Khanna, A., Sharma, D.K. and Singh, J., 2018. An Energy Efficient Routing Protocol for Wireless Internet-of-Things Sensor Networks. arXiv preprint arXiv:1808.01039."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Xingmei, X., Jing, Z. and He, W., 2013, October. Research on the basic characteristics, the key technologies, the network architecture and security problems of the internet of things. In Computer Science and Network Technology (ICCSNT), 2013 3rd International Conference on (pp. 825-828). IEEE.","DOI":"10.1109\/ICCSNT.2013.6967233"},{"key":"12_CR9","unstructured":"Srinidhi, N.N., Kumar, S.D. and Venugopal, K.R., 2018. Network optimizations in the Internet of Things: A review. Engineering Science and Technology, an International Journal."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Reyna, A., Mart\u00edn, C., Chen, J., Soler, E. and D\u00edaz, M., 2018. On blockchain and its integration with IoT. Challenges and opportunities. Future Generation Computer Systems.","DOI":"10.1016\/j.future.2018.05.046"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iot.2018.05.002","volume":"1-2","author":"Daniel Minoli","year":"2018","unstructured":"Minoli, D. and Occhiogrosso, B., 2018. Blockchain mechanisms for IoT security. Internet of Things, 1, pp.1-13.","journal-title":"Internet of Things"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"Minhaj Ahmad Khan","year":"2018","unstructured":"Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, pp.395-411.","journal-title":"Future Generation Computer Systems"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Bennani, K. and El Ghanami, D., 2012, November. Particle swarm optimization based clustering in wireless sensor networks: the effectiveness of distance altering. In Complex systems (ICCS), 2012 international conference on (pp. 1-4). IEEE.","DOI":"10.1109\/ICoCS.2012.6458564"},{"issue":"4","key":"12_CR14","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s00521-015-1920-1","volume":"27","author":"Seyedali Mirjalili","year":"2015","unstructured":"Mirjalili, S., 2016. Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Computing and Applications, 27(4), pp.1053-1073.","journal-title":"Neural Computing and Applications"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Jesus, E.F., Chicarino, V.R., de Albuquerque, C.V. and Rocha, A.A.D.A., 2018. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. Security and Communication Networks, 2018.","DOI":"10.1155\/2018\/9675050"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"77145","DOI":"10.1109\/ACCESS.2018.2874026","volume":"6","author":"K. Shankar","year":"2018","unstructured":"K. Shankar, Mohamed Elhoseny, E. Dhiravida chelvi, SK. Lakshmanaprabu, Wanqing Wu, An Efficient Optimal Key Based Chaos Function for Medical Image Security, IEEE Access, November 2018. \n                  https:\/\/doi.org\/10.1109\/ACCESS.2018.2874026","journal-title":"IEEE Access"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Mohamed Elhoseny, K. Shankar, S. K. Lakshmanaprabu, Andino Maseleno, N. Arunkumar, Hybrid optimization with cryptography encryption for medical image security in Internet of Things, Neural Computing and Applications - Springer, October 2018. \n                  https:\/\/doi.org\/10.1007\/s00521-018-3801-x","DOI":"10.1007\/s00521-018-3801-x"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"24196","DOI":"10.1109\/ACCESS.2018.2830651","volume":"6","author":"S. K. Lakshmanaprabu","year":"2018","unstructured":"Lakshmanaprabu SK, K. Shankar, Ashish Khanna, Deepak Gupta, Joel J. P. C. Rodrigues, Pl\u00e1cido R. Pinheiro, Victor Hugo C. de Albuquerque, \u201cEffective Features to Classify Big Data using Social Internet of Things\u201d, IEEE Access, Volume.6, page(s):24196-24204, April 2018.","journal-title":"IEEE Access"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"T. Avudaiappan, R. Balasubramanian, S. Sundara Pandiyan, M. Saravanan, S. K. Lakshmanaprabu, K. Shankar, Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm, Journal of Medical Systems, Volume 42, Issue 11, pp.1-11, November 2018. \n                  https:\/\/doi.org\/10.1007\/s10916-018-1053-z","DOI":"10.1007\/s10916-018-1053-z"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"K.Shankar and P.Eswaran. \u201cRGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography\u201d, China Communications, Volume. 14, Issue. 2, page(s): 118-130, February 2017.","DOI":"10.1109\/CC.2017.7868160"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Nur Aminudin, Andino Maseleno, K. Shankar, S. Hemalatha, K. Sathesh kumar, Fauzi, Rita Irviani, Muhamad Muslihudin, \u201cNur Algorithm on Data Encryption and Decryption\u201d, International Journal of Engineering & Technology, Volume. 7, Issue-2.26, page(s): 109-118, June 2018.","DOI":"10.14419\/ijet.v7i2.26.14363"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"K. Shankar and P. Eswaran. \u201cRGB Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique\u201d, Journal of Circuits, Systems, and Computers, Volume. 25, No. 11, page(s): 1650138-1 to 23, November 2016.","DOI":"10.1142\/S0218126616501383"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"K. Shankar, Lakshmanaprabu S. K, \u201cOptimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm\u201d, International Journal of Engineering & Technology, Volume. 7, Issue. 9, page(s): 22-27, 2018.","DOI":"10.14419\/ijet.v7i1.9.9729"},{"key":"12_CR24","unstructured":"K. Shankar and P.Eswaran. \u201cA Secure Visual Secret Share (VSS) Creation Scheme in Visual Cryptography using Elliptic Curve Cryptography with Optimization Technique\u201d. Australian Journal of Basic and Applied Sciences. Volume: 9, Issue.36, Page(s): 150-163, 2015."},{"key":"12_CR25","unstructured":"K. Sathesh Kumar, K. Shankar, M. Ilayaraja, M. Rajesh, \u201cSensitive Data Security in Cloud Computing Aid of Different Encryption Techniques\u201d, Journal of Advanced Research in Dynamical and Control Systems, Volume. 9, Issue. 18, page(s): 2888-2899, December 2017."},{"key":"12_CR26","unstructured":"K. Shankar and P.Eswaran. \u201cECC Based Image Encryption Scheme with aid of Optimization Technique using Differential Evolution Algorithm\u201d, International Journal of Applied Engineering Research, Volume: 10, No.5, pp. 1841\u2013184, 2015."}],"container-title":["Handbook of Multimedia Information Security: Techniques and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15887-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T14:41:46Z","timestamp":1563547306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15887-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030158866","9783030158873"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15887-3_12","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}