{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T07:39:17Z","timestamp":1771054757946,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030381806","type":"print"},{"value":"9783030381813","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38181-3_9","type":"book-chapter","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T01:04:48Z","timestamp":1583111088000},"page":"161-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":75,"title":["The Future of Blockchain Technology in Healthcare Internet of Things Security"],"prefix":"10.1007","author":[{"given":"Gautam","family":"Srivastava","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0049-4296","authenticated-orcid":false,"given":"Reza M.","family":"Parizi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Dehghantanha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"9_CR1","volume-title":"Resilient Overlay Networks","author":"D Andersen","year":"2001","unstructured":"D. Andersen, H. Balakrishnan, F. Kaashoek, R. Morris, Resilient Overlay Networks, vol. 35 (ACM, New York, 2001)"},{"key":"9_CR2","unstructured":"M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J.A. Halderman, L. Invernizzi, M. Kallitsis et al., Understanding the Mirai Botnet, in 26th {USENIX} Security Symposium ({USENIX} Security 17), pp. 1093\u20131110 (2017)"},{"key":"9_CR3","first-page":"25","volume-title":"MedRec: Using blockchain for medical data access and permission management, in 2016 2nd International Conference on Open and Big Data (OBD)","author":"A Azaria","year":"2016","unstructured":"A. Azaria, A. Ekblaw, T. Vieira, A. Lippman, MedRec: Using blockchain for medical data access and permission management, in 2016 2nd International Conference on Open and Big Data (OBD) (IEEE, New York, 2016), pp. 25\u201330"},{"key":"9_CR4","first-page":"494","volume-title":"An empirical analysis of smart contracts: platforms, applications, and design patterns, in International Conference on Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"M. Bartoletti, L. Pompianu, An empirical analysis of smart contracts: platforms, applications, and design patterns, in International Conference on Financial Cryptography and Data Security (Springer, Cham, 2017), pp. 494\u2013509"},{"key":"9_CR5","unstructured":"C. Cachin, Architecture of the hyperledger blockchain fabric, in Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310, p. 4 (2016)"},{"key":"9_CR6","first-page":"1","volume-title":"Security issues in biomedical wireless sensor networks, in 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies","author":"T Dimitriou","year":"2008","unstructured":"T. Dimitriou, K. Ioannis, Security issues in biomedical wireless sensor networks, in 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies (IEEE, New York, 2008), pp. 1\u20135"},{"key":"9_CR7","first-page":"173","volume-title":"Towards an optimized blockchain for IoT, in Proceedings of the Second International Conference on Internet-of-Things Design and Implementation","author":"A Dorri","year":"2017","unstructured":"A. Dorri, S.S. Kanhere, R. Jurdak, Towards an optimized blockchain for IoT, in Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (ACM, New York, 2017), pp. 173\u2013178"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"A.D. Dwivedi, L. Malina, P. Dzurenda, G. Srivastava, Optimized blockchain model for internet of things based healthcare applications. arXiv preprint. arXiv:1906.06517 (2019)","DOI":"10.1109\/TSP.2019.8769060"},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"Ashutosh Dwivedi","year":"2019","unstructured":"A.D. Dwivedi, G. Srivastava, S. Dhar, R. Singh, A decentralized privacy-preserving healthcare blockchain for IoT.Sensors 19(2), 326 (2019)","journal-title":"Sensors"},{"key":"9_CR10","unstructured":"S. Edwards, I. Profetis, Hajime: Analysis of a decentralized internet worm for IoT devices, in Rapidity Networks, Oct 16, 2016"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/00396338.2011.555586","volume":"53","author":"JP Farwell","year":"2011","unstructured":"J.P. Farwell, R. Rohozinski, Stuxnet and the future of cyber war. Survival 53(1), 23\u201340 (2011)","journal-title":"Survival"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"K.N. Griggs, O. Ossipova, C.P. Kohlios, A.N. Baccarini, E.A. Howson, T. Hayajneh, Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med. Syst. 42(7), 130 (2018)","DOI":"10.1007\/s10916-018-0982-x"},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR14","unstructured":"A. Josang, R. Ismail, The beta reputation system, in Proceedings of the 15th Bled Electronic Commerce Conference, vol. 5, pp. 2502\u20132511 (2002)"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"Minhaj Ahmad Khan","year":"2018","unstructured":"M.A. Khan, K. Salah, IoT security: Review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018, May 1)","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"9_CR16","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.1007\/s11042-018-6730-x","volume":"78","author":"M Kim","year":"2019","unstructured":"M. Kim, W. Jo, J. Kim, T. Shon, Visualization for internet of things: power system and financial network cases. Multimed. Tools Appl. 78(3), 3241\u20133265 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"9_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/s120100055","volume":"12","author":"P Kumar","year":"2012","unstructured":"P. Kumar, H.-J. Lee, Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55\u201391 (2012)","journal-title":"Sensors"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.3390\/s120201625","volume":"12","author":"P Kumar","year":"2012","unstructured":"P. Kumar, S.-G. Lee, H.-J. Lee, E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2), 1625\u20131647 (2012)","journal-title":"Sensors"},{"key":"9_CR19","unstructured":"C. Lamb, Future potential attack patterns against nuclear power I&C systems. Technical report, Sandia National Lab. (SNL-NM), Albuquerque, NM (United States), 2018"},{"issue":"4","key":"9_CR20","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/JSAC.2009.090502","volume":"27","author":"X Lin","year":"2009","unstructured":"X. Lin, R. Lu, X. Shen, Y. Nemoto, N. Kato, Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J. Sel. Areas Commun. 27(4), 365\u2013378 (2009)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9_CR21","unstructured":"L. Malina, G. Srivastava, P. Dzurenda, J. Hajny, and R. Fujdiak. A secure publish\/subscribe protocol for internet of things."},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1089\/big.2015.0056","volume":"4","author":"D McGinn","year":"2016","unstructured":"D. McGinn, D. Birch, D. Akroyd, M. Molina-Solana, Y. Guo, W.J. Knottenbelt, Visualizing dynamic bitcoin transaction patterns. Big Data 4(2), 109\u2013119 (2016)","journal-title":"Big Data"},{"issue":"2","key":"9_CR23","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/s10550-006-0051-8","volume":"24","author":"H Ng","year":"2006","unstructured":"H. Ng, M. Sim, C. Tan, Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2), 138\u2013144 (2006)","journal-title":"BT Technol. J."},{"key":"9_CR24","unstructured":"J.-T.C. Ngo, J.T. Webb, Managing the status of documents in a distributed storage system, US Patent 9,020,887, 28 Apr 2015"},{"key":"9_CR25","unstructured":"R.M. Parizi, A. Dehghantanha, K.-K.R. Choo, A. Singh, Empirical vulnerability analysis of automated smart contracts security testing on blockchains, in Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, pp. 103\u2013113. IBM Corp. (2018)"},{"key":"9_CR26","first-page":"75","volume-title":"Smart contract programming languages on blockchains: an empirical evaluation of usability and security, in International Conference on Blockchain","author":"RM Parizi","year":"2018","unstructured":"R.M. Parizi, A. Dehghantanha et al., Smart contract programming languages on blockchains: an empirical evaluation of usability and security, in International Conference on Blockchain (Springer, Cham, 2018), pp. 75\u201391"},{"key":"9_CR27","first-page":"1","volume-title":"Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption, in 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","author":"Y Rahulamathavan","year":"2017","unstructured":"Y. Rahulamathavan, R.C.-W. Phan, M. Rajarajan, S. Misra, A. Kondoz, Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption, in 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (IEEE, New York, 2017), pp. 1\u20136"},{"key":"9_CR28","unstructured":"L.G.A. Rodriguez, J.S. Trazzi, V. Fossaluza, R. Campiolo, D.M. Batista, Analysis of vulnerability disclosure delays from the national vulnerability database, in Anais do Workshop de Seguran\u00e7a Cibern\u00e9tica em Dispositivos Conectados (WSCDC-SBRC 2018), vol. 1. SBC (2018)"},{"key":"9_CR29","unstructured":"G. Srivastava, A.D. Dwivedi, R. Singh, Automated remote patient monitoring: data sharing and privacy using blockchain. arXiv preprint. arXiv:1811.03417 (2018)"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"G. Srivastava, A.D. Dwivedi, R. Singh, Crypto-democracy: a decentralized voting scheme using blockchain technology, in ICETE (2), pp. 674\u2013679 (2018)","DOI":"10.5220\/0006881906740679"},{"key":"9_CR31","first-page":"499","volume-title":"Phantom protocol as the new crypto-democracy, in IFIP International Conference on Computer Information Systems and Industrial Management","author":"G Srivastava","year":"2018","unstructured":"G. Srivastava, A.D. Dwivedi, R. Singh, Phantom protocol as the new crypto-democracy, in IFIP International Conference on Computer Information Systems and Industrial Management (Springer, Cham, 2018), pp. 499\u2013509"},{"issue":"4","key":"9_CR32","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1023\/A:1019197320544","volume":"3","author":"M Stemm","year":"1998","unstructured":"M. Stemm, R.H. Katz, Vertical handoffs in wireless overlay networks. Mobile Netw. Appl. 3(4), 335\u2013350 (1998)","journal-title":"Mobile Netw. Appl."},{"key":"9_CR33","volume-title":"A systematic literature review of blockchain cyber security, in Digital Communications and Networks","author":"PJ Taylor","year":"2019","unstructured":"P.J. Taylor, T. Dargahi, A. Dehghantanha, R.M. Parizi, K.-K.R. Choo, A systematic literature review of blockchain cyber security, in Digital Communications and Networks (2019)"},{"key":"9_CR34","first-page":"197","volume-title":"Security for pervasive health monitoring sensor applications, in 2006 Fourth International Conference on Intelligent Sensing and Information Processing","author":"KK Venkatasubramanian","year":"2006","unstructured":"K.K. Venkatasubramanian, S.K. Gupta, Security for pervasive health monitoring sensor applications, in 2006 Fourth International Conference on Intelligent Sensing and Information Processing (IEEE, New York, 2006), pp. 197\u2013202"},{"issue":"2","key":"9_CR35","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00530-015-0476-3","volume":"23","author":"F Wu","year":"2017","unstructured":"F. Wu, L. Xu, S. Kumari, X. Li, An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Syst. 23(2) ,195\u2013205 (2017)","journal-title":"Multimedia Syst."},{"issue":"4","key":"9_CR36","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2006.1632651","volume":"44","author":"Y Xiao","year":"2006","unstructured":"Y. Xiao, X. Shen, B. Sun, L. Cai, Security and privacy in RFID and applications in telemedicine. IEEE Commun. Mag. 44(4), 64\u201372 (2006)","journal-title":"IEEE Commun. Mag."},{"key":"9_CR37","doi-asserted-by":"publisher","first-page":"46731","DOI":"10.1109\/ACCESS.2018.2866626","volume":"6","author":"J Yoo","year":"2018","unstructured":"J. Yoo, J.H. Yi, Code-based authentication scheme for lightweight integrity checking of smart vehicles. IEEE Access 6, 46731\u201346741 (2018)","journal-title":"IEEE Access"},{"key":"9_CR38","volume-title":"A pentagon of considerations towards more secure blockchains, in IEEE Blockchain Technical Briefs","author":"Q Zhang","year":"2018","unstructured":"Q. Zhang, R.M. Parizi, K.K.R. Choo, A pentagon of considerations towards more secure blockchains, in IEEE Blockchain Technical Briefs (2018)"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain technology: architecture, consensus, and future trends, in 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564, June 2017","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"4","key":"9_CR40","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Z. Zheng, S. Xie, H.-N. Dai, X. Chen, H. Wang, Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."}],"container-title":["Advances in Information Security","Blockchain Cybersecurity, Trust and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38181-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T01:05:45Z","timestamp":1583111145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38181-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030381806","9783030381813"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38181-3_9","relation":{},"ISSN":["1568-2633","2512-2193"],"issn-type":[{"value":"1568-2633","type":"print"},{"value":"2512-2193","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}