{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T04:14:45Z","timestamp":1760328885972,"version":"3.44.0"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030589509"},{"type":"electronic","value":"9783030589516"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58951-6_19","type":"book-chapter","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T09:07:40Z","timestamp":1599815260000},"page":"377-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["LegIoT: Ledgered Trust Management Platform for IoT"],"prefix":"10.1007","author":[{"given":"Jens","family":"Neureither","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[]},{"given":"David","family":"Koisser","sequence":"additional","affiliation":[]},{"given":"Ferdinand","family":"Brasser","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 Workshop on New Security Paradigms, pp. 48\u201360 (1998)","DOI":"10.1145\/283699.283739"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Abera, T., et al.: C-FLAT: control-flow attestation for embedded systems software. In: ACM SIGSAC CCS (2016)","DOI":"10.1145\/2976749.2978358"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Abera, T., et al.: Things, trouble, trust: on building trust in IoT systems. In: ACM DAC (2016)","DOI":"10.1145\/2897937.2905020"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Abera, T., Bahmani, R., Brasser, F., Ibrahim, A., Sadeghi, A.R., Schunter, M.: DIAT: data integrity attestation for resilient collaboration of autonomous systems. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23420"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing trust in a peer-to-peer information system. In: ACM CIKM (2001)","DOI":"10.1145\/502636.502638"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Alexopoulos, N., Daubert, J., M\u00fchlh\u00e4user, M., Habib, S.M.: Beyond the hype: on using blockchains in trust management for authentication. In: IEEE Trustcom\/BigDataSE\/ICESS (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.283"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Alexopoulos, N., Vasilomanolakis, E., Iv\u00e1nk\u00f3, N.R., M\u00fchlh\u00e4user, M.: Towards blockchain-based collaborative intrusion detection systems. In: CRITIS (2017)","DOI":"10.1007\/978-3-319-99843-5_10"},{"key":"19_CR8","unstructured":"Alves, T., Felton, D.: TrustZone: integrated hardware and software security (2004)"},{"key":"19_CR9","unstructured":"Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A.R., Schunter, M.: SANA: secure and scalable aggregate network attestation. In: ACM SIGSAC CCS (2016)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Ammar, M., Washha, M., Ramabhadran, G.S., Crispo, B.: Slimiot: scalable lightweight attestation protocol for the Internet of Things. In: IEEE DSC (2018)","DOI":"10.1109\/DESEC.2018.8625142"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Asokan, N., et al.: SEDA: scalable embedded device attestation. In: ACM SIGSAC CCS (2015)","DOI":"10.1145\/2810103.2813670"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Banerjee, M., Lee, J., Chen, Q., Choo, K.R.: Blockchain-based security layer for identification and isolation of malicious things in IoT: a conceptual design. In: ICCCN (2018)","DOI":"10.1109\/ICCCN.2018.8487447"},{"key":"19_CR13","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE S&P (1996)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: ACM MOBIHOC (2002)","DOI":"10.1145\/513824.513828"},{"key":"19_CR15","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform. Whitepaper (2014). https:\/\/blockchainlab.com\/pdf\/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Carpent, X., ElDefrawy, K., Rattanavipanon, N., Tsudik, G.: Lightweight swarm attestation: a tale of two LISA-s. In: ACM AsiaCCS (2017)","DOI":"10.1145\/3052973.3053010"},{"key":"19_CR17","unstructured":"Cervesato, I.: The Dolev-Yao intruder is the most powerful attacker. In: ACM\/IEEE LICS (2001)"},{"key":"19_CR18","unstructured":"Dardaman, C.: Breaking & entering with Zipato SmartHubs (2019). https:\/\/blackmarble.sh\/zipato-smart-hub\/"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29, 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"19_CR20","unstructured":"Eldefrawy, K., Tsudik, G., Francillon, A., Perito, D.: Smart: secure and minimal architecture for (establishing dynamic) root of trust. In: NDSS (2012)"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Elkins, M., Torto, D.D., Levien, R., Roessler, T.: MIME Security with OpenPGP, IETF RFC 3156 (2001). www.ietf.org\/rfc\/rfc3156.txt","DOI":"10.17487\/rfc3156"},{"key":"19_CR22","unstructured":"Eschenauer, L., Gligor, V., Baras, J.: On trust establishment in mobile ad-hoc networks. In: Security Protocols Workshop (2002)"},{"key":"19_CR23","unstructured":"WE Forum: This is how a smart factory actually works (2019). https:\/\/www.weforum.org\/agenda\/2019\/06\/connectivity-is-driving-a-revolution-in-manufacturing\/"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Francillon, A., Nguyen, Q., Rasmussen, K.B., Tsudik, G.: A minimalist approach to remote attestation. In: DATE (2014)","DOI":"10.7873\/DATE.2014.257"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Golomb, T., Mirsky, Y., Elovici, Y.: CIoTA: collaborative IoT anomaly detection via blockchain. CoRR (2018)","DOI":"10.14722\/diss.2018.23003"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Hemsley, K., Fisher, R.: History of industrial control system cyber incidents (2018)","DOI":"10.2172\/1505628"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure, Certificate and CRL Profile, IETF RFC 2459 (1999). www.ietf.org\/rfc\/rfc2459.txt","DOI":"10.17487\/rfc2459"},{"key":"19_CR28","unstructured":"Hyperledger: Hyperledger Sawtooth - a modular platform for building, deploying, and running distributed ledgers (2018). https:\/\/www.hyperledger.org\/projects\/sawtooth"},{"key":"19_CR29","unstructured":"Hyperledger: Hyperledger Sawtooth v1.1.4 documentation (2019). https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/1.1.4\/"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Sadeghi, A.R., Tsudik, G., Zeitouni, S.: DARPA: device attestation resilient to physical attacks. In: 9th ACM WiSec (2016)","DOI":"10.1145\/2939918.2939938"},{"key":"19_CR31","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Australasian Computer Science Conference (2006)"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Koeberl, P., Schulz, S., Sadeghi, A.R., Varadharajan, V.: TrustLite: a security architecture for tiny embedded devices. In: EuroSys (2014)","DOI":"10.1145\/2592798.2592824"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Kohnh\u00e4user, F., B\u00fcscher, N., Gabmeyer, S., Katzenbeisser, S.: Scapi: a scalable attestation protocol to detect software and physical attacks. In: ACM WiSec (2017)","DOI":"10.1145\/3098243.3098255"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Kohnh\u00e4user, F., B\u00fcscher, N., Katzenbeisser, S.: Salad: secure and lightweight attestation of highly dynamic and disruptive networks. In: ACM AsiaCCS (2018)","DOI":"10.1145\/3196494.3196544"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE S&P 9, 49\u201351 (2011)","DOI":"10.1109\/MSP.2011.67"},{"issue":"2","key":"19_CR36","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MC.2007.76","volume":"40","author":"H Li","year":"2007","unstructured":"Li, H., Singhal, M.: Trust management in distributed systems. Computers 40(2), 45\u201353 (2007)","journal-title":"Computers"},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom (2000)","DOI":"10.1145\/345910.345955"},{"key":"19_CR38","doi-asserted-by":"publisher","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","volume":"6","author":"W Meng","year":"2018","unstructured":"Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179\u201310188 (2018)","journal-title":"IEEE Access"},{"key":"19_CR39","unstructured":"Moinet, A., Darties, B., Baril, J.L.: Blockchain based trust & authentication for decentralized sensor networks. CoRR (2017)"},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Park, J., Kim, K.: TM-Coin: Trustworthy management of TCB measurements in IoT. In: PerCom Workshops. IEEE (2017)","DOI":"10.1109\/PERCOMW.2017.7917640"},{"key":"19_CR41","unstructured":"Pearson, S., Balacheff, B.: Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall Professional (2003)"},{"key":"19_CR42","unstructured":"Rayner, G.: Smart meters could leave British homes vulnerable to cyber attacks, experts have warned (2018). https:\/\/www.telegraph.co.uk\/news\/2018\/02\/18\/smart-meters-could-leave-british-homes-vulnerable-cyber-attacks\/"},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: IEEE Trustcom\/BigDataSE\/ISPA (2015)","DOI":"10.1109\/Trustcom.2015.357"},{"key":"19_CR44","unstructured":"Scout, S.L.: Guide on Airbnb smart locks (2019). https:\/\/www.postscapes.com\/airbnb-smart-lock\/"},{"key":"19_CR45","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Using software-based attestation for verifying embedded systems in cars. In: ESCAR Workshop (2004)"},{"key":"19_CR46","unstructured":"Signorini, M., Pontecorvi, M., Kanoun, W., Di Pietro, R.: Bad: blockchain anomaly detection. CoRR (2018)"},{"key":"19_CR47","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad hoc wireless networks. In: Security Protocols Workshop (1999)","DOI":"10.1007\/10720107_24"},{"key":"19_CR48","unstructured":"TCG: Trusted computing group. https:\/\/trustedcomputinggroup.org\/"},{"key":"19_CR49","doi-asserted-by":"crossref","unstructured":"Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: IEEE\/WIC WI 2003, pp. 372\u2013378. IEEE (2003)","DOI":"10.1109\/WI.2003.1241218"},{"key":"19_CR50","unstructured":"World, T.: IoT in utilities market forecasted to grow to \\$53.8 billion by 2024 (2020). https:\/\/www.tdworld.com\/grid-innovations\/article\/21120887\/iot-in-utilities-market-worth-538-billion-by-2024"},{"key":"19_CR51","unstructured":"Xiong, L., Liu, L.: Building trust in decentralized peer-to-peer electronic communities. In: ICEC (2002)"},{"key":"19_CR52","doi-asserted-by":"publisher","first-page":"67809","DOI":"10.1109\/ACCESS.2018.2878995","volume":"6","author":"C Xu","year":"2018","unstructured":"Xu, C., Liu, H., Li, P., Wang, P.: A remote attestation security model based on privacy-preserving blockchain for v2x. IEEE Access 6, 67809\u201367818 (2018)","journal-title":"IEEE Access"},{"key":"19_CR53","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-45012-2_15","volume-title":"Cooperative Information Agents IV - The Future of Information Agents in Cyberspace","author":"B Yu","year":"2000","unstructured":"Yu, B., Singh, M.P.: A social mechanism of reputation management in electronic communities. In: Klusch, M., Kerschberg, L. (eds.) CIA 2000. LNCS (LNAI), vol. 1860, pp. 154\u2013165. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/978-3-540-45012-2_15"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58951-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:03:12Z","timestamp":1757541792000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58951-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030589509","9783030589516"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58951-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guildford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/esorics2020.sccs.surrey.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"366","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,16","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9,1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-10 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}