{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:46:58Z","timestamp":1743004018559,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030611422"},{"type":"electronic","value":"9783030611439"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61143-9_17","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T11:03:15Z","timestamp":1604574195000},"page":"205-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Framework to Secure Cluster-Header Decision in Wireless Sensor Network Using Blockchain"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2489-0637","authenticated-orcid":false,"given":"Hafsa","family":"Benaddi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9682-9555","authenticated-orcid":false,"given":"Khalil","family":"Ibrahimi","sequence":"additional","affiliation":[]},{"given":"Haytham","family":"Dahri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9307-6132","authenticated-orcid":false,"given":"Abderrahim","family":"Benslimane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,6]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Abdullah, K.M., Houssein, E.H., Zayed, H.H.: New security protocol using hybrid cryptography algorithm for WSN. In: 1st International Conference on Computer Applications & Information Security (ICCAIS), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/CAIS.2018.8442003"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Al-Karaki, J.N., Gawanmeh, A., Ayache, M., Mashaleh, A.: Dass-care: a decentralized, accessible, scalable, and secure healthcare framework using blockchain. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 330\u2013335. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766714"},{"key":"17_CR3","first-page":"909086","volume":"2013","author":"P Azad","year":"2013","unstructured":"Azad, P., Sharma, V.: Cluster head selection in wireless sensor networks underfuzzy environment. ISRN Sensor Netw. 2013, 909086 (2013)","journal-title":"ISRN Sensor Netw."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bai, Q., Zhou, X., Wang, X., Xu, Y., Wang, X., Kong, Q.: A deep dive into blockchain selfish mining. In: IEEE International Conference on Communications (ICC), ICC 2019, pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761240"},{"issue":"6","key":"17_CR5","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515\u20132534 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Cheikhrouhou, O., Koubaa, A.: BlockLoc: secure localization in the internet-of-things using blockchain. CoRR abs\/1904.13138 (2019)","DOI":"10.1109\/IWCMC.2019.8766440"},{"issue":"16","key":"17_CR7","first-page":"22","volume":"113","author":"K Gupta","year":"2015","unstructured":"Gupta, K., Goyal, A., Tripathi, A.K.: A novel approach for cluster head selection in wireless sensor network. Int. J. Comput. Appl. 113(16), 22\u201327 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"17_CR8","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3390\/fi9040085","volume":"9","author":"Z Hong","year":"2017","unstructured":"Hong, Z., Wang, Z., Cai, W., Leung, V.: Blockchain-empowered fair computational resource sharing system in the D2D network. Future Internet 9(4), 85 (2017)","journal-title":"Future Internet"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.jnca.2018.10.019","volume":"125","author":"I Makhdoom","year":"2019","unstructured":"Makhdoom, I., Abolhasan, M., Abbas, H., Ni, W.: Blockchain\u2019s adoption in IoT: the challenges, and a way forward. J. Netw. Comput. Appl. 125, 251\u2013279 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Misic, J., Misic, V.B., Chang, X., Motlagh, S.G., Ali, M.Z.: Block delivery time in bitcoin distribution network. In: IEEE International Conference on Communications (ICC), ICC 2019, pp. 1\u20137 (2019)","DOI":"10.1109\/ICC.2019.8761420"},{"key":"17_CR11","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report, Manubot (2019)"},{"key":"17_CR12","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-030-33509-0_9","volume-title":"Advances on P2P, parallel, grid, cloud and internet computing","author":"RJ ul Hussen Khan","year":"2020","unstructured":"ul Hussen Khan, R.J., Noshad, Z., Javaid, A., Zahid, M., Ali, I., Javaid, N.: Node Recovery in Wireless Sensor Networks via Blockchain. In: Barolli, L., Hellinckx, P., Natwichai, J. (eds.) 3PGCIC 2019. LNNS, vol. 96, pp. 94\u2013105. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-33509-0_9"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Riabi, I., Ayed, H.K.B., Saidane, L.A.: A survey on blockchain based access control for internet of things. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 502\u2013507. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766453"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Sayadi, S., Rejeb, S.B., Choukair, Z.: Anomaly detection model over blockchain electronic transactions. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 895\u2013900. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766765"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Spathoulas, G., et al.: Towards reliable integrity in blacklisting: facing malicious IPs in GHOST smart contracts. In: Innovations in Intelligent Systems and Applications (INISTA), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/INISTA.2018.8466327"}],"container-title":["Communications in Computer and Information Science","Advanced Communication Systems and Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61143-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T11:05:32Z","timestamp":1604574332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61143-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030611422","9783030611439"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61143-9_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACOSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Communication Systems and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acosis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acosis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.22","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}