{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:58:43Z","timestamp":1743062323998,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030995836"},{"type":"electronic","value":"9783030995843"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99584-3_18","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T14:03:49Z","timestamp":1648649029000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic Monitoring System for\u00a0Security Using IoT Devices and\u00a0Smart Contracts"],"prefix":"10.1007","author":[{"given":"Kotono","family":"Iwata","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"18_CR1","unstructured":"IDC: IoT Growth Demands Rethink of Long-Term Storage Strategies, says IDC. https:\/\/www.idc.com\/getdoc.jsp?containerId=prAP46737220. Accessed 8 Dec 2021"},{"key":"18_CR2","unstructured":"Statist: Size of the security services market worldwide from 2011 to 2020, by region. https:\/\/www.statista.com\/statistics\/323113\/distribution-of-the-security-services-market-worldwide\/. Accessed 8 Dec 2021"},{"key":"18_CR3","doi-asserted-by":"publisher","DOI":"10.4324\/9781315157191","volume-title":"Private Security: An Introduction to Principles and Practice","author":"CP Nemeth","year":"2017","unstructured":"Nemeth, C.P.: Private Security: An Introduction to Principles and Practice, 1st edn. CRC Press, Boca Raton (2017)","edition":"1"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Mrdovic, S.: IoT forensics. In: Avoine, G., Hernandez-Castro, J. (eds.) Security of Ubiquitous Computing Systems, pp. 215\u2013229. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-10591-4_13","DOI":"10.1007\/978-3-030-10591-4_13"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1016\/j.procs.2018.05.140","volume":"132","author":"NM Kumar","year":"2018","unstructured":"Kumar, N.M., Mallick, P.K.: Blockchain technology for security issues and challenges in IoT. Procedia Comput. Sci. 132, 1815\u20131823 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"18_CR6","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Le, D., Meng, H., Su, L., Thing, V., Yeo, S.L.: BIFF: a blockchain-based IoT forensics framework with identity privacy. In: 2018 IEEE TENCON, pp. 2372\u20132377 (2018)","DOI":"10.1109\/TENCON.2018.8650434"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"M Li","year":"2019","unstructured":"Li, M., Qiu, M., Su, S., Sun, Y., Tian, Z.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151\u2013165 (2019)","journal-title":"Inf. Sci."},{"key":"18_CR9","unstructured":"Akkaya, K., Cebe, M., Chang, M., Mercan, S., Tekiner, E., Uluagac, S.: A cost-efficient IoT forensics framework with blockchain. In: 2020 IEEE ICBC, pp. 1\u20135 (2020)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Id\u00e9, T.: Collaborative anomaly detection on blockchain from noisy sensor data. In: 2018 IEEE ICDMW, pp. 120\u2013127 (2018)","DOI":"10.1109\/ICDMW.2018.00024"},{"key":"18_CR11","unstructured":"Jang, J., Nang, J., Song, J.: Design of anomaly detection and visualization tool for IoT blockchain. In: 2018 CSCI, pp. 1464\u20131465 (2018)"},{"issue":"2","key":"18_CR12","first-page":"314","volume":"13","author":"S Cheung","year":"2020","unstructured":"Cheung, S., He, J., Wang, X., Xie, Z., Zhao, G.: ContractGuard: defend ethereum smart contracts with embedded intrusion detection. IEEE Trans. Serv. Comput. 13(2), 314\u2013328 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.jmsy.2021.03.020","volume":"59","author":"M Chica","year":"2021","unstructured":"Chica, M., Tang, Q., Zhang, Z.: Maintenance costs and makespan minimization for assembly permutation flow shop scheduling by considering preventive and corrective maintenance. J. Manuf. Syst. 59, 549\u2013564 (2021)","journal-title":"J. Manuf. Syst."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.jmsy.2021.02.010","volume":"59","author":"H Huang","year":"2021","unstructured":"Huang, H., Lu, Y., Wang, Y., Xu, X., Yang, L.: Digital Twin-driven online anomaly detection for an automation system based on edge intelligence. J. Manuf. Syst. 59, 138\u2013150 (2021)","journal-title":"J. Manuf. Syst."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"106889","DOI":"10.1016\/j.cie.2020.106889","volume":"150","author":"C Costa","year":"2020","unstructured":"Costa, C., Li, G.P., Lima, M.J., Righi, R., Trindade, E.S., Zonta, T.: Predictive maintenance in the Industry 4.0: a systematic literature review. Comput. Ind. Eng. 150, 106889 (2020)","journal-title":"Comput. Ind. Eng."},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Aung, Y. N., Tantidham, T.: Emergency service for smart home system using ethereum blockchain: system and architecture. In: 2019 IEEE PerCom Workshops, pp. 888\u2013893 (2019)","DOI":"10.1109\/PERCOMW.2019.8730816"},{"issue":"6","key":"18_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MNET.011.2000085","volume":"34","author":"N Guizani","year":"2020","unstructured":"Guizani, N., Li, Y., Lou, C., Wang, L., Yu, Y.: Decentralized public key infrastructures atop blockchain. IEEE Network 34(6), 133\u2013139 (2020)","journal-title":"IEEE Network"},{"key":"18_CR18","unstructured":"PoA Network: Proof of Authority: consensus model with Identity at Stake. https:\/\/medium.com\/poa-network\/proof-of-authority-consensus-model-with-identity-at-stake-d5bd15463256. Accessed 8 Dec 2021"},{"key":"18_CR19","unstructured":"Infura: Ethereum API $$|$$ IPFS API and Gateway $$|$$ ETH Nodes as a Service \u2014 Infura. https:\/\/infura.io\/. Accessed 8 Dec 2021"},{"key":"18_CR20","unstructured":"MetaMask: MetaMask - A crypto wallet and gateway to blockchain apps. https:\/\/metamask.io\/. Accessed 8 Dec 2021"},{"key":"18_CR21","unstructured":"Rinkeby: Rinkeby: Network Dashboard. https:\/\/www.rinkeby.io\/. Accessed 8 Dec 2021"},{"key":"18_CR22","unstructured":"Ethereum: Home $$|$$ ethereum.org. https:\/\/ethereum.org\/en\/. Accessed 8 Dec 2021"},{"key":"18_CR23","unstructured":"Ethereum: Remix IDE - Ethereum.org. https:\/\/remix.ethereum.org\/. Accessed 8 Dec 2021"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99584-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T14:39:52Z","timestamp":1648651192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99584-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030995836","9783030995843"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99584-3_18","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}