{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:02:31Z","timestamp":1742954551888,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031609930"},{"type":"electronic","value":"9783031609947"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60994-7_17","type":"book-chapter","created":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T23:04:39Z","timestamp":1716764679000},"page":"208-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Addressing Security and Privacy Issues in a Smart Environment by Using Blockchain as a Preemptive Technique"],"prefix":"10.1007","author":[{"given":"Shahbaz","family":"Pervez","sequence":"first","affiliation":[]},{"given":"Aljawharah","family":"Almuhana","sequence":"additional","affiliation":[]},{"given":"Seyed Ebrahim","family":"Hosseini","sequence":"additional","affiliation":[]},{"given":"Zahida","family":"Parveen","sequence":"additional","affiliation":[]},{"given":"Samina","family":"Naz","sequence":"additional","affiliation":[]},{"given":"Hira","family":"Tariq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,26]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Hosseini, S., Goher, K.: Personal care robots for children: state of the art (2017)","DOI":"10.5539\/ass.v13n1p169"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Hosseini, S., Charters, S., Anthony, P., Alhazmi, A.: \u201cEffects of \u201cthe selected smartphone social-messaging applications\u201d training on Iranian elderly\u2019s quality of life: results of a qualitative study,\u201d (2021)","DOI":"10.3991\/ijim.v15i07.19475"},{"issue":"02","key":"17_CR3","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3991\/ijim.v17i02.35457","volume":"17","author":"SE Hosseini","year":"2023","unstructured":"Hosseini, S.E., Charters, S., Anthony, P.: Effects of smartphone social applications on elderly people\u2019s quality of life. Int. J. Interact. Mob. Technol. (iJIM) 17(02), 137\u2013152 (2023)","journal-title":"Int. J. Interact. Mob. Technol. (iJIM)"},{"issue":"4","key":"17_CR4","first-page":"28","volume":"4","author":"SE Hosseini","year":"2022","unstructured":"Hosseini, S.E., Pervez, S.: EFFECTS OF SMARTPHONE APPLICATIONS ON ELDERLY PEOPLE\u2019S QUALITY OF LIFE. Int. J. Technol. Manag. Inform. Syst. 4(4), 28\u201338 (2022)","journal-title":"Int. J. Technol. Manag. Inform. Syst."},{"key":"17_CR5","unstructured":"Hosseini, S.E.: \u201cThe effect of technology upskilling on the quality of life of elderly people in Iran: a thesis submitted in partial fulfilment of the requirements for the Degree of Doctor of Philosophy at Lincoln University,\u201d Lincoln University (2023)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Wilson, J., Hosseini, S.E., Pervez, S.: Identification of fake news in social media using sentimental analysis. In: 2023 IEEE Industrial Electronics and Applications Conference (IEACon), pp. 220\u2013224. IEEE (2023)","DOI":"10.1109\/IEACon57683.2023.10370300"},{"key":"17_CR7","unstructured":"Pervez, S., Ahmed, S.Z., Shahbaz, M., Abosaq, N.: Use of cutting-edge technologies for effective teaching and learning environment in higher education. In: 4th International Conference on Advances in Education and Social Sciences (ADVED 2018), Istanbul Turkey, pp. 7833\u2013791 (2018)"},{"key":"17_CR8","first-page":"33","volume":"25","author":"M Alvarez","year":"2018","unstructured":"Alvarez, M.: A comparative analysis of cryptocurrency regulation in the United States, Nigeria, and China: the potential influence of illicit activities on regulatory evolution. ILSA J. Int. Comp. L. 25, 33 (2018)","journal-title":"ILSA J. Int. Comp. L."},{"key":"17_CR9","unstructured":"Pervez, S., Abosaq, N., Alandjani, G., Akram, A.: Internet of Things (IoT) as beginning for Jail-Less Community in Smart Society. In: IEEE International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), pp. 28\u201329 (2018)"},{"issue":"11","key":"17_CR10","first-page":"521","volume":"4","author":"S Pervez","year":"2018","unstructured":"Pervez, S., Abosaq, N.: Emerging technologies for implementation of education system for the citizens of smart societies. Int. E-J. Adv. Soc. Sci. 4(11), 521\u2013527 (2018)","journal-title":"Int. E-J. Adv. Soc. Sci."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/978-3-319-93698-7_43","volume-title":"Computational Science \u2013 ICCS 2018: 18th International Conference, Wuxi, China, June 11\u201313, 2018, Proceedings, Part I","author":"D Nasonov","year":"2018","unstructured":"Nasonov, D., Visheratin, A.A., Boukhanovsky, A.: Blockchain-based transaction integrity in distributed big data marketplace. In: Shi, Y., Haohuan, Fu., Tian, Y., Krzhizhanovskaya, V.V., Lees, M.H., Dongarra, J., Sloot, P.M.A. (eds.) Computational Science \u2013 ICCS 2018: 18th International Conference, Wuxi, China, June 11\u201313, 2018, Proceedings, Part I, pp. 569\u2013577. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93698-7_43"},{"issue":"4","key":"17_CR12","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68697-5_1","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1\u201315. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_1"},{"issue":"10","key":"17_CR14","doi-asserted-by":"publisher","first-page":"533","DOI":"10.4236\/jsea.2016.910036","volume":"9","author":"A Bahga","year":"2016","unstructured":"Bahga, A., Madisetti, V.K.: Blockchain platform for industrial internet of things. J. Softw. Eng. Appl. 9(10), 533\u2013546 (2016)","journal-title":"J. Softw. Eng. Appl."},{"issue":"14","key":"17_CR15","first-page":"1","volume":"125","author":"A Mayuri","year":"2015","unstructured":"Mayuri, A., Sudhir, T.: Internet of things: architecture, security issues and countermeasures. Int. J. Comput. Appl. 125(14), 1\u20134 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"27","key":"17_CR16","first-page":"31","volume":"179","author":"TA Rao","year":"2018","unstructured":"Rao, T.A., Haq, E.: Security challenges facing IoT layers and its protective measures. Int. J. Comput. Appl. 179(27), 31\u201335 (2018)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"17_CR17","first-page":"25","volume":"2","author":"MN Majeed","year":"2013","unstructured":"Majeed, M.N., Chattha, S.P., Akram, A., Zafrullah, M.: Vehicular ad hoc networks: history and future development arenas. Int. J. Inf. Techno. Elect. Eng 2(2), 25\u201329 (2013)","journal-title":"Int. J. Inf. Techno. Elect. Eng"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Xiaohui, X.: Study on security problems and key technologies of the internet of things. In: 2013 International Conference on Computational and Information Sciences, pp. 407\u2013410. IEEE (2013)","DOI":"10.1109\/ICCIS.2013.114"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Yan, L., Zhang, Y., Yang, L.T., Ning, H.: The internet of things: from RFID to the next-generation pervasive networked systems. Crc Press (2008)","DOI":"10.1201\/9781420052824"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Munirathinam, S.: Industry 4.0: Industrial internet of things (IIOT). In: Advances in Computers, vol. 117, no. 1, pp. 129\u2013164. Elsevier (2020)","DOI":"10.1016\/bs.adcom.2019.10.010"},{"key":"17_CR21","unstructured":"Maker.io, \u201c5 Leading IoT Security Breaches and What We Can Learn From Them,\u201d (2019). https:\/\/www.digikey.com\/en\/maker\/blogs\/2019\/5-leading-iot-security-breaches-and-what-we-can-learn-from-them"},{"issue":"5","key":"17_CR22","first-page":"135","volume":"1","author":"SE Hosseini","year":"2014","unstructured":"Hosseini, S.E., Ramchahi, A.A., Yusuf, R.J.R.: The impact of information technology on Islamic behaviour. J. Multidiscip. Eng. Sci. Technol. (JMEST) 1(5), 135\u2013141 (2014)","journal-title":"J. Multidiscip. Eng. Sci. Technol. (JMEST)"},{"key":"17_CR23","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-19024-2_23","volume-title":"Recent Advances in Information and Communication Technology 2015","author":"A Asadullah","year":"2015","unstructured":"Asadullah, A., Oyefolahan, I.O., Bawazir, M.A., Hosseini, S.E.: Factors Influencing users\u2019 willingness to use cloud computing services: an empirical Study. In: Unger, H., Meesad, P., Boonkrong, S. (eds.) Recent Advances in Information and Communication Technology 2015. AISC, vol. 361, pp. 227\u2013236. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19024-2_23"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Gopal, T.S., Meerolla, M., Jyostna, G., Eswari, P.R.L., Magesh, E.: Mitigating mirai malware spreading in IoT environment. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2226\u20132230. IEEE (2018)","DOI":"10.1109\/ICACCI.2018.8554643"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Mushtaq, S., Alandjani, G., Abbasi, S.F., Abosaq, N., Akram, A., Pervez, S.: Hybrid geo-location routing protocol for indoor and outdoor positioning applications. Int. J. Adv. Comput. Sci. Appl. 10(7) 2019","DOI":"10.14569\/IJACSA.2019.0100701"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Zahra, S.R., Chishti, M.A.: Ransomware and internet of things: a new security nightmare. In: 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 551\u2013555. IEEE (2019)","DOI":"10.1109\/CONFLUENCE.2019.8776926"},{"issue":"4","key":"17_CR27","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1049\/iet-cvi.2018.5069","volume":"13","author":"U Muhammad","year":"2019","unstructured":"Muhammad, U., Wang, W., Hadid, A., Pervez, S.: Bag of words KAZE (BoWK) with two-step classification for high-resolution remote sensing images. IET Comput. Vision 13(4), 395\u2013403 (2019)","journal-title":"IET Comput. Vision"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Naik, S., Maral, V.: Cyber security\u2014iot. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 764\u2013767. IEEE (2017)","DOI":"10.1109\/RTEICT.2017.8256700"},{"key":"17_CR29","unstructured":"Aslan, \u00d6.: \u201cPerformance comparison of static malware analysis tools versus antivirus scanners to detect malware,\u201d in International Multidisciplinary Studies Congress (IMSC) (2017)"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Ijaz, M., Durad, M.H., Ismail, M.: Static and dynamic malware analysis using machine learning. In: 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 687\u2013691. IEEE (2019)","DOI":"10.1109\/IBCAST.2019.8667136"},{"issue":"12","key":"17_CR31","first-page":"6057","volume":"12","author":"J Xue","year":"2018","unstructured":"Xue, J., Xu, C., Zhang, Y.: Private blockchain-based secure access control for smart home systems. KSII Trans. Internet Inform. Syst. (TIIS) 12(12), 6057\u20136078 (2018)","journal-title":"KSII Trans. Internet Inform. Syst. (TIIS)"},{"issue":"5","key":"17_CR32","first-page":"2965","volume":"16","author":"S Pervez","year":"2013","unstructured":"Pervez, S., Akram, A.: \u201cA temporally efficient and optimized solution for wireless mesh backbone device placement and antenna selection in wireless mesh networks\u201d, international information institute (Tokyo). Information 16(5), 2965 (2013)","journal-title":"Information"},{"issue":"10","key":"17_CR33","first-page":"78","volume":"3","author":"F Babar","year":"2016","unstructured":"Babar, F., Pervez, S., Muhammad, U.: Compromising health by excessive use of smart phones. Int. J. Eng. Works 3(10), 78\u201382 (2016)","journal-title":"Int. J. Eng. Works"},{"key":"17_CR34","unstructured":"Jha, A., Kropczynski, J., Lipford, H.R., Wisniewski, P.J.: An exploration on sharing smart home devices beyond the home. In: IUI Workshops (2019)"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops), pp. 618\u2013623. IEEE (2017)","DOI":"10.1109\/PERCOMW.2017.7917634"},{"issue":"8","key":"17_CR36","doi-asserted-by":"publisher","first-page":"2575","DOI":"10.3390\/s18082575","volume":"18","author":"A Panarello","year":"2018","unstructured":"Panarello, A., Tapas, N., Merlino, G., Longo, F., Puliafito, A.: Blockchain and IoT integration: a systematic survey. Sensors 18(8), 2575 (2018)","journal-title":"Sensors"},{"key":"17_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.05.002","volume":"52","author":"X Pan","year":"2020","unstructured":"Pan, X., Pan, X., Song, M., Ai, B., Ming, Y.: Blockchain technology and enterprise operational capabilities: an empirical test. Int. J. Inf. Manage. 52, 101946 (2020)","journal-title":"Int. J. Inf. Manage."},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Lawrenz, S., Sharma, P., Rausch, A.: Blockchain technology as an approach for data marketplaces. In: Proceedings of the 2019 International Conference on Blockchain Technology, pp. 55\u201359 (2019)","DOI":"10.1145\/3320154.3320165"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60994-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T23:10:27Z","timestamp":1716765027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60994-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031609930","9783031609947"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60994-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}