{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:35:09Z","timestamp":1774161309833,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319943695","type":"print"},{"value":"9783319943701","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94370-1_1","type":"book-chapter","created":{"date-parts":[[2018,6,16]],"date-time":"2018-06-16T10:28:30Z","timestamp":1529144910000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A Blockchain-Based Decentralized Security Architecture for IoT"],"prefix":"10.1007","author":[{"given":"Pelin","family":"Angin","sequence":"first","affiliation":[]},{"given":"Melih Burak","family":"Mert","sequence":"additional","affiliation":[]},{"given":"Okan","family":"Mete","sequence":"additional","affiliation":[]},{"given":"Azer","family":"Ramazanli","sequence":"additional","affiliation":[]},{"given":"Kaan","family":"Sarica","sequence":"additional","affiliation":[]},{"given":"Bora","family":"Gungoren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,17]]},"reference":[{"key":"1_CR1","unstructured":"Barcelona: Barcelona ciutat digital. http:\/\/ajuntament.barcelona.cat\/digital\/ca. Accessed Mar 2018"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Capossele, A., Cervo, V., Cicco, G.D., Petrioli, C.: Security as a CoAP resource: an optimized DTLS implementation for the iot. In: IEEE ICC, pp. 549\u2013554 (2015)","DOI":"10.1109\/ICC.2015.7248379"},{"key":"1_CR3","unstructured":"European Commission: IDC and TXT solutions, smart 2013\/0037 cloud and iot combination, study for the european commission. http:\/\/www.telit2market.com\/wp-content\/uploads\/2015\/02\/TEL_14016_P_112-114.pdf. Accessed Mar 2018"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R.: Towards and optimized blockchain for IoT. In: 2nd ACM\/IEEE IoTDI, pp. 173\u2013178 (2017)","DOI":"10.1145\/3054977.3055003"},{"key":"1_CR5","unstructured":"Dyn: Dyn analysis summary of friday october 21 attack. https:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/. Accessed Mar 2018"},{"key":"1_CR6","unstructured":"Eastlake, D., Hansen, T.: US Secure Hash Algorithms. RFC 6234, RFC Editor, May 2011"},{"key":"1_CR7","unstructured":"Gartner: Gartner says 8.4 billion connected \u201cthings\u201d will be in use in 2017, up 31 percent from 2016. https:\/\/www.gartner.com\/newsroom\/id\/3598917. Accessed Apr 2018"},{"key":"1_CR8","unstructured":"Globe, B.: If the CIA can compromise our gadgets, can others do the same? https:\/\/www.bostonglobe.com\/business\/2017\/03\/08\/wikileaks-hits-cia-secrecy-software-spying\/EQdLVwseMu70HEYlZcowOO\/story.html. Accessed Mar 2018"},{"key":"1_CR9","unstructured":"Greenberg, A.: Hackers remotely kill a jeep on the highway with me in it. https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/. Accessed Mar 2018"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-319-26823-1_3","volume-title":"Cryptology and Network Security","author":"H Gross","year":"2015","unstructured":"Gross, H., H\u00f6lbl, M., Slamanig, D., Spreitzer, R.: Privacy-aware authentication in the internet of things. In: Reiter, M., Naccache, D. (eds.) CANS 2015. LNCS, vol. 9476, pp. 32\u201339. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26823-1_3"},{"key":"1_CR11","unstructured":"NIST Network Working Group: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280, RFC Editor, May 2008"},{"key":"1_CR12","unstructured":"Kelley, M.B.: The stuxnet attack on iran\u2019s nuclear plant was \u2019far more dangerous\u2019 than previously thought. http:\/\/www.businessinsider.com\/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11. Accessed Mar 2018"},{"key":"1_CR13","unstructured":"Laurence, T.: Blockchain for dummies. For Dummies (2017)"},{"key":"1_CR14","unstructured":"Modadugu, N., Rescorla, E.: The design and implementation of datagram TLS. In: Network and Distributed System Security Symposium (NDSS) (2004)"},{"key":"1_CR15","unstructured":"Moinet, A., Darties, B., Baril, J.L.: Blockchain based trust & authentication for decentralized sensor networks. CoRR abs\/1706.01730 (2017)"},{"key":"1_CR16","unstructured":"Qorvo: Sensara senior lifestyle. http:\/\/www.qorvo.com\/resources\/d\/qorvo-sensara-senior-lifestyle-white-paper. Accessed Mar 2018"},{"key":"1_CR17","unstructured":"Research, F.: A Mix of New and Existing Technologies Help Secure IoT Deployments. Technical report, Forrester Research (Q1 2017)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Skarmeta, A., et al.: A decentralized approach for security and privacy challenges in the internet of things. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 67\u201372 (2014)","DOI":"10.1109\/WF-IoT.2014.6803122"},{"key":"1_CR19","unstructured":"Road Traffic Technology: M42 active traffic management scheme, birmingham. http:\/\/www.roadtraffic-technology.com\/projects\/m42\/. Accessed Mar 2018"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Ukil, A., Bandyopadhyay, S., Pal, A.: Iot-privacy: to be private or not to be private. In: INFOCOM Computer Communications Workshops, pp. 123\u2013124 (2014)","DOI":"10.1109\/INFCOMW.2014.6849186"}],"container-title":["Lecture Notes in Computer Science","Internet of Things \u2013 ICIOT 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94370-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:22:46Z","timestamp":1709810566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94370-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319943695","9783319943701"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94370-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciot2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciot.org\/2018\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"www.confhub.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}