{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T05:46:40Z","timestamp":1777355200037,"version":"3.51.4"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/most","name":"Ministry of Science and Technology, Taiwan (TW)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/most","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Science and Technology, Taiwan (TW)","award":["MOST 108-2218-E-011-021"],"award-info":[{"award-number":["MOST 108-2218-E-011-021"]}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2221-E-011-063"],"award-info":[{"award-number":["MOST 108-2221-E-011-063"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2221-E-011-065"],"award-info":[{"award-number":["MOST 108-2221-E-011-065"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10207-019-00467-6","type":"journal-article","created":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T08:02:57Z","timestamp":1568016177000},"page":"257-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["FOTB: a secure blockchain-based firmware update framework for IoT environment"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3816-1577","authenticated-orcid":false,"given":"Alexander","family":"Yohan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4622-4977","authenticated-orcid":false,"given":"Nai-Wei","family":"Lo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"467_CR1","unstructured":"Van der Meulen, R.: Gartner Says 8.4 Billion Connected \u201cThings\u201d Will Be in Use in 2017, Up 31 Percent From 2016. Gartner, Inc. \nhttps:\/\/www.gartner.com\/newsroom\/id\/3598917\n\n (2017). Accessed 15 Feb 2017"},{"key":"467_CR2","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions and open challenges. Future Gener. Comput. Syst. 82, 395\u2013411 (2018). \nhttps:\/\/doi.org\/10.1016\/j.future.2017.11.022","journal-title":"Future Gener. Comput. Syst."},{"key":"467_CR3","unstructured":"Miessler, D., Smith, C.: OWASP Internet of Things Project\u2014OWASP. \nhttps:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Project\n\n (2018). Accessed 10 Apr2018"},{"key":"467_CR4","unstructured":"Cui, A., Costello, M., Stolfo, S.J.: When firmware modifications attack: a case study of embedded exploitation. In: 20th Annual Network Distributed System Security Symposium. \nhttp:\/\/ids.cs.columbia.edu\/sites\/default\/files\/ndss-2013.pdf\n\n (2013)"},{"key":"467_CR5","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292\u20132303 (2016). \nhttps:\/\/doi.org\/10.1109\/ACCESS.2016.2566339","journal-title":"IEEE Access"},{"key":"467_CR6","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","volume":"41","author":"N Kshetri","year":"2017","unstructured":"Kshetri, N.: Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41, 1027\u20131038 (2017). \nhttps:\/\/doi.org\/10.1016\/j.telpol.2017.09.003","journal-title":"Telecommun. Policy"},{"key":"467_CR7","unstructured":"Ethereum: Introduction to Smart Contracts. \nhttp:\/\/solidity.readthedocs.io\/en\/latest\/introduction-to-smart-contracts.html\n\n (2016). Accessed 10 Apr 2018"},{"key":"467_CR8","doi-asserted-by":"publisher","unstructured":"Yohan, A., Lo, N.W.: An Over-the-blockchain firmware update framework for IoT devices. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138 (2018). \nhttps:\/\/doi.org\/10.1109\/DESEC.2018.8625164","DOI":"10.1109\/DESEC.2018.8625164"},{"key":"467_CR9","doi-asserted-by":"publisher","unstructured":"Prada-Delgado, M.A., Vazquez-Reyes, A., Baturone, I.: Trustworthy firmware update for Internet-of-Thing devices using physical unclonable functions. In: 2017 Global Internet of Things Summit (GIoTS), pp. 1\u20135 (2017). \nhttps:\/\/doi.org\/10.1109\/GIOTS.2017.8016282","DOI":"10.1109\/GIOTS.2017.8016282"},{"issue":"1","key":"467_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TCE.2016.7448561","volume":"62","author":"B Choi","year":"2016","unstructured":"Choi, B., Lee, S., Na, J., Lee, J.: Secure firmware validation and update for consumer devices in home networking. IEEE Trans. Consum. Electron. 62(1), 39\u201344 (2016). \nhttps:\/\/doi.org\/10.1109\/TCE.2016.7448561","journal-title":"IEEE Trans. Consum. Electron."},{"key":"467_CR11","unstructured":"Mayama, K., Tanaka, M., ando, Y., Yoshimi, T., Mizukawa, M.: Design of firmware update system of RT-middleware for embedded system. In: Proceedings of SICE Annual Conference 2010, pp. 2818\u20132822 (2010)"},{"key":"467_CR12","doi-asserted-by":"publisher","unstructured":"Jain, N., Mali, S.G., Kulkarni, S.: Infield firmware update: challenges and solutions. In: 2016 International Conference on Communication and Signal Processing (ICCSP), pp. 1232\u20131236 (2016). \nhttps:\/\/doi.org\/10.1109\/ICCSP.2016.7754349","DOI":"10.1109\/ICCSP.2016.7754349"},{"key":"467_CR13","doi-asserted-by":"publisher","unstructured":"Chandra, H., Anggadjaja, E., Wijaya, P.S., Gunawan, E.: Internet of Things: over-the-air (OTA) firmware update in lightweight mesh network protocol for smart urban development. In: 2016 22nd Asia-Pacific Conference on Communications (APCC), pp. 115\u2013118 (2016). \nhttps:\/\/doi.org\/10.1109\/APCC.2016.7581459","DOI":"10.1109\/APCC.2016.7581459"},{"key":"467_CR14","doi-asserted-by":"publisher","unstructured":"Jurkovic, G., Sruk, V.: Remote firmware update for constrained embedded systems. In: 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1019\u20131023 (2014). \nhttps:\/\/doi.org\/10.1109\/MIPRO.2014.6859718","DOI":"10.1109\/MIPRO.2014.6859718"},{"key":"467_CR15","doi-asserted-by":"publisher","unstructured":"Odat, H.A., Ganesan, S.: Firmware over the air for automotive, fotamotive. In: IEEE International Conference on Electro\/Information Technology, pp. 130\u2013139 (2014). \nhttps:\/\/doi.org\/10.1109\/EIT.2014.6871751","DOI":"10.1109\/EIT.2014.6871751"},{"key":"467_CR16","doi-asserted-by":"publisher","unstructured":"Katzir, L., Schwartzman, I.: Secure firmware updates for smart grid devices. In: 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, pp. 1\u20135 (2011). \nhttps:\/\/doi.org\/10.1109\/ISGTEurope.2011.6162728","DOI":"10.1109\/ISGTEurope.2011.6162728"},{"key":"467_CR17","doi-asserted-by":"publisher","unstructured":"Doddapaneni, K., Lakkundi, R., Rao, S., Kulkarni, S.G., Bhat, B.: Secure FoTA object for IoT. In: 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), pp. 154\u2013159 (2017). \nhttps:\/\/doi.org\/10.1109\/LCN.Workshops.2017.78","DOI":"10.1109\/LCN.Workshops.2017.78"},{"key":"467_CR18","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-319-60717-7_6","volume-title":"Quality, Reliability, Security and Robustness in Heterogeneous Networks QShine 2016","author":"B Lee","year":"2017","unstructured":"Lee, B., Malik, S., Wi, S., Lee, J.H.: Firmware verification of embedded devices based on a blockchain. In: Lee, J.H., Pack, S. (eds.) Quality, Reliability, Security and Robustness in Heterogeneous Networks QShine 2016, pp. 52\u201361. Springer, Cham (2017)"},{"key":"467_CR19","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","volume":"73","author":"B Lee","year":"2017","unstructured":"Lee, B., Lee, J.H.: Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. J. Supercomput. 73, 1152\u20131167 (2017). \nhttps:\/\/doi.org\/10.1007\/s11227-016-1870-0","journal-title":"J. Supercomput."},{"key":"467_CR20","doi-asserted-by":"publisher","unstructured":"Boudguiga, A., Bouzerna, N., Granboulan, L., Olivereau, A., Quesnel, F., Roger, A., Sirdey, R.: Towards better availability and accountability for IoT updates by means of a blockchain. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 50\u201358 (2017). \nhttps:\/\/doi.org\/10.1109\/EuroSPW.2017.50","DOI":"10.1109\/EuroSPW.2017.50"},{"key":"467_CR21","doi-asserted-by":"publisher","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Professional Computing. Springer, New York (2004). \nhttps:\/\/doi.org\/10.1007\/b97644","DOI":"10.1007\/b97644"},{"key":"467_CR22","unstructured":"Santoso, L.P.: Secure and Trusted Firmware Update Framework for IoT Environment (Master Thesis). National Taiwan University of Science and Technology (2019)"},{"key":"467_CR23","unstructured":"Dedis Group: Skipchain Implementation. \nhttps:\/\/github.com\/dedis\/cothority\/tree\/master\/skipchain\n\n (2018). Accessed 21 Jan 2019"},{"key":"467_CR24","unstructured":"Ford, B.: How Do You Know It\u2019s On the Blockchain? With a SkipChain. \nhttp:\/\/bford.info\/2017\/08\/01\/skipchain\/\n\n (2018). Accessed 21 Jan 2019"},{"key":"467_CR25","unstructured":"Brown, D.R.L.: SEC 1: Elliptic Curve Cryptography. \nhttp:\/\/www.secg.org\/sec1-v2.pdf\n\n (2009). Accessed 15 Feb 2017"},{"key":"467_CR26","doi-asserted-by":"publisher","unstructured":"Gupta, V., Gupta, S., Shantz, S.: Performance Analysis of Elliptic Curve Cryptography for SSL (2002). \nhttps:\/\/doi.org\/10.1145\/570681.570691","DOI":"10.1145\/570681.570691"},{"key":"467_CR27","doi-asserted-by":"publisher","unstructured":"Boneh, D., Lipton, R.J.: Algorithms for Black-Box Fields and their Application to Cryptography, pp. 283\u2013297. Springer, Berlin (1996). \nhttps:\/\/doi.org\/10.1007\/3-540-68697-5_22","DOI":"10.1007\/3-540-68697-5_22"},{"key":"467_CR28","doi-asserted-by":"publisher","unstructured":"Shoup, V.: Lower Bounds for Discrete Logarithms and Related Problems, Springer, Berlin, pp. 256\u2013266 (1997). \nhttps:\/\/doi.org\/10.1007\/3-540-69053-0_18","DOI":"10.1007\/3-540-69053-0_18"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00467-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-019-00467-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00467-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T23:22:40Z","timestamp":1599520960000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-019-00467-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["467"],"URL":"https:\/\/doi.org\/10.1007\/s10207-019-00467-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"9 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Alexander Yohan declares that he has no conflict of interest. Nai-Wei Lo declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}