{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:37:58Z","timestamp":1762353478623},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:00:00Z","timestamp":1706140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:00:00Z","timestamp":1706140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-023-00808-6","type":"journal-article","created":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T19:02:43Z","timestamp":1706209363000},"page":"1649-1665","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BLISS: blockchain-based integrated security system for internet of things (IoT) applications"],"prefix":"10.1007","volume":"23","author":[{"given":"Lokendra","family":"Vishwakarma","sequence":"first","affiliation":[]},{"given":"Debasis","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,25]]},"reference":[{"key":"808_CR1","doi-asserted-by":"publisher","first-page":"11404","DOI":"10.1109\/ACCESS.2022.3146295","volume":"10","author":"A Ahmed","year":"2022","unstructured":"Ahmed, A., Abdullah, S., Bukhsh, M., Ahmad, I., Mushtaq, Z.: An energy-efficient data aggregation mechanism for IoT secured by blockchain. IEEE Access 10, 11404\u201311419 (2022)","journal-title":"IEEE Access"},{"key":"808_CR2","first-page":"45","volume":"16","author":"I Ali","year":"2019","unstructured":"Ali, I., Hassan, A., Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETS): a survey. Veh. Commun. 16, 45\u201361 (2019)","journal-title":"Veh. Commun."},{"key":"808_CR3","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.comcom.2021.02.002","volume":"170","author":"JA Alzubi","year":"2021","unstructured":"Alzubi, J.A.: Blockchain-based Lamport Merkle Digital signature: authentication tool in IoT healthcare. Comput. Commun. 170, 200\u2013208 (2021)","journal-title":"Comput. Commun."},{"key":"808_CR4","doi-asserted-by":"crossref","unstructured":"Avizheh, S., Nabi, M., Safavi-Naini, R., Venkateswarlu\u00a0K, M.: Verifiable computation using smart contracts. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 17\u201328, London United Kingdom (2019). ACM SIGSAC","DOI":"10.1145\/3338466.3358925"},{"key":"808_CR5","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.future.2021.02.006","volume":"119","author":"E Bandara","year":"2021","unstructured":"Bandara, E., Tosh, D., Foytik, P., Shetty, S., Ranasinghe, N., De Zoysa, K.: Tikiri-towards a lightweight blockchain for IoT. Futur. Gener. Comput. Syst. 119, 154\u2013165 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"808_CR6","doi-asserted-by":"publisher","first-page":"14914","DOI":"10.1109\/ACCESS.2022.3147795","volume":"10","author":"MR Bataineh","year":"2022","unstructured":"Bataineh, M.R., Mardini, W., Khamayseh, Y.M., Yasin, M.B.: Novel and secure blockchain framework for health applications in IoT. IEEE Access 10, 14914\u201314926 (2022)","journal-title":"IEEE Access"},{"issue":"7","key":"808_CR7","doi-asserted-by":"publisher","first-page":"5744","DOI":"10.1109\/JIOT.2020.3030308","volume":"8","author":"B Bera","year":"2021","unstructured":"Bera, B., Saha, S., Das, A.K., Vasilakos, A.V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet of Things J. 8(7), 5744\u20135761 (2021)","journal-title":"IEEE Internet of Things J."},{"key":"808_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108005","volume":"191","author":"S Brotsis","year":"2021","unstructured":"Brotsis, S., Limniotis, K., Bendiab, G., Kolokotronis, N., Shiaeles, S.: On the suitability of blockchain platforms for IoT applications: architectures, security, privacy, and performance. Comput. Netw. 191, 108005 (2021)","journal-title":"Comput. Netw."},{"issue":"1","key":"808_CR9","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/232335.232338","volume":"26","author":"T Coffey","year":"1996","unstructured":"Coffey, T., Saidha, P.: Non-repudiation with mandatory proof of receipt. ACM SIGCOMM Comput. Commun. Rev. 26(1), 6\u201317 (1996)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"808_CR10","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.comcom.2021.10.028","volume":"181","author":"E Corradini","year":"2022","unstructured":"Corradini, E., Nicolazzo, S., Nocera, A., Ursino, D., Virgili, L.: A two-tier blockchain framework to increase protection and autonomy of smart objects in the IoT. Comput. Commun. 181, 338\u2013356 (2022)","journal-title":"Comput. Commun."},{"issue":"2","key":"808_CR11","first-page":"241","volume":"13","author":"Z Cui","year":"2020","unstructured":"Cui, Z., Fei, X., Zhang, S., Cai, X., Cao, Y., Zhang, W., Chen, J.: A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans. Serv. Comput. 13(2), 241\u2013251 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"808_CR12","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","volume":"134","author":"A Dorri","year":"2019","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: A lightweight scalable blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 134, 180\u2013197 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"808_CR13","doi-asserted-by":"crossref","unstructured":"Fotiou, N., Pittaras, I., Siris, V.A., Polyzos, G.C.: Enabling opportunistic users in multi-tenant IoT systems using decentralized identifiers and permissioned blockchains. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 22\u201323, New York, NY, USA, (2019). Association for Computing Machinery","DOI":"10.1145\/3338507.3358622"},{"key":"808_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126\u2013142 (2018)","journal-title":"Comput. Secur."},{"key":"808_CR15","unstructured":"Higginbotham, S: The U.S. government finally gets serious about IoT security (2021). https:\/\/rb.gy\/jz0b50"},{"key":"808_CR16","unstructured":"IDC. Worldwide internet of things infrastructure forecast, 2021\u20132025 (2021). https:\/\/idc-cema.com\/dwn\/SF_177701\/driving_the_digital_agenda_requires_strategic_architecture_rosen_idc.pdf"},{"issue":"5","key":"808_CR17","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","volume":"12","author":"R Li","year":"2018","unstructured":"Li, R., Song, T., Mei, B., Li, H., Cheng, X., Sun, L.: Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput. 12(5), 762\u2013771 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"808_CR18","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.jnca.2018.10.019","volume":"125","author":"I Makhdoom","year":"2019","unstructured":"Makhdoom, I., Abolhasan, M., Abbas, H., Ni, W.: Blockchain\u2019s adoption in IoT: the challenges, and a way forward. J. Netw. Comput. Appl. 125, 251\u2013279 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"808_CR19","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 369\u2013378, Springer, Heidelberg (1987)","DOI":"10.1007\/3-540-48184-2_32"},{"key":"808_CR20","doi-asserted-by":"crossref","unstructured":"Michelin, R.A., Dorri, A., Steger, M., Lunardi, R.C., Kanhere, S.S., Jurdak, R., Zorzo, A.F.: Speedychain: a framework for decoupling data from blockchain for smart cities. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 145\u2013154, New York NY USA (2018). EAI","DOI":"10.1145\/3286978.3287019"},{"key":"808_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101883","volume":"113","author":"B Narwal","year":"2021","unstructured":"Narwal, B., Mohapatra, A.K.: A survey on security and authentication in wireless body area networks. J. Syst. Archit. 113, 101883 (2021)","journal-title":"J. Syst. Archit."},{"key":"808_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108234","volume":"196","author":"R Paul","year":"2021","unstructured":"Paul, R., Ghosh, N., Sau, S., Chakrabarti, A., Mohapatra, P.: Blockchain based secure smart city architecture using low resource IoTs. Comput. Netw. 196, 108234 (2021)","journal-title":"Comput. Netw."},{"issue":"3","key":"808_CR23","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TCSS.2020.2973710","volume":"7","author":"S Rasool","year":"2020","unstructured":"Rasool, S., Saleem, A., Iqbal, M., Dagiuklas, T., Mumtaz, S., ulQayyum, Z.: Docschain: blockchain-based IoT solution for verification of degree documents. IEEE Trans. Comput. Soc. Syst. 7(3), 827\u2013837 (2020)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"808_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta, J., Ruj, S., Bit, S.D.: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"808_CR25","doi-asserted-by":"crossref","unstructured":"Shafagh, H., Burkhalter, L., Hithnawi, A., Duquennoy, S.: Towards blockchain-based auditable storage and sharing of iot data. In: Proceedings of the 2017 on Cloud Computing Security Workshop, pp. 45\u201350, New York, NY, USA (2017). Association for Computing Machinery","DOI":"10.1145\/3140649.3140656"},{"issue":"1","key":"808_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-020-00068-0","volume":"4","author":"A Shafarenko","year":"2021","unstructured":"Shafarenko, A.: A pls blockchain for IoT applications: protocols and architecture. Cybersecurity 4(1), 1\u201317 (2021)","journal-title":"Cybersecurity"},{"issue":"5","key":"808_CR27","doi-asserted-by":"publisher","first-page":"7702","DOI":"10.1109\/JIOT.2019.2901840","volume":"6","author":"M Shen","year":"2019","unstructured":"Shen, M., Tang, X., Zhu, L., Xiaojiang, D., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 6(5), 7702\u20137712 (2019)","journal-title":"IEEE Internet Things J."},{"key":"808_CR28","doi-asserted-by":"publisher","DOI":"10.1145\/3409798","author":"Q Song","year":"2021","unstructured":"Song, Q., Chen, Y., Zhong, Y., Lan, K., Fong, S., Tang, R.: A supply-chain system framework based on internet of things using blockchain technology. ACM Trans. Internet Technol. (2021). https:\/\/doi.org\/10.1145\/3409798","journal-title":"ACM Trans. Internet Technol."},{"issue":"9","key":"808_CR29","doi-asserted-by":"publisher","first-page":"7727","DOI":"10.1109\/JIOT.2020.3040938","volume":"8","author":"J Srinivas","year":"2021","unstructured":"Srinivas, J., Das, A.K., Wazid, M., Vasilakos, A.V.: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. IEEE Internet Things J. 8(9), 7727\u20137744 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"808_CR30","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/TCSS.2019.2924442","volume":"6","author":"W Viriyasitavat","year":"2019","unstructured":"Viriyasitavat, W., Da Li, X., Bi, Z., Sapsomboon, A.: New blockchain-based architecture for service interoperations in internet of things. IEEE Trans. Comput. Soc. Syst. 6(4), 739\u2013748 (2019)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"808_CR31","doi-asserted-by":"crossref","unstructured":"Vishwakarma, L., Das, D.: Bss: Blockchain enabled security system for internet of things applications. In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), pp. 1\u20134, Cambridge, MA, USA, (2020). IEEE","DOI":"10.1109\/NCA51143.2020.9306694"},{"key":"808_CR32","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.comcom.2019.01.006","volume":"136","author":"X Wang","year":"2019","unstructured":"Wang, X., Zha, X., Ni, W., Liu, R.P., Guo, Y.J., Niu, X., Zheng, K.: Survey on blockchain for internet of things. Comput. Commun. 136, 10\u201329 (2019)","journal-title":"Comput. Commun."},{"key":"808_CR33","doi-asserted-by":"publisher","DOI":"10.1145\/3395331","author":"X Xu","year":"2021","unstructured":"Xu, X., Zhu, D., Yang, X., Wang, S., Qi, L., Dou, W.: Concurrent practical byzantine fault tolerance for integration of blockchain and supply chain. ACM Trans. Internet Technol. (2021). https:\/\/doi.org\/10.1145\/3395331","journal-title":"ACM Trans. Internet Technol."},{"issue":"3","key":"808_CR34","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1109\/JIOT.2021.3089334","volume":"9","author":"H Yang","year":"2022","unstructured":"Yang, H., Yuan, J., Li, C., Zhao, G., Sun, Z., Yao, Q., Bao, B., Vasilakos, A.V., Zhang, J.: Brainiot: brain-like productive services provisioning with federated learning in industrial IoT. IEEE Internet Things J. 9(3), 2014\u20132024 (2022)","journal-title":"IEEE Internet Things J."},{"key":"808_CR35","doi-asserted-by":"crossref","unstructured":"Yang, T., Zhang, G., Liu, L., Yang, Y., Zhao, S., Sun, H., Wang, W.: New features of authentication scheme for the IoT: a survey. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 44\u201349, New York, NY, USA, (2019). Association for Computing Machinery","DOI":"10.1145\/3338507.3358618"},{"key":"808_CR36","first-page":"85","volume":"16","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Luo, M., Li, J., Man Ho, A., Choo, K.-K.R., Chen, T., Tian, S.: Blockchain based secure data sharing system for internet of vehicles: a position paper. Veh. Commun. 16, 85\u201393 (2019)","journal-title":"Veh. Commun."},{"key":"808_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, M.,\u00a0Peng, B.,\u00a0Chen, Y.: An efficient image encryption scheme for industrial internet-of-things devices. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 38\u201343, New York, NY, USA, (2019). Association for Computing Machinery","DOI":"10.1145\/3338507.3358620"},{"key":"808_CR38","doi-asserted-by":"crossref","unstructured":"Zhou, B., Li, H.,\u00a0Xu, L.: An authentication scheme using identity-based encryption and blockchain. In: 2018 IEEE Symposium on Computers and Communications (ISCC), pp. 00556\u201300561, Natal, Brazil, 2018. IEEE","DOI":"10.1109\/ISCC.2018.8538446"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00808-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00808-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00808-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T02:03:39Z","timestamp":1716775419000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00808-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,25]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["808"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00808-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,25]]},"assertion":[{"value":"25 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests:"}},{"value":"This research was conducted in compliance with ethical standards. Data were handled in a responsible and ethical manner.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standards"}}]}}