{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:48:55Z","timestamp":1768423735983,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00962-5","type":"journal-article","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T16:14:00Z","timestamp":1734970440000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Brave-sdn: blockchain-reliant authentication for versatile east\u2013west bound in distributed SDNs"],"prefix":"10.1007","volume":"24","author":[{"given":"Mohamed","family":"Rahouti","sequence":"first","affiliation":[]},{"given":"Hamza","family":"Drid","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Hamouid","sequence":"additional","affiliation":[]},{"given":"Karima","family":"Massmi","sequence":"additional","affiliation":[]},{"given":"Sif Eddine","family":"Mehenna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,23]]},"reference":[{"issue":"139","key":"962_CR1","first-page":"739","volume":"9","author":"S Abbas","year":"2021","unstructured":"Abbas, S., Javaid, N., Almogren, A., Gulfam, S.M., Ahmed, A., Radwan, A.: Securing genetic algorithm enabled SDN routing for blockchain based internet of things. IEEE Access 9(139), 739\u2013754 (2021)","journal-title":"IEEE Access"},{"issue":"98","key":"962_CR2","first-page":"893","volume":"7","author":"Z Abou El Houda","year":"2019","unstructured":"Abou El Houda, Z., Hafid, A.S., Khoukhi, L.: Cochain-SC: An intra-and inter-domain DDOS mitigation scheme based on blockchain using SDN and smart contract. IEEE Access 7(98), 893\u2013907 (2019)","journal-title":"IEEE Access"},{"key":"962_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-020-09575-4","volume":"29","author":"S Ahmad","year":"2021","unstructured":"Ahmad, S., Mir, A.H.: Scalability, consistency, reliability and security in SDN controllers: a survey of diverse SDN controllers. J. Netw. Syst. Manag. 29, 1\u201359 (2021)","journal-title":"J. Netw. Syst. Manag."},{"key":"962_CR4","unstructured":"Ali, A., Rahouti, M., Latif, S., Kanhere, S., Singh, J., Janjua, U., Mian, AN., Qadir, J., Crowcroft, J.: et\u00a0al Blockchain and the future of the internet: A comprehensive review. arXiv preprint arXiv:1904.00733 (2019)"},{"key":"962_CR5","doi-asserted-by":"crossref","unstructured":"Ammann, M., Hirschi, L., Kremer, S.: Dy fuzzing: formal dolev-yao models meet cryptographic protocol fuzz testing. Cryptology ePrint Archive (2023)","DOI":"10.1109\/SP54263.2024.00096"},{"key":"962_CR6","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, DA., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, PH., H\u00e9am, PC., Kouchnarenko, O., Mantovani, J., M\u00f6dersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Vigan\u00f2, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification, https:\/\/api.semanticscholar.org\/CorpusID:15944266 (2005)","DOI":"10.1007\/11513988_27"},{"issue":"1","key":"962_CR7","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/COMST.2017.2782482","volume":"20","author":"F Bannour","year":"2017","unstructured":"Bannour, F., Souihi, S., Mellouk, A.: Distributed SDN control: survey, taxonomy, and challenges. IEEE Commun. Surv. Tutor. 20(1), 333\u2013354 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"962_CR8","doi-asserted-by":"crossref","unstructured":"Das, D., Banerjee, S., Dasgupta, K., Chatterjee, P., Ghosh, U., Biswas, U.: Blockchain enabled sdn framework for security management in 5g applications. In: Proceedings of the 24th International Conference on Distributed Computing and Networking, pp 414\u2013419 (2023)","DOI":"10.1145\/3571306.3571445"},{"issue":"108","key":"962_CR9","first-page":"802","volume":"206","author":"R Deb","year":"2022","unstructured":"Deb, R., Roy, S.: A comprehensive survey of vulnerability and information security in SDN. Comput. Netw. 206(108), 802 (2022)","journal-title":"Comput. Netw."},{"key":"962_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/9984666","volume":"2021","author":"A Derhab","year":"2021","unstructured":"Derhab, A., Guerroumi, M., Belaoued, M., Cheikhrouhou, O.: BMC-SDN: Blockchain-based multicontroller architecture for secure software-defined networks. Wirel. Commun. Mobile Comput. 2021, 1\u201312 (2021)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"962_CR11","doi-asserted-by":"crossref","unstructured":"Fan, W., Chang, SY., Kumar, S., Zhou, X., Park, Y.: Blockchain-based secure coordination for distributed sdn control plane. In: 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), IEEE, pp 253\u2013257 (2021)","DOI":"10.1109\/NetSoft51509.2021.9492615"},{"key":"962_CR12","doi-asserted-by":"crossref","unstructured":"Galindo, D.: Boneh-franklin identity based encryption revisited. In: Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005. Proceedings 32, Springer, pp 791\u2013802 (2005)","DOI":"10.1007\/11523468_64"},{"key":"962_CR13","doi-asserted-by":"crossref","unstructured":"Gao, Y., Chen, Y., Lin, H., Rodrigues, JJ.: Blockchain based secure iot data sharing framework for sdn-enabled smart communities. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp 514\u2013519 (2020)","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162725"},{"key":"962_CR14","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2002","author":"C Gentry","year":"2002","unstructured":"Gentry, C., Silverberg, A.: Hierarchical id-based cryptography. In: Zheng, Y. (ed.) Advances in Cryptology \u2013 ASIACRYPT 2002, pp. 548\u2013566. Springer, Heidelberg (2002)"},{"key":"962_CR15","doi-asserted-by":"crossref","unstructured":"Ghosh, U., Njilla, L., Shetty, S., Kamhoua, CA.: A decentralized smart grid communication framework using SDN-enabled blockchain. In: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), IEEE, pp 982\u2013985 (2024)","DOI":"10.1109\/CCNC51664.2024.10454835"},{"key":"962_CR16","doi-asserted-by":"crossref","unstructured":"Hakiri, A., Dezfouli, B.: Towards a blockchain-SDN architecture for secure and trustworthy 5g massive iot networks. In: Proceedings of the 2021 ACM international workshop on software defined networks & network function virtualization security, pp 11\u201318 (2021)","DOI":"10.1145\/3445968.3452090"},{"issue":"6","key":"962_CR17","doi-asserted-by":"publisher","first-page":"8716","DOI":"10.1109\/JSEN.2021.3052009","volume":"21","author":"S Hameed","year":"2021","unstructured":"Hameed, S., Shah, S.A., Saeed, Q.S., Siddiqui, S., Ali, I., Vedeshin, A., Draheim, D.: A scalable key and trust management solution for iot sensors using SDN and blockchain technology. IEEE Sens. J. 21(6), 8716\u20138733 (2021)","journal-title":"IEEE Sens. J."},{"key":"962_CR18","doi-asserted-by":"crossref","unstructured":"Hamouid, K., Adi, K.: Self-certified based trust establishment scheme in ad-hoc networks. In: 2012 5th International Conference on New Technologies, pp. 1\u20137. IEEE, Mobility and Security (NTMS) (2012)","DOI":"10.1109\/NTMS.2012.6208765"},{"issue":"1","key":"962_CR19","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1186\/s42400-023-00163-y","volume":"6","author":"Z Hussein","year":"2023","unstructured":"Hussein, Z., Salama, M.A., El-Rahman, S.A.: Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms. Cybersecurity 6(1), 30 (2023)","journal-title":"Cybersecurity"},{"key":"962_CR20","unstructured":"International Telecommunication Union (ITU) (2020) Itu-t-x.1365: Security methodology for the use of identity-based cryptography in support of internet of things (IoT) services over telecommunication networks. Tech. rep., https:\/\/www.document-center.com\/standards\/show\/ITU-T-X.1365"},{"issue":"5","key":"962_CR21","doi-asserted-by":"publisher","first-page":"3850","DOI":"10.1109\/JIOT.2021.3100797","volume":"9","author":"MJ Islam","year":"2021","unstructured":"Islam, M.J., Rahman, A., Kabir, S., Karim, M.R., Acharjee, U.K., Nasir, M.K., Band, S.S., Sookhak, M., Wu, S.: Blockchain-SDN-based energy-aware and distributed secure architecture for iot in smart cities. IEEE Internet Things J. 9(5), 3850\u20133864 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"962_CR22","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1016\/j.dcan.2023.01.016","volume":"9","author":"W Jiang","year":"2023","unstructured":"Jiang, W.: Software defined satellite networks: a survey. Digital Commun. Netw. 9(6), 1243\u20131264 (2023)","journal-title":"Digital Commun. Netw."},{"key":"962_CR23","unstructured":"Jiasi, W., Jian, W., Jia-Nan, L., Yue, Z.: Secure software-defined networking based on blockchain. arXiv preprint arXiv:1906.04342 (2019)"},{"key":"962_CR24","doi-asserted-by":"crossref","unstructured":"Karako\u00e7, E., \u00c7eken, C.: Secure sla management using smart contracts for sdn-enabled wsn. KSII Transactions on Internet & Information Systems 17(11) (2023)","DOI":"10.3837\/tiis.2023.11.006"},{"issue":"109","key":"962_CR25","first-page":"800","volume":"230","author":"T Kayathri","year":"2023","unstructured":"Kayathri, T., Kumaresan, N., Vijayabhasker, R.: Sdbgpchain: a decentralized low complexity framework to detect and prevent the bgpattacks using SDN with smart contract based dendrimer tree blockchain. Comput. Netw. 230(109), 800 (2023)","journal-title":"Comput. Netw."},{"key":"962_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2022.11.007","volume":"198","author":"M Khalid","year":"2023","unstructured":"Khalid, M., Hameed, S., Qadir, A., Shah, S.A., Draheim, D.: Towards SDN-based smart contract solution for iot access control. Comput. Commun. 198, 1\u201331 (2023)","journal-title":"Comput. Commun."},{"issue":"119","key":"962_CR27","first-page":"445","volume":"322","author":"M Kim","year":"2022","unstructured":"Kim, M., Lee, J., Oh, J., Park, K., Park, Y., Park, K.: Blockchain based energy trading scheme for vehicle-to-vehicle using decentralized identifiers. Appl. Energy 322(119), 445 (2022)","journal-title":"Appl. Energy"},{"key":"962_CR28","unstructured":"Mazzocca, C., Acar, A., Uluagac, S., Montanari, R., Bellavista, P., Conti, M.: A survey on decentralized identifiers and verifiable credentials. arXiv preprint arXiv:2402.02455 (2024)"},{"issue":"08","key":"962_CR29","first-page":"2330","volume":"20","author":"A Miah","year":"2023","unstructured":"Miah, A., Rahouti, M., Jagatheesaperumal, S.K., Ayyash, M., Xiong, K., Fernandez, F., Lekena, M.: Blockchain in financial services: current status, adoption challenges, and future vision. Int. J. Innov. Technol. Manag. 20(08), 2330 (2023)","journal-title":"Int. J. Innov. Technol. Manag."},{"key":"962_CR30","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"issue":"4","key":"962_CR31","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s10922-022-09682-4","volume":"30","author":"A Rahman","year":"2022","unstructured":"Rahman, A., Montieri, A., Kundu, D., Karim, M.R., Islam, M.J., Umme, S., Nascita, A., Pescap\u00e9, A.: On the integration of blockchain and SDN: overview, applications, and future perspectives. J. Netw. Syst. Manag. 30(4), 73 (2022)","journal-title":"J. Netw. Syst. Manag."},{"key":"962_CR32","doi-asserted-by":"crossref","unstructured":"Rahouti, M., Xiong, K., Xin, Y.: Secure software-defined networking communication systems for smart cities: current status, challenges, and trends. IEEE Access 9(12), 83\u2013113 (2020)","DOI":"10.1109\/ACCESS.2020.3047996"},{"issue":"45","key":"962_CR33","first-page":"820","volume":"10","author":"M Rahouti","year":"2022","unstructured":"Rahouti, M., Xiong, K., Xin, Y., Jagatheesaperumal, S.K., Ayyash, M., Shaheed, M.: SDN security review: threat taxonomy, implications, and open challenges. IEEE Access 10(45), 820\u2013854 (2022)","journal-title":"IEEE Access"},{"issue":"102","key":"962_CR34","first-page":"802","volume":"135","author":"S Siddiqui","year":"2023","unstructured":"Siddiqui, S., Hameed, S., Shah, S.A., Khan, A.K., Aneiba, A.: Smart contract-based security architecture for collaborative services in municipal smart cities. J. Syst. Archit. 135(102), 802 (2023)","journal-title":"J. Syst. Archit."},{"issue":"6","key":"962_CR35","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s11401-023-0053-6","volume":"44","author":"X Wang","year":"2023","unstructured":"Wang, X., Xu, G., Yu, Y.: Lattice-based cryptography: a survey. Chin. Ann. Math., Ser. B 44(6), 945\u2013960 (2023)","journal-title":"Chin. Ann. Math., Ser. B"},{"issue":"13s","key":"962_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579845","volume":"55","author":"J Xu","year":"2023","unstructured":"Xu, J., Wang, C., Jia, X.: A survey of blockchain consensus protocols. ACM Comput. Surv. 55(13s), 1\u201335 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"100","key":"962_CR37","first-page":"386","volume":"40","author":"B Yan","year":"2021","unstructured":"Yan, B., Liu, Q., Shen, J., Liang, D., Zhao, B., Ouyang, L.: A survey of low-latency transmission strategies in software defined networking. Comput. Sci. Rev. 40(100), 386 (2021)","journal-title":"Comput. Sci. Rev."},{"issue":"9","key":"962_CR38","doi-asserted-by":"publisher","first-page":"7967","DOI":"10.1109\/JIOT.2020.2993587","volume":"7","author":"B Yuan","year":"2020","unstructured":"Yuan, B., Lin, C., Zhao, H., Zou, D., Yang, L.T., Jin, H., Rong, C.: Secure data transportation with software-defined networking and KN secret sharing for high-confidence iot services. IEEE Internet Things J. 7(9), 7967\u20137981 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"103","key":"962_CR39","first-page":"678","volume":"80","author":"L Zhou","year":"2024","unstructured":"Zhou, L., Diro, A., Saini, A., Kaisar, S., Hiep, P.C.: Leveraging zero knowledge proofs for blockchain-based identity sharing: a survey of advancements, challenges and opportunities. J. Inf. Secur. Appl. 80(103), 678 (2024)","journal-title":"J. Inf. Secur. Appl."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00962-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00962-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00962-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:18:26Z","timestamp":1739337506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00962-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["962"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00962-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,23]]},"assertion":[{"value":"23 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"51"}}