{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:07Z","timestamp":1761402067364,"version":"3.37.3"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["22A20130012814","2018R1D1A1A09082266"],"award-info":[{"award-number":["22A20130012814","2018R1D1A1A09082266"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["IITP-2019-2016-0-00313"],"award-info":[{"award-number":["IITP-2019-2016-0-00313"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s10586-019-03036-7","type":"journal-article","created":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T07:02:27Z","timestamp":1577862147000},"page":"2047-2065","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["The limitations in the state-of-the-art counter-measures against the security threats in H-IoT"],"prefix":"10.1007","volume":"23","author":[{"given":"Yazdan Ahmad","family":"Qadri","sequence":"first","affiliation":[]},{"given":"Rashid","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Arslan","family":"Musaddiq","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"Al-Turjman","sequence":"additional","affiliation":[]},{"given":"Dae Wan","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8454-6980","authenticated-orcid":false,"given":"Sung Won","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"3036_CR1","doi-asserted-by":"publisher","unstructured":"Alagar, V., Alsaig, A., Ormandjiva, O., Wan, K.: Context-based security and privacy for healthcare IoT. In: 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), Xi\u2019an, pp. 122\u2013128 (2018). https:\/\/doi.org\/10.1109\/SmartIoT.2018.00-14","DOI":"10.1109\/SmartIoT.2018.00-14"},{"key":"3036_CR2","doi-asserted-by":"publisher","unstructured":"Ramli, S.N., Ahmad, R.: Surveying the wireless body area network in the realm of wireless communication. In: 2011 7th International Conference Information Assurance and Security (IAS), Melaka, pp. 58\u201361 (2011). https:\/\/doi.org\/10.1109\/ISIAS.2011.6122845","DOI":"10.1109\/ISIAS.2011.6122845"},{"key":"3036_CR3","doi-asserted-by":"publisher","unstructured":"Suresh, P., Daniel, J.V., Parthasarathy, V., Aswathy, R.H.: A state of the art review on the Internet of Things (IoT) History, Technology and fields of deployment. In: 2014 International Conference on Science Engineering and Management (ICSEMR), Chennai, India, pp. 1\u20138 (2014). https:\/\/doi.org\/10.1109\/ICSEMR.2014.7043637","DOI":"10.1109\/ICSEMR.2014.7043637"},{"key":"3036_CR4","unstructured":"Qadri, Y.A., Musaddiq, A., Kim, D.W., Kim, S.W.: An overview of selective forwarding and wormhole attacks in healthcare IoT. In: Asia Pacific Conference on Information Communication Technology (APCICT-2018), Daegu, Korea (2018)"},{"key":"3036_CR5","doi-asserted-by":"publisher","unstructured":"Naik, M.R.K., Samundiswary, P.: Wireless body area network security issues-survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, India, pp. 190\u2013194 (2016). https:\/\/doi.org\/10.1109\/ICCICCT.2016.7987943","DOI":"10.1109\/ICCICCT.2016.7987943"},{"issue":"4","key":"3036_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2017","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 1\u201312 (2017). https:\/\/doi.org\/10.1109\/JSYST.2016.2544805","journal-title":"IEEE Syst. J."},{"key":"3036_CR7","doi-asserted-by":"publisher","unstructured":"Lin, Y.-J., Chen, H.-S., Su, M.-J.: A cloud based bluetooth low energy tracking system for dementia patients. In: 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), Hakodate, pp. 88\u201389 (2015). https:\/\/doi.org\/10.1109\/ICMU.2015.7061043","DOI":"10.1109\/ICMU.2015.7061043"},{"key":"3036_CR8","doi-asserted-by":"publisher","unstructured":"IEEE Standard for Low-Rate Wireless Networks. IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011), pp. 1\u2013709, (2016). https:\/\/doi.org\/10.1109\/IEEESTD.2016.7460875","DOI":"10.1109\/IEEESTD.2016.7460875"},{"issue":"1","key":"3036_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/02564602.2016.1242387","volume":"35","author":"R Ali","year":"2018","unstructured":"Ali, R., Kim, S.W., Kim, B., Park, Y.: Design of MAC layer resource allocation schemes for IEEE 802.11ax: future directions. IETE Tech. Rev. 35(1), 28\u201352 (2018). https:\/\/doi.org\/10.1080\/02564602.2016.1242387","journal-title":"IETE Tech. Rev."},{"issue":"11","key":"3036_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CC.2017.8233646","volume":"14","author":"S He","year":"2017","unstructured":"He, S., Cheng, B., Wang, H., Huang, Y., Chen, J.: Proactive personalized services through fog-cloud computing in large-scale iot-based healthcare application. China Commun. 14(11), 1\u201316 (2017). https:\/\/doi.org\/10.1109\/CC.2017.8233646","journal-title":"China Commun."},{"key":"3036_CR11","doi-asserted-by":"publisher","unstructured":"Ridhawi, I.A., Aloqaily, M., Kotb, Y., Jararweh, Y.: A profitable and energy-efficient cooperative fog solution for IoT services. In: IEEE Transactions on Industrial Informatics (Early Access) (2019). https:\/\/doi.org\/10.1109\/TII.2019.2922699","DOI":"10.1109\/TII.2019.2922699"},{"key":"3036_CR12","doi-asserted-by":"publisher","unstructured":"Buyukakkaslar, M.T., Erturk, M.A., Aydin, M.A., Vollero, L.: LoRaWAN as an e-health communication technology. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, pp. 310\u2013313 (2017). https:\/\/doi.org\/10.1109\/COMPSAC.2017.162","DOI":"10.1109\/COMPSAC.2017.162"},{"key":"3036_CR13","doi-asserted-by":"publisher","first-page":"35816","DOI":"10.1109\/ACCESS.2019.2903157","volume":"7","author":"A Lavric","year":"2019","unstructured":"Lavric, A., Petrariu, A.I., Popa, V.: Long range sigfox communication protocol scalability analysis under large-scale, high-density conditions. IEEE Access 7, 35816\u201335825 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2903157","journal-title":"IEEE Access"},{"key":"3036_CR14","doi-asserted-by":"publisher","unstructured":"Anand, S, Routray, S.K.: Issues and challenges in healthcare narrowband IoT. In: 2017 international conference on inventive communication and computational technologies (ICICCT), Coimbatore, pp. 486\u2013489 (2017). https:\/\/doi.org\/10.1109\/ICICCT.2017.7975247","DOI":"10.1109\/ICICCT.2017.7975247"},{"key":"3036_CR15","doi-asserted-by":"publisher","first-page":"26521","DOI":"10.1109\/ACCESS.2017.2775180","volume":"5","author":"SB Baker","year":"2017","unstructured":"Baker, S.B., Xiang, W., Atkinson, I.: Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5, 26521\u201326543 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2775180","journal-title":"IEEE Access"},{"key":"3036_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.comcom.2019.09.010","volume":"148","author":"S Zafar","year":"2019","unstructured":"Zafar, S., Jangsher, S., Bouachir, O., Aloqaily, M., Othman, J.B.: QoS enhancement with deep learning-based interference prediction in mobile IoT. Comput. Commun. 148, 86\u201397 (2019). https:\/\/doi.org\/10.1016\/j.comcom.2019.09.010","journal-title":"Comput. Commun."},{"issue":"12","key":"3036_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCAD.2018.2801227","volume":"37","author":"F Firouzi","year":"2018","unstructured":"Firouzi, F., Farahani, B., Ibrahim, M., Chakrabarty, K.: From EDA to IoT eHealth: promise, challenges, and solutions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(12), 1\u201316 (2018). https:\/\/doi.org\/10.1109\/TCAD.2018.2801227","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"3036_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.csi.2017.03.003","volume":"53","author":"M Faheem","year":"2017","unstructured":"Faheem, M., Gungor, V.C.: Capacity and spectrum-aware communication framework for wireless sensor network-based smart grid applications. Comput. Stand. Interfaces 53, 48\u201358 (2017). https:\/\/doi.org\/10.1016\/j.csi.2017.03.003","journal-title":"Comput. Stand. Interfaces"},{"key":"3036_CR19","doi-asserted-by":"publisher","unstructured":"Faheem, M., Butt, R.A, Raza, B, Ashraf, M.W, Begum, S, Ngadi, M.A, Gungor, V.C: Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0. In: Transactions on Emerging Telecommunications Technologies (2018). https:\/\/doi.org\/10.1002\/ett.3503","DOI":"10.1002\/ett.3503"},{"key":"3036_CR20","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1016\/j.asoc.2017.07.045","volume":"68","author":"M Faheem","year":"2018","unstructured":"Faheem, M., Gungor, V.C.: Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0. Appl. Soft Comput. 68, 910\u2013922 (2018). https:\/\/doi.org\/10.1016\/j.asoc.2017.07.045","journal-title":"Appl. Soft Comput."},{"key":"3036_CR21","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.jnca.2015.08.002","volume":"58","author":"M Faheem","year":"2015","unstructured":"Faheem, M., Abbas, M.Z., Tuna, G., Gungor, V.C.: EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks. J. Netw. Comput. Appl. 58, 309\u2013326 (2015). https:\/\/doi.org\/10.1016\/j.jnca.2015.08.002","journal-title":"J. Netw. Comput. Appl."},{"key":"3036_CR22","doi-asserted-by":"publisher","DOI":"10.1201\/9780429243707","volume-title":"Internet of Nano-Things and Wireless Body Area Networks (WBAN)","author":"F Al-Turjman","year":"2019","unstructured":"Al-Turjman, F., Ever, E., Zahmatkesh, H.: Internet of nano-things (IoNT) & WBAN. In: Al-Turjman, F. (ed.) Internet of Nano-Things and Wireless Body Area Networks (WBAN). CRC Press, Baco Raton (2019)"},{"key":"3036_CR23","volume-title":"Internet of Nano-Things and Wireless Body Area Networks (WBAN)","author":"SD Topel","year":"2019","unstructured":"Topel, S.D., Al-Turjman, F.: Nanosensors for the internet of nano-things (IoNT): an overview. In: Al-Turjman, F. (ed.) Internet of Nano-Things and Wireless Body Area Networks (WBAN). CRC Press, Boca Raton (2019)"},{"key":"3036_CR24","doi-asserted-by":"publisher","unstructured":"Balasubramanian, V., Zaman, F., Aloqaily, M., Ridhawi, I.A., Jararweh, Y., Salameh, H.B.: A mobility management architecture for seamless delivery of 5G-IoT services. In: 2019 IEEE International Conference on Communications (ICC 2019), Shanghai, China, pp. 1\u20137 (2019). https:\/\/doi.org\/10.1109\/ICC.2019.8761658","DOI":"10.1109\/ICC.2019.8761658"},{"issue":"6","key":"3036_CR25","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1109\/JIOT.2017.2749883","volume":"4","author":"I Tomi\u0107","year":"2017","unstructured":"Tomi\u0107, I., McCann, J.A.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 4(6), 1910\u20131923 (2017). https:\/\/doi.org\/10.1109\/JIOT.2017.2749883","journal-title":"IEEE Internet Things J."},{"key":"3036_CR26","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/ijwgs.2018.10016848","volume":"14","author":"Z Zheng","year":"2016","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14, 352\u2013375 (2016). https:\/\/doi.org\/10.1504\/ijwgs.2018.10016848","journal-title":"Int. J. Web Grid Serv."},{"issue":"2","key":"3036_CR27","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2), 326 (2019). https:\/\/doi.org\/10.3390\/s19020326","journal-title":"Sensors"},{"key":"3036_CR28","doi-asserted-by":"publisher","first-page":"10127","DOI":"10.1109\/ACCESS.2018.2890507","volume":"7","author":"K Salah","year":"2019","unstructured":"Salah, K., Rehman, M.H.U., Nizamuddin, N., Al-Fuqaha, A.: Blockchain for AI: review and open research challenges. IEEE Access 7, 10127\u201310149 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2018.2890507","journal-title":"IEEE Access"},{"key":"3036_CR29","doi-asserted-by":"publisher","unstructured":"Salleh, A., Mamat, K., Darus, M.Y.: Integration of wireless sensor network and web of things: security perspective. In: 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, pp. 138\u2013143 (2017). https:\/\/doi.org\/10.1109\/ICSGRC.2017.8070583","DOI":"10.1109\/ICSGRC.2017.8070583"},{"key":"3036_CR30","unstructured":"Goyal, S., Bhatia, T., Verma, A.K.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 1463\u20131468 (2015)"},{"key":"3036_CR31","doi-asserted-by":"publisher","unstructured":"Prabhakar, A., Anjali, T.: Mitigating selective Gray Hole Attack in wireless multi-hop network. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, pp. 1223\u20131227 (2017). https:\/\/doi.org\/10.1109\/WiSPNET.2017.8299958","DOI":"10.1109\/WiSPNET.2017.8299958"},{"issue":"2","key":"3036_CR32","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TWC.2009.070536","volume":"8","author":"M Khabbazian","year":"2009","unstructured":"Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wireless Commun. 8(2), 736\u2013745 (2009). https:\/\/doi.org\/10.1109\/TWC.2009.070536","journal-title":"IEEE Trans. Wireless Commun."},{"key":"3036_CR33","doi-asserted-by":"publisher","unstructured":"Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium (IPDPS), Rhodes Island, Greece (2006). https:\/\/doi.org\/10.1109\/IPDPS.2006.1639675","DOI":"10.1109\/IPDPS.2006.1639675"},{"issue":"12","key":"3036_CR34","doi-asserted-by":"publisher","first-page":"30942","DOI":"10.3390\/s151229835","volume":"15","author":"A Liu","year":"2015","unstructured":"Liu, A., Dong, M., Ota, K., Long, J.: PHACK: an efficient scheme for selective forwarding attack detection in WSNs. Sensors 15(12), 30942\u201330963 (2015). https:\/\/doi.org\/10.3390\/s151229835","journal-title":"Sensors"},{"key":"3036_CR35","doi-asserted-by":"publisher","unstructured":"Mathur, A., Newe, T., Rao, M.: Healthcare WSN: cluster elections and selective forwarding defense. In: NGMAST 9th International Conference on Next Generation Mobile Applications, Services and Technologies, Cambridge, UK, pp. 341\u2013346 (2015). https:\/\/doi.org\/10.1109\/NGMAST.2015.14","DOI":"10.1109\/NGMAST.2015.14"},{"issue":"5","key":"3036_CR36","doi-asserted-by":"publisher","first-page":"3718","DOI":"10.1109\/TWC.2016.2526601","volume":"15","author":"J Ren","year":"2016","unstructured":"Ren, J., Zhang, Y., Zhang, K., Shen, X.: Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans. Wireless Commun. 15(5), 3718\u20133731 (2016). https:\/\/doi.org\/10.1109\/TWC.2016.2526601","journal-title":"IEEE Trans. Wireless Commun."},{"key":"3036_CR37","doi-asserted-by":"publisher","unstructured":"Gara, F., Saad, L.B., Ayed, R.B.: An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, pp. 276\u2013281 (2017). https:\/\/doi.org\/10.1109\/IWCMC.2017.7986299","DOI":"10.1109\/IWCMC.2017.7986299"},{"key":"3036_CR38","doi-asserted-by":"publisher","unstructured":"Ioannou, C., Vassiliou, V., Sergiou, C.: An intrusion detection system for wireless sensor networks. In: 2017 24th International Conference on Telecommunications (ICT), Limassol, Cyprus, pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/ICT.2017.7998271","DOI":"10.1109\/ICT.2017.7998271"},{"issue":"6","key":"3036_CR39","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1007\/s11276-016-1251-x","volume":"23","author":"A Dorri","year":"2017","unstructured":"Dorri, A.: An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Springer Wirel. Netw. 23(6), 1767\u20131778 (2017). https:\/\/doi.org\/10.1007\/s11276-016-1251-x","journal-title":"Springer Wirel. Netw."},{"issue":"1","key":"3036_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2016.2535730","volume":"12","author":"C Pu","year":"2018","unstructured":"Pu, C., Lim, S.: A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation. IEEE Syst. J. 12(1), 1\u20139 (2018). https:\/\/doi.org\/10.1109\/JSYST.2016.2535730","journal-title":"IEEE Syst. J."},{"key":"3036_CR41","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1007\/s10586-017-1622-9","volume":"22","author":"DC Mehetre","year":"2018","unstructured":"Mehetre, D.C., Roslin, S.E., Wagh, S.J.: Detection and prevention of black hole and selective forwarding attack in clustered wsn with active trust. Clust. Comput. 22, 1313\u20131328 (2018). https:\/\/doi.org\/10.1007\/s10586-017-1622-9","journal-title":"Clust. Comput."},{"key":"3036_CR42","unstructured":"Modirkhazeni, A., Aghamahamoodi, S., Modirkhazeni, A., Niknejad, N.: Distributed approach to mitigate wormhole attack in wireless sensor network. In: 7th International Conference on Networked Computing, Gyeongsanbuk-do, Korea, pp. 122\u2013128 v"},{"issue":"2","key":"3036_CR43","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.jnca.2012.12.019","volume":"36","author":"S Qazi","year":"2013","unstructured":"Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multi-rate ad hoc networks. J. Netw. Comput. Appl. 36(2), 582\u2013592 (2013). https:\/\/doi.org\/10.1016\/j.jnca.2012.12.019","journal-title":"J. Netw. Comput. Appl."},{"key":"3036_CR44","doi-asserted-by":"publisher","unstructured":"Bendjima, M., Feham, M.: Wormhole attack detection in wireless sensor networks. In: 2016 SAI Computing Conference (SAI), London, UK, pp. 1319\u20131326 (2016). https:\/\/doi.org\/10.1109\/SAI.2016.7556151","DOI":"10.1109\/SAI.2016.7556151"},{"key":"3036_CR45","doi-asserted-by":"publisher","unstructured":"Sharma, M.K., Joshi, B.K.: A mitigation technique for high transmission power based wormhole attack in wireless sensor networks. In: 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, India, pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/ICTBIG.2016.7892698","DOI":"10.1109\/ICTBIG.2016.7892698"},{"key":"3036_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/8354930","volume":"2016","author":"R Singh","year":"2016","unstructured":"Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. J. Mob. Inf. Syst. 2016, 1\u201313 (2016). https:\/\/doi.org\/10.1155\/2016\/8354930","journal-title":"J. Mob. Inf. Syst."},{"key":"3036_CR47","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.procs.2016.03.092","volume":"79","author":"A Parmar","year":"2016","unstructured":"Parmar, A., Vaghelab, V.B.: Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Comput. Sci. 79, 700\u2013707 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.03.092","journal-title":"Procedia Comput. Sci."},{"key":"3036_CR48","doi-asserted-by":"publisher","unstructured":"Shukla, P.: ML-IDS: A machine learning approach to detect Wormhole attacks in Internet of Things. In: 2017 Intelligent Systems Conference (IntelliSys), London, pp. 234\u2013240 (2017). https:\/\/doi.org\/10.1109\/IntelliSys.2017.8324298","DOI":"10.1109\/IntelliSys.2017.8324298"},{"key":"3036_CR49","doi-asserted-by":"publisher","unstructured":"Ahsan, M.S., Bhutta, M.N.M., Maqsood, M.: Wormhole attack detection in routing protocol for low power lossy networks. In: 2017 International Conference on Information and Communication Technologies (ICICT), Karachi, pp. 58\u201367 (2017). https:\/\/doi.org\/10.1109\/ICICT.2017.8320165","DOI":"10.1109\/ICICT.2017.8320165"},{"key":"3036_CR50","doi-asserted-by":"publisher","unstructured":"Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Mammeri, A.: Graph-based wormhole attack detection in mobile ad hoc networks (MANETs). In: 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ), Florida, USA, pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/MOBISECSERV.2018.8311439","DOI":"10.1109\/MOBISECSERV.2018.8311439"},{"issue":"8","key":"3036_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19081793","volume":"19","author":"YB Zikria","year":"2019","unstructured":"Zikria, Y.B., Kim, S.W., Hahm, O., Afzal, M.K., Aalsalem, M.Y.: Internet of Things (IoT) operating systems management: opportunities, challenges, and solution. Sensors 19(8), 1\u201310 (2019). https:\/\/doi.org\/10.3390\/s19081793","journal-title":"Sensors"},{"key":"3036_CR52","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","volume":"88","author":"A Reyna","year":"2018","unstructured":"Reyna, A., Mart\u00edn, C., Chen, J., Soler, E., D\u00edaz, M.: On blockchain and its integration with IoT: challenges and opportunities. Future Gener. Comput. Syst. 88, 173\u2013190 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.05.046","journal-title":"Future Gener. Comput. Syst."},{"key":"3036_CR53","doi-asserted-by":"publisher","unstructured":"Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp. 464\u2013467 (2017). https:\/\/doi.org\/10.23919\/ICACT.2017.7890132","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"3036_CR54","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45\u201358 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2018.10.020","journal-title":"J. Netw. Comput. Appl."},{"key":"3036_CR55","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies, 1st edn. O\u2019Reilly Media, Inc., Newton (2014). ISBN:1449374042 9781449374044","edition":"1"},{"key":"3036_CR56","doi-asserted-by":"publisher","unstructured":"Virmani, C., Gupta, D.J., Choudhary, T.: Blockchain 2.0: an edge over technologies. In: Architectures and Frameworks for Developing and Applying Blockchain Technology. IGI Global, Pennsylvania (2019). https:\/\/doi.org\/10.4018\/978-1-5225-9257-0.ch009","DOI":"10.4018\/978-1-5225-9257-0.ch009"},{"key":"3036_CR57","doi-asserted-by":"publisher","first-page":"117134","DOI":"10.1109\/ACCESS.2019.2936094","volume":"7","author":"AA Monrat","year":"2019","unstructured":"Monrat, A.A., Schel\u00e9n, O., Andersson, K.: A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7, 117134\u2013117151 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2936094","journal-title":"IEEE Access"},{"key":"3036_CR58","doi-asserted-by":"publisher","unstructured":"Otte, P., Vos, N.D., Pouwelse, J: TrustChain: A Sybil-resistant scalable blockchain. Future Gener. Comput. Syst. (2017). https:\/\/doi.org\/10.1016\/j.future.2017.08.048","DOI":"10.1016\/j.future.2017.08.048"},{"key":"3036_CR59","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: 1st International Workshop on Peer-To-Peer Systems (IPTPS), Berlin, pp. 251\u2013260 (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"9","key":"3036_CR60","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.3390\/app9091788","volume":"9","author":"S Sayeed","year":"2019","unstructured":"Sayeed, S., Marco-Gisbert, H.: Assessing blockchain consensus and security mechanisms against the 51% attack. Appl. Sci. 9(9), 1788 (2019). https:\/\/doi.org\/10.3390\/app9091788","journal-title":"Appl. Sci."},{"key":"3036_CR61","doi-asserted-by":"publisher","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2019.02.001","journal-title":"Ad Hoc Netw."},{"key":"3036_CR62","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.compeleceng.2019.03.013","volume":"76","author":"F Al-Turjman","year":"2019","unstructured":"Al-Turjman, F., Din, S., Paul, A.: Energy monitoring in IoT-based ad hoc networks: an overview. Comput. Electr. Eng. 76, 133\u2013142 (2019). https:\/\/doi.org\/10.1016\/j.compeleceng.2019.03.013","journal-title":"Comput. Electr. Eng."},{"key":"3036_CR63","volume-title":"Internet of Nano-Things and Wireless Body Area Networks (WBAN)","author":"SM Demir","year":"2019","unstructured":"Demir, S.M., Al-Turjman, F., Muhtaroglu, A.: Energy-harvesting methods for WBAN applications. In: Al-Turjman, F. (ed.) Internet of Nano-Things and Wireless Body Area Networks (WBAN). CRC Press, Boca Raton (2019)"},{"key":"3036_CR64","doi-asserted-by":"crossref","unstructured":"Balasubramanian, V., Zaman, F., Aloqaily, M., Alrabaee, S., Gorlatova, M., Reisslein, M.: Reinforcing the edge: autonomous energy management for mobile device clouds. In: IEEE International Conference on Computer Communications, Paris, France (2019)","DOI":"10.1109\/INFCOMW.2019.8845263"},{"key":"3036_CR65","doi-asserted-by":"publisher","unstructured":"Al-Turjman, F., Zahmatkesh, H., Mostarda, L.: Quantifying uncertainty in internet of medical things and big-data services using intelligence and deep learning. In: IEEE Access (Early Access). https:\/\/doi.org\/10.1109\/ACCESS.2019.2931637","DOI":"10.1109\/ACCESS.2019.2931637"},{"key":"3036_CR66","doi-asserted-by":"publisher","unstructured":"Balasubramaniam, V., Aloqaily, M., Zaman, F., Jararweh, Y.: Exploring computing at the edge: a multi-interface system architecture enabled mobile device cloud. In: 2018 IEEE 7th International Conference on Cloud Networking (CloudNet),Tokyo, Japan (2018). https:\/\/doi.org\/10.1109\/CloudNet.2018.8549296","DOI":"10.1109\/CloudNet.2018.8549296"},{"key":"3036_CR67","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2019.1800376","volume":"33","author":"Y Dai","year":"2019","unstructured":"Dai, Y., Xu, D., Maharjan, S., Chen, Z., He, Q., Zhang, Y.: Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Netw. 33, 10\u201317 (2019). https:\/\/doi.org\/10.1109\/MNET.2019.1800376","journal-title":"IEEE Netw."},{"key":"3036_CR68","doi-asserted-by":"publisher","first-page":"3165","DOI":"10.3390\/s19143165","volume":"19","author":"G Rathee","year":"2019","unstructured":"Rathee, G., Sharma, A., Iqbal, R., Aloqaily, M., Jaglan, N., Kumar, R.: A blockchain framework for securing connected and autonomous vehicles. Sensors 19, 3165 (2019). https:\/\/doi.org\/10.3390\/s19143165","journal-title":"Sensors"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-019-03036-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-019-03036-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-019-03036-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,31]],"date-time":"2020-12-31T00:45:58Z","timestamp":1609375558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-019-03036-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["3036"],"URL":"https:\/\/doi.org\/10.1007\/s10586-019-03036-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2020,1,1]]},"assertion":[{"value":"8 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}