{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:38:46Z","timestamp":1775421526749,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s10586-020-03058-6","type":"journal-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T13:03:03Z","timestamp":1581339783000},"page":"2067-2087","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":233,"title":["A decentralized lightweight blockchain-based authentication mechanism for IoT systems"],"prefix":"10.1007","volume":"23","author":[{"given":"Umair","family":"Khalid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2894-7891","authenticated-orcid":false,"given":"Muhammad","family":"Asim","sequence":"additional","affiliation":[]},{"given":"Thar","family":"Baker","sequence":"additional","affiliation":[]},{"given":"Patrick C. K.","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Muhammad Adnan","family":"Tariq","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Rafferty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,10]]},"reference":[{"key":"3058_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.jnca.2017.03.008","volume":"89","author":"T Baker","year":"2017","unstructured":"Baker, T., Asim, M., Tawfik, H., Aldawsari, B., Buyya, R.: An energy-aware service composition algorithm for multiple cloud-based IoT applications. J. Netw. Comput. Appl. 89, 96\u2013108 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"3058_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/jsan8010016","volume":"8","author":"N Abbas","year":"2019","unstructured":"Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for securing IoT-enabled applications at the fog layer. J. Sens. Actuator Netw. 8, 16 (2019)","journal-title":"J. Sens. Actuator Netw."},{"key":"3058_CR3","first-page":"1","volume":"7","author":"B Hammi","year":"2017","unstructured":"Hammi, B., Khatoun, R., Zeadally, S., Fayad, A., Khoukhi, L.: IoT technologies for smart cities. IET Netw. 7, 1\u201313 (2017)","journal-title":"IET Netw."},{"key":"3058_CR4","unstructured":"By, Gartner Says, 2020, More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things. Publicado em Janeiro (2016)"},{"key":"3058_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MITP.2018.2876977","volume":"20","author":"AA Alkheir","year":"2018","unstructured":"Alkheir, A.A., Aloqaily, M., Mouftah, H.T.: Connected and autonomous electric vehicles (caevs). IT Prof. 20, 54\u201361 (2018)","journal-title":"IT Prof."},{"key":"3058_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MWC.001.1900151","volume":"26","author":"A Ahmad","year":"2019","unstructured":"Ahmad, A., Din, S., Paul, A., Jeon, G., Aloqaily, M., Ahmad, M.: Real-time route planning and data dissemination for urban scenarios using the Internet of Things. IEEE Wirel. Commun. 26, 50\u201355 (2019)","journal-title":"IEEE Wirel. Commun."},{"key":"3058_CR7","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58, 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"3058_CR8","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.future.2017.04.031","volume":"78","author":"S Tonyali","year":"2018","unstructured":"Tonyali, S., Akkaya, K., Saputro, N., Uluagac, A.S., Nojoumian, M.: Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems. Future Gener. Comput. Syst. 78, 547\u2013557 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3058_CR9","doi-asserted-by":"crossref","unstructured":"Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), pp. 321\u2013326 (2016)","DOI":"10.1109\/ICED.2016.7804660"},{"key":"3058_CR10","doi-asserted-by":"crossref","unstructured":"Liu, B., Yu, X.L., Chen, S., Xu, X., Zhu, L.: Blockchain based data integrity service framework for IoT data, Liming. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 468\u2013475 (2017)","DOI":"10.1109\/ICWS.2017.54"},{"key":"3058_CR11","doi-asserted-by":"crossref","unstructured":"Anirudh, M., Thileeban, S.A., Nallathambi, D.J.: Use of honeypots for mitigating DoS attacks targeted on IoT networks. In: 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), pp. 1\u20134 (2017)","DOI":"10.1109\/ICCCSP.2017.7944057"},{"key":"3058_CR12","doi-asserted-by":"publisher","first-page":"3677","DOI":"10.1109\/JSEN.2013.2262271","volume":"13","author":"F Li","year":"2013","unstructured":"Li, F., Xiong, P.: Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J. 13, 3677\u20133684 (2013)","journal-title":"IEEE Sens. J."},{"key":"3058_CR13","doi-asserted-by":"publisher","first-page":"3679","DOI":"10.1109\/TII.2018.2791944","volume":"14","author":"K Muhammad","year":"2018","unstructured":"Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H., Baik, S.W.: Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans. Ind. Inform. 14, 3679\u20133689 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"3058_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126\u2013142 (2018)","journal-title":"Comput. Secur."},{"key":"3058_CR15","doi-asserted-by":"crossref","unstructured":"Won, J., Seo, S.-H., Bertino, E.: A secure communication protocol for drones and smart objects. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 249\u2013260 (2015)","DOI":"10.1145\/2714576.2714616"},{"key":"3058_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MCOM.2019.1800624","volume":"57","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Al Ridhawi, I., Salameh, H.B., Jararweh, Y.: Data and service management in densely crowded environments: challenges, opportunities, and recent developments. IEEE Commun. Mag. 57, 81\u201387 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"3058_CR17","doi-asserted-by":"crossref","unstructured":"Baker, T., Asim, M., MacDermott, A., Iqbal, F., Kamoun, F., Shah, B., Alfandi, O., Hammoudeh, M.: A secure fog-based platform for SCADA-based IoT critical infrastructure. Software: Practice and Experience (2019)","DOI":"10.1002\/spe.2688"},{"key":"3058_CR18","doi-asserted-by":"publisher","first-page":"3165","DOI":"10.3390\/s19143165","volume":"14","author":"G Rathee","year":"2019","unstructured":"Rathee, G., Sharma, A., Iqbal, R., Aloqaily, M., Jaglan, N., Kumar, R.: A blockchain framework for securing connected and autonomous vehicles. Sensors 14, 3165 (2019)","journal-title":"Sensors"},{"key":"3058_CR19","doi-asserted-by":"crossref","unstructured":"Al Ridhawi, I., Aloqaily, M., Kotb, Y., Jararweh, Y., Baker, T.: A profitable and energy-efficient cooperative fog solution for IoT services. IEEE Trans. Ind. Inform. (2019)","DOI":"10.1109\/TII.2019.2922699"},{"key":"3058_CR20","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.3390\/s19081788","volume":"19","author":"N Tariq","year":"2019","unstructured":"Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., Ghafir, I.: The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors 19, 1788 (2019)","journal-title":"Sensors"},{"key":"3058_CR21","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"key":"3058_CR22","doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336\u2013341 (2015)","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"3058_CR23","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/JIOT.2017.2703088","volume":"4","author":"MN Aman","year":"2017","unstructured":"Aman, M.N., Chua, K.C., Sikdar, B.: Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J. 4, 1327\u20131340 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3058_CR24","doi-asserted-by":"crossref","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 956\u2013963 (2012)","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"3058_CR25","doi-asserted-by":"crossref","unstructured":"Jan, M.A., Nanda, P., He, X., Tan, Z., Liu, R.P.: A robust authentication scheme for observing resources in the internet of things environment. In: 2014 IEEE 13th International Conference on Trust. Security and Privacy in Computing and Communications, pp. 205\u2013211 (2014)","DOI":"10.1109\/TrustCom.2014.31"},{"key":"3058_CR26","doi-asserted-by":"crossref","unstructured":"Lau, C.H., Alan, K.-H.Y., Yan, F.: Blockchain-Based Authentication in IoT Networks. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138 (2018)","DOI":"10.1109\/DESEC.2018.8625141"},{"key":"3058_CR27","doi-asserted-by":"crossref","unstructured":"Li, D., Peng, W., Deng, W., Gai, F.: A Blockchain-Based Authentication and Security Mechanism for IoT. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20136 (2018)","DOI":"10.1109\/ICCCN.2018.8487449"},{"key":"3058_CR28","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","volume":"41","author":"N Kshetri","year":"2017","unstructured":"Kshetri, N.: Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41, 1027\u20131038 (2017)","journal-title":"Telecommun. Policy"},{"key":"3058_CR29","doi-asserted-by":"publisher","first-page":"6835","DOI":"10.1109\/JIOT.2019.2911969","volume":"6","author":"G Kumar","year":"2019","unstructured":"Kumar, G., Saha, R., Rai, M.K., Thomas, R., Kim, T.-H.: Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE Internet Things J. 6, 6835\u20136842 (2019)","journal-title":"IEEE Internet Things J."},{"key":"3058_CR30","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/LWC.2018.2864758","volume":"8","author":"J Kang","year":"2018","unstructured":"Kang, J., Xiong, Z., Niyato, D., Wang, P., Ye, D., Kim, D.I.: Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks. IEEE Wirel. Commun. Lett. 8, 157\u2013160 (2018)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"3058_CR31","doi-asserted-by":"crossref","unstructured":"Sousa, J., Bessani, A., Vukolic, M.: A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. In: 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 51\u201358 (2018)","DOI":"10.1109\/DSN.2018.00018"},{"key":"3058_CR32","unstructured":"Schwartz, D., Youngs, N., Britto, A., et al.: The ripple protocol consensus algorithm, Ripple Labs Inc White Paper 5, 8 (2014)"},{"key":"3058_CR33","first-page":"1","volume":"4","author":"A Baliga","year":"2017","unstructured":"Baliga, A.: Understanding blockchain consensus models. Persistent 4, 1\u201314 (2017)","journal-title":"Persistent"},{"key":"3058_CR34","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1155\/2019\/2014697","volume":"2019","author":"U Jayasinghe","year":"2019","unstructured":"Jayasinghe, U., Lee, G.M., MacDermott, A., Rhee, W.S.: TrustChain: a privacy preserving blockchain with edge computing. Wirel. Commun. Mobile Comput. 2019, 17 (2019)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"3058_CR35","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.compeleceng.2017.04.012","volume":"63","author":"F Wu","year":"2017","unstructured":"Wu, F., Li, X., Xu, L., Kumari, S., Karuppiah, M., Shen, J.: A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63, 168\u2013181 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"3058_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, Z., Yang, Z., Zhang, Q.: Proximity based IoT device authentication. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139 (2017)","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"3058_CR37","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","volume":"78","author":"P Vijayakumar","year":"2018","unstructured":"Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78, 943\u2013955 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3058_CR38","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2019","unstructured":"Gope, P., Sikdar, B.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet of Things J. 6, 580\u2013589 (2019)","journal-title":"IEEE Internet of Things J."},{"key":"3058_CR39","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.comnet.2018.01.039","volume":"134","author":"W Feng","year":"2018","unstructured":"Feng, W., Qin, Y., Zhao, S., Feng, D.: AAoT: lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw. 134, 167\u2013182 (2018)","journal-title":"Comput. Netw."},{"key":"3058_CR40","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/JIOT.2017.2737630","volume":"6","author":"A Esfahani","year":"2017","unstructured":"Esfahani, A., Mantas, G., Matischek, R., Saghezchi, F.B., Rodriguez, J., Bicaku, A., Maksuti, S., Tauber, M., Schmittner, C., Bastos, J.: A lightweight authentication mechanism for M2M communications in industrial iot environment. IEEE Internet Things J. 6, 288\u2013296 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3058_CR41","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1016\/j.future.2017.07.034","volume":"78","author":"B Gong","year":"2018","unstructured":"Gong, B., Zhang, Y., Wang, Y.: A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gen. Comput. Syst. 78, 867\u2013886 (2018)","journal-title":"Future Gen. Comput. Syst."},{"key":"3058_CR42","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comcom.2018.06.005","volume":"127","author":"P Roychoudhury","year":"2018","unstructured":"Roychoudhury, P., Roychoudhury, B., Saikia, D.K.: Provably secure group authentication and key agreement for machine type communication using Chebyshev\u2019s polynomial. Comput. Commun. 127, 146\u2013157 (2018)","journal-title":"Comput. Commun."},{"key":"3058_CR43","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TPDS.2013.48","volume":"25","author":"X Zhang","year":"2013","unstructured":"Zhang, X., Yang, L.T., Liu, C., Chen, J.: A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Trans. Parallel Distrib. Syst. 25, 363\u2013373 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3058_CR44","doi-asserted-by":"publisher","first-page":"2611","DOI":"10.3390\/s18082611","volume":"18","author":"T Raptis","year":"2018","unstructured":"Raptis, T., Passarella, A., Conti, M.: Performance analysis of latency-aware data management in industrial IoT networks. Sensors 18, 2611 (2018)","journal-title":"Sensors"},{"key":"3058_CR45","doi-asserted-by":"crossref","unstructured":"Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1725\u20131729 (2016)","DOI":"10.1109\/ICACCI.2016.7732296"},{"key":"3058_CR46","first-page":"018","volume":"3","author":"XU Dexin","year":"2006","unstructured":"Dexin, X.U., Zhenfan, T.A.N., Yanbin, G.A.O.: Developing application and realizing multiplatform based on Qt framework. J. Northeast Agric. Univ. 3, 018 (2006)","journal-title":"J. Northeast Agric. Univ."},{"key":"3058_CR47","unstructured":"Matt Broadstone, QJSON RPC, Bitbucket. https:\/\/bitbucket.org\/devonit\/qjsonrpc\/src\/master\/. Accessed 08 Sept 2019"},{"key":"3058_CR48","doi-asserted-by":"crossref","unstructured":"Fotiou, N., Polyzos, G.C.: Decentralized name-based security for content distribution using blockchains. In: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 415\u2013420 (2016)","DOI":"10.1109\/INFCOMW.2016.7562112"},{"key":"3058_CR49","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1504\/IJSN.2011.043666","volume":"6","author":"M Barua","year":"2011","unstructured":"Barua, M., Liang, X., Lu, R., Shen, X.: ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing. Int. J. Secur. Netw. 6, 67\u201376 (2011)","journal-title":"Int. J. Secur. Netw."},{"key":"3058_CR50","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1016\/j.scs.2018.06.004","volume":"41","author":"AG Reddy","year":"2018","unstructured":"Reddy, A.G., Suresh, D., Phaneendra, K., Shin, J.S., Odelu, V.: Provably secure pseudo-identity based device authentication for smart cities environment. Sustain. Cities Soc. 41, 878\u2013885 (2018)","journal-title":"Sustain. Cities Soc."},{"key":"3058_CR51","doi-asserted-by":"crossref","unstructured":"Sultan, A., Mushtaq, M.A., Abubakar, M.: IOT security issues via blockchain: a review paper. In: Proceedings of the 2019 International Conference on Blockchain Technology, pp. 60\u201365 (2019)","DOI":"10.1145\/3320154.3320163"},{"key":"3058_CR52","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/TCE.2004.1362504","volume":"50","author":"KC Lee","year":"2004","unstructured":"Lee, K.C., Lee, H.-H.: Network-based fire-detection system via controller area network for smart home automation. IEEE Trans. Consum. Electron. 50, 1093\u20131100 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"3058_CR53","doi-asserted-by":"crossref","unstructured":"Al-Turjman, F., Altrjman, C.: IoT smart homes and security issues: an overview. Security in IoT-Enabled Spaces, pp. 111\u2013137 (2019)","DOI":"10.1201\/9780429031915-6"},{"key":"3058_CR54","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721\u201382743 (2019)","journal-title":"IEEE Access"},{"key":"3058_CR55","doi-asserted-by":"publisher","first-page":"8114","DOI":"10.1109\/JIOT.2019.2922538","volume":"6","author":"M Wu","year":"2019","unstructured":"Wu, M., Wang, K., Cai, X., Guo, S., Guo, M., Rong, C.: A comprehensive survey of blockchain: from theory to IoT applications and beyond. IEEE Internet Things J. 6, 8114\u20138154 (2019)","journal-title":"IEEE Internet Things J."},{"key":"3058_CR56","first-page":"1","volume":"46","author":"A Lohachab","year":"2019","unstructured":"Lohachab, A., et al.: ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J. Inf. Secur. Appl. 46, 1\u201312 (2019)","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03058-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-020-03058-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03058-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:20:42Z","timestamp":1612916442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-020-03058-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,10]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["3058"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03058-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,10]]},"assertion":[{"value":"28 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}