{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:00:05Z","timestamp":1768071605860,"version":"3.49.0"},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10586-020-03137-8","type":"journal-article","created":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T23:07:10Z","timestamp":1602025630000},"page":"37-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":111,"title":["A survey on boosting IoT security and privacy through blockchain"],"prefix":"10.1007","volume":"24","author":[{"given":"Omar","family":"Alfandi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3514-6398","authenticated-orcid":false,"given":"Salam","family":"Khanji","sequence":"additional","affiliation":[]},{"given":"Liza","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Asad","family":"Khattak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,6]]},"reference":[{"key":"3137_CR1","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1016\/j.procs.2018.05.140","volume":"132","author":"NM Kumar","year":"2018","unstructured":"Kumar, N.M., Mallick, P.K.: Blockchain technology for security issues and challenges in IoT. Procedia Comput. Sci. 132, 1815\u20131823 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"3137_CR2","unstructured":"Hung, M.: Leading the IoT, gartner insights on how to lead in a connected world. https:\/\/www.securityweek.com\/mirai-based-botnet-launches-massive-ddos-attack-streaming-service (2017). Accessed Sept 2019"},{"issue":"1","key":"3137_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MNET.001.1900103","volume":"34","author":"T Lewis","year":"2020","unstructured":"Lewis, T., Liwen, W., Safa, O., Moayad, A., Jalel\u00a0Ben, O.: Blockchain for managing heterogeneous internet of things: a perspective architecture. IEEE Netw. 34(1), 16\u201323 (2020)","journal-title":"IEEE Netw."},{"key":"3137_CR4","doi-asserted-by":"crossref","unstructured":"Ali, F., Aloqaily, M., Alfandi, O., Ozkasap, O.: Cyberphysical blockchain-enabled peer-to-peer energy trading. In: Computer IEEE (2020)","DOI":"10.1109\/MC.2020.2991453"},{"key":"3137_CR5","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Boukerche, A., Bouachir, O., Khalid, F., Jangsher, S.: An energy trade framework using smart contracts: verview and challenges. IEEE Netw. 1\u20137 (2020)","DOI":"10.1109\/MNET.011.1900573"},{"key":"3137_CR6","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"WH Hassan","year":"2019","unstructured":"Hassan, W.H.: Current research on internet of things (IoT) security: a survey. Comput. Netw. 148, 283\u2013294 (2019)","journal-title":"Comput. Netw."},{"key":"3137_CR7","doi-asserted-by":"crossref","unstructured":"Kushner, D.: The real story of stuxnet. https:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet (2013). Accessed Sept 2019","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"3137_CR8","unstructured":"Arghire, I.: Mirai-based botnet launches massive DDOS attack on streaming service. (2019). Accessed Sept 2019"},{"issue":"1","key":"3137_CR9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/3158333","volume":"61","author":"H Subramanian","year":"2018","unstructured":"Subramanian, H.: Decentralized blockchain-based electronic marketplaces. Commun. ACM 61(1), 78\u201384 (2018)","journal-title":"Commun. ACM"},{"key":"3137_CR10","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"3137_CR11","doi-asserted-by":"publisher","first-page":"100078","DOI":"10.1016\/j.iot.2019.100078","volume":"7","author":"I Lee","year":"2019","unstructured":"Lee, I.: The internet of things for enterprises: an ecosystem, architecture, and IoT service business model. Internet Things 7, 100078 (2019)","journal-title":"Internet Things"},{"key":"3137_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.iot.2018.11.003","volume":"5","author":"P Radoglou Grammatikis","year":"2019","unstructured":"Radoglou Grammatikis, P., Sarigiannidis, P., Moscholios, I.: Securing the internet of things: challenges, threats and solutions. Internet Things 5, 41\u201370 (2019)","journal-title":"Internet Things"},{"key":"3137_CR13","unstructured":"FIDO Alliance. How fido works. https:\/\/fidoalliance.org\/how-fido-works\/. Accessed Feb 2020"},{"key":"3137_CR14","unstructured":"Tewari, A., Gupta, B.: Security, privacy and trust of different layers in internet-of-things (IOTS) framework. Future Gener. Comput. Syst. (2018)"},{"issue":"1","key":"3137_CR15","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2019","unstructured":"Salman, T., Zolanvari, M., Erbad, A., Jain, R., Samaka, M.: Security services using blockchains: a state of the art survey. IEEE Commun. Surv. Tutor. 21(1), 850\u2013880 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3137_CR16","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. http:\/\/bitcoin.org\/bitcoin.pdf (2008). Accessed Sept 2019"},{"key":"3137_CR17","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media Inc., New York (2014)"},{"issue":"3","key":"3137_CR18","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F Tschorsch","year":"2016","unstructured":"Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084\u20132123 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3137_CR19","unstructured":"Ethereum blockchain app platform. www.ethereum.org\/ (2017). Accessed Sept 2019"},{"key":"3137_CR20","unstructured":"Bitcoinwiki. Proof of work. Accessed Sept 2019"},{"key":"3137_CR21","unstructured":"Khalilov, M.C.K., Levi, A.: A survey on anonymity and privacy in bitcoin-like digital cash systems. IEEE Commun. Surv. Tutor. (2018)"},{"key":"3137_CR22","unstructured":"Baraniuk, C.: Bitfinex users to share 36% of bitcoin losses after hack. BBC News. https:\/\/www.bbc.com\/news\/technology-37009319 (2019). Accessed Oct 2019"},{"key":"3137_CR23","doi-asserted-by":"crossref","unstructured":"Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., Mohaisen, A.: Exploring the attack surface of blockchain: a systematic overview. arXiv preprint arXiv:1904.03487 (2019)","DOI":"10.1002\/9781119519621.ch3"},{"key":"3137_CR24","unstructured":"Hyperledger. https:\/\/www.hyperledger.org (2017). Accessed Oct 2019"},{"key":"3137_CR25","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance. Osdi. OSDI 99, 173\u2013186 (1999)","journal-title":"Osdi. OSDI"},{"key":"3137_CR26","unstructured":"Sachs, G.: Blockchain\u2019 putting theory into practice. the-blockchain.com, pp. 25\u201332 (2016)"},{"key":"3137_CR27","doi-asserted-by":"publisher","first-page":"12118","DOI":"10.1109\/ACCESS.2018.2805783","volume":"6","author":"J Gu","year":"2018","unstructured":"Gu, J., Sun, B., Du, X., Wang, J., Zhuang, Y., Wang, Z.: Consortium blockchainbased malware detection in mobile devices. IEEE Access 6, 12118\u201312128 (2018)","journal-title":"IEEE Access"},{"issue":"8","key":"3137_CR28","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"A Zhang","year":"2018","unstructured":"Zhang, A., Lin, X.: Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med. Syst. 42(8), 140 (2018)","journal-title":"J. Med. Syst."},{"key":"3137_CR29","first-page":"26","volume":"1","author":"F Tao","year":"2016","unstructured":"Tao, F., Wang, Y., Zuo, Y., Yang, H., Zhang, M.: Internet of things in product life-cycle energy management. J. Ind. Inf. Integr. 1, 26\u201339 (2016)","journal-title":"J. Ind. Inf. Integr."},{"key":"3137_CR30","unstructured":"Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environment. (2017)"},{"key":"3137_CR31","doi-asserted-by":"publisher","first-page":"106526","DOI":"10.1016\/j.compeleceng.2019.106526","volume":"81","author":"S Xie","year":"2020","unstructured":"Xie, S., Zheng, Z., Chen, W., Wu, J., Dai, H.N., Imran, M.: Blockchain for cloud exchange: a survey. Comput. Electr. Eng. 81, 106526 (2020)","journal-title":"Comput. Electr. Eng."},{"key":"3137_CR32","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops, pp. 180\u2013184 (2015)","DOI":"10.1109\/SPW.2015.27"},{"issue":"2","key":"3137_CR33","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info8020044","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E.B., Smahi, A., Amofa, S., Zhang, X.: BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2), 44 (2017)","journal-title":"Information"},{"key":"3137_CR34","first-page":"1","volume":"1","author":"K Peterson","year":"2016","unstructured":"Peterson, K., Deeduvan, R., Kanjamala, P., Boles, K.: A blockchain-based approach to health information exchange networks. Proc. NIST Workshop Blockchain Healthc. 1, 1\u201310 (2016)","journal-title":"Proc. NIST Workshop Blockchain Healthc."},{"key":"3137_CR35","unstructured":"Popov, S.: The tangle, iota whitepaper"},{"key":"3137_CR36","unstructured":"Valenta, M., Sandner, P.: Comparison of ethereum, hyperledger fabric and corda. ebook Frankfurt School, Blockchain Center (2017)"},{"key":"3137_CR37","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De\u00a0Caro, A., Muralidharan, S.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Thirteenth EuroSys Conference, ACM, p. 30 (2018)","DOI":"10.1145\/3190508.3190538"},{"issue":"3","key":"3137_CR38","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","volume":"73","author":"B Lee","year":"2017","unstructured":"Lee, B., Lee, J.H.: Blockchain-based secure firmware update for embedded devices in an internet of things environment. J. Supercomput. 73(3), 1152\u20131167 (2017)","journal-title":"J. Supercomput."},{"key":"3137_CR39","doi-asserted-by":"crossref","unstructured":"Boudguiga, A., Bouzerna, N., Granboulan, L., Olivereau, A., Quesnel, F., Roger, A., Sirdey, R:. Towards better availability and accountability for IoT updates by means of a blockchain. In: IEEE European Symposium on Security and Privacy Workshops (EuroS and PW), pp. 50\u201358 (2017)","DOI":"10.1109\/EuroSPW.2017.50"},{"key":"3137_CR40","doi-asserted-by":"crossref","unstructured":"Leiba, O., Yitzchak, Y., Bitton, R., Nadler, A., Shabtai, A.: Incentivized delivery network of IoT software updates based on trustless proof-of-distribution. In: IEEE European Symposium on Security and Privacy Workshops (EuroS and PW), pp. 29\u201339 (2018)","DOI":"10.1109\/EuroSPW.2018.00011"},{"key":"3137_CR41","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.jpdc.2019.06.001","volume":"132","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Liu, Y., Tian, A., Yu, Y., Du, X.: Blockchain based privacy-preserving software updates with proof-of-delivery for internet of things. J. Parallel Distrib. Comput. 132, 141\u2013149 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"3137_CR42","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Kate, A., Schr\u00f6der, D.: Liar, liar, coins on fire!: penalizing equivocation by loss of bitcoins. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, pp. 219\u2013230 (2015)","DOI":"10.1145\/2810103.2813686"},{"issue":"12","key":"3137_CR43","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1109\/TPDS.2013.2295809","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen, X., Li, J., Huang, X., et al.: Secure outsourced attribute-based signatures. IEEE Trans. Parallel Distrib. Syst. 25(12), 3285\u20133294 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3137_CR44","doi-asserted-by":"crossref","unstructured":"Naik, N.: Choice of effective messaging protocols for IoT systems: MQTT, COAP, AMQP and HTTP. In: 2017 IEEE International Systems Engineering Symposium (ISSE), pp. 1\u20137 (2017)","DOI":"10.1109\/SysEng.2017.8088251"},{"key":"3137_CR45","doi-asserted-by":"crossref","unstructured":"Fakhri, D., Mutijarsa, K.: Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1\u20136 (2018)","DOI":"10.1109\/ISESD.2018.8605485"},{"issue":"1","key":"3137_CR46","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MPOT.2018.2850541","volume":"38","author":"D Puthal","year":"2019","unstructured":"Puthal, D., Mohanty, S.P.: Proof of authentication: IoT-friendly blockchains. IEEE Potentials 38(1), 26\u201329 (2019)","journal-title":"IEEE Potentials"},{"issue":"6","key":"3137_CR47","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MWC.001.1900077","volume":"26","author":"I Al\u00a0Ridhawi","year":"2019","unstructured":"Al\u00a0Ridhawi, I., Aloqaily, M., Boukerche, A.: Comparing fog solutions for energy efficiency in wireless networks: challenges and opportunities. IEEE Wirel. Commun. 26(6), 80\u201386 (2019)","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"3137_CR48","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1049\/trit.2018.0014","volume":"3","author":"H Zhao","year":"2019","unstructured":"Zhao, H., Bai, P., Peng, Y., Xu, R.: Efficient key management scheme for health blockchain. CAAI Trans. Intell. Technol. 3(2), 114\u2013118 (2019)","journal-title":"CAAI Trans. Intell. Technol."},{"key":"3137_CR49","doi-asserted-by":"crossref","unstructured":"Tomescu, A., Devadas, S.: Catena: Efficient non-equivocation via bitcoin. In: 2017 38th IEEE Symposium on Security and Privacy (SP), pp. 393\u2013409 (2017)","DOI":"10.1109\/SP.2017.19"},{"key":"3137_CR50","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.future.2018.10.002","volume":"92","author":"A Dorri","year":"2019","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R.: Mof-bc: a memory optimized and flexible blockchain for large scale networks. Future Gener. Comput. Syst. 92, 357\u2013373 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"3137_CR51","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.future.2019.07.036","volume":"101","author":"H Si","year":"2019","unstructured":"Si, H., Sun, C., Li, Y., Qiao, H., Shi, L.: IoT information sharing security mechanism based on blockchain technology. Future Gener. Comput. Syst. 101, 1028\u20131040 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"3137_CR52","doi-asserted-by":"crossref","unstructured":"Dittmann, G., Jelitto, J.: A blockchain proxy for lightweight IoT devices. In: Crypto Valley Conference on Blockchain Technology (CVCBT) (2019)","DOI":"10.1109\/CVCBT.2019.00015"},{"key":"3137_CR53","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jnca.2019.06.019","volume":"143","author":"S Rathore","year":"2019","unstructured":"Rathore, S., Wook Kwon, B., Park, J., Blockchain-based decentralized security architecture for IoT network: BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 143, 167\u2013177 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"3137_CR54","doi-asserted-by":"crossref","unstructured":"Bouachir, O., Aloqaily, M., Tesng, L., Boukerche, A.: Blockchain and fog computing for cyber-physical systems: case of smart industry. In: Computer IEEE (2020)","DOI":"10.1109\/MC.2020.2996212"},{"key":"3137_CR55","doi-asserted-by":"crossref","unstructured":"Son, M., Kim, H.: Blockchain-based secure firmware management system in IoT environment. In: International Conference on Advanced Communications Technology (ICACT) (2019)","DOI":"10.23919\/ICACT.2019.8701959"},{"key":"3137_CR56","doi-asserted-by":"crossref","unstructured":"Dukkipati, C., Zhang, Y., Cheng, L.C.: Decentralized, blockchain based access control framework for the heterogeneous internet of things. In: Proceedings of the Third ACM Workshop on Attribute-Based Access Control, pp. 61\u201369 (2018)","DOI":"10.1145\/3180457.3180458"},{"key":"3137_CR57","doi-asserted-by":"crossref","unstructured":"Maesa, D.D.F., Mori, P., Ricci, L.: Blockchain based access control. In: IFIP International Conference on Distributed Applications and Interoperable Systems. Springer, Cham, pp. 206\u2013220 (2017)","DOI":"10.1007\/978-3-319-59665-5_15"},{"issue":"18","key":"3137_CR58","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: Fairaccess: a new blockchain based access control framework for the internet of things. Secur. Commun. Netw. 9(18), 5943\u20135964 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"3137_CR59","doi-asserted-by":"crossref","unstructured":"Alfandi, O., Otoum, S., Jararweh, Y.: Blockchain solution for IoT-based critical infrastructures: byzantine fault tolerance. In: Network Operations and Management Symposium, IEEE\/IFIP (2020)","DOI":"10.1109\/NOMS47738.2020.9110312"},{"issue":"7","key":"3137_CR60","first-page":"417","volume":"8","author":"A Outchakoucht","year":"2017","unstructured":"Outchakoucht, A., Hamza, E.S., Leroy, J.P.: Dynamic access control policy based on blockchain and machine learning for the internet of things. Int. J. Adv. Comput. Sci. Appl. 8(7), 417\u2013424 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"3137_CR61","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: 26th Symposium on Operating Systems Principles. ACM, pp. 51\u201368 (2017)","DOI":"10.1145\/3132747.3132757"},{"issue":"8","key":"3137_CR62","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1109\/TC.2019.2900648","volume":"68","author":"J Yu","year":"2019","unstructured":"Yu, J., Kozhaya, D., Decouchant, J., Verissimo, P.: Repucoin: your reputation is your power. IEEE Trans. Comput. 68(8), 1225\u20131237 (2019)","journal-title":"IEEE Trans. Comput."},{"key":"3137_CR63","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S. S., Jurdak, R., Gauravaram, P.: Lsb: a lightweight scalable blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. (2019)","DOI":"10.1016\/j.jpdc.2019.08.005"},{"key":"3137_CR64","doi-asserted-by":"crossref","unstructured":"Ali, M. H., Fadlizolkipi, M., Firdaus, A., Khidzir, N.Z.: A hybrid particle swarm optimization-extreme learning machine approach for intrusion detection system. In: IEEE Student Conference on Research and Development (SCOReD) (2018)","DOI":"10.1109\/SCORED.2018.8711287"},{"key":"3137_CR65","doi-asserted-by":"publisher","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Otoum, S., Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019)","journal-title":"Ad Hoc Netw."},{"issue":"14","key":"3137_CR66","doi-asserted-by":"publisher","first-page":"3165","DOI":"10.3390\/s19143165","volume":"19","author":"G Rathee","year":"2019","unstructured":"Rathee, G., Sharma, A., Iqbal, R., Aloqaily, M., Jaglan, N., Kumar, R.: A blockchain framework for securing connected and autonomous vehicles. Sensors 19(14), 3165 (2019)","journal-title":"Sensors"},{"key":"3137_CR67","doi-asserted-by":"crossref","unstructured":"Zhang, X., Chen, J.: Deep learning based intelligent intrusion detection. In: IEEE 9th International Conference on Communication Software and Networks (ICCSN) (2017)","DOI":"10.1109\/ICCSN.2017.8230287"},{"issue":"2","key":"3137_CR68","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","volume":"1","author":"S Otoum","year":"2019","unstructured":"Otoum, S., et al.: On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw. Lett. 1(2), 68\u201371 (2019)","journal-title":"IEEE Netw. Lett."},{"key":"3137_CR69","unstructured":"Anish, A., Sundarakantham, K.: Machine learning based intrusion detection system. In: Proceedings of 2019 3rd International Conference on Trends in Electronics and Informatics, vol. 10.1109, pp. 916\u2013920 (2019)"},{"key":"3137_CR70","doi-asserted-by":"crossref","unstructured":"Taher K.A., Jisan, B.M., Rahman, M.M.: Network intrusion detection using supervised machine learning technique with feature selection. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (2019)","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"3137_CR71","doi-asserted-by":"crossref","unstructured":"Laufenberg, D., Li, L., Shahriar, H., Han, M.: An architecture for blockchain-enabled collaborative signature-based intrusion detection system. In: Proceedings of the 20th Annual SIG Conference on Information Technology Education\u2014SIGITE 19 (2019)","DOI":"10.1145\/3349266.3351389"},{"key":"3137_CR72","doi-asserted-by":"crossref","unstructured":"Chen, Y., Liu, J.: Distributed community detection over blockchain networks based on structural entropy. In: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure\u2014BSCI 19 (2019)","DOI":"10.1145\/3327960.3332381"},{"key":"3137_CR73","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, B., Kim, H.J.: Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange. In: Proceedings of the 2018 International Conference on Cloud Computing and Internet of Things\u2014CCIOT 2018 (2018)","DOI":"10.1145\/3291064.3291075"},{"key":"3137_CR74","doi-asserted-by":"crossref","unstructured":"Chen, X., Ji, J., Luo, C., Liao, W.: When machine learning meets blockchain: a decentralized, privacy-preserving and secure design. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 1178\u20131187 (2018)","DOI":"10.1109\/BigData.2018.8622598"},{"key":"3137_CR75","unstructured":"Dheeru, D., Karra, E.: Taniskidou. UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml. Accessed Feb 2020"},{"key":"3137_CR76","unstructured":"LeCun, Y., Cortes, C.: MNIST handwritten digit database. http:\/\/yann.lecun.com\/exdb\/mnist\/. Accessed Feb 2020"},{"key":"3137_CR77","unstructured":"Blanchard, P., Mhamdi, E.M.E., Guerraoui, R., Stainer, J.: Byzantine-tolerant machine learning"},{"key":"3137_CR78","doi-asserted-by":"crossref","unstructured":"Dey, S.: Securing majority-attack in blockchain using machine learning and algorithmic game theory: a proof of work. In: 2018 10th Computer Science and Electronic Engineering (CEEC). pp. 7\u201310. IEEE (2018)","DOI":"10.1109\/CEEC.2018.8674185"},{"key":"3137_CR79","doi-asserted-by":"crossref","unstructured":"Bravo\u00a0Marquez, F., Reeves, S., Ugarte, M.: Proof-of-learning: a blockchain consensus mechanism based on machine learning competitions. In: IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp. 119\u2013124 (2019)","DOI":"10.1109\/DAPPCON.2019.00023"},{"key":"3137_CR80","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.3390\/su11143974","volume":"11","author":"S Rathore","year":"2019","unstructured":"Rathore, S., Pan, Y., Park, J.H.: Blockdeepnet: a blockchain-based secure deep learning for IoT network. Sustainability 11, 3974 (2019)","journal-title":"Sustainability"},{"issue":"1","key":"3137_CR81","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s11263-014-0733-5","volume":"111","author":"M Everingham","year":"2015","unstructured":"Everingham, M., Eslami, S.A., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The pascal visual object classes challenge: a retrospective. International J. Comput. Vis. 111(1), 98\u2013136 (2015)","journal-title":"International J. Comput. Vis."},{"key":"3137_CR82","doi-asserted-by":"crossref","unstructured":"Sankar, L. S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, pp. 1\u20135 (2017)","DOI":"10.1109\/ICACCS.2017.8014672"},{"key":"3137_CR83","doi-asserted-by":"crossref","unstructured":"Wang, Q., Zhu, X., Ni, Y., Gu, L., Zhu, H.: Blockchain for the IoT and industrial IoT: a review. Internet Things, 100081 (2019)","DOI":"10.1016\/j.iot.2019.100081"},{"key":"3137_CR84","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: Iot security: ongoing challenges and research opportunities. In: IEEE 7th International Conference on Service-Oriented Computing and applications, pp. 230\u2013234 (2014)","DOI":"10.1109\/SOCA.2014.58"},{"issue":"3","key":"3137_CR85","first-page":"910","volume":"7","author":"S Apte","year":"2016","unstructured":"Apte, S., Petrovsky, N.: Will blockchain technology revolutionize excipient supply chain management? J. Excip. Food Chem. 7(3), 910 (2016)","journal-title":"J. Excip. Food Chem."},{"key":"3137_CR86","doi-asserted-by":"crossref","unstructured":"Miraz, M.H., Ali, M.: Applications of blockchain technology beyond cryptocurrency. arXiv preprint arXiv:1801.03528 (2018)","DOI":"10.33166\/AETiC.2018.01.001"},{"key":"3137_CR87","doi-asserted-by":"crossref","unstructured":"Tasatanattakool, P., Techapanupreeda, C.: Blockchain: challenges and applications. In: International Conference on Information Networking (ICOIN). IEEE, pp. 473\u2013475 (2018)","DOI":"10.1109\/ICOIN.2018.8343163"},{"key":"3137_CR88","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: 2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 173\u2013178 (2017)","DOI":"10.1145\/3054977.3055003"},{"key":"3137_CR89","doi-asserted-by":"crossref","unstructured":"Abbasi, A.G., Khan, Z.: Veidblock: verifiable identity using blockchain and ledger in a software defined network. In: Companion Proceedings of the10th International Conference on Utility and Cloud Computing, pp. 173\u2013179 (2017)","DOI":"10.1145\/3147234.3148088"},{"key":"3137_CR90","doi-asserted-by":"crossref","unstructured":"Kravitz, D.W., Cooper, J.: Securing user identity and transactions symbiotically: Iot meets blockchain. 2017 Global Internet of Things Summit (GIoTS), pp. 1\u20136 (2017)","DOI":"10.1109\/GIOTS.2017.8016280"},{"key":"3137_CR91","doi-asserted-by":"crossref","unstructured":"Liu, B., Yu, X.L., Chen, S., Xu, X., Zhu, L.: Blockchain based data integrity service framework for IoT data. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 468\u2013475 (2017)","DOI":"10.1109\/ICWS.2017.54"},{"key":"3137_CR92","doi-asserted-by":"crossref","unstructured":"Steichen, M., Hommes, S., State, R.: Chainguard\u2014a firewall for blockchain applications using SDN with openflow. In: 2017 Principles, Systems and Applications of IP Telecommunications (IPTComm), pp. 1\u20138 (2017)","DOI":"10.1109\/IPTCOMM.2017.8169748"},{"key":"3137_CR93","doi-asserted-by":"crossref","unstructured":"Basnet, S.R., Shakya, S.: BSS: blockchain security over software defined network. In: 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 720\u2013725 (2017)","DOI":"10.1109\/CCAA.2017.8229910"},{"key":"3137_CR94","doi-asserted-by":"crossref","unstructured":"Baker, T., Asim, M., MacDermott, A., Iqbal, F., Kamoun, F., Shah, B., Alfandi, O., Hammoudeh, M.: A secure fog-based platform for SCADA-based IoT critical infrastructure. Practice and Experience, Software (2019)","DOI":"10.1002\/spe.2688"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03137-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03137-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03137-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T09:24:33Z","timestamp":1633512273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-020-03137-8"}},"subtitle":["Exploration, requirements, and open issues"],"short-title":[],"issued":{"date-parts":[[2020,10,6]]},"references-count":94,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["3137"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03137-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,6]]},"assertion":[{"value":"19 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}