{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:19:29Z","timestamp":1770279569195,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10586-022-03583-6","type":"journal-article","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T01:06:40Z","timestamp":1648602400000},"page":"237-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs"],"prefix":"10.1007","volume":"26","author":[{"given":"Aqsa","family":"Rashid","sequence":"first","affiliation":[]},{"given":"Asif","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Atta ur Rehman","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,30]]},"reference":[{"key":"3583_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55405-1","volume-title":"Internet of Things: Challenges, Advances, and Applications","author":"QF Hassan","year":"2017","unstructured":"Hassan, Q.F., Madani, S.A., Khan, A.R.: Internet of Things: Challenges, Advances, and Applications. CRC Press, Boca Raton (2017)"},{"issue":"21","key":"3583_CR2","doi-asserted-by":"publisher","first-page":"14753","DOI":"10.1007\/s00521-021-06115-2","volume":"33","author":"S Abbas","year":"2021","unstructured":"Abbas, S., Nasir, Q., Nouichi, D., Abdelsalam, M., Talib, M.A., Waraga, O.A., Khan, A.R.: Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput. Appl. 33(21), 14753\u201314769 (2021)","journal-title":"Neural Comput. Appl."},{"issue":"8","key":"3583_CR3","doi-asserted-by":"publisher","first-page":"2575","DOI":"10.3390\/s18082575","volume":"18","author":"A Panarello","year":"2018","unstructured":"Panarello, A., Nachiket, T., Giovanni, M., Francesco, L., Antonio, P.: Blockchain and iot integration: a systematic survey. Sensors 18(8), 2575 (2018)","journal-title":"Sensors"},{"key":"3583_CR4","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Khaled, S.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"3583_CR5","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Kyoochun, L.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"issue":"7","key":"3583_CR6","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Rajkumar, B., Slaven, M., Marimuthu, P.: Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3583_CR7","first-page":"e3813","volume":"40","author":"MF Aziz","year":"2019","unstructured":"Aziz, M.F., Khan, A.N., Shuja, J., Khan, I.A., Khan, F.G., Khan, A.R.: A lightweight and compromise-resilient authentication scheme for IoTs. Trans. Emerg. Telecommun. Technol. 40, e3813 (2019)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"3583_CR8","first-page":"e3676","volume":"24","author":"A Adeel","year":"2019","unstructured":"Adeel, A., Ali, M., Khan, A.N., Khalid, T., Rehman, F., Jararweh, Y., Shuja, J.: A multi-attack resilient, lightweight IoT authentication scheme. Trans. Emerg. Telecommun. Technol. 24, e3676 (2019)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"22","key":"3583_CR9","doi-asserted-by":"publisher","first-page":"25114","DOI":"10.1109\/JSEN.2021.3060953","volume":"21","author":"J Shuja","year":"2021","unstructured":"Shuja, J., Humayun, M.A., Alasmary, W., Sinky, H., Alanazi, E., Khan, M.K.: Resource efficient geo-textual hierarchical clustering framework for social IoT applications. IEEE Sens. J. 21(22), 25114\u201325122 (2021)","journal-title":"IEEE Sens. J."},{"key":"3583_CR10","doi-asserted-by":"crossref","unstructured":"Ali, J., Toqeer A., Yazed A., Ahmad S. K., and Shahrulniza M.: Blockchain-based smart-IoT trust zone measurement architecture, In\u00a0Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 152\u2013157, (2019)","DOI":"10.1145\/3312614.3312646"},{"key":"3583_CR11","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi, M.T., Badis, H., Patrick, B., Ahmed, S.: Bubbles of Trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126\u2013142 (2018)","journal-title":"Comput. Secur."},{"key":"3583_CR12","first-page":"1","volume":"14","author":"U Khalid","year":"2020","unstructured":"Khalid, U., Muhammad, A., Thar, B., Patrick, C.K.H., Muhammad, A.T., Laura, R.: A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 14, 1\u201321 (2020)","journal-title":"Clust. Comput."},{"key":"3583_CR13","unstructured":"Vuli\u0107, I., Prodanovi\u0107, R., Vuk\u010devi\u0107, G., Sretenovi\u0107, S.: Trust Establishing Model in IoT using PKI and Timestamp. In: Konjovi\u0107, Z., Zdravkovi\u0107, M., Trajanovi\u0107, M. (Eds.) ICIST 2018 Proceedings Vol. 2, pp.333\u2013338, (2018)"},{"key":"3583_CR14","first-page":"9622","volume":"12","author":"W Iqbal","year":"2020","unstructured":"Iqbal, W., Haider, A., Pan, D., Jiafu, W., Bilal, R., Yawar, A., Imran, R.: ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes. IEEE Internet Things J. 12, 9622\u20139633 (2020)","journal-title":"IEEE Internet Things J."},{"key":"3583_CR15","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","volume":"78","author":"P Vijayakumar","year":"2018","unstructured":"Vijayakumar, P., Victor, C., Jegatha, L.D., Balamurugan, B., Shynu, P.G.: Computationally efficient privacy-preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comput. Syst. 78, 943\u2013955 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"3583_CR16","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope, P., Biplab, S.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 6(1), 580\u2013589 (2018)","journal-title":"IEEE Internet Things J."},{"key":"3583_CR17","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.comnet.2018.01.039","volume":"134","author":"W Feng","year":"2018","unstructured":"Feng, W., Yu, Q., Shijun, Z., Dengguo, F.: AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw. 134, 167\u2013182 (2018)","journal-title":"Comput. Netw."},{"key":"3583_CR18","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comcom.2018.06.005","volume":"127","author":"P Roychoudhury","year":"2018","unstructured":"Roychoudhury, P., Basav, R., Dilip, K.S.: Provably secure group authentication and key agreement for machine type communication using Chebyshev\u2019s polynomial. Comput. Commun. 127, 146\u2013157 (2018)","journal-title":"Comput. Commun."},{"issue":"5","key":"3583_CR19","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/JIOT.2017.2703088","volume":"4","author":"MN Aman","year":"2017","unstructured":"Aman, M.N., Kee, C.C., Biplab, S.: Mutual authentication in IoT systems using physically unclonable functions. IEEE Internet Things J. 4(5), 1327\u20131340 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3583_CR20","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.compeleceng.2017.04.012","volume":"63","author":"F Wu","year":"2017","unstructured":"Wu, F., Xiong, L., Lili, X., Saru, K., Marimuthu, K., Jian, S.: A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63, 168\u2013181 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"3583_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zeyu W., Zhice Y., and Qian Z.: Proximity-based IoT device authentication, In IEEE INFOCOM 2017-IEEE Conference on Computer Com[munications, pp. 1\u20139. IEEE, (2017)","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"3583_CR22","doi-asserted-by":"crossref","unstructured":"Kothmayr, T., Corinna S., Wen H., Michael B., and Georg C.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, In 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 956\u2013963. IEEE, (2012)","DOI":"10.1109\/LCNW.2012.6424088"},{"issue":"5","key":"3583_CR23","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh, H.L., Tien-Ho, C., Pin-Chuan, L., Tai-Hoo, K., Hsin-Wen, W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767\u20134779 (2011)","journal-title":"Sensors"},{"issue":"1","key":"3583_CR24","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/JIOT.2017.2737630","volume":"6","author":"A Esfahani","year":"2017","unstructured":"Esfahani, A., Georgios, M., Rainer, M., Firooz, B.S., Jonathan, R., Ani, B., Silia, M., Markus, G.T., Christoph, S., Joaquim, B.: A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J. 6(1), 288\u2013296 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3583_CR25","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1016\/j.future.2017.07.034","volume":"78","author":"B Gong","year":"2018","unstructured":"Gong, B., Yu, Z., Yubo, W.: A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Futur. Gener. Comput. Syst. 78, 867\u2013886 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3583_CR26","doi-asserted-by":"crossref","unstructured":"Jan, M. A., Priyadarsi N., Xiangjian H., Zhiyuan T., and Ren P. L.: A robust authentication scheme for observing resources in the internet of things environment, In\u00a02014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 205\u2013211. IEEE, (2014)","DOI":"10.1109\/TrustCom.2014.31"},{"issue":"1","key":"3583_CR27","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2647881","volume":"4","author":"D Minoli","year":"2017","unstructured":"Minoli, D., Kazem, S., Benedict, O.: IoT considerations, requirements, and architectures for smart buildings\u2014energy optimization and next-generation building management systems. IEEE Internet Things J. 4(1), 269\u2013283 (2017)","journal-title":"IEEE Internet Things J."},{"key":"3583_CR28","doi-asserted-by":"crossref","unstructured":"Babar, S., Antonietta S., Neeli P., Jaydip S., and Ramjee P.: Proposed embedded security framework for internet of things (IoT), In 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"issue":"2","key":"3583_CR29","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","volume":"5","author":"O Novo","year":"2018","unstructured":"Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184\u20131195 (2018)","journal-title":"IEEE Internet Things J."},{"key":"3583_CR30","first-page":"80","volume":"15","author":"Y Lu","year":"2019","unstructured":"Lu, Y.: The blockchain: state-of-the-art and research challenges. J. Ind. Inf. Integr. 15, 80\u201390 (2019)","journal-title":"J. Ind. Inf. Integr."},{"key":"3583_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Michael C.Y. C., Chia-Wei W., Chia-Wei H., Chong-Kuan C., and Shiuhpyng S.: IoT security: ongoing challenges and research opportunities, In\u00a02014 IEEE 7th international conference on service-oriented computing and applications, pp. 230\u2013234. IEEE (2014)","DOI":"10.1109\/SOCA.2014.58"},{"key":"3583_CR32","doi-asserted-by":"crossref","unstructured":"Patel, C., and Nishant D.: Security challenges in IoT cyber world, In\u00a0Security in smart cities: models, applications, and challenges, pp. 171-191. Springer, Cham, (2019)","DOI":"10.1007\/978-3-030-01560-2_8"},{"issue":"12","key":"3583_CR33","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.3390\/app10124102","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh, L., Fadi, M., Mais, T., Muhannad, Q.: IoT Privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)","journal-title":"Appl. Sci."},{"issue":"5","key":"3583_CR34","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/MNET.101.2000532","volume":"35","author":"A Rashid","year":"2021","unstructured":"Rashid, A., Masood, A., Abbas, A., Zhang, Y.: Blockchain-based public key infrastructure: a transparent digital certification mechanism for secure communication. IEEE Netw. 35(5), 220\u2013225 (2021). https:\/\/doi.org\/10.1109\/MNET.101.2000532","journal-title":"IEEE Netw."},{"key":"3583_CR35","doi-asserted-by":"publisher","first-page":"3551","DOI":"10.1007\/s10586-021-03352-x","volume":"16","author":"A Rashid","year":"2021","unstructured":"Rashid, A., Masood, A., Khan, A.R.: RCAAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organization. Clust. Comput. 16, 3551\u20133571 (2021)","journal-title":"Clust. Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03583-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03583-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03583-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T14:17:20Z","timestamp":1677507440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03583-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,30]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3583"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03583-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,30]]},"assertion":[{"value":"19 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Ethical approval was not required to conduct this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal right."}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent."}}]}}