{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:29:24Z","timestamp":1771064964413,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100018157","name":"Al-Hussein Bin Talal University","doi-asserted-by":"publisher","award":["25\/2022"],"award-info":[{"award-number":["25\/2022"]}],"id":[{"id":"10.13039\/100018157","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s10586-023-04202-8","type":"journal-article","created":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T18:02:10Z","timestamp":1701194530000},"page":"4551-4568","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks"],"prefix":"10.1007","volume":"27","author":[{"given":"Saleh","family":"Atiewi","sequence":"first","affiliation":[]},{"given":"Amer","family":"Al-Rahayfeh","sequence":"additional","affiliation":[]},{"given":"Muder","family":"Almiani","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Abuhussein","sequence":"additional","affiliation":[]},{"given":"Salman","family":"Yussof","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,28]]},"reference":[{"issue":"6","key":"4202_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.4067","volume":"33","author":"W Yan","year":"2022","unstructured":"Yan, W., Wang, Z., Wang, H., Wang, W., Li, J., Gui, X.: Survey on recent smart gateways for smart home: systems, technologies, and challenges. Trans. Emerg. Telecommun. Technol. 33(6), 1\u201320 (2022). https:\/\/doi.org\/10.1002\/ett.4067","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"18","key":"4202_CR2","doi-asserted-by":"publisher","first-page":"6037","DOI":"10.3390\/s21186037","volume":"21","author":"D Bouchabou","year":"2021","unstructured":"Bouchabou, D., Nguyen, S.M., Lohr, C., Leduc, B., Kanellos, I.: A survey of human activity recognition in smart homes based on IoT sensors algorithms: taxonomies, challenges, and opportunities with deep learning. Sensors 21(18), 6037 (2021). https:\/\/doi.org\/10.3390\/s21186037","journal-title":"Sensors"},{"key":"4202_CR3","doi-asserted-by":"publisher","first-page":"117802","DOI":"10.1109\/ACCESS.2020.3004662","volume":"8","author":"S Arif","year":"2020","unstructured":"Arif, S., Khan, M.A., Rehman, S.U., Kabir, M.A., Imran, M.: Investigating smart home security: is blockchain the answer? IEEE Access 8, 117802\u2013117816 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3004662","journal-title":"IEEE Access"},{"key":"4202_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106525","volume":"81","author":"M Kamran","year":"2020","unstructured":"Kamran, M., Khan, H.U., Nisar, W., Farooq, M., Rehman, S.U.: Blockchain and Internet of Things: a bibliometric study. Comput. Electr. Eng. 81, 106525 (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2019.106525","journal-title":"Comput. Electr. Eng."},{"key":"4202_CR5","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9077348","author":"S Tanwar","year":"2022","unstructured":"Tanwar, S., Gupta, N., Iwendi, C., Kumar, K., Alenezi, M.: Next generation IoT and blockchain integration. J. Sens. (2022). https:\/\/doi.org\/10.1155\/2022\/9077348","journal-title":"J. Sens."},{"issue":"1","key":"4202_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-020-0214-5","volume":"10","author":"Y Lee","year":"2020","unstructured":"Lee, Y., Rathore, S., Park, J.H., Park, J.H.: A blockchain-based smart home gateway architecture for preventing data forgery. Hum.-Centric Comput. Inf. Sci. 10(1), 1\u201314 (2020). https:\/\/doi.org\/10.1186\/s13673-020-0214-5","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"4202_CR7","doi-asserted-by":"crossref","unstructured":"Tantidham, T., Aung, Y.N.: Emergency service for smart home system using ethereum blockchain: System and architecture. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 888\u2013893. IEEE (2019)","DOI":"10.1109\/PERCOMW.2019.8730816"},{"issue":"3","key":"4202_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21030936","volume":"21","author":"D Kwon","year":"2021","unstructured":"Kwon, D., Yu, S., Lee, J., Son, S., Park, Y.: Wsn-slap: secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors 21(3), 1\u201323 (2021). https:\/\/doi.org\/10.3390\/s21030936","journal-title":"Sensors"},{"issue":"3","key":"4202_CR9","doi-asserted-by":"publisher","first-page":"2316","DOI":"10.1109\/TITS.2021.3056704","volume":"23","author":"AK Sutrala","year":"2022","unstructured":"Sutrala, A.K., Obaidat, M.S., Saha, S., Das, A.K., Alazab, M., Park, Y.: Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems. IEEE Trans. Intell. Transp. Syst. 23(3), 2316\u20132330 (2022). https:\/\/doi.org\/10.1109\/TITS.2021.3056704","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"4202_CR10","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1007\/s11036-018-1085-0","volume":"24","author":"H-C Chen","year":"2019","unstructured":"Chen, H.-C.: Collaboration IoT-based RBAC with trust evaluation algorithm model for massive IoT integrated application. Mob. Netw. Appl. 24(3), 839\u2013852 (2019)","journal-title":"Mob. Netw. Appl."},{"issue":"7","key":"4202_CR11","doi-asserted-by":"publisher","first-page":"80","DOI":"10.22214\/ijraset.2022.45184","volume":"10","author":"P Parial","year":"2022","unstructured":"Parial, P.: Home automation system using based on IoT. Int. J. Res. Appl. Sci. Eng. Technol. 10(7), 80\u201394 (2022). https:\/\/doi.org\/10.22214\/ijraset.2022.45184","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"4202_CR12","doi-asserted-by":"publisher","first-page":"103651","DOI":"10.1109\/ACCESS.2021.3098795","volume":"9","author":"A Qashlan","year":"2021","unstructured":"Qashlan, A., Nanda, P., He, X., Mohanty, M.: Privacy-preserving mechanism in smart home using blockchain. IEEE Access 9, 103651\u2013103669 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3098795","journal-title":"IEEE Access"},{"key":"4202_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4393314","author":"K Liao","year":"2022","unstructured":"Liao, K.: Design of the secure smart home system based on the blockchain and cloud service. Wirel. Commun. Mob. Comput. (2022). https:\/\/doi.org\/10.1155\/2022\/4393314","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"3","key":"4202_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3390\/cryptography6030037","volume":"6","author":"V Kumar","year":"2022","unstructured":"Kumar, V., Malik, N., Singla, J., Jhanjhi, N.Z., Amsaad, F., Razaque, A.: Light weight authentication scheme for smart home IoT devices. Cryptography 6(3), 37 (2022). https:\/\/doi.org\/10.3390\/cryptography6030037","journal-title":"Cryptography"},{"issue":"3","key":"4202_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102482","volume":"58","author":"M Ammi","year":"2021","unstructured":"Ammi, M., Alarabi, S., Benkhelifa, E.: Customized blockchain-based architecture for secure smart home for lightweight IoT. Inf. Process. Manag. 58(3), 102482 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2020.102482","journal-title":"Inf. Process. Manag."},{"key":"4202_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9928254","author":"O Taiwo","year":"2021","unstructured":"Taiwo, O., Ezugwu, A.E.: Internet of Things-based intelligent smart home control system. Secur. Commun. Networks (2021). https:\/\/doi.org\/10.1155\/2021\/9928254","journal-title":"Secur. Commun. Networks"},{"issue":"1","key":"4202_CR17","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/electronics9010094","volume":"9","author":"A Khatoon","year":"2020","unstructured":"Khatoon, A.: A blockchain-based smart contract system for healthcare management. Electron 9(1), 94 (2020). https:\/\/doi.org\/10.3390\/electronics9010094","journal-title":"Electron"},{"key":"4202_CR18","doi-asserted-by":"publisher","first-page":"45325","DOI":"10.1109\/ACCESS.2021.3067029","volume":"9","author":"P Franco","year":"2021","unstructured":"Franco, P., Martinez, J.M., Kim, Y.C., Ahmed, M.A.: IoT based approach for load monitoring and activity recognition in smart homes. IEEE Access 9, 45325\u201345339 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3067029","journal-title":"IEEE Access"},{"key":"4202_CR19","doi-asserted-by":"publisher","first-page":"18352","DOI":"10.1109\/ACCESS.2022.3148140","volume":"10","author":"NM Allifah","year":"2022","unstructured":"Allifah, N.M., Zualkernan, I.A.: Ranking security of IoT-based smart home consumer devices. IEEE Access 10, 18352\u201318369 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3148140","journal-title":"IEEE Access"},{"key":"4202_CR20","doi-asserted-by":"publisher","first-page":"133940","DOI":"10.1109\/ACCESS.2021.3116148","volume":"9","author":"P Franco","year":"2021","unstructured":"Franco, P., Martinez, J.M., Kim, Y.C., Ahmed, M.A.: A framework for iot based appliance recognition in smart homes. IEEE Access 9, 133940\u2013133960 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3116148","journal-title":"IEEE Access"},{"issue":"7","key":"4202_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics11071083","volume":"11","author":"Z Rahman","year":"2022","unstructured":"Rahman, Z., Yi, X., Billah, M., Sumi, M., Anwar, A.: Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home. Electron. 11(7), 1\u201315 (2022). https:\/\/doi.org\/10.3390\/electronics11071083","journal-title":"Electron."},{"key":"4202_CR22","doi-asserted-by":"publisher","first-page":"126186","DOI":"10.1109\/ACCESS.2021.3111443","volume":"9","author":"S Yu","year":"2021","unstructured":"Yu, S., Jho, N., Park, Y.: Lightweight three-factor-based privacy- preserving authentication scheme for IoT-enabled smart homes. IEEE Access 9, 126186\u2013126197 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3111443","journal-title":"IEEE Access"},{"key":"4202_CR23","doi-asserted-by":"publisher","first-page":"116747","DOI":"10.1109\/ACCESS.2022.3219068","volume":"10","author":"YH Lin","year":"2022","unstructured":"Lin, Y.H., Tang, H.S., Shen, T.Y., Hsia, C.H.: A smart home energy management system utilizing neurocomputing-based time-series load modeling and forecasting facilitated by energy decomposition for smart home automation. IEEE Access 10, 116747\u2013116765 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3219068","journal-title":"IEEE Access"},{"key":"4202_CR24","doi-asserted-by":"publisher","first-page":"58800","DOI":"10.1109\/ACCESS.2020.2982542","volume":"8","author":"G Ali","year":"2020","unstructured":"Ali, G., et al.: xDBAuth: blockchain based cross domain authentication and authorization framework for Internet of Things. IEEE Access 8, 58800\u201358816 (2020)","journal-title":"IEEE Access"},{"key":"4202_CR25","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4401809","author":"AR Kairaldeen","year":"2021","unstructured":"Kairaldeen, A.R., Abdullah, N.F., Abu-Samah, A., Nordin, R.: Data integrity time optimization of a blockchain IoT smart home network using different consensus and hash algorithms. Wirel. Commun. Mob. Comput. (2021). https:\/\/doi.org\/10.1155\/2021\/4401809","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"12","key":"4202_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s22124522","volume":"22","author":"MS Farooq","year":"2022","unstructured":"Farooq, M.S., Khan, S., Rehman, A., Abbas, S., Khan, M.A., Hwang, S.O.: Blockchain-based smart home networks security empowered with fused machine learning. Sensors 22(12), 1\u201313 (2022). https:\/\/doi.org\/10.3390\/s22124522","journal-title":"Sensors"},{"issue":"15","key":"4202_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.6934","volume":"34","author":"A Rizzardi","year":"2022","unstructured":"Rizzardi, A., Sicari, S., Miorandi, D., Coen-Porisini, A.: Securing the access control policies to the Internet of Things resources through permissioned blockchain. Concurr. Comput. Pract. Exp. 34(15), 1\u201319 (2022). https:\/\/doi.org\/10.1002\/cpe.6934","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"10","key":"4202_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics9101746","volume":"9","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Wu, M.: Blockchain use in IoT for privacy-preserving anti-pandemic home quarantine. Electron 9(10), 1\u201316 (2020). https:\/\/doi.org\/10.3390\/electronics9101746","journal-title":"Electron"},{"issue":"12","key":"4202_CR29","doi-asserted-by":"publisher","first-page":"4522","DOI":"10.3390\/s22124522","volume":"22","author":"MS Farooq","year":"2022","unstructured":"Farooq, M.S., Khan, S., Rehman, A., Abbas, S., Khan, M.A., Hwang, S.O.: Blockchain-based smart home networks security empowered with fused machine learning. Sensors 22(12), 4522 (2022)","journal-title":"Sensors"},{"issue":"4","key":"4202_CR30","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.3390\/app11041772","volume":"11","author":"S Algarni","year":"2021","unstructured":"Algarni, S., et al.: Blockchain-based secured access control in an IoT system. Appl. Sci. 11(4), 1772 (2021)","journal-title":"Appl. Sci."},{"issue":"3","key":"4202_CR31","first-page":"300","volume":"2","author":"LA Ajao","year":"2019","unstructured":"Ajao, L.A., Agajo, J., Adedokun, E.A., Karngong, L.: Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry. J 2(3), 300\u2013325 (2019)","journal-title":"J"},{"key":"4202_CR32","doi-asserted-by":"crossref","unstructured":"Ajao, L.A., Apeh, S.T.: Blockchain integration with machine learning for securing fog computing vulnerability in smart city sustainability. In: 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), pp. 1\u20136. IEEE (2023)","DOI":"10.1109\/ICAISC56366.2023.10085192"},{"issue":"5","key":"4202_CR33","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0217499","volume":"14","author":"M Ehteram","year":"2019","unstructured":"Ehteram, M., Singh, V.P., Ferdowsi, A., Mousavi, S.F., Farzin, S., Karami, H., Mohd, N.S., Afan, H.A., Lai, S.H., Kisi, O., Malek, M.A.: An improved model based on the support vector machine and cuckoo algorithm for simulating reference evapotranspiration. PLoS ONE 14(5), e0217499 (2019)","journal-title":"PLoS ONE"},{"issue":"20","key":"4202_CR34","doi-asserted-by":"publisher","first-page":"10651","DOI":"10.1007\/s00500-022-06798-2","volume":"26","author":"M Imran","year":"2022","unstructured":"Imran, M., Khan, S., Hlavacs, H., Khan, F.A., Anwar, S.: Intrusion detection in networks using cuckoo search optimization. Soft. Comput. 26(20), 10651\u201310663 (2022)","journal-title":"Soft. Comput."},{"issue":"2","key":"4202_CR35","doi-asserted-by":"publisher","first-page":"2283","DOI":"10.32604\/iasc.2023.037673","volume":"37","author":"MS Al-kahtani","year":"2023","unstructured":"Al-kahtani, M.S., Mehmood, Z., Sadad, T., Zada, I., Ali, G., ElAffendi, M.: Intrusion detection in the Internet of Things using fusion of GRU-LSTM deep learning model. Intell. Autom. Soft Comput. 37(2), 2283 (2023)","journal-title":"Intell. Autom. Soft Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04202-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04202-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04202-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T14:31:42Z","timestamp":1722609102000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04202-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,28]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["4202"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04202-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,28]]},"assertion":[{"value":"25 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}