{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:38:44Z","timestamp":1776184724358,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05120-7","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T11:31:27Z","timestamp":1755603087000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SDIdA-IoT: self-sovereign digital identification and authentication framework for IoT devices using blockchain"],"prefix":"10.1007","volume":"28","author":[{"given":"Mahendra Kumar","family":"Jhariya","sequence":"first","affiliation":[]},{"given":"Vasudev","family":"Dehalwar","sequence":"additional","affiliation":[]},{"given":"Jyoti","family":"Bharti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"5120_CR1","doi-asserted-by":"publisher","unstructured":"V. Dehalwar, M. L. Kolhe, S. Solanki, M. K. Jhariya and K. Ogura, \"Blockchain based device identification and authentication in a Smart Grid,\" 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech), Split, Croatia, 2020, pp. 1\u20135, https:\/\/doi.org\/10.23919\/SpliTech49282.2020.9243707.","DOI":"10.23919\/SpliTech49282.2020.9243707"},{"key":"5120_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clet.2022.100481","author":"V Dehalwar","year":"2022","unstructured":"Dehalwar, V., Kolhe, M.L., Deoli, S., Jhariya, M.K.: Blockchain-based trust management and authentication of devices in smart grid. Clean. Eng. Technol. (2022). https:\/\/doi.org\/10.1016\/j.clet.2022.100481","journal-title":"Clean. Eng. Technol."},{"key":"5120_CR3","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1016\/j.eti.2020.101129","volume":"20","author":"K Haseeb","year":"2020","unstructured":"Haseeb, K., Lee, S., Jeon, G.: EBDS: an energy-efficient big data-based secure framework using internet of things for green environment. Environ. Technol. Innovat. 20, 2352\u20131864 (2020). https:\/\/doi.org\/10.1016\/j.eti.2020.101129","journal-title":"Environ. Technol. Innovat."},{"key":"5120_CR4","doi-asserted-by":"publisher","unstructured":"V. Dahiphale, G. Bansod and J. Patil, \"ANU-II: A fast and efficient lightweight encryption design for security in IoT,\" 2017 International Conference on Big Data, IoT and Data Science (BID), Pune, India, 2017, pp. 130\u2013137, https:\/\/doi.org\/10.1109\/BID.2017.8336586.","DOI":"10.1109\/BID.2017.8336586"},{"key":"5120_CR5","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1016\/j.matpr.2020.08.519","volume":"37","author":"P Velmurugadass","year":"2021","unstructured":"Velmurugadass, P., Dhanasekaran, S., ShasiAnand, S., Vasudevan, V.: Enhancing blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Mater. Today 37, 2653\u20132659 (2021). https:\/\/doi.org\/10.1016\/j.matpr.2020.08.519","journal-title":"Mater. Today"},{"key":"5120_CR6","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","volume":"134","author":"A Dorri","year":"2019","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: a lightweight scalable blockchain for IoT security and anonymity. J. Parallel Distribut. Comput. 134, 180\u2013197 (2019). https:\/\/doi.org\/10.1016\/j.jpdc.2019.08.005","journal-title":"J. Parallel Distribut. Comput."},{"key":"5120_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.jpdc.2021.04.003","volume":"154","author":"L Vishwakarma","year":"2021","unstructured":"Vishwakarma, L., Das, D.: SCAB - IoTA: secure communication and authentication for IoT applications using blockchain. J. Parallel Distribut. Comput. 154, 94\u2013105 (2021). https:\/\/doi.org\/10.1016\/j.jpdc.2021.04.003","journal-title":"J. Parallel Distribut. Comput."},{"key":"5120_CR8","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s44227-024-00029-w","volume":"12","author":"SH Gopalan","year":"2024","unstructured":"Gopalan, S.H., Manikandan, A., Dharani, N.P., et al.: Enhancing IoT security: a blockchain-based mitigation framework for deauthentication attacks. Int. J. Netw. Distrib. Comput. 12, 237\u2013249 (2024). https:\/\/doi.org\/10.1007\/s44227-024-00029-w","journal-title":"Int. J. Netw. Distrib. Comput."},{"key":"5120_CR9","doi-asserted-by":"publisher","first-page":"102448","DOI":"10.1016\/j.adhoc.2021.102448","volume":"115","author":"OA Khashan","year":"2021","unstructured":"Khashan, O.A., Ahmad, R., Khafajah, N.M.: An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw.Netw. 115, 102448 (2021). https:\/\/doi.org\/10.1016\/j.adhoc.2021.102448","journal-title":"Ad Hoc Netw.Netw."},{"key":"5120_CR10","doi-asserted-by":"publisher","first-page":"3229","DOI":"10.1007\/s11277-020-07979-8","volume":"117","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Abhishek, K., Liu, X., et al.: An efficient privacy-preserving ID centric authentication in IoT based cloud servers for sustainable smart cities. Wireless Pers. Commun.Commun. 117, 3229\u20133253 (2021). https:\/\/doi.org\/10.1007\/s11277-020-07979-8","journal-title":"Wireless Pers. Commun.Commun."},{"key":"5120_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.adhoc.2019.03.003","volume":"89","author":"V Rao","year":"2019","unstructured":"Rao, V., Prema, K.V.: Light-weight hashing method for user authentication in internet-of-things. Adv. Hoc. Netw. 89, 97\u2013106 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2019.03.003","journal-title":"Adv. Hoc. Netw."},{"key":"5120_CR12","doi-asserted-by":"publisher","unstructured":"P. C. Bartolomeu, E. Vieira, S. M. Hosseini and J. Ferreira, \"Self-sovereign identity: use-cases, technologies, and challenges for industrial IoT,\" 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Zaragoza, Spain, 2019, pp. 1173\u20131180, https:\/\/doi.org\/10.1109\/ETFA.2019.8869262.","DOI":"10.1109\/ETFA.2019.8869262"},{"key":"5120_CR13","doi-asserted-by":"publisher","unstructured":"Bubbles of Trust: A decentralized blockchain-based authentication system for IoT, Computers & Security, Volume 78, 2018, Pages 126\u2013142, ISSN 0167\u20134048, https:\/\/doi.org\/10.1016\/j.cose.2018.06.004.","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"5120_CR14","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","volume":"12","author":"R Li","year":"2019","unstructured":"Li, R., Song, T., Mei, B., Li, H., Cheng, X., Sun, L.: Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Service. Comput. 12, 762\u2013771 (2019). https:\/\/doi.org\/10.1109\/TSC.2018.2853167","journal-title":"IEEE Trans. Service. Comput."},{"key":"5120_CR15","doi-asserted-by":"publisher","first-page":"18207","DOI":"10.1109\/ACCESS.2020.2968492","volume":"8","author":"H Liu","year":"2020","unstructured":"Liu, H., Han, D., Li, D.: Fabric-iot: a blockchain-based access control system in IoT. IEEE Access 8, 18207\u201318218 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2968492","journal-title":"IEEE Access"},{"key":"5120_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1186\/s13638-021-01986-4","volume":"2021","author":"L Song","year":"2021","unstructured":"Song, L., Ju, X., Zhu, Z., et al.: An access control model for the internet of things based on zero-knowledge token and blockchain. J. Wireless Com. Netw. 2021, 105 (2021). https:\/\/doi.org\/10.1186\/s13638-021-01986-4","journal-title":"J. Wireless Com. Netw."},{"key":"5120_CR17","doi-asserted-by":"publisher","unstructured":"A. Singh and K. Chatterjee, \"A secure multi-tier authentication scheme in cloud computing environment,\" 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Nagercoil, India, 2015, pp. 1\u20137, https:\/\/doi.org\/10.1109\/ICCPCT.2015.7159276.","DOI":"10.1109\/ICCPCT.2015.7159276"},{"key":"5120_CR18","doi-asserted-by":"publisher","unstructured":"J. H. Yang and P. Y. Lin, \"An ID-based user authentication scheme for cloud computing,\" 2014 tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, 2014, pp. 98\u2013101, https:\/\/doi.org\/10.1109\/IIH-MSP.2014.31","DOI":"10.1109\/IIH-MSP.2014.31"},{"key":"5120_CR19","doi-asserted-by":"publisher","first-page":"6960","DOI":"10.3390\/su12176960","volume":"12","author":"M Tahir","year":"2020","unstructured":"Tahir, M., Sardaraz, M., Muhammad, S., Saud Khan, M.: A lightweight authentication and authorization framework for blockchain-enabled iot network in health-informatics. Sustainability 12, 6960 (2020). https:\/\/doi.org\/10.3390\/su12176960","journal-title":"Sustainability"},{"key":"5120_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3390\/fi13020024","volume":"13","author":"MA Bouras","year":"2021","unstructured":"Bouras, M.A., Lu, Q., Dhelim, S., Ning, H.: A lightweight blockchain-based IoT identity management approach. Future Int. 13, 24 (2021). https:\/\/doi.org\/10.3390\/fi13020024","journal-title":"Future Int."},{"key":"5120_CR21","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.3390\/app11041772","volume":"11","author":"S Algarni","year":"2021","unstructured":"Algarni, S., Eassa, F., Almarhabi, K., Almalaise, A., Albassam, E., Alsubhi, K., Yamin, M.: Blockchain-based secured access control in an IoT system. Appl. Sci. 11, 1772 (2021). https:\/\/doi.org\/10.3390\/app11041772","journal-title":"Appl. Sci."},{"key":"5120_CR22","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala, B.S., Pradhan, A.K., Badarla, V., Mohanty, S.P.: Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Int. Things J. 8, 11717\u201311731 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3058946","journal-title":"IEEE Int. Things J."},{"key":"5120_CR23","doi-asserted-by":"publisher","first-page":"203","DOI":"10.3390\/info12050203","volume":"12","author":"L Gong","year":"2021","unstructured":"Gong, L., Alghazzawi, D.M., Cheng, L.: BCoT sentry: a blockchain-based identity authentication framework for IoT devices. Information 12, 203 (2021). https:\/\/doi.org\/10.3390\/info12050203","journal-title":"Information"},{"key":"5120_CR24","doi-asserted-by":"publisher","first-page":"101011","DOI":"10.1109\/ACCESS.2022.3207803","volume":"10","author":"H Saidi","year":"2022","unstructured":"Saidi, H., Labraoui, N., Ari, A.A.A., Maglaras, L.A., Emati, J.H.M.: DSMAC: privacy-aware decentralized self-management of data access control based on blockchain for health data. IEEE Access 10, 101011\u2013101028 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3207803","journal-title":"IEEE Access"},{"key":"5120_CR25","doi-asserted-by":"publisher","first-page":"488","DOI":"10.3390\/app10020488","volume":"10","author":"T Sultana","year":"2020","unstructured":"Sultana, T., Almogren, A., Akbar, M., Zuair, M., Ullah, I., Javaid, N.: Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Appl. Sci. 10, 488 (2020). https:\/\/doi.org\/10.3390\/app10020488","journal-title":"Appl. Sci."},{"key":"5120_CR26","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/systems10020039","volume":"10","author":"S Venkatraman","year":"2022","unstructured":"Venkatraman, S., Parvin, S.: Developing an IoT identity management system using blockchain. Systems 10, 39 (2022). https:\/\/doi.org\/10.3390\/systems10020039","journal-title":"Systems"},{"key":"5120_CR27","doi-asserted-by":"publisher","first-page":"10556","DOI":"10.3390\/su131910556","volume":"13","author":"SYA Zaidi","year":"2021","unstructured":"Zaidi, S.Y.A., Shah, M.A., Khattak, H.A., Maple, C., Rauf, H.T., El-Sherbeeny, A.M., El-Meligy, M.A.: An attribute-based access control for IoT using blockchain and smart contracts. Sustainability 13, 10556 (2021). https:\/\/doi.org\/10.3390\/su131910556","journal-title":"Sustainability"},{"key":"5120_CR28","doi-asserted-by":"publisher","first-page":"6428","DOI":"10.1007\/s11227-017-2048-0","volume":"74","author":"S Kumari","year":"2018","unstructured":"Kumari, S., Karuppiah, M., Das, A.K., et al.: A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput.Supercomput. 74, 6428\u20136453 (2018). https:\/\/doi.org\/10.1007\/s11227-017-2048-0","journal-title":"J. Supercomput.Supercomput."},{"key":"5120_CR29","doi-asserted-by":"publisher","first-page":"102240","DOI":"10.1016\/j.adhoc.2020.102240","volume":"106","author":"S Medileh","year":"2020","unstructured":"Medileh, S., Laouid, A., Nagoudi, E.M.B., Euler, R., Bounceur, A., Hammoudeh, M., AlShaikh, M., Eleyan, A., Khashan, O.A.: A flexible encryption technique for the internet of things environment. Ad Hoc Netw.Netw. 106, 102240 (2020). https:\/\/doi.org\/10.1016\/j.adhoc.2020.102240","journal-title":"Ad Hoc Netw.Netw."},{"key":"5120_CR30","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-84","volume":"18","author":"J Lawrence Carter","year":"1979","unstructured":"Lawrence Carter, J., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci.Comput. Syst. Sci. 18, 143\u2013154 (1979). https:\/\/doi.org\/10.1016\/0022-0000(79)90044-84","journal-title":"J. Comput. Syst. Sci.Comput. Syst. Sci."},{"key":"5120_CR31","doi-asserted-by":"publisher","first-page":"102097","DOI":"10.1016\/j.scs.2020.102097","volume":"56","author":"TK Dang","year":"2020","unstructured":"Dang, T.K., Pham, C.D.M., Nguyen, T.L.P.: A pragmatic elliptic curve cryptography-based extension for energy-efficient device-to-device communications in smart cities. Sust. Citi. Soc. 56, 102097 (2020). https:\/\/doi.org\/10.1016\/j.scs.2020.102097","journal-title":"Sust. Citi. Soc."},{"key":"5120_CR32","doi-asserted-by":"publisher","unstructured":"Booher, D. D., Cambou, B., Carlson, A. H., & Philabaum, C. (2019). Dynamic key generation for polymorphic encryption. In S. Chakrabarti, & H. N. Saha (Eds.), 2019 IEEE 9th Annual computing and communication workshop and Conference, CCWC 2019 (pp. 482\u2013487). Article 8666500 (2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019). Institute of Electrical and Electronics Engineers Inc.. https:\/\/doi.org\/10.1109\/CCWC.2019.8666500","DOI":"10.1109\/CCWC.2019.8666500"},{"key":"5120_CR33","doi-asserted-by":"publisher","first-page":"20191","DOI":"10.1109\/ACCESS.2021.3051556","volume":"9","author":"A Altigani","year":"2021","unstructured":"Altigani, A., Hasan, S., Barry, B., Naserelden, S., Elsadig, M.A., Elshoush, H.T.: A Polymorphic advanced encryption standard \u2013 a novel approach. IEEE Access 9, 20191\u201320207 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3051556","journal-title":"IEEE Access"},{"key":"5120_CR34","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.1-26","author":"S Jin","year":"2021","unstructured":"Jin, S., Lee, S., Cho, S.M., Kim, H., Hong, S.: Novel key recovery attack on secure ECDSA implementation by exploiting collisions between unknown entries. IACR Trans. Cryptograph. Hardware Embed. Syst. (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.1-26","journal-title":"IACR Trans. Cryptograph. Hardware Embed. Syst."},{"key":"5120_CR35","doi-asserted-by":"crossref","unstructured":"Johnson, D., Menezes, A. and Vanstone, S. (2001) The Elliptic Curve Digital Signature Algorithm (ECDSA). Department of Combinatorics & Optimization, University of Waterloo. http:\/\/www.cs.miami.edu\/home\/burt\/learning\/Csc609.142\/ecdsa-cert.pdf.","DOI":"10.1007\/s102070100002"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05120-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05120-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05120-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:06:59Z","timestamp":1757963219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05120-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":35,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5120"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05120-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"7 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"495"}}