{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T21:07:26Z","timestamp":1765487246796,"version":"3.48.0"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05770-7","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T18:52:59Z","timestamp":1760727179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed secured and trustworthy IoT framework based on SDN, AI, and blockchain"],"prefix":"10.1007","volume":"28","author":[{"given":"Wiem","family":"Bekri","sequence":"first","affiliation":[]},{"given":"Rihab","family":"Jmal","sequence":"additional","affiliation":[]},{"given":"Lamia","family":"Chaari Fourati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"issue":"1","key":"5770_CR1","first-page":"41","volume":"5","author":"P Gokhale","year":"2018","unstructured":"Gokhale, P., Bhat, O., Bhat, S.: Introduction to iot. International Advanced Research Journal in Science, Engineering and Technology 5(1), 41\u201344 (2018)","journal-title":"International Advanced Research Journal in Science, Engineering and Technology"},{"key":"5770_CR2","doi-asserted-by":"crossref","unstructured":"Rimal, B.P., Choi, E., Lumb, I.: A taxonomy and survey of cloud computing systems. In: 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 44\u201351 (2009). Ieee","DOI":"10.1109\/NCM.2009.218"},{"key":"5770_CR3","doi-asserted-by":"crossref","unstructured":"Stockinger, H.: Distributed database management systems and the data grid. In: 2001 Eighteenth IEEE Symposium on Mass Storage Systems and Technologies, pp. 1\u20131 (2001). IEEE","DOI":"10.1109\/MSS.2001.10003"},{"issue":"3","key":"5770_CR4","first-page":"369","volume":"13","author":"MK Mishra","year":"2017","unstructured":"Mishra, M.K., Patel, Y.S., Ghosh, M., Mund, G.: A review and classification of grid computing systems. Int. J. Comput. Intell. Res. 13(3), 369\u2013402 (2017)","journal-title":"Int. J. Comput. Intell. Res."},{"issue":"18","key":"5770_CR5","doi-asserted-by":"publisher","first-page":"5803","DOI":"10.1002\/sec.1737","volume":"9","author":"K Benzekki","year":"2016","unstructured":"Benzekki, K., El Fergougui, A., Elbelrhiti Elalaoui, A.: Software-defined networking (sdn): a survey. Security and communication networks 9(18), 5803\u20135833 (2016)","journal-title":"Security and communication networks"},{"issue":"5","key":"5770_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCSE.2017.3421554","volume":"19","author":"M Pierro","year":"2017","unstructured":"Pierro, M.: What is the blockchain? Comput Sci Eng 19(5), 92\u201395 (2017)","journal-title":"Comput Sci Eng"},{"key":"5770_CR7","volume-title":"Artificial Intelligence","author":"MA Boden","year":"1996","unstructured":"Boden, M.A.: Artificial Intelligence. Elsevier, Amsterdam (1996)"},{"issue":"19","key":"5770_CR8","doi-asserted-by":"publisher","first-page":"3799","DOI":"10.3390\/electronics13193799","volume":"13","author":"H Alrashede","year":"2024","unstructured":"Alrashede, H., Eassa, F., Marish Ali, A., Albalwy, F., Aljihani, H.: A blockchain-based security framework for east-west interface of sdn. Electronics 13(19), 3799 (2024)","journal-title":"Electronics"},{"issue":"1","key":"5770_CR9","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-55662-w","volume":"14","author":"A Rahman","year":"2024","unstructured":"Rahman, A., Wadud, M.A.H., Islam, M.J., Kundu, D., Bhuiyan, T.A.-U.-H., Muhammad, G., Ali, Z.: Internet of medical things and blockchain-enabled patient-centric agent through sdn for remote patient monitoring in 5g network. Sci. Rep. 14(1), 5297 (2024)","journal-title":"Sci. Rep."},{"key":"5770_CR10","doi-asserted-by":"crossref","unstructured":"Pawar, P.P., Kumar, D., Ananthan, B., Pradeepa, A.S., Selvi, A.S.: An efficient ddos attack detection using attention based hybrid model in blockchain based sdn-iot. In: 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT), pp. 1\u20135 (2024). IEEE","DOI":"10.1109\/AIIoT58432.2024.10574596"},{"key":"5770_CR11","doi-asserted-by":"crossref","unstructured":"Islam, J., Rahman, A., Kabir, S., Karim, R., Acharjee, U.K., Nasir, M.K., Band, S.S., Mosavi, A.: Blockchain-sdn based energy optimized and distributed secure architecture for iots in smart cities. Preprints (2020)","DOI":"10.20944\/preprints202011.0552.v1"},{"issue":"20","key":"5770_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/s22207917","volume":"22","author":"S Asaithambi","year":"2022","unstructured":"Asaithambi, S., Ravi, L., Kotb, H., Milyani, A.H., Azhari, A.A., Nallusamy, S., Varadarajan, V., Vairavasundaram, S.: An energy-efficient and blockchain-integrated software defined network for the industrial internet of things. Sensors 22(20), 7917 (2022)","journal-title":"Sensors"},{"issue":"11","key":"5770_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.14569\/IJACSA.2023.0141113","volume":"14","author":"A Sharmin","year":"2023","unstructured":"Sharmin, A., Olanrewaju, R.F., Khan, B.U.I., Anwar, F., Motakabber, S., Rosely, N., Hashim, A.H.A.: Secure iot routing through manifold criterion trust evaluation using ant colony optimization. International Journal of Advanced Computer Science and Applications 14(11), 131\u2013143 (2023)","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"11","key":"5770_CR14","doi-asserted-by":"publisher","DOI":"10.3390\/info13110544","volume":"13","author":"BUI Khan","year":"2022","unstructured":"Khan, B.U.I., Anwar, F., Rahman, F.D.B.A., Olanrewaju, R.F., Goh, K.W., Janin, Z., Rahman, M.A.: Sgm: strategic game model for resisting node misbehaviour in iot-cloud ecosystem. Information 13(11), 544 (2022)","journal-title":"Information"},{"key":"5770_CR15","doi-asserted-by":"publisher","first-page":"98481","DOI":"10.1109\/ACCESS.2020.2997711","volume":"8","author":"BUI Khan","year":"2020","unstructured":"Khan, B.U.I., Anwar, F., Olanrewaju, R.F., Pampori, B.R., Mir, R.N.: A novel multi-agent and multilayered game formulation for intrusion detection in internet of things (iot). IEEE Access 8, 98481\u201398490 (2020)","journal-title":"IEEE Access"},{"key":"5770_CR16","doi-asserted-by":"publisher","first-page":"61778","DOI":"10.1109\/ACCESS.2021.3073343","volume":"9","author":"BUI Khan","year":"2021","unstructured":"Khan, B.U.I., Anwar, F., Olanrewaju, R.F., Kiah, M.L.B.M., Mir, R.N.: Game theory analysis and modeling of sophisticated multi-collusion attack in manets. IEEE Access 9, 61778\u201361792 (2021)","journal-title":"IEEE Access"},{"key":"5770_CR17","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Zindros, D.: Proof-of-work sidechains. In: Financial Cryptography and Data Security: FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18\u201322, 2019, Revised Selected Papers 23, pp. 21\u201334 (2020). Springer","DOI":"10.1007\/978-3-030-43725-1_3"},{"key":"5770_CR18","unstructured":"Siim, J.: Proof-of-stake. In: Research Seminar in Cryptography (2017)"},{"key":"5770_CR19","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.procs.2022.01.071","volume":"199","author":"MA Manolache","year":"2022","unstructured":"Manolache, M.A., Manolache, S., Tapus, N.: Decision making using the blockchain proof of authority consensus. Procedia Computer Science 199, 580\u2013588 (2022)","journal-title":"Procedia Computer Science"},{"key":"5770_CR20","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro, M., Liskov, B., et al.: Practical byzantine fault tolerance. In: OsDI 99, 173\u2013186 (1999)","journal-title":"Practical byzantine fault tolerance. In: OsDI"},{"issue":"7","key":"5770_CR21","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1016\/j.engappai.2012.05.002","volume":"25","author":"LC De Silva","year":"2012","unstructured":"De Silva, L.C., Morikawa, C., Petra, I.M.: State of the art of smart homes. Engineering Applications of Artificial Intelligence 25(7), 1313\u20131321 (2012)","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"9","key":"5770_CR22","first-page":"661","volume":"5","author":"MS Anwer","year":"2014","unstructured":"Anwer, M.S., Guy, C.: A survey of vanet technologies. J. Emerg. Trends. Comput. Inf. Sci 5(9), 661\u2013671 (2014)","journal-title":"J. Emerg. Trends. Comput. Inf. Sci"},{"issue":"6","key":"5770_CR23","first-page":"838","volume":"5","author":"N Gondchawar","year":"2016","unstructured":"Gondchawar, N., Kawitkar, R., et al.: Iot based smart agriculture. Inter. J. Adv. Res. Comput. Commun. Eng. 5(6), 838\u2013842 (2016)","journal-title":"Inter. J. Adv. Res. Comput. Commun. Eng."},{"issue":"44","key":"5770_CR24","first-page":"46","volume":"21","author":"N Scarpato","year":"2017","unstructured":"Scarpato, N., Pieroni, A., Di Nunzio, L., Fallucchi, F.: E-health-iot universe: A review. management 21(44), 46 (2017)","journal-title":"E-health-iot universe: A review. management"},{"key":"5770_CR25","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/j.future.2019.02.012","volume":"96","author":"F Al-Turjman","year":"2019","unstructured":"Al-Turjman, F., Abujubbeh, M.: Iot-enabled smart grid via sm: an overview. Future Generation Computer Systems 96, 579\u2013590 (2019)","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"5770_CR26","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s11280-020-00855-2","volume":"24","author":"Y Al-Hadhrami","year":"2021","unstructured":"Al-Hadhrami, Y., Hussain, F.K.: Ddos attacks in iot networks: a comprehensive systematic literature review. World Wide Web 24(3), 971\u20131001 (2021)","journal-title":"World Wide Web"},{"issue":"3","key":"5770_CR27","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1109\/TII.2021.3089462","volume":"18","author":"O Salem","year":"2021","unstructured":"Salem, O., Alsubhi, K., Shaafi, A., Gheryani, M., Mehaoua, A., Boutaba, R.: Man-in-the-middle attack mitigation in internet of medical things. IEEE Trans. Industr. Inf. 18(3), 2053\u20132062 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"5770_CR28","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.comcom.2019.12.037","volume":"151","author":"B Li","year":"2020","unstructured":"Li, B., Ye, R., Gu, G., Liang, R., Liu, W., Cai, K.: A detection mechanism on malicious nodes in iot. Computer Communications 151, 51\u201359 (2020)","journal-title":"Computer Communications"},{"key":"5770_CR29","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1016\/j.future.2019.07.021","volume":"101","author":"L Liu","year":"2019","unstructured":"Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in iot networks. Future Generation Computer Systems 101, 865\u2013879 (2019)","journal-title":"Future Generation Computer Systems"},{"issue":"9","key":"5770_CR30","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.mpsur.2009.07.005","volume":"27","author":"A Nightingale","year":"2009","unstructured":"Nightingale, A.: A guide to systematic literature reviews. Surgery (Oxford) 27(9), 381\u2013384 (2009)","journal-title":"Surgery (Oxford)"},{"key":"5770_CR31","doi-asserted-by":"publisher","first-page":"29800","DOI":"10.1109\/ACCESS.2023.3260777","volume":"11","author":"SW Turner","year":"2023","unstructured":"Turner, S.W., Karakus, M., Guler, E., Uludag, S.: A promising integration of sdn and blockchain for iot networks: a survey. IEEE Access 11, 29800\u201329822 (2023)","journal-title":"IEEE Access"},{"issue":"4","key":"5770_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09682-4","volume":"30","author":"A Rahman","year":"2022","unstructured":"Rahman, A., Montieri, A., Kundu, D., Karim, M.R., Islam, M.J., Umme, S., Nascita, A., Pescap\u00e9, A.: On the integration of blockchain and sdn: overview, applications, and future perspectives. J. Netw. Syst. Manage. 30(4), 73 (2022)","journal-title":"J. Netw. Syst. Manage."},{"issue":"23","key":"5770_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/su162310177","volume":"16","author":"S Almarri","year":"2024","unstructured":"Almarri, S., Aljughaiman, A.: Blockchain technology for iot security and trust: a comprehensive slr. Sustainability 16(23), 10177 (2024)","journal-title":"Sustainability"},{"issue":"16","key":"5770_CR34","doi-asserted-by":"publisher","first-page":"14483","DOI":"10.1109\/JIOT.2023.3268705","volume":"10","author":"M Shen","year":"2023","unstructured":"Shen, M., Gu, A., Kang, J., Tang, X., Lin, X., Zhu, L., Niyato, D.: Blockchains for artificial intelligence of things: a comprehensive survey. IEEE Internet Things J. 10(16), 14483\u201314506 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5770_CR35","doi-asserted-by":"publisher","first-page":"44772","DOI":"10.1109\/ACCESS.2023.3267764","volume":"11","author":"H Ahmadvand","year":"2023","unstructured":"Ahmadvand, H., Lal, C., Hemmati, H., Sookhak, M., Conti, M.: Privacy-preserving and security in sdn-based iot: a survey. IEEE Access 11, 44772\u201344786 (2023)","journal-title":"IEEE Access"},{"key":"5770_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3393548","author":"AH Abdi","year":"2024","unstructured":"Abdi, A.H., Audah, L., Salh, A., Alhartomi, M.A., Rasheed, H., Ahmed, S., Tahir, A.: Security control and data planes of sdn: A comprehensive review of traditional, ai and mtd approaches to security solutions. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3393548","journal-title":"IEEE Access"},{"issue":"7","key":"5770_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/technologies12070099","volume":"12","author":"BJ Ospina Cifuentes","year":"2024","unstructured":"Ospina Cifuentes, B.J., Su\u00e1rez, \u00c1., Garc\u00eda Pineda, V., Alvarado Jaimes, R., Montoya Benitez, A.O., Grajales Bustamante, J.D.: Analysis of the use of artificial intelligence in software-defined intelligent networks: a survey. Technologies 12(7), 99 (2024)","journal-title":"Technologies"},{"key":"5770_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3365634","author":"M Humayun","year":"2024","unstructured":"Humayun, M., Tariq, N., Alfayad, M., Zakwan, M., Alwakid, G., Assiri, M.: Securing the internet of things in artificial intelligence era: A comprehensive survey. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3365634","journal-title":"IEEE Access"},{"issue":"4","key":"5770_CR39","doi-asserted-by":"publisher","first-page":"2279","DOI":"10.3390\/ai5040112","volume":"5","author":"R Abreu","year":"2024","unstructured":"Abreu, R., Sim\u00e3o, E., Ser\u00f4dio, C., Branco, F., Valente, A.: Enhancing iot security in vehicles: a comprehensive review of ai-driven solutions for cyber-threat detection. AI 5(4), 2279\u20132299 (2024)","journal-title":"AI"},{"issue":"3","key":"5770_CR40","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s11235-023-01089-z","volume":"85","author":"W Bekri","year":"2024","unstructured":"Bekri, W., Jmal, R., Fourati, L.C.: Secure and trustworthiness iot systems: investigations and literature review. Telecommun. Syst. 85(3), 503\u2013538 (2024)","journal-title":"Telecommun. Syst."},{"key":"5770_CR41","doi-asserted-by":"publisher","first-page":"57128","DOI":"10.1109\/ACCESS.2024.3382709","volume":"12","author":"M Adam","year":"2024","unstructured":"Adam, M., Hammoudeh, M., Alrawashdeh, R., Alsulaimy, B.: A survey on security, privacy, trust, and architectural challenges in iot systems. IEEE Access 12, 57128 (2024)","journal-title":"IEEE Access"},{"key":"5770_CR42","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TCE.2024.3365673","volume":"70","author":"KA Awan","year":"2024","unstructured":"Awan, K.A., Din, I.U., Almogren, A., Rodrigues, J.J.: Artificial intelligence and quantum synergies in trust-enhanced consumer applications for software defined networks. IEEE.Trans.Cons.Elect 70, 791 (2024)","journal-title":"IEEE.Trans.Cons.Elect"},{"key":"5770_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110109","volume":"237","author":"KK Karmakar","year":"2023","unstructured":"Karmakar, K.K., Varadharajan, V., Hitchens, M., Tupakula, U., Sariputra, P.: A trust-aware openflow switching framework for software defined networks (sdn). Computer Networks 237, 110109 (2023)","journal-title":"Computer Networks"},{"key":"5770_CR44","doi-asserted-by":"crossref","unstructured":"Kumhar, M., Bhatia, J., Jadav, N.K., Gupta, R., Tanwar, S.: Ai-based intelligent sdn controller to optimize onion routing framework for iomt environment. In: 2023 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 885\u2013890 (2023). IEEE","DOI":"10.1109\/ICCWorkshops57953.2023.10283774"},{"issue":"6","key":"5770_CR45","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1016\/j.dcan.2022.07.001","volume":"9","author":"J Jiang","year":"2023","unstructured":"Jiang, J., Lin, C., Han, G., Abu-Mahfouz, A.M., Shah, S.B.H., Mart\u00ednez-Garc\u00eda, M.: How ai-enabled sdn technologies improve the security and functionality of industrial iot network: architectures, enabling technologies, and opportunities. Digital Communications and Networks 9(6), 1351\u20131362 (2023)","journal-title":"Digital Communications and Networks"},{"key":"5770_CR46","doi-asserted-by":"crossref","unstructured":"Rahman, A., Eidmum, M., Kundu, D., Hossain, M., Tashrif, M., Karim, M.A., Islam, M.J.: Distb-vnet: Distributed cluster-based blockchain vehicular ad-hoc networks through sdn-nfv for smart city. arXiv preprint arXiv:2412.04222 (2024)","DOI":"10.1109\/ICCIT64611.2024.11022025"},{"issue":"3","key":"5770_CR47","first-page":"26","volume":"6","author":"S Kumar","year":"2024","unstructured":"Kumar, S., Kumar, M., Azmea, C.N., Vaigandla, K.K.: Bcsdncc: a secure blockchain sdn framework for iot and cloud computing. International Research Journal of Multidisciplinary Technovation 6(3), 26\u201344 (2024)","journal-title":"International Research Journal of Multidisciplinary Technovation"},{"issue":"12","key":"5770_CR48","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.3390\/pr12091825","volume":"2024","author":"B Khan","year":"2024","unstructured":"Khan, B., Goh, K., Khan, A., Zuhairi, M., Chaimanee, M.: Integrating AI and blockchain for enhanced data security in IoT-driven smart cities. Processes 2024(12), 1825 (2024)","journal-title":"Processes"},{"key":"5770_CR49","doi-asserted-by":"crossref","unstructured":"Barach, J.: Towards zero trust security in sdn: A multi-layered defense strategy. In: Proceedings of the 26th International Conference on Distributed Computing and Networking, pp. 331\u2013339 (2025)","DOI":"10.1145\/3700838.3703671"},{"key":"5770_CR50","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comcom.2024.04.001","volume":"221","author":"UH Garba","year":"2024","unstructured":"Garba, U.H., Toosi, A.N., Pasha, M.F., Khan, S.: Sdn-based detection and mitigation of ddos attacks on smart homes. Comput. Commun. 221, 29\u201341 (2024)","journal-title":"Comput. Commun."},{"issue":"2","key":"5770_CR51","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.dcan.2022.11.003","volume":"9","author":"A Rahman","year":"2023","unstructured":"Rahman, A., Islam, M.J., Band, S.S., Muhammad, G., Hasan, K., Tiwari, P.: Towards a blockchain-sdn-based secure architecture for cloud computing in smart industrial iot. Digital Communications and Networks 9(2), 411\u2013421 (2023)","journal-title":"Digital Communications and Networks"},{"issue":"4","key":"5770_CR52","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10723-023-09693-8","volume":"21","author":"J Ali","year":"2023","unstructured":"Ali, J., Shan, G., Gul, N., Roh, B.-H.: An intelligent blockchain-based secure link failure recovery framework for software-defined internet-of-things. J. Grid Computing 21(4), 57 (2023)","journal-title":"J. Grid Computing"},{"key":"5770_CR53","doi-asserted-by":"crossref","unstructured":"Ohri, P., Daniel, A., Neogi, S.G., Muttoo, S.K.: Blockchain-based security framework for mitigating network attacks in multi-sdn controller environment. International Journal of Information Technology, 1\u201313 (2024)","DOI":"10.1007\/s41870-024-01933-8"},{"issue":"1","key":"5770_CR54","doi-asserted-by":"publisher","DOI":"10.3390\/sym17010061","volume":"17","author":"BUI Khan","year":"2025","unstructured":"Khan, B.U.I., Goh, K.W., Khan, A.R., Zuhairi, M.F., Chaimanee, M.: Resource management and secure data exchange for mobile sensors using ethereum blockchain. Symmetry 17(1), 61 (2025)","journal-title":"Symmetry"},{"issue":"4","key":"5770_CR55","doi-asserted-by":"publisher","first-page":"212","DOI":"10.3390\/info15040212","volume":"15","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., Goh, K.W., Mir, M.S., Mohd Rosely, N.F.L., Mir, A.A., Chaimanee, M.: Blockchain-enhanced sensor-as-a-service (seaas) in iot: Leveraging blockchain for efficient and secure sensing data transactions. Information 15(4), 212 (2024)","journal-title":"Information"},{"issue":"23","key":"5770_CR56","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11233982","volume":"11","author":"RF Olanrewaju","year":"2022","unstructured":"Olanrewaju, R.F., Khan, B.U.I., Kiah, M.L.M., Abdullah, N.A., Goh, K.W.: Decentralized blockchain network for resisting side-channel attacks in mobility-based iot. Electronics 11(23), 3982 (2022)","journal-title":"Electronics"},{"key":"5770_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6","volume-title":"Introducing Ethereum and Solidity","author":"C Dannen","year":"2017","unstructured":"Dannen, C.: Introducing Ethereum and Solidity, vol. 1. Springer, Berlin (2017)"},{"key":"5770_CR58","doi-asserted-by":"crossref","unstructured":"Samreen, N.F., Alalfi, M.H.: Reentrancy vulnerability identification in ethereum smart contracts. In: 2020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pp. 22\u201329 (2020). IEEE","DOI":"10.1109\/IWBOSE50093.2020.9050260"},{"issue":"1","key":"5770_CR59","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.30574\/ijsra.2024.11.1.0332","volume":"11","author":"T Alam","year":"2024","unstructured":"Alam, T., Ali, M., Rahman, M., et al.: Front-running attack in decentralized finance in the metaverse: a systematic review. Int. J. Sci. Res. Arch 11(1), 2315\u20132324 (2024)","journal-title":"Int. J. Sci. Res. Arch"},{"key":"5770_CR60","unstructured":"Askar, S., Keti, F.: Performance evaluation of different sdn controllers (2021)"},{"key":"5770_CR61","unstructured":"Kaur, K., Singh, J., Ghumman, N.S.: Mininet as software defined networking testing platform. In: International Conference on Communication, Computing & Systems (ICCCS), pp. 139\u201342 (2014). IEEE"},{"key":"5770_CR62","unstructured":"Hertzog, R., O\u2019Gorman, J., Aharoni, M.: Kali linux revealed. Mastering the Penetration Testing Distribution (2017)"},{"key":"5770_CR63","doi-asserted-by":"crossref","unstructured":"Lee, W.-M., Lee, W.-M.: Using the metamask chrome extension. Beginning Ethereum Smart Contracts Programming: With Examples in Python, Solidity, and JavaScript, 93\u2013126 (2019)","DOI":"10.1007\/978-1-4842-5086-0_5"},{"key":"5770_CR64","doi-asserted-by":"crossref","unstructured":"Jain, S.M.: Introduction to remix ide. In: A Brief Introduction to Web3: Decentralized Web Fundamentals for App Development, pp. 89\u2013126. Springer, (2022)","DOI":"10.1007\/978-1-4842-8975-4_5"},{"issue":"6","key":"5770_CR65","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MIC.2010.145","volume":"14","author":"S Tilkov","year":"2010","unstructured":"Tilkov, S., Vinoski, S.: Node. js: Using javascript to build high-performance network programs. IEEE Internet Computing 14(6), 80\u201383 (2010)","journal-title":"IEEE Internet Computing"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05770-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05770-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05770-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T21:02:33Z","timestamp":1765486953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05770-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":65,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5770"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05770-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"22 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"1065"}}