{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T14:11:46Z","timestamp":1771251106164,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key Project of Tianjin Natural Science Foundation","award":["25JCZDJC00420"],"award-info":[{"award-number":["25JCZDJC00420"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05951-y","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T13:22:59Z","timestamp":1771248179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A key assignment strategy for reliable sensor data delivery based on blockchain oracle"],"prefix":"10.1007","volume":"29","author":[{"given":"Lu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Degan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yingyuan","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"issue":"6","key":"5951_CR1","doi-asserted-by":"publisher","first-page":"3587","DOI":"10.1007\/s11276-019-01955-2","volume":"25","author":"JX Gao","year":"2019","unstructured":"Gao, J.X.: Novel approach of distributed & adaptive trust metrics for manet. Wireless Networks 25(6), 3587\u20133603 (2019)","journal-title":"Wireless Networks"},{"issue":"1","key":"5951_CR2","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TII.2013.2250910","volume":"10","author":"G Li","year":"2014","unstructured":"Li, G., Zhang, K.: An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Trans. Ind. Inf. 10(1), 766\u2013773 (2014)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"5951_CR3","first-page":"1","volume":"88","author":"S Liu","year":"2017","unstructured":"Liu, S.: Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education. J. Netw. Comput. Appl. 88, 1\u20139 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"5951_CR4","doi-asserted-by":"publisher","first-page":"1866","DOI":"10.1007\/s10489-018-1368-y","volume":"49","author":"T Zhang","year":"2019","unstructured":"Zhang, T.: Novel self-adaptive routing service algorithm for application of vanet. Appl. Intell. 49(5), 1866\u20131879 (2019)","journal-title":"Appl. Intell."},{"issue":"4","key":"5951_CR5","first-page":"741","volume":"7","author":"X Wang","year":"2015","unstructured":"Wang, X., Song, X.D.: A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Trans. Serv. Comput. 7(4), 741\u2013748 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"5951_CR6","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TWC.2019.2897296","volume":"18","author":"JN Yang","year":"2019","unstructured":"Yang, J.N., Mao, G.Q.: Optimal base station antenna downtilt in downlink cellular networks. IEEE Transactions on Wireless Communications 18(3), 1779\u20131791 (2019)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"5951_CR7","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.asoc.2019.03.053","volume":"80","author":"YY Cui","year":"2019","unstructured":"Cui, Y.Y., Zhang, T.: New quantum-genetic based OLSR protocol (QG-OLSR) for mobile ad hoc network. Appl. Soft Comput. 80, 285\u2013296 (2019)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"5951_CR8","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1109\/TITS.2018.2853165","volume":"20","author":"H Ge","year":"2019","unstructured":"Ge, H.: New multi-hop clustering algorithm for vehicular ad hoc network. IEEE Trans. Intell. Transp. Syst. 20(4), 1517\u20131530 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"5951_CR9","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.1109\/TVT.2017.2753772","volume":"67","author":"JQ Chen","year":"2018","unstructured":"Chen, J.Q., Mao, G.Q.: Capacity of cooperative vehicular networks with infrastructure support: multi-user case. IEEE Transactions on Vehicular Technology 67(2), 1546\u20131560 (2018)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"5951_CR10","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1109\/TCSS.2022.3193739","volume":"10","author":"JX Wang","year":"2023","unstructured":"Wang, J.X., Zhang, J.: New method of fuzzy mutli-criteria routing in vehicle ad-hoc network. IEEE Trans. Comput. Soc. Syst. 10(6), 3181\u20133193 (2023)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"5951_CR11","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/TCSS.2022.3228692","volume":"11","author":"WM Dong","year":"2024","unstructured":"Dong, W.M.: New computing tasks offloading method for MEC based on prospect theory framework. IEEE Transactions on Computational Social Systems 11(1), 770\u2013781 (2024)","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"8","key":"5951_CR12","doi-asserted-by":"publisher","first-page":"8324","DOI":"10.1109\/TITS.2023.3264553","volume":"24","author":"WJ Wang","year":"2023","unstructured":"Wang, W.J.: Novel edge caching approach based on multi-agent deep reinforcement learning for Internet of vehicles. IEEE Trans. Intell. Transp. Syst. 24(8), 8324\u20138338 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"5951_CR13","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1109\/TII.2023.3285301","volume":"20","author":"CH Ni","year":"2024","unstructured":"Ni, C.H.: New method of edge computing based data adaptive return in Internet of vehicles. IEEE Trans. Ind. Inform. 20(2), 2042\u20132052 (2024)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"5951_CR14","doi-asserted-by":"publisher","first-page":"3598","DOI":"10.1109\/TNSM.2024.3355967","volume":"21","author":"HZ An","year":"2024","unstructured":"An, H.Z.: Novel privacy awareness task offloading approach based on privacy entropy. IEEE Transactions on Network and Service Management 21(3), 3598\u20133608 (2024)","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"3","key":"5951_CR15","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1109\/TSUSC.2024.3503580","volume":"10","author":"ZH Zhang","year":"2025","unstructured":"Zhang, Z.H.: Novel approach of vehicular cooperative communication based on strategy of interval type-2 fuzzy logic and cooperative game. IEEE Transactions on Sustainable Computing 10(3), 588\u2013600 (2025)","journal-title":"IEEE Transactions on Sustainable Computing"},{"issue":"3","key":"5951_CR16","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1109\/TNSM.2025.3539865","volume":"22","author":"M Qiao","year":"2025","unstructured":"Qiao, M., E, H.L.: New offloading method of computing task based on gray wolf hunting optimization mechanism for the IoV. IEEE Trans. Netw. Serv. Manag. 22(3), 2264\u20132277 (2025)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"5951_CR17","doi-asserted-by":"publisher","first-page":"5190","DOI":"10.1109\/TR.2025.3617340","volume":"74","author":"WJ Wang","year":"2025","unstructured":"Wang, W.J.: New method of vehicular network content distribution based on edge caching and catch fish optimization strategy. IEEE Transactions on Reliability 74(4), 5190\u20135204 (2025)","journal-title":"IEEE Transactions on Reliability"},{"issue":"20","key":"5951_CR18","doi-asserted-by":"publisher","first-page":"43829","DOI":"10.1109\/JIOT.2025.3598760","volume":"12","author":"XM Zhu","year":"2025","unstructured":"Zhu, X.M., Zhang, T.: Novel approach of computational resource allocation in fog computing based on deep reinforcement learning strategies. IEEE Internet of Things Journal 12(20), 43829\u201343841 (2025)","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"5951_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10586-024-04923-4","volume":"28","author":"W Abbessi","year":"2025","unstructured":"Abbessi, W., Ouni, A.: Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger. Cluster Comput. 28(3), 187 (2025)","journal-title":"Cluster Comput."},{"issue":"3","key":"5951_CR20","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/s11227-025-07018-y","volume":"81","author":"FG Wu","year":"2025","unstructured":"Wu, F.G., Zhou, B.: Quantum-resistant blockchain and performance analysis. J. Supercomput. 81(3), 498 (2025)","journal-title":"J. Supercomput."},{"key":"5951_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103682","volume":"166","author":"L Zhang","year":"2025","unstructured":"Zhang, L.: New routing method based on sticky bacteria algorithm and link stability for vanet. Ad Hoc Netw. 166, 103682 (2025)","journal-title":"Ad Hoc Netw."},{"key":"5951_CR22","doi-asserted-by":"publisher","first-page":"111182","DOI":"10.1016\/j.comnet.2025.111182","volume":"262","author":"EM Cruz","year":"2025","unstructured":"Cruz, E.M., Junior, J.R.D.S: A, \u201cArchW3: An adaptive blockchain wallet architecture for Web3 applications,\u201d Comput. Netw., 262, 111182 (2025).","journal-title":"Comput. Netw."},{"issue":"3","key":"5951_CR23","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/TNSM.2025.3556456","volume":"22","author":"XC Guo","year":"2025","unstructured":"Guo, X.C., Liui, G.: Bechain: a sharding blockchain with higher security. IEEE Trans. Netw. Serv. Manag. 22(3), 2702\u20132714 (2025)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"5951_CR24","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1007\/s10586-025-05511-w","volume":"28","author":"S Kumar","year":"2025","unstructured":"Kumar, S., Kumar, J.S.: Federated blockchain and IPFS based secure interoperable healthcare system. Cluster Comput. 28, 794 (2025)","journal-title":"Cluster Comput."},{"issue":"10","key":"5951_CR25","doi-asserted-by":"publisher","first-page":"7459","DOI":"10.1109\/TSMC.2025.3595714","volume":"55","author":"MY Chen","year":"2025","unstructured":"Chen, M.Y., Gong, Y.M.: Vertical information sharing in a blockchain-enabled supply chain. IEEE Transactions on Systems, Man, and Cybernetics: Systems 55(10), 7459\u20137471 (2025)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"5951_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107732","volume":"166","author":"QW Hu","year":"2025","unstructured":"Hu, Q.W., Correia, W.: An efficient blockchain for decentralized ABAC policy decision point. Futur. Gener. Comp. Syst. 166, 107732 (2025)","journal-title":"Futur. Gener. Comp. Syst."},{"key":"5951_CR27","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1007\/s41870-023-01705-w","volume":"16","author":"V Kumar","year":"2024","unstructured":"Kumar, V., Ali, R., Sharma, P.K.: A secure blockchain-assisted authentication framework for electronic health records. International Journal of Information Technology 16, 1581\u20131593 (2024)","journal-title":"International Journal of Information Technology"},{"key":"5951_CR28","first-page":"477","volume":"1020","author":"V Kumar","year":"2024","unstructured":"Kumar, V., Ali, R., Sharma, P.K.: A Secure Multi-factor Authentication Framework for IoT-Environment Using Cloud Computing. Innovative Computing and Communications, ICICC 2024 Singapore 1020, 477\u2013494 (2024)","journal-title":"Innovative Computing and Communications, ICICC 2024 Singapore"},{"key":"5951_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110554","volume":"250","author":"V Kumar","year":"2024","unstructured":"Kumar, V., Ali, R., Sharma, P.K.: IoEPM plus: a secured and lightweight 6G-enabled pollution monitoring authentication framework using IoT and blockchain technology. Comput. Netw. 250, 110554 (2024)","journal-title":"Comput. Netw."},{"issue":"1","key":"5951_CR30","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TMC.2021.3068717","volume":"22","author":"JX Li","year":"2023","unstructured":"Li, J.X., Wu, J.G., Chen, L., Li, J., Lam, S.K.: Blockchain-based secure key management for mobile edge computing. IEEE Transactions on Mobile Computing 22(1), 100\u2013114 (2023)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"5951_CR31","first-page":"100","volume":"22","author":"NC Gowda","year":"2023","unstructured":"Gowda, N.C., Manvi, S.S., Malakreddy, A.B., Lorenz, P.: BSKM-FC: blockchain-based secured key management in a fog computing environment. Futur. Gener. Comp. Syst. 22(1), 100\u2013114 (2023)","journal-title":"Futur. Gener. Comp. Syst."},{"issue":"3","key":"5951_CR32","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.1109\/TASE.2024.3381068","volume":"21","author":"A Badshah","year":"2024","unstructured":"Badshah, A., Abbas, G., Waqas, M., Muhammad, F., Abbas, Z.H., Bilaland, M., Song, H.B.: Blockchain-assisted lightweight authenticated key agreement security framework for smart vehicles-enabled intelligent transportation system. IEEE Trans. Autom. Sci. Eng. 21(3), 2425\u20132439 (2024)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"9","key":"5951_CR33","doi-asserted-by":"publisher","first-page":"3298","DOI":"10.1109\/TMC.2021.3053230","volume":"21","author":"YD Huang","year":"2022","unstructured":"Huang, Y.D., Zhang, J.R., Duan, J., Xiao, B., Ye, F., Yang, Y.Y.: Resource allocation and consensus of blockchains in pervasive edge computing environments. IEEE Transactions on Mobile Computing 21(9), 3298\u20133311 (2022)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"5951_CR34","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1109\/TC.2024.3355759","volume":"73","author":"SY Li","year":"2024","unstructured":"Li, S.Y., Zhang, Y., Song, Y.Q., Cheng, N., Yang, K., Li, H.W.: Blockchain-based portable authenticated data transmission for mobile edge computing: a universally composable secure solution. IEEE Trans. Comput. 73(4), 1114\u20131125 (2024)","journal-title":"IEEE Trans. Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05951-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05951-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05951-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T13:23:00Z","timestamp":1771248180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05951-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5951"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05951-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]},"assertion":[{"value":"15 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We confirm that this work is original and has not been published elsewhere, nor is it currently under consideration for publication elsewhere. We have no conflict of interest to disclose. This article does not contain any studies with animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors have not disclosed any competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"158"}}