{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:51:37Z","timestamp":1776091897592,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05952-x","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:55:53Z","timestamp":1771527353000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based authentication framework for edge computing"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1616-3501","authenticated-orcid":false,"given":"Rajdeep","family":"Roy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0104-967X","authenticated-orcid":false,"given":"Sourav","family":"Banerjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9496-5561","authenticated-orcid":false,"given":"Utpal","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"issue":"18","key":"5952_CR1","doi-asserted-by":"publisher","first-page":"13849","DOI":"10.1109\/JIOT.2021.3088875","volume":"8","author":"Z Chang","year":"2021","unstructured":"Chang, Z., Liu, S., Xiong, X., Cai, Z., Tu, G.: A survey of recent advances in edge-computing-powered artificial intelligence of things. IEEE Internet of Things Journal 8(18), 13849\u201313875 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3088875","journal-title":"IEEE Internet of Things Journal"},{"key":"5952_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jss.2017.10.033","volume":"136","author":"S Taherizadeh","year":"2018","unstructured":"Taherizadeh, S., Jones, A.C., Taylor, I., Zhao, Z., Stankovski, V.: Monitoring self-adaptive applications within edge computing frameworks: A state-of-the-art review. J. Syst. Softw. 136, 19\u201338 (2018). https:\/\/doi.org\/10.1016\/j.jss.2017.10.033","journal-title":"J. Syst. Softw."},{"issue":"5","key":"5952_CR3","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/JIOT.2020.2966870","volume":"7","author":"T Wang","year":"2020","unstructured":"Wang, T., Qiu, L., Sangaiah, A.K., Liu, A., Bhuiyan, M.Z.A., Ma, Y.: Edge-computing-based trustworthy data collection model in the internet of things. IEEE Internet of Things Journal 7(5), 4218\u20134227 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2966870","journal-title":"IEEE Internet of Things Journal"},{"key":"5952_CR4","doi-asserted-by":"publisher","unstructured":"Al-Ahmad, A.S., Kahtan, H.: Cloud computing review: Features and issues. In: Proc. 2018 Int. Conf. Smart Comput. Electron. Enterp. (ICSCEE), pp. 1\u20135. IEEE (2018). https:\/\/doi.org\/10.1109\/ICSCEE.2018.8538387","DOI":"10.1109\/ICSCEE.2018.8538387"},{"issue":"1","key":"5952_CR5","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/JIOT.2017.2767608","volume":"5","author":"J Pan","year":"2017","unstructured":"Pan, J., McElhannon, J.: Future edge cloud and edge computing for internet of things applications. IEEE Internet of Things J. 5(1), 439\u2013449 (2017). https:\/\/doi.org\/10.1109\/JIOT.2017.2767608","journal-title":"IEEE Internet of Things J."},{"key":"5952_CR6","doi-asserted-by":"publisher","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","volume":"8","author":"K Cao","year":"2020","unstructured":"Cao, K., Liu, Y., Meng, G., Sun, Q.: An overview on edge computing research. IEEE Access 8, 85714\u201385728 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2991734","journal-title":"IEEE Access"},{"key":"5952_CR7","doi-asserted-by":"publisher","unstructured":"Pradeep, A.: Exploring the future of edge computing: Advantages, limitations, and opportunities. In: Proc. Int. Conf. Advanced Commun. Intell. Syst., pp. 196\u2013209. Springer Nature Switzerland (2023). https:\/\/doi.org\/10.1007\/978-3-031-45124-9_15","DOI":"10.1007\/978-3-031-45124-9_15"},{"key":"5952_CR8","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Das, D., Biswas, M., Biswas, U.: Study and survey on blockchain privacy and security issues. In: Cross-Industry Use of Blockchain Technology and Opportunities for the Future, pp. 80\u2013102. IGI Global (2020)","DOI":"10.4018\/978-1-7998-3632-2.ch005"},{"key":"5952_CR9","doi-asserted-by":"publisher","unstructured":"Mohanta, B.K., Panda, S.S., Jena, D.: An overview of smart contract and use cases in blockchain technology. In: Proc. 9th Int. Conf. Comput. Commun. Networking Technol. (ICCCNT), pp. 1\u20134. IEEE (2018). https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494045","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"5952_CR10","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","volume":"97","author":"WZ Khan","year":"2019","unstructured":"Khan, W.Z., Ahmed, E., Hakak, S., Yaqoob, I., Ahmed, A.: Edge computing: A survey. Future Generation Computer Systems 97, 219\u2013235 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.02.050","journal-title":"Future Generation Computer Systems"},{"key":"5952_CR11","doi-asserted-by":"publisher","unstructured":"Amara, M., Siad, A.: Elliptic curve cryptography and its applications. In: Proc. Int. Workshop Syst. Signal Process. Their Appl. (WOSSPA), pp. 247\u2013250. IEEE (2011). https:\/\/doi.org\/10.1109\/WOSSPA.2011.5931464","DOI":"10.1109\/WOSSPA.2011.5931464"},{"issue":"6","key":"5952_CR12","doi-asserted-by":"publisher","first-page":"4063","DOI":"10.1109\/JIOT.2020.3019297","volume":"8","author":"X Li","year":"2020","unstructured":"Li, X., Chen, T., Cheng, Q., Ma, S., Ma, J.: Smart applications in edge computing: Overview on authentication and data security. IEEE Internet Things J. 8(6), 4063\u20134080 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3019297","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"5952_CR13","doi-asserted-by":"publisher","first-page":"7940","DOI":"10.1109\/TVT.2020.2994144","volume":"69","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Zhong, H., Cui, J., Tian, M., Xu, Y., Liu, L.: Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks. IEEE Trans. Veh. Technol. 69(7), 7940\u20137954 (2020). https:\/\/doi.org\/10.1109\/TVT.2020.2994144","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"5952_CR14","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","volume":"20","author":"J Cui","year":"2018","unstructured":"Cui, J., Wei, L., Zhang, J., Xu, Y., Zhong, H.: An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 20(5), 1621\u20131632 (2018). https:\/\/doi.org\/10.1109\/TITS.2018.2827460","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5952_CR15","doi-asserted-by":"crossref","unstructured":"Das, D., Banerjee, S., Chatterjee, P., Ghosh, U., Mansoor, W., Biswas, U.: Design of a trust-based authentication scheme for blockchain-enabled IoV system. In: Advances in Science and Engineering Technology International Conferences (ASET), pp. 1\u20136. IEEE (2023)","DOI":"10.1109\/ASET56582.2023.10180814"},{"issue":"1","key":"5952_CR16","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/JSYST.2019.2896064","volume":"14","author":"X Jia","year":"2019","unstructured":"Jia, X., He, D., Kumar, N., Choo, K.-K.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14(1), 560\u2013571 (2019). https:\/\/doi.org\/10.1109\/JSYST.2019.2896064","journal-title":"IEEE Syst. J."},{"key":"5952_CR17","doi-asserted-by":"publisher","unstructured":"Guin, U., Cui, P., Skjellum, A.: Ensuring proof-of-authenticity of IoT edge devices using blockchain technology. In: Proc. IEEE Int. Conf. Internet Things (iThings), pp. 1042\u20131049. IEEE (2018). https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00193","DOI":"10.1109\/Cybermatics_2018.2018.00193"},{"key":"5952_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100543","volume":"28","author":"L Kenioua","year":"2024","unstructured":"Kenioua, L., Lejdel, B., Alamri, S., Ramadan, Q.: A password-based authentication approach for edge computing architectures. Egyptian Informatics Journal 28, 100543 (2024). https:\/\/doi.org\/10.1016\/j.eij.2024.100543","journal-title":"Egyptian Informatics Journal"},{"issue":"3","key":"5952_CR19","doi-asserted-by":"publisher","first-page":"1972","DOI":"10.1109\/TII.2019.2938001","volume":"16","author":"S Guo","year":"2019","unstructured":"Guo, S., Hu, X., Guo, S., Qiu, X., Qi, F.: Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans. Ind. Informatics 16(3), 1972\u20131983 (2019). https:\/\/doi.org\/10.1109\/TII.2019.2938001","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"5952_CR20","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.future.2020.07.009","volume":"113","author":"E Bonnah","year":"2020","unstructured":"Bonnah, E., Shiguang, J.: DecChain: A decentralized security approach in edge computing based on blockchain. Future Generation Computer Systems 113, 363\u2013379 (2020). https:\/\/doi.org\/10.1016\/j.future.2020.07.009","journal-title":"Future Generation Computer Systems"},{"key":"5952_CR21","doi-asserted-by":"crossref","unstructured":"Lahiri, P.K., Das, D., Mansoor, W., Banerjee, S., Chatterjee, P.: A trustworthy blockchain based framework for impregnable IoV in edge computing. In: 17th Int. Conf. Mobile Ad Hoc Sensor Syst. (MASS), pp. 26\u201331. IEEE (2020)","DOI":"10.1109\/MASS50613.2020.00013"},{"issue":"1","key":"5952_CR22","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TCSS.2021.3056540","volume":"9","author":"G Cheng","year":"2021","unstructured":"Cheng, G., Chen, Y., Deng, S., Gao, H., Yin, J.: A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans. Comput. Social Syst. 9(1), 146\u2013158 (2021). https:\/\/doi.org\/10.1109\/TCSS.2021.3056540","journal-title":"IEEE Trans. Comput. Social Syst."},{"key":"5952_CR23","doi-asserted-by":"publisher","unstructured":"Gy\u0151r\u00f6di, C., Gy\u0151r\u00f6di, R., Pecherle, G., Olah, A.: A comparative study: MongoDB vs. MySQL. In: 13th Int. Conf. Eng. Modern Electr. Syst. (EMES), pp. 1\u20136. IEEE (2015). https:\/\/doi.org\/10.1109\/EMES.2015.7158433","DOI":"10.1109\/EMES.2015.7158433"},{"key":"5952_CR24","doi-asserted-by":"publisher","unstructured":"Patil, M.A., Karule, P.T.: Design and implementation of Keccak hash function for cryptography. In: Int. Conf. Commun. Signal Process. (ICCSP), pp. 875\u2013878. IEEE (2015). https:\/\/doi.org\/10.1109\/ICCSP.2015.7322620","DOI":"10.1109\/ICCSP.2015.7322620"},{"key":"5952_CR25","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: A secure decentralised generalised transaction Ledger. Ethereum Project Yellow Paper. 151, 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"5952_CR26","doi-asserted-by":"publisher","unstructured":"Norvill, R., Borja Fiz Pontiveros, B., State, R., Cullen, A.: Visual emulation for Ethereum\u2019s virtual machine. In: NOMS 2018 - IEEE\/IFIP Network Operations and Management Symp., pp. 1\u20134. IEEE (2018). https:\/\/doi.org\/10.1109\/NOMS.2018.8406332","DOI":"10.1109\/NOMS.2018.8406332"},{"key":"5952_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3039-8","volume-title":"Practical Node.js","author":"A Mardan","year":"2018","unstructured":"Mardan, A., Mardan, C.: Practical Node.js. Apress (2018). https:\/\/doi.org\/10.1007\/978-1-4842-3039-8"},{"key":"5952_CR28","unstructured":"Peters, C.: Building rich internet applications with Node.js and Express.js. In: Rich Internet Applications with HTML and JavaScript, p. 15 (2017). https:\/\/uol.de\/f\/2\/dept\/informatik\/ag\/svs\/download\/reader\/reader-seminar-ws2016.pdf"},{"key":"5952_CR29","doi-asserted-by":"publisher","unstructured":"Somasundar, A., Rama Krishnam Raju, B.H.V.S., Kumari Behera, S., Venkata Ramana, C., Sethy, P.K.: MongoDB integration with Python and Node.js, Express.js. In: Fourth Int. Conf. Adv. Electr. Comput. Commun. Sustainable Technol. (ICAECT), pp. 1\u20135. IEEE (2024). (2024). https:\/\/doi.org\/10.1109\/ICAECT60202.2024.10469546","DOI":"10.1109\/ICAECT60202.2024.10469546"},{"key":"5952_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-1-4842-2535-6_4","volume-title":"Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners","author":"C Dannen","year":"2017","unstructured":"Dannen, C.: Solidity programming. In: Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners, pp. 69\u201388. (2017). https:\/\/doi.org\/10.1007\/978-1-4842-2535-6_4"},{"issue":"3","key":"5952_CR31","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A survey of man-in-the-middle attacks. IEEE Communications Surveys & Tutorials 18(3), 2027\u20132051 (2016). https:\/\/doi.org\/10.1109\/COMST.2016.2548426","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5952_CR32","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The Sybil attack. In: Proc. Int. Workshop Peer-to-Peer Syst., pp. 251\u2013260. Springer (2002). https:\/\/www.freehaven.net\/anonbib\/cache\/sybil.pdf","DOI":"10.1007\/3-540-45748-8_24"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05952-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05952-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05952-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T13:51:58Z","timestamp":1776088318000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05952-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5952"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05952-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"6 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2026","order":6,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":7,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: The contents under the section headings '3.6 Authentication of ED by ES' and '4.3.4 Signature validation of ED on the smart contract' is missing and the contents have been included now.","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"175"}}