{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:26:14Z","timestamp":1776331574421,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T00:00:00Z","timestamp":1613779200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T00:00:00Z","timestamp":1613779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10715-4","type":"journal-article","created":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T19:02:52Z","timestamp":1613847772000},"page":"18901-18915","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Ethereum for Internet of Things security"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0094-0444","authenticated-orcid":false,"given":"Aparna","family":"Raj","sequence":"first","affiliation":[]},{"given":"Kavita","family":"Maji","sequence":"additional","affiliation":[]},{"given":"Sujala D.","family":"Shetty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,20]]},"reference":[{"key":"10715_CR1","unstructured":"Ali J, Ali T, Musa S, Zahrani A (2020) Towards secure IoT communication with smart contracts in a blockchain infrastructure"},{"key":"10715_CR2","doi-asserted-by":"publisher","unstructured":"Ali A, Zhu Y, Chen Q et al (2019) Leveraging spatio-Temporal patterns for predicting citywide traffic crowd flows using deep hybrid neural networks. Proc Int Conf Parallel Distrib Syst - ICPADS 2019-December:125\u2013132. https:\/\/doi.org\/10.1109\/ICPADS47876.2019.00025","DOI":"10.1109\/ICPADS47876.2019.00025"},{"key":"10715_CR3","doi-asserted-by":"publisher","unstructured":"Alrubei S, Rigelsford J, Willis C, Ball E (2019) Ethereum blockchain for securing the internet of things: Practical implementation and performance evaluation. 2019 Int Conf Cyber Secur Prot Digit Serv Cyber Secur 2019 1\u20135. https:\/\/doi.org\/10.1109\/CyberSecPODS.2019.8885029","DOI":"10.1109\/CyberSecPODS.2019.8885029"},{"key":"10715_CR4","doi-asserted-by":"publisher","unstructured":"Asadullah M, Raza A (2016) An overview of home automation systems. 2016 2nd Int Conf Robot Artif Intell ICRAI 2016 27\u201331. https:\/\/doi.org\/10.1109\/ICRAI.2016.7791223","DOI":"10.1109\/ICRAI.2016.7791223"},{"key":"10715_CR5","doi-asserted-by":"publisher","first-page":"975","DOI":"10.5120\/ijca2019918450","volume":"182","author":"A Ashari","year":"2019","unstructured":"Ashari A, Shouran Z, Kuntoro Priyambodo T (2019) Internet of Things (IoT) of smart home: privacy and security. Artic Int J Comput Appl 182:975\u20138887. https:\/\/doi.org\/10.5120\/ijca2019918450","journal-title":"Artic Int J Comput Appl"},{"key":"10715_CR6","doi-asserted-by":"crossref","unstructured":"Atlam HF, Wills GB (2019) Technical aspects of blockchain and IoT, 1st ed. Elsevier Inc, Amsterdam","DOI":"10.1016\/bs.adcom.2018.10.006"},{"key":"10715_CR7","doi-asserted-by":"publisher","unstructured":"Aung YN, Tantidham T (2017) Review of Ethereum: Smart home case study. Proceeding 2017 2nd Int Conf Inf Technol INCIT 2017 2018-Janua:1\u20134. https:\/\/doi.org\/10.1109\/INCIT.2017.8257877","DOI":"10.1109\/INCIT.2017.8257877"},{"key":"10715_CR8","unstructured":"Buterin V (2014) A next-generation smart contract and decentralized application platform. White paper 3, no. 37"},{"key":"10715_CR9","doi-asserted-by":"publisher","unstructured":"Chen H, Pendleton M, Njilla L, Xu S (2020) 67 A Survey on Ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surv 53. https:\/\/doi.org\/10.1145\/3391195","DOI":"10.1145\/3391195"},{"key":"10715_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09368-6","author":"J Cheng","year":"2020","unstructured":"Cheng J, Xie L, Tang X et al (2020) A survey of security threats and defense on Blockchain. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09368-6","journal-title":"Multimed Tools Appl"},{"key":"10715_CR11","doi-asserted-by":"publisher","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: The case study of a smart home. 2017 IEEE Int Conf Pervasive Comput Commun Work PerCom Work 2017:618\u2013623. https:\/\/doi.org\/10.1109\/PERCOMW.2017.7917634","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"10715_CR12","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","volume":"134","author":"A Dorri","year":"2019","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2019) LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J Parallel Distrib Comput 134:180\u2013197. https:\/\/doi.org\/10.1016\/j.jpdc.2019.08.005","journal-title":"J Parallel Distrib Comput"},{"key":"10715_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD.2018.8605485","author":"D Fakhri","year":"2019","unstructured":"Fakhri D, Mutijarsa K (2019) Secure IoT communication using blockchain technology. ISESD 2018 - Int Symp Electron Smart Devices Smart Devices Big Data Anal Mach Learn. https:\/\/doi.org\/10.1109\/ISESD.2018.8605485"},{"key":"10715_CR14","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V et al (2019) A survey on IoT Security: application areas, security threats, and solution architectures. IEEE Access 7:82721\u201382743. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924045","journal-title":"IEEE Access"},{"key":"10715_CR15","doi-asserted-by":"publisher","unstructured":"Hossain S, Waheed S, Rahman Z et al (2020) Blockchain for the security of Internet of Things: a smart home use case using Ethereum. https:\/\/doi.org\/10.35940\/ijrte.E6861.018520","DOI":"10.35940\/ijrte.E6861.018520"},{"key":"10715_CR16","doi-asserted-by":"publisher","unstructured":"Hsu HT, Jong GJ, Chen JH, Jhe CG (2019) Improve IoT security system of smart-home by using support vector machine. 2019 IEEE 4th Int Conf Comput Commun Syst ICCCS 2019, 674\u2013677. https:\/\/doi.org\/10.1109\/CCOMS.2019.8821678","DOI":"10.1109\/CCOMS.2019.8821678"},{"key":"10715_CR17","doi-asserted-by":"publisher","unstructured":"Huh S, Cho S, Kim S (2017) Managing IoT devices using blockchain platform. Int Conf Adv Commun Technol ICACT 464\u2013467. https:\/\/doi.org\/10.23919\/ICACT.2017.7890132","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"10715_CR18","doi-asserted-by":"publisher","unstructured":"Jeyanthi N, Thandeeswaran R, Global IGI (2017) Security breaches and threat prevention in the Internet of Things. i:276. https:\/\/doi.org\/10.4018\/978-1-5225-2296-6","DOI":"10.4018\/978-1-5225-2296-6"},{"key":"10715_CR19","unstructured":"Jones MT Platform emulation with Bochs. http:\/\/www.ibm.com\/developerworks\/library\/i-bochs\/, January-2011"},{"key":"10715_CR20","doi-asserted-by":"publisher","unstructured":"Ma M, He Z, Xu Q, Li XJ (2019) Design and development of smart home sensing supported by blockchain technology. ACM Int Conf Proceeding Ser 525\u2013530. https:\/\/doi.org\/10.1145\/3377170.3377281","DOI":"10.1145\/3377170.3377281"},{"key":"10715_CR21","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.jnca.2018.10.019","volume":"125","author":"I Makhdoom","year":"2019","unstructured":"Makhdoom I, Abolhasan M, Abbas H, Ni W (2019) Blockchain\u2019s adoption in IoT: The challenges, and a way forward. J Netw Comput Appl 125:251\u2013279","journal-title":"J Netw Comput Appl"},{"key":"10715_CR22","doi-asserted-by":"publisher","first-page":"100107","DOI":"10.1016\/j.iot.2019.100107","volume":"8","author":"BK Mohanta","year":"2019","unstructured":"Mohanta BK, Jena D, Panda SS, Sobhanayak S (2019) Blockchain technology: A survey on applications and security privacy Challenges. Internet of Things 8:100107. https:\/\/doi.org\/10.1016\/j.iot.2019.100107","journal-title":"Internet of Things"},{"key":"10715_CR23","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1162\/ARTL_a_00247","volume":"23","author":"M Monti","year":"2017","unstructured":"Monti M, Rasmussen S (2017) RAIN: a bio-inspired communication and data storage infrastructure. Artif Life 23:552\u2013557. https:\/\/doi.org\/10.1162\/ARTL_a_00247","journal-title":"Artif Life"},{"key":"10715_CR24","doi-asserted-by":"publisher","unstructured":"Mtetwa N, Tarwireyi P, Adigun M (2019) Secure the Internet of Things Software Updates with Ethereum Blockchain. Proc \u2013 2019 Int Multidiscip Inf Technol Eng Conf IMITEC 2019:1\u20136. https:\/\/doi.org\/10.1109\/IMITEC45504.2019.9015865","DOI":"10.1109\/IMITEC45504.2019.9015865"},{"key":"10715_CR25","doi-asserted-by":"publisher","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for 5G and beyond networks: a state of the art survey. J Netw Comput Appl 102693. https:\/\/doi.org\/10.1016\/j.jnca.2020.102693","DOI":"10.1016\/j.jnca.2020.102693"},{"key":"10715_CR26","unstructured":"Paunikar VL, Dewalkar VV, Tambekar NS, Dighore RG, Paunikar NO (2020) A user authentication scheme of Iot devices using blockchain-enabled fog nodes. International Journal of All Research Writings 1, 11:19\u201322"},{"key":"10715_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tdsc.2019.2914911","volume":"PP","author":"G Poh","year":"2019","unstructured":"Poh G, Sen, Gope P, Ning J (2019) PrivHome: privacy-preserving authenticated communication in smart home environment. IEEE Trans Dependable Secur Comput PP:1\u20131. https:\/\/doi.org\/10.1109\/tdsc.2019.2914911","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"10715_CR28","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","volume":"88","author":"A Reyna","year":"2018","unstructured":"Reyna A, Mart\u00edn C, Chen J et al (2018) On blockchain and its integration with IoT. Challenges and opportunities. Futur Gener Comput Syst 88:173\u2013190. https:\/\/doi.org\/10.1016\/j.future.2018.05.046","journal-title":"Futur Gener Comput Syst"},{"key":"10715_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2017.8251003","author":"N Rifi","year":"2018","unstructured":"Rifi N, Rachkidi E, Agoulmine N, Taher NC (2018) Towards using blockchain technology for IoT data access protection. 2017 IEEE 17th Int Conf Ubiquitous Wirel Broadband, ICUWB 2017 - Proc 2018-Janua:1\u20135. https:\/\/doi.org\/10.1109\/ICUWB.2017.8251003"},{"key":"10715_CR30","doi-asserted-by":"publisher","unstructured":"Selim M, Khwaja H, Ali Y et al (2020) Blockchain for the security of Internet of Things: A smart home use case using Ethereum system and security view project software developement view project. Int J Recent Technol Eng :2277\u20133878. https:\/\/doi.org\/10.35940\/ijrte.E6861.018520","DOI":"10.35940\/ijrte.E6861.018520"},{"key":"10715_CR31","doi-asserted-by":"crossref","unstructured":"Singh PK, Singh R, Nandi SK, Nandi S (2019) Managing smart home appliances with proof of authority and blockchain. In: Communications in Computer and Information Science. Springer Verlag, Berlin, pp 221\u2013232","DOI":"10.1007\/978-3-030-22482-0_16"},{"key":"10715_CR32","doi-asserted-by":"publisher","unstructured":"Tantidham T, Aung YN (2019) Emergency service for smart home system using ethereum blockchain: system and architecture. 2019 IEEE Int Conf Pervasive Comput Commun Work PerCom Work 2019 888\u2013893. https:\/\/doi.org\/10.1109\/PERCOMW.2019.8730816","DOI":"10.1109\/PERCOMW.2019.8730816"},{"key":"10715_CR33","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1016\/j.procs.2019.08.101","volume":"155","author":"R Thakore","year":"2019","unstructured":"Thakore R, Vaghashiya R, Patel C, Doshi N (2019) Blockchain - based IoT: A survey. Procedia Comput Sci 155:704\u2013709. https:\/\/doi.org\/10.1016\/j.procs.2019.08.101","journal-title":"Procedia Comput Sci"},{"key":"10715_CR34","doi-asserted-by":"publisher","unstructured":"Wohrer M, Zdun U (2018) Smart contracts: Security patterns in the ethereum ecosystem and solidity. 2018 IEEE 1st Int Work Blockchain Oriented Softw Eng IWBOSE 2018 - Proc 2018-Janua:2\u20138. https:\/\/doi.org\/10.1109\/IWBOSE.2018.8327565","DOI":"10.1109\/IWBOSE.2018.8327565"},{"key":"10715_CR35","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3440802","author":"CS Wright","year":"2019","unstructured":"Wright CS (2019) Bitcoin: a peer-to-peer electronic cash system. SSRN Electron J. https:\/\/doi.org\/10.2139\/ssrn.3440802","journal-title":"SSRN Electron J"},{"key":"10715_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-019-0195-4","volume":"9","author":"C Yin","year":"2019","unstructured":"Yin C, Zhou B, Yin Z, Wang J (2019) Local privacy protection classification based on human-centric computing. Human Centric Comput Inf Sci 9:1\u201314. https:\/\/doi.org\/10.1186\/s13673-019-0195-4","journal-title":"Human Centric Comput Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10715-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10715-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10715-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:26:50Z","timestamp":1621502810000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10715-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,20]]},"references-count":36,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10715"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10715-4","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"},{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,20]]},"assertion":[{"value":"15 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}