{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:25:37Z","timestamp":1778347537974,"version":"3.51.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16662-6","type":"journal-article","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T08:01:47Z","timestamp":1694851307000},"page":"31505-31526","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["IoT-based blockchain intrusion detection using optimized recurrent neural network"],"prefix":"10.1007","volume":"83","author":[{"given":"V.","family":"Saravanan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M","family":"Madiajagan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaik Mohammad","family":"Rafee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P","family":"Sanju","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tasneem Bano","family":"Rehman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Balachandra","family":"Pattanaik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,9,16]]},"reference":[{"issue":"49","key":"16662_CR1","first-page":"36","volume":"182","author":"Y Perwej","year":"2019","unstructured":"Perwej Y et al (2019) The internet of things (IoT) and its application domains. Int J Comput Appl 182(49):36\u201349","journal-title":"Int J Comput Appl"},{"key":"16662_CR2","doi-asserted-by":"crossref","unstructured":"Rath M, Pattanayak B (2018) Technological improvement in modern health care applications using Internet of Things (IoT) and proposal of novel health care approach. International Journal of Human Rights in Healthcare","DOI":"10.1108\/IJHRH-01-2018-0007"},{"key":"16662_CR3","doi-asserted-by":"crossref","unstructured":"Khoa TA et al (2020) Designing efficient smart home management with IoT smart lighting: a case study. Wireless Communications and Mobile Computing 2020","DOI":"10.1155\/2020\/8896637"},{"key":"16662_CR4","doi-asserted-by":"crossref","unstructured":"Al Makdi K, Sheldon FT, Hussein AA (2020) Trusted Security Model for IDS Using Deep Learning. 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS). IEEE","DOI":"10.1109\/ICSPIS51252.2020.9340136"},{"issue":"5","key":"16662_CR5","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E et al (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6(5):9042\u20139053","journal-title":"IEEE Internet Things J"},{"key":"16662_CR6","doi-asserted-by":"crossref","unstructured":"Nathiya T, Suseendran G (2019) An effective hybrid intrusion detection system for use in security monitoring in the virtual network layer of cloud computing technology. Data management, analytics and innovation. Springer, Singapore, pp. 483-497","DOI":"10.1007\/978-981-13-1274-8_36"},{"key":"16662_CR7","unstructured":"Brown IL (2018) An appropriate technology system for emergent beekeepers: Field testing and development towards implementation. Diss. University of Johannesburg (South Africa)"},{"key":"16662_CR8","doi-asserted-by":"crossref","unstructured":"Sharafaldin I et al (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 International Carnahan Conference on Security Technology (ICCST). IEEE","DOI":"10.1109\/CCST.2019.8888419"},{"key":"16662_CR9","doi-asserted-by":"crossref","unstructured":"Jayasinghe U et al (2019) TrustChain: A privacy preserving blockchain with edge computing.\" Wireless Communications and Mobile Computing 2019","DOI":"10.1155\/2019\/2014697"},{"key":"16662_CR10","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.compind.2019.01.006","volume":"108","author":"T Borangiu","year":"2019","unstructured":"Borangiu T et al (2019) Digital transformation of manufacturing through cloud services and resource virtualization. Comput Ind 108:150\u2013162","journal-title":"Comput Ind"},{"issue":"1","key":"16662_CR11","volume":"19","author":"ZR Alashhab","year":"2021","unstructured":"Alashhab ZR et al (2021) \"Impact of coronavirus pandemic crisis on technologies and cloud computing applications.\" Journal of Electronic. Sci Technol 19(1):100059","journal-title":"Sci Technol"},{"key":"16662_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen DC et al (2021) Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2021.3072611"},{"key":"16662_CR13","doi-asserted-by":"crossref","unstructured":"Zhang K, Jacobsen H-A (2018) Towards Dependable, Scalable, and Pervasive Distributed Ledgers with Blockchains (Technical Report)","DOI":"10.1109\/ICDCS.2018.00134"},{"key":"16662_CR14","first-page":"2653","volume":"37","author":"P Velmurugadass","year":"2021","unstructured":"Velmurugadass P et al (2021) Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Materials Today: Proc 37:2653\u20132659","journal-title":"Materials Today: Proc"},{"key":"16662_CR15","doi-asserted-by":"crossref","unstructured":"Datta P et al (2020) A secured smart national identity card management design using blockchain. 2020 2nd international conference on advanced information and communication technology (ICAICT). IEEE","DOI":"10.1109\/ICAICT51780.2020.9333487"},{"issue":"2","key":"16662_CR16","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s11277-020-07907-w","volume":"117","author":"R Kumar","year":"2021","unstructured":"Kumar R, Bhalaji N (2021) Blockchain based chameleon hashing technique for privacy preservation in E-governance system. Wirel Pers Commun 117(2):987\u20131006","journal-title":"Wirel Pers Commun"},{"key":"16662_CR17","doi-asserted-by":"crossref","unstructured":"Kerr M, Han F, van Schyndel R (2018) A blockchain implementation for the cataloguing of cctv video evidence. 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE","DOI":"10.1109\/AVSS.2018.8639440"},{"key":"16662_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107991","volume":"101","author":"S Das","year":"2022","unstructured":"Das S, Namasudra S (2022) A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure. Comput Electr Eng 101:107991","journal-title":"Comput Electr Eng"},{"issue":"6","key":"16662_CR19","first-page":"472","volume":"13","author":"YM Arif","year":"2020","unstructured":"Arif YM et al (2020) Blockchain-based data sharing for decentralized tourism destinations recommendation system. Int J Intel Eng Syst 13(6):472\u2013486","journal-title":"Int J Intel Eng Syst"},{"issue":"1","key":"16662_CR20","doi-asserted-by":"publisher","first-page":"414","DOI":"10.3390\/app11010414","volume":"11","author":"M Firdaus","year":"2021","unstructured":"Firdaus M, Rhee K-H (2021) On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Appl Sci 11(1):414","journal-title":"Appl Sci"},{"issue":"6","key":"16662_CR21","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1016\/j.bushor.2019.08.003","volume":"62","author":"JY Lee","year":"2019","unstructured":"Lee JY (2019) A decentralized token economy: How blockchain and cryptocurrency can revolutionize business. Bus Horiz 62(6):773\u2013784","journal-title":"Bus Horiz"},{"issue":"11","key":"16662_CR22","first-page":"4909","volume":"11","author":"G Albanese","year":"2020","unstructured":"Albanese G et al (2020) \"Dynamic consent management for clinical trials via private blockchain technology.\" Journal of Ambient Intelligence and Humanized. Computing 11(11):4909\u20134926","journal-title":"Computing"},{"key":"16662_CR23","doi-asserted-by":"crossref","unstructured":"Swetha MS et al (2020) Blockchain enabled secure healthcare Systems. 2020 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT). IEEE","DOI":"10.1109\/ICMLANT50963.2020.9355970"},{"issue":"11","key":"16662_CR24","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.3390\/electronics8111210","volume":"8","author":"A Khraisat","year":"2019","unstructured":"Khraisat A et al (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8(11):1210","journal-title":"Electronics"},{"issue":"7","key":"16662_CR25","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.3390\/electronics9071120","volume":"9","author":"C Liang","year":"2020","unstructured":"Liang C et al (2020) Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9(7):1120","journal-title":"Electronics"},{"issue":"12","key":"16662_CR26","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi O et al (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8(12):9463\u20139472","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"16662_CR27","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.icte.2021.04.006","volume":"7","author":"T Thilagam","year":"2021","unstructured":"Thilagam T, Aruna R (2021) Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express 7(4):512\u2013520","journal-title":"ICT Express"},{"key":"16662_CR28","doi-asserted-by":"crossref","unstructured":"Derhab A et al (2020) Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering.Wireless Communications and Mobile Computing 2020.","DOI":"10.1155\/2020\/6689134"},{"key":"16662_CR29","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh H et al (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Futur Gener Comput Syst 85:88\u201396","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"16662_CR30","doi-asserted-by":"publisher","first-page":"12937","DOI":"10.1038\/s41598-022-17043-z","volume":"12","author":"RF Mansour","year":"2022","unstructured":"Mansour RF (2022) Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci Rep 12(1):12937","journal-title":"Sci Rep"},{"issue":"2","key":"16662_CR31","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1007\/s10586-022-03779-w","volume":"26","author":"A Belhadi","year":"2023","unstructured":"Belhadi A et al (2023) Group intrusion detection in the Internet of Things using a hybrid recurrent neural network. Clust Comput 26(2):1147\u20131158","journal-title":"Clust Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16662-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16662-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16662-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T06:39:37Z","timestamp":1709879977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16662-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,16]]},"references-count":31,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16662"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16662-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,16]]},"assertion":[{"value":"23 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"Informed consent does not apply as this was a retrospective review with no identifying patient information.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no conflict of interest.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}