{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:59:06Z","timestamp":1757617146532,"version":"3.44.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:00Z","timestamp":1729641600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:00Z","timestamp":1729641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20280-1","type":"journal-article","created":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:02:18Z","timestamp":1729652538000},"page":"30583-30602","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integration of blockchain with hybrid lightweight cryptosystem"],"prefix":"10.1007","volume":"84","author":[{"given":"Girija","family":"V","sequence":"first","affiliation":[]},{"given":"Victo Sudha George","family":"G","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,23]]},"reference":[{"key":"20280_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","volume":"88","author":"A Reyna","year":"2018","unstructured":"Reyna A, Mart\u00edn C, Chen J, Soler E, D\u00edaz M (2018) On blockchain and its integration with IoT. Challenges and opportunities. Future Gener Comput Syst 88:173\u2013190","journal-title":"Future Gener Comput Syst"},{"key":"20280_CR2","unstructured":"Maayan GD (2020) The IoT rundown for 2020: stats, risks, and solutions. Security Today. https:\/\/securitytoday.com\/Articles\/ 2020\/01\/13\/The-IoT-Rundown-for-2020.aspx?Page=2. Accessed 19 Jan 2020"},{"issue":"14","key":"20280_CR3","doi-asserted-by":"publisher","first-page":"3928","DOI":"10.3390\/s20143928","volume":"20","author":"R Jabbar","year":"2020","unstructured":"Jabbar R, Kharbeche M, Al-Khalifa K, Krichen M, Barkaoui K (2020) Blockchain for the internet of vehicles: a decentralized IoT solution for vehicles communication using Ethereum. Sensors 20(14):3928","journal-title":"Sensors"},{"key":"20280_CR4","first-page":"244","volume":"19","author":"M Alamri","year":"2019","unstructured":"Alamri M, Jhanjhi N, Humayun M (2019) Blockchain for Internet of Things (IoT) research issues challenges and future directions: a review. J Comput Sci Netw Secur 19:244","journal-title":"J Comput Sci Netw Secur"},{"issue":"8","key":"20280_CR5","doi-asserted-by":"publisher","first-page":"146","DOI":"10.3390\/s18082575","volume":"18","author":"A Panarello","year":"2018","unstructured":"Panarello A, Tapas N, Merlino G, Longo F, Puliafto A (2018) Blockchain and IoT integration: a systematic survey. Sensors 18(8):146\u2013160","journal-title":"Sensors"},{"key":"20280_CR6","unstructured":"Springwise Editorial team (2018) IoT innovative report. Deloitte. https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/de\/Documents\/ Innovation\/Internet-of-Things-Innovation-Report-2018-Deloitte. pdf. Accessed 1 Jan 2020"},{"issue":"7","key":"20280_CR7","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","volume":"30","author":"TTA Dinh","year":"2018","unstructured":"Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling blockchain: a data processing view of blockchain systems. IEEE Trans Knowl Data Eng 30(7):1366\u20131385","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"8","key":"20280_CR8","first-page":"36900","volume":"14","author":"Z Li","year":"2018","unstructured":"Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial Internet of Things. IEEE Trans Industr Inf 14(8):36900\u201333700","journal-title":"IEEE Trans Industr Inf"},{"key":"20280_CR9","doi-asserted-by":"crossref","unstructured":"Nuss M, Puchta A, Kunz M (2018) Towards blockchain-based identity and access management for Internet of Things in enterprises. Proceedings of international conference on trust, privacy and security in digital business, Regensburg, Germany, 167\u2013181","DOI":"10.1007\/978-3-319-98385-1_12"},{"issue":"2","key":"20280_CR10","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","volume":"5","author":"O Novo","year":"2018","unstructured":"Novo O (2018) Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J 5(2):1184\u20131195","journal-title":"IEEE Internet Things J"},{"key":"20280_CR11","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress) (pp. 557\u2013564). Ieee","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"20280_CR12","doi-asserted-by":"crossref","unstructured":"Singh K, Heulot N, Hamida EB (2018) Towards anonymous, unlinkable, and confdential transactions in blockchain. Proceedings of 2018 IEEE iThings and IEEE GreenCom and IEEE CPSCom and IEEE SmartData, Halifax, 1642\u20131649","DOI":"10.1109\/Cybermatics_2018.2018.00274"},{"issue":"2","key":"20280_CR13","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MITP.2018.021921652","volume":"20","author":"V Gatteschi","year":"2018","unstructured":"Gatteschi V, Lamberti F, Demartini C, Pranteda C, Santamaria V (2018) To blockchain or not to blockchain: that is the question. IT Professional 20(2):62\u201374","journal-title":"IT Professional"},{"key":"20280_CR14","unstructured":"Ben E, Brousmiche K, Levard H, Thea E (2017) Blockchain for enterprise: overview, opportunities and challenges. Proceedings of the international conference on wireless and mobile communications (ICWMC), Nice, France, 83\u201388"},{"issue":"55","key":"20280_CR15","first-page":"653","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin IC, Liao TC (2017) A survey of blockchain security issues and challenges. Intl J Netw Secur 19(55):653\u2013659","journal-title":"Intl J Netw Secur"},{"issue":"6","key":"20280_CR16","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832\u20131843","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"20280_CR17","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","volume":"19","author":"N Kshetri","year":"2017","unstructured":"Kshetri N (2017) Can blockchain strengthen the Internet of Things? IT Professional 19(4):68\u201372","journal-title":"IT Professional"},{"key":"20280_CR18","doi-asserted-by":"crossref","unstructured":"Ahram T, Sargolzaei A, Sargolzaei S, Daniels J, Amaba B (2017) Blockchain technology innovations. Proceedings of IEEE technology & engineering management conference (TEMSCON), Santa Clara, CA, USA, 137\u2013141","DOI":"10.1109\/TEMSCON.2017.7998367"},{"key":"20280_CR19","doi-asserted-by":"crossref","unstructured":"Liao CC, Cheng SM, Domb M (2017) On designing energy efcient Wi-Fi P2P connections for Internet of Things. Proceedings of IEEE 85th vehicular technology conference. (VTC Spring), Sydney, 1\u20135","DOI":"10.1109\/VTCSpring.2017.8108292"},{"key":"20280_CR20","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R (2017) Towards an optimized blockchain for IoT. Proceedings of IEEE\/ACM international conference on Internet-of-Things design and implementation (IoTDI), Pittsburg, 173\u2013178","DOI":"10.1145\/3054977.3055003"},{"issue":"10","key":"20280_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0163477","volume":"11","author":"J Yli-Huumo","year":"2016","unstructured":"Yli-Huumo J, Ko D, Choi S, Park S, Smolander K (2016) Where is current research on blockchain technology? - a systematic review. PLoS ONE 11(10):1\u201327","journal-title":"PLoS ONE"},{"key":"20280_CR22","doi-asserted-by":"crossref","unstructured":"Sompolinsky Y, Zohar A (2015) Secure high-rate transaction processing in bitcoin. Proceedings of the fnancial cryptography and data security. Springer, Heidelberg, 507\u2013527","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"20280_CR23","doi-asserted-by":"crossref","unstructured":"Chen B, Wu W, Zhang Y (2014) The Design and Implementation of Digital Signature System Based on Elliptic Curve. The 2012 International Conference on Cybernetics and Informatics, l63:2041\u20132047","DOI":"10.1007\/978-1-4614-3872-4_260"},{"issue":"6","key":"20280_CR24","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.3390\/s22062112","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah MA, Ali A, Hajjej F, Pasha MF, Alohali MA (2022) A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things. Sensors 22(6):2112","journal-title":"Sensors"},{"key":"20280_CR25","doi-asserted-by":"crossref","unstructured":"Mahajan H, Reddy KTV (2023) Secure gene profile data processing using lightweight cryptography and blockchain. Cluster Comput 1\u201319","DOI":"10.1007\/s10586-023-04123-6"},{"issue":"2","key":"20280_CR26","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1016\/j.jksuci.2023.01.011","volume":"35","author":"OA Khashan","year":"2023","unstructured":"Khashan OA, Khafajah NM (2023) Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. J King Saud Univ Comput Inform Sci 35(2):726\u2013739","journal-title":"J King Saud Univ Comput Inform Sci"},{"issue":"11","key":"20280_CR27","first-page":"261","volume":"9","author":"R Cahya","year":"2018","unstructured":"Cahya R, Arief P, Novriza A, Kohei A (2018) Noble method for data hiding using steganography discrete wavelet transformation and cryptography triple data encryption standard: DES. Int J Adv Comput Sci Appl 9(11):261\u2013266","journal-title":"Int J Adv Comput Sci Appl"},{"key":"20280_CR28","unstructured":"Vijayakumar R, Raja S, Prabakaran M (2014) ECDSA Performance improvements of intrusion detection in Mobile Ad-hoc Networks. COMPUSOFT. Intl J Adv Comput Technol 3"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20280-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20280-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20280-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T23:41:46Z","timestamp":1757115706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20280-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,23]]},"references-count":28,"journal-issue":{"issue":"26","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["20280"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20280-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,10,23]]},"assertion":[{"value":"24 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"The authors declare that we have no competing interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}