{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:01:48Z","timestamp":1765231308566},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:00:00Z","timestamp":1689724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:00:00Z","timestamp":1689724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05525-4","type":"journal-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T11:02:51Z","timestamp":1689764571000},"page":"1491-1521","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing"],"prefix":"10.1007","volume":"80","author":[{"given":"Alavieh Sadat","family":"Alavizadeh","sequence":"first","affiliation":[]},{"given":"Seyed Hossein","family":"Erfani","sequence":"additional","affiliation":[]},{"given":"Meghdad","family":"Mirabi","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Sahafi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,19]]},"reference":[{"key":"5525_CR1","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.3390\/s19081788","volume":"19","author":"N Tariq","year":"2019","unstructured":"Tariq N, Asim M, Al-Obeida F, Baker T, Hammoudeh M, Ghafir I (2019) The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors 19:1788","journal-title":"Sensors"},{"key":"5525_CR2","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14:352\u2013375","journal-title":"Int J Web Grid Serv"},{"key":"5525_CR3","doi-asserted-by":"publisher","first-page":"3179","DOI":"10.1007\/s13042-020-01241-0","volume":"12","author":"I Cviti\u0107","year":"2021","unstructured":"Cviti\u0107 I, Perakovi\u0107 D, Peri\u0161a M, Gupta B (2021) Ensemble machine learning approach for classifcation of IoT devices in smart home. Int J Mach Learn Cybern 12:3179\u20133202","journal-title":"Int J Mach Learn Cybern"},{"key":"5525_CR4","unstructured":"Vailshery LS. Statista. (2022) [Online]. Available: https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/#statisticContainer"},{"key":"5525_CR5","doi-asserted-by":"publisher","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481","journal-title":"J Netw Comput Appl"},{"key":"5525_CR6","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. J Comput Netw 141:199\u2013221","journal-title":"J Comput Netw"},{"key":"5525_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.comcom.2019.01.006","volume":"136","author":"X Wang","year":"2019","unstructured":"Wang X, Zha X, Ni W, Liu RP, Guo YJ, Niu X, Zheng K (2019) Survey on blockchain for internet of things. Comput Commun 136:10\u201329","journal-title":"Comput Commun"},{"key":"5525_CR8","doi-asserted-by":"publisher","first-page":"102657","DOI":"10.1109\/ACCESS.2020.2999213","volume":"8","author":"H Baniata","year":"2020","unstructured":"Baniata H, Kertesz A (2020) A survey on Blockchain\u2013Fog integration approaches. IEEE Access 8:102657\u2013102668","journal-title":"IEEE Access"},{"key":"5525_CR9","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","volume":"134","author":"A Dorri","year":"2019","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2019) LSB: a lightweight scalable blockchain for IoT security and anonymity. J Parallel Distrib Comput 134:180\u2013197","journal-title":"J Parallel Distrib Comput"},{"key":"5525_CR10","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D (2019) A survey on IoT security: application areas, security threats, and solution architectures. J IEEE Access 7:82721\u201382743","journal-title":"J IEEE Access"},{"key":"5525_CR11","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1007\/s10586-020-03059-5","volume":"23","author":"D Pavithran","year":"2020","unstructured":"Pavithran D, Shaalan K, Al-Karaki JN, Gawanmeh A (2020) Towards building a blockchain framework for IoT. Cluster Comput 23:2089\u20132103","journal-title":"Cluster Comput"},{"key":"5525_CR12","doi-asserted-by":"crossref","unstructured":"Gao W, Hatcher WG, Yu W (2018) A survey of blockchain: techniques, applications, and challenges. In: 27th International Conference on Computer Communication and Networks (ICCCN). IEEE.","DOI":"10.1109\/ICCCN.2018.8487348"},{"key":"5525_CR13","first-page":"101","volume":"14","author":"GT Nguyen","year":"2018","unstructured":"Nguyen GT, Kim K (2018) A survey about consensus algorithms used in blockchain. J Inf Process Syst 14:101\u2013128","journal-title":"J Inf Process Syst"},{"key":"5525_CR14","first-page":"653","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin IC (2017) Liao C (2017) A survey of blockchain security issues and challenges. Int J Netw Sec 19:653\u2013659","journal-title":"Int J Netw Sec"},{"key":"5525_CR15","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. J Future Gener Comput Syst 107:841\u2013853","journal-title":"J Future Gener Comput Syst"},{"key":"5525_CR16","doi-asserted-by":"crossref","unstructured":"Rathee G, Ahmad F, Jaglan N, Konstantinou C (2022) A secure and trusted mechanism for industrial IoT network using blockchain. arXiv preprint arXiv:2206.03419","DOI":"10.1109\/TII.2022.3182121"},{"issue":"3","key":"5525_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/IJSWIS.2020070102","volume":"16","author":"A Tewari","year":"2020","unstructured":"Tewari A, Gupta BB (2020) Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int J Semant Web Inf Syst 16(3):20\u201334","journal-title":"Int J Semant Web Inf Syst"},{"key":"5525_CR18","doi-asserted-by":"publisher","first-page":"6143","DOI":"10.1109\/JIOT.2020.2977196","volume":"7","author":"DV Medhane","year":"2020","unstructured":"Medhane DV, Sangaiah AK, Hossain MS, Mu G (2020) Blockchain-enabled distributed security framework for next-generation IoT: an edge cloud and software-defined network-integrated approach. IEEE Internet Things J 7:6143\u20136149","journal-title":"IEEE Internet Things J"},{"key":"5525_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/bs.adcom.2019.01.001","volume":"115","author":"MS Ferdous","year":"2019","unstructured":"Ferdous MS, Biswas K, Morshed-Chowdhury MJ, Chowdhury N, Muthukkumarasamy V (2019) Integrated platforms for blockchain enablement. J Adv Comput 115:41\u201372","journal-title":"J Adv Comput"},{"key":"5525_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.jnca.2018.10.019","volume":"125","author":"I Makhdoom","year":"2019","unstructured":"Makhdoom I, Abolhasan M, Abbas H, Ni W (2019) Blockchain\u2019s adoption in IoT: the challenges, and a way forward. J Netw Comput Appl 125:251\u2013279","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"5525_CR21","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.3390\/sym11101198","volume":"11","author":"L Ismail","year":"2019","unstructured":"Ismail L, Materwala H (2019) A review of blockchain architecture and consensus protocols: Use cases, challenges, and solutions. J Symmetry 11(10):1198","journal-title":"J Symmetry"},{"key":"5525_CR22","unstructured":"Schiener D, S\u00f8nsteb\u00f8 D, Popov S, Ramachandr N (2020) https:\/\/docs.iota.org\/docs\/getting-started\/0.1\/introduction\/overview. IOTA Foundation"},{"key":"5525_CR23","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1007\/s00607-020-00806-9","volume":"102","author":"T Alsboui","year":"2020","unstructured":"Alsboui T, Qin Y, Hill R, Al-Aqrabi H (2020) Enabling distributed intelligence for the internet of things with IOTA and mobile agents. Computing 102:1345\u20131363","journal-title":"Computing"},{"key":"5525_CR24","doi-asserted-by":"crossref","unstructured":"Alsboui T, Qin Y, Hill R, Al-Aqrabi H (2020) Towards a scalable iota tangle-based distributed intelligence approach for the internet of things. In: Intelligent Computing: Proceedings of the 2020 Computing Conference","DOI":"10.1007\/978-3-030-52246-9_35"},{"key":"5525_CR25","unstructured":"Popov S, Moog H, Camargo D, Capossele A (2020) The Coordicide. IOTA Foundation"},{"key":"5525_CR26","unstructured":"Gal A (2018) https:\/\/blog.iota.org\/the-tangle-an-illustrated-introduction-4d5eae6fe8d4. Official IOTA Foundation blog, 31 Jan 2018. [Online]"},{"key":"5525_CR27","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.future.2020.05.047","volume":"112","author":"WF Silvano","year":"2020","unstructured":"Silvano WF, Marcelino R (2020) Iota Tangle: a cryptocurrency to communicate internet-of-things data. Future Gener Comput Syst 112:307\u2013319","journal-title":"Future Gener Comput Syst"},{"key":"5525_CR28","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.jpdc.2020.09.002","volume":"147","author":"S Popov","year":"2021","unstructured":"Popov S, Buchanan WJ (2021) FPC-BI: fast probabilistic consensus within byzantine infrastructures. J Parallel Distrib Comput 147:77\u201386","journal-title":"J Parallel Distrib Comput"},{"issue":"1","key":"5525_CR29","first-page":"73","volume":"11","author":"CM Bulla","year":"2021","unstructured":"Bulla CM, Birje MN (2021) A multi-agent-based data collection and aggregation model for fog-enabled cloud monitoring. Int J Cloud Appl Comput 11(1):73\u201392","journal-title":"Int J Cloud Appl Comput"},{"issue":"8","key":"5525_CR30","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1007\/s00500-019-04220-y","volume":"24","author":"A Al-Qerem","year":"2020","unstructured":"Al-Qerem A, Alauthman M, Almomani A, Gupta BB (2020) IoT transaction processing through cooperative concurrency control on fog\u2013cloud computing environment. Soft Comput J 24(8):5695\u20135711","journal-title":"Soft Comput J"},{"key":"5525_CR31","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Kong J, Jue JP (2019) All one needs to know about fog computing and related edge computing paradigms: a complete survey. J Syst Architect 98:289\u2013330","journal-title":"J Syst Architect"},{"key":"5525_CR32","unstructured":"Popov S (2018) The Tangle. IOTA foundation"},{"key":"5525_CR33","doi-asserted-by":"publisher","first-page":"143","DOI":"10.3758\/s13423-016-1015-8","volume":"25","author":"DV Ravenzwaaij","year":"2018","unstructured":"Ravenzwaaij DV, Cassey P, Brown SD (2018) A simple introduction to Markov Chain Monte-Carlo sampling. Psychonom Bull Rev 25:143\u2013154","journal-title":"Psychonom Bull Rev"},{"key":"5525_CR34","doi-asserted-by":"publisher","first-page":"101871","DOI":"10.1016\/j.cose.2020.101871","volume":"95","author":"EK Wang","year":"2020","unstructured":"Wang EK, Sun R, Chen C-M, Liang Z, Kumari S, Khan MK (2020) Proof of X-repute blockchain consensus protocol for IoT systems. Comput Sec 95:101871","journal-title":"Comput Sec"},{"key":"5525_CR35","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Chen M-Y, Park JH (2017) A software defined fog node based distributed blockchain cloud architecture for IoT. J IEEE Access 6:115\u2013124","journal-title":"J IEEE Access"},{"issue":"3","key":"5525_CR36","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1109\/JIOT.2018.2871706","volume":"6","author":"Z Xiong","year":"2018","unstructured":"Xiong Z, Feng S, Wang W, Niyato D, Wa P (2018) Cloud\/fog computing resource management and pricing for blockchain networks. IEEE Internet Things J 6(3):4585\u20134600","journal-title":"IEEE Internet Things J"},{"key":"5525_CR37","doi-asserted-by":"crossref","unstructured":"Almadhoun R, Kadadha M, Alhemeiri M, Alshehhi M, Salah K (2018) A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA)","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"5525_CR38","doi-asserted-by":"crossref","unstructured":"Gu X, Peng J, Yu W, Cheng Y, Jiang F, Zhang X, Huang Z, Cai L (2019) Using blockchain to enhance the security of fog-assisted crowdsensing systems. In: 2019 IEEE 28th international symposium on industrial electronics (ISIE)","DOI":"10.1109\/ISIE.2019.8781332"},{"key":"5525_CR39","doi-asserted-by":"crossref","unstructured":"Cech HL, Gro\u00dfmann M, Krieger UR (2019) A fog computing architecture to share sensor data by means of blockchain functionality. In: 2019 IEEE International Conference on Fog Computing (ICFC)","DOI":"10.1109\/ICFC.2019.00013"},{"key":"5525_CR40","doi-asserted-by":"crossref","unstructured":"Ziegler MH, Gro\u00dfmann M, Krieger UR (2019) Integration of fog computing and blockchain technology using the plasma framework. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","DOI":"10.1109\/BLOC.2019.8751308"},{"key":"5525_CR41","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jss.2019.04.050","volume":"154","author":"S Tuli","year":"2019","unstructured":"Tuli S, Mahmud R, Tuli S, Buyya R (2019) Fogbus: a blockchain-based lightweight framework for edge and fog computing. J Syst Softw 154:22\u201336","journal-title":"J Syst Softw"},{"key":"5525_CR42","doi-asserted-by":"publisher","first-page":"169073","DOI":"10.1109\/ACCESS.2019.2952472","volume":"7","author":"RA Memon","year":"2019","unstructured":"Memon RA, Li JP, Nazeer MI, Khan AN, Ahmed J (2019) DualFog-IoT: additional fog layer for solving blockchain integration problem in internet of things. IEEE Access 7:169073\u2013169093","journal-title":"IEEE Access"},{"key":"5525_CR43","doi-asserted-by":"crossref","unstructured":"Saputro MYA, Sari RF (2019) Securing IoT network using lightweight multi-fog (LMF) blockchain model. In: 2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","DOI":"10.11591\/eecsi.v6.1974"},{"issue":"1","key":"5525_CR44","first-page":"1","volume":"10","author":"Y Lee","year":"2020","unstructured":"Lee Y, Rathore S, Park JH, Park JH (2020) A blockchain-based smart home gateway architecture for preventing data forgery. HCIS 10(1):1\u201314","journal-title":"HCIS"},{"key":"5525_CR45","doi-asserted-by":"crossref","unstructured":"Damianou A, Angelopoulos CM, Kato V (2019) An architecture for blockchain over edge-enabled IoT for smart circular cities. In: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS)","DOI":"10.1109\/DCOSS.2019.00092"},{"key":"5525_CR46","first-page":"5898","volume":"12","author":"HK Yang","year":"2021","unstructured":"Yang HK, Cha HJ, Song YJ (2021) A study on the application of blockchain technology based on direct acyclic graph in IoT environment. Turk J Comput Math Educ 12:5898\u20135907","journal-title":"Turk J Comput Math Educ"},{"key":"5525_CR47","first-page":"1","volume":"100686","author":"V Lukaj","year":"2023","unstructured":"Lukaj V, Martella F, Fazio M, Celesti A, Villari M (2023) Establishment of a trusted environment for IoT service provisioning based on X3DH-based brokering and federated Blockchain. Internet Things 100686:1\u201320","journal-title":"Internet Things"},{"key":"5525_CR48","doi-asserted-by":"publisher","first-page":"250","DOI":"10.3390\/fi14090250","volume":"14","author":"R Chaganti","year":"2022","unstructured":"Chaganti R, Varadarajan V, Gorantla VS, Gadekallu TR, Ravi V (2022) Blockchain-based cloud-enabled security monitoring using internet of things in smart agriculture. Future Internet 14:250","journal-title":"Future Internet"},{"key":"5525_CR49","doi-asserted-by":"publisher","first-page":"6652","DOI":"10.1109\/JIOT.2022.3152546","volume":"10","author":"BD Deebak","year":"2022","unstructured":"Deebak BD, Memon FH, Khowaja SA, Wang W, Faseeh Qureshi NM, Su C (2022) Lightweight blockchain based remote mutual authentication for AI-empowered IoT sustainable computing systems. IEEE Internet Things J 10:6652\u20136660","journal-title":"IEEE Internet Things J"},{"key":"5525_CR50","doi-asserted-by":"publisher","first-page":"102042","DOI":"10.1016\/j.simpat.2019.102042","volume":"101","author":"A Markus","year":"2019","unstructured":"Markus A, Kertesz A (2019) A survey and taxonomy of simulation environments modelling fog. Simul Model Pract Theory 101:102042","journal-title":"Simul Model Pract Theory"},{"key":"5525_CR51","doi-asserted-by":"crossref","unstructured":"Mahmud R, Buyya R (2019) Modelling and simulation of fog and edge computing environments using iFogSim toolkit. Fog and edge computing: principles and paradigms, pp 1\u201335","DOI":"10.1002\/9781119525080"},{"key":"5525_CR52","doi-asserted-by":"publisher","first-page":"102042","DOI":"10.1016\/j.simpat.2019.102042","volume":"101","author":"A Markus","year":"2020","unstructured":"Markus A, Kertesz A (2020) A survey and taxonomy of simulation environments modelling fog computing. Simul Model Pract Theory 101:102042","journal-title":"Simul Model Pract Theory"},{"key":"5525_CR53","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1002\/spe.2509","volume":"47","author":"H Gupta","year":"2017","unstructured":"Gupta H, Dastjerdi AV, Ghosh SK, Buyya R (2017) iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw Pract Exp 47:1275\u20131296","journal-title":"Softw Pract Exp"},{"key":"5525_CR54","doi-asserted-by":"publisher","first-page":"22529","DOI":"10.1109\/JIOT.2022.3182004","volume":"9","author":"Y Liu","year":"2022","unstructured":"Liu Y, Qian K, Wang K, He L (2022) BCmaster: a compatible framework for comprehensively analyzing and monitoring blockchain systems in IoT. IEEE Internet Things J 9:22529\u201322546","journal-title":"IEEE Internet Things J"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05525-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05525-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05525-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T09:20:20Z","timestamp":1705310420000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05525-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,19]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5525"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05525-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,19]]},"assertion":[{"value":"26 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. The authors declare no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}