{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:22:13Z","timestamp":1752549733199},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T00:00:00Z","timestamp":1672012800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T00:00:00Z","timestamp":1672012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11265-022-01825-9","type":"journal-article","created":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T04:13:19Z","timestamp":1672027999000},"page":"241-252","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Davis Mayer Streebog Cryptographic Hash-Based Blockchain for Secure Transaction Management Using SDN in IIoT Applications"],"prefix":"10.1007","volume":"95","author":[{"given":"Saad Ali","family":"Alahmari","sequence":"first","affiliation":[]},{"given":"Sivaram","family":"Rajeyyagari","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"Al-Turjman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,26]]},"reference":[{"key":"1825_CR1","unstructured":"Vijay, K. S. (2019). IoT Applications in Finance and Banking. International Journal of Research and Analytical Reviews (IJRAR)."},{"issue":"1","key":"1825_CR2","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/JIOT.2017.2734903","volume":"6","author":"S Al-Rubaye","year":"2017","unstructured":"Al-Rubaye, S., Kadhum, E., Ni, Q., & Anpalagan, A. (2017). Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency. IEEE Internet of Things Journal., 6(1), 267\u2013277.","journal-title":"IEEE Internet of Things Journal."},{"key":"1825_CR3","doi-asserted-by":"crossref","unstructured":"Islam, M. R., & Aktheruzzaman, K. M. (2020).\u00a0An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions. Journal of Computer and Communications, 8(4).","DOI":"10.4236\/jcc.2020.84002"},{"key":"1825_CR4","doi-asserted-by":"crossref","unstructured":"Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020).\u00a0BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications. IEEE Network, 1\u20139.","DOI":"10.1109\/MNET.001.1900151"},{"key":"1825_CR5","first-page":"1","volume":"88","author":"A Yazdinejad","year":"2019","unstructured":"Yazdinejad, A., Parizi, R. M., & Dehghantanha, A. (2019). Kim-Kwang Raymond Choo, \u201cP4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.\u201d Computers & Security, Elsevier, 88, 1\u201314.","journal-title":"Computers & Security, Elsevier"},{"key":"1825_CR6","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1016\/j.future.2018.04.060","volume":"86","author":"Pradip Kumar Sharma and Jong Hyuk Park","year":"2018","unstructured":"Sharma, P. K., & Park, J. H.\u00a0(2018). Blockchain based hybrid network architecture for the smart city. Future Generation Computer Systems, Elsevier, 86, 650\u2013655.","journal-title":"Future Generation Computer Systems, Elsevier"},{"issue":"12","key":"1825_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0189095","volume":"12","author":"Qi Zhao","year":"2017","unstructured":"Zhao, Qi., Zhang, C., & Zhao, Z. (2017). A decoy chain deployment method based on SDN and NFV against penetration attack. PLoS ONE, 12(12), 1\u201323.","journal-title":"PLoS ONE"},{"key":"1825_CR8","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.inffus.2020.12.006","volume":"60","author":"W Meng","year":"2021","unstructured":"Meng, W., Li, W., & Zhou, J. (2021). Enhancing the security of blockchain-based software-defined networking through trust-based traffic fusion and filtration. Information Fusion, Elsevier, 60, 60\u201371.","journal-title":"Information Fusion, Elsevier"},{"key":"1825_CR9","doi-asserted-by":"crossref","unstructured":"Lakhan, A., Mohammed, M. A., Kadry, S., AlQahtani, S. A., Maashi, M. S., & Abdulkareem, K. H. (2022). Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications.\u00a0Computers and Electrical Engineering,\u00a0100, 107839. Elsevier.","DOI":"10.1016\/j.compeleceng.2022.107839"},{"key":"1825_CR10","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Bera, B., Das, A. K., Chattopadhyay, S., Khan, M. K., & Rodrigues, J. J. (2021). Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT.\u00a0Computer Communications,\u00a0169, 99-113.","DOI":"10.1016\/j.comcom.2021.01.023"},{"key":"1825_CR11","doi-asserted-by":"crossref","unstructured":"Derhab, A., Guerroumi, M., Belaoued, M., & Cheikhrouhou, O. (2021). BMC-SDN: blockchain-based multicontroller architecture for secure software-defined networks.\u00a0Wireless Communications and Mobile Computing,\u00a02021, 1\u201312.","DOI":"10.1155\/2021\/9984666"},{"key":"1825_CR12","doi-asserted-by":"crossref","unstructured":"Kaliyamurthy, N. M., Taterh, S., Shanmugasundaram, S., Saxena, A., Cheikhrouhou, O., & Ben Elhadj, H. (2021). Software-Defined Networking: An Evolving Network Architecture\u2014Programmability and Security Perspective.\u00a0Security and Communication Networks,\u00a02021, 17.","DOI":"10.1155\/2021\/9971705"},{"key":"1825_CR13","doi-asserted-by":"crossref","unstructured":"Lam, J., Lee, S. G., Lee, H. J., & Oktian, Y. E. (2016). Securing SDN southbound and data plane communication with IBC.\u00a0Mobile Information Systems,\u00a02016,\u00a01\u201312.","DOI":"10.1155\/2016\/1708970"},{"key":"1825_CR14","doi-asserted-by":"crossref","unstructured":"Rajeesh Kumar, N. V., Mohan Kumar, P. (2020). Application of SDN for secure communication in IoT environment. Computer Communications, 151, 60\u201365.\u00a0Elsevier.","DOI":"10.1016\/j.comcom.2019.12.046"},{"key":"1825_CR15","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.yofte.2018.07.005","volume":"45","author":"H Wang","year":"2018","unstructured":"Wang, H., Zhao, Y., Li, Y., Xiaosong, Yu., Zhang, J., Liu, C., & Shao, Qi. (2018). A flexible key-updating method for software-defined optical networks secured by quantum key distribution. Optical Fiber Technology, Elsevier, 45, 195\u2013200.","journal-title":"Optical Fiber Technology, Elsevier"},{"key":"1825_CR16","doi-asserted-by":"crossref","unstructured":"Ellinidou, S., Sharma, G., Rigas, T., Vanspouwen, T., Markowitch, O., & Dricot, J. M. (2019). SSPSoC: A secure SDN-based protocol over MPSoC.\u00a0Security and Communication Networks,\u00a02019,\u00a01\u201311.","DOI":"10.1155\/2019\/4869167"},{"issue":"1","key":"1825_CR17","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/JIOT.2017.2779180","volume":"5","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Kuang, Y., Xiao, Y., & Guangxia, Xu. (2018). SDN-Based Data Transfer Security for Internet of Things. IEEE Internet of Things Journal, 5(1), 257\u2013268.","journal-title":"IEEE Internet of Things Journal"},{"key":"1825_CR18","doi-asserted-by":"publisher","first-page":"3059","DOI":"10.1002\/sec.1243","volume":"9","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Zhang, P., & Vasilakos, A. V. (2016). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks, Wiley, 9, 3059\u20133069.","journal-title":"Security and Communication Networks, Wiley"},{"key":"1825_CR19","doi-asserted-by":"crossref","unstructured":"Chen, Y., Jia, H., Huang, K., Lan, J., & Yan, X. (2016). A secure network coding based on broadcast encryption in sdn.\u00a0Mathematical Problems in Engineering,\u00a02016,\u00a01\u20138.","DOI":"10.1155\/2016\/7145138"},{"issue":"1","key":"1825_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNSM.2018.2799000","volume":"15","author":"Wu Jun","year":"2018","unstructured":"Jun, Wu., Dong, M., Ota, K., Li, J., & Guan, Z. (2018). Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks. IEEE Transactions on Network and Service Management, 15(1), 27\u201338.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"17","key":"1825_CR21","first-page":"1","volume":"5","author":"Li Wang","year":"2018","unstructured":"Wang, Li., & Dinghao, Wu. (2018). Bridging the Gap between Security Tools and SDN Controllers. EAI Endorsed Transactions on Security and Safety, 5(17), 1\u201316.","journal-title":"EAI Endorsed Transactions on Security and Safety"},{"key":"1825_CR22","doi-asserted-by":"crossref","unstructured":"Kim, J. A., Park, D. G., & Jeong, J. (2019). Design and performance evaluation of cost-effective function-distributed mobility management scheme for software-defined smart factory networking.\u00a0Journal of Ambient Intelligence and Humanized Computing,\u00a01\u201317.","DOI":"10.1007\/s12652-019-01356-5"},{"issue":"1","key":"1825_CR23","first-page":"1","volume":"29","author":"F Rebecchi","year":"2018","unstructured":"Rebecchi, F., Boite, J., Nardin, P.-A., Bouet, M., & Conan, V. (2018). DDoS protection with stateful software-defined networking. International journal of network management, 29(1), 1\u201319.","journal-title":"International journal of network management"},{"key":"1825_CR24","doi-asserted-by":"publisher","first-page":"137856","DOI":"10.1109\/ACCESS.2019.2943146","volume":"7","author":"Xu Chuanfeng","year":"2019","unstructured":"Chuanfeng, Xu., Lin, H., Yulei, Wu., Guo, X., & Lin, W. (2019). An SDNFV-Based DDoS Defense Technology for Smart Cities. IEEE Access, 7, 137856\u2013137874.","journal-title":"IEEE Access"},{"key":"1825_CR25","doi-asserted-by":"publisher","first-page":"4829","DOI":"10.1007\/s11227-019-02767-z","volume":"75","author":"Kshira Sagar Sahoo","year":"2019","unstructured":"Sahoo, K. S., Panda, S. K., Sahoo, S., Sahoo, B., & Dash, R. (2019)\u00a0Toward secure software-defined networks against distributed denial of service attack.\u00a0The Journal of Supercomputing, Elsevier, 75, 4829\u20134874.","journal-title":"The Journal of Supercomputing, Elsevier"},{"key":"1825_CR26","doi-asserted-by":"crossref","unstructured":"Bawany, N. Z., & Shamsi, J. A. (2019). SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks.\u00a0Journal of Network and Computer Applications,\u00a0145, 1\u201335.","DOI":"10.1016\/j.jnca.2019.06.001"},{"issue":"4","key":"1825_CR27","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TIFS.2018.2868220","volume":"14","author":"V Varadharajan","year":"2019","unstructured":"Varadharajan, V., Karmakar, K., Tupakula, U., & Hitchens, M. (2019). A Policy-Based Security Architecture for Software-Defined Networks. IEEE Transactions on Information Forensics and Security, 14(4), 897\u2013912.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"1825_CR28","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/LCOMM.2019.2898864","volume":"23","author":"K Sood","year":"2019","unstructured":"Sood, K. (2019). Kallol Krishna Karmakar, Vijay Varadharajan, Uday Tupakula, and Shui Yu, \u201cAnalysis of Policy-Based Security Management System in Software-Defined Networks.\u201d IEEE Communications Letters, 23(4), 612\u2013615.","journal-title":"IEEE Communications Letters"},{"key":"1825_CR29","unstructured":"1999 Czech financial dataset - real anonymized transactions - dataset by lpetrocelli. data. world, 13-Dec-2019. Retrived date January 02, 2022, from\u00a0https:\/\/data.world\/lpetrocelli\/czech-financial-dataset-real-anonymized-transactions"},{"issue":"4","key":"1825_CR30","doi-asserted-by":"publisher","first-page":"2679","DOI":"10.1109\/JIOT.2019.2951687","volume":"7","author":"T Wang","year":"2019","unstructured":"Wang, T., Bhuiyan, M. Z. A., Wang, G., Qi, L., Wu, J., & Hayajneh, T. (2019). Preserving balance between privacy and data integrity in edge-assisted Internet of Things. IEEE Internet of Things Journal, 7(4), 2679\u20132689.","journal-title":"IEEE Internet of Things Journal"},{"key":"1825_CR31","doi-asserted-by":"crossref","unstructured":"Ramachandran, M., Patan, R., Kumar, A., Hosseini, S., & Gandomi, A. H. (2021). Mutual informative MapReduce and minimum quadrangle classification for brain tumor big data.\u00a0IEEE Transactions on Engineering Management.","DOI":"10.1109\/TEM.2021.3073018"},{"issue":"6","key":"1825_CR32","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1049\/cmu2.12119","volume":"15","author":"C Kannan","year":"2021","unstructured":"Kannan, C., Dakshinamoorthy, M., Ramachandran, M., Patan, R., Kalyanaraman, H., & Kumar, A. (2021). Cryptography-based deep artificial structure for secure communication using IoT-enabled cyber-physical system. IET Communications., 15(6), 771\u2013779.","journal-title":"IET Communications."},{"key":"1825_CR33","unstructured":"Mekala, M. S., Rizwan, P., & Khan, M. S. (2021). Computational intelligent sensor-rank consolidation approach for industrial internet of things (iiot).\u00a0IEEE Internet of Things Journal."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-022-01825-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-022-01825-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-022-01825-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T15:21:13Z","timestamp":1679584873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-022-01825-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,26]]},"references-count":33,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1825"],"URL":"https:\/\/doi.org\/10.1007\/s11265-022-01825-9","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,26]]},"assertion":[{"value":"30 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest between the authors to publish this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}