{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:34:37Z","timestamp":1766486077425,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11277-021-08339-w","type":"journal-article","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T10:02:37Z","timestamp":1615543357000},"page":"2469-2485","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["BDN-GWMNN: Internet of Things (IoT) Enabled Secure Smart City Applications"],"prefix":"10.1007","volume":"119","author":[{"given":"Subhashini","family":"Peneti","sequence":"first","affiliation":[]},{"given":"M.","family":"Sunil Kumar","sequence":"additional","affiliation":[]},{"given":"Suresh","family":"Kallam","sequence":"additional","affiliation":[]},{"given":"Rizwan","family":"Patan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3820-2081","authenticated-orcid":false,"given":"Vidhyacharan","family":"Bhaskar","sequence":"additional","affiliation":[]},{"given":"Manikandan","family":"Ramachandran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,12]]},"reference":[{"key":"8339_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993216","author":"L Xing","year":"2020","unstructured":"Xing, L. (2020). Reliability in Internet of Things: Current Status and Future Perspectives. IEEE Internet of Things Journal. DOI:https:\/\/doi.org\/10.1109\/JIOT.2020.2993216.","journal-title":"IEEE Internet of Things Journal"},{"key":"8339_CR2","doi-asserted-by":"publisher","unstructured":"Gomathi, P., Baskar, S., & Shakeel, P. M. (2020) Concurrent service access and management framework for usercentric future internet of things in smart cities. Complex Intell. Syst. (2020). https:\/\/doi.org\/10.1007\/s40747-020-00160-5.","DOI":"10.1007\/s40747-020-00160-5"},{"key":"8339_CR3","first-page":"1","volume-title":"Advances in Core Computer Science-Based Technologies","author":"GA Tsihrintzis","year":"2020","unstructured":"Tsihrintzis, G. A., & Virvou, M. (2020). Advances in Core Computer Science-Based Technologies. In Advances in Core Computer Science-Based Technologies (pp.\u00a01\u20136). Cham: Springer."},{"issue":"2","key":"8339_CR4","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","volume":"21","author":"MS Ali","year":"2019","unstructured":"Ali, M. S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., & Rehmani, M. H. (2019). Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), 1676\u20131717.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"8339_CR5","doi-asserted-by":"publisher","unstructured":"Sheron, P. F., Sridhar, K. P., Baskar, S., & Shakeel, P. M. (2019). A decentralized scalable security framework for end-to\u2010end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies, e3815.https:\/\/doi.org\/10.1002\/ett.3815.","DOI":"10.1002\/ett.3815"},{"key":"8339_CR6","doi-asserted-by":"crossref","unstructured":"Ge, M., Hong, J. B., Walter Guttmann, and Dong Seong Kim. (2017) \u201cA framework for automating security analysis of the internet of things.\u201c Journal of Network and Computer Applications 83 (2017): 12\u201327.","DOI":"10.1016\/j.jnca.2017.01.033"},{"key":"8339_CR7","doi-asserted-by":"publisher","unstructured":"Preeth, S. S. L., & Dhanalakshmi, R. &Shakeel, P. M. (2019). An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks. Peer-to-PeerNetworking and Applications, 1\u201312. https:\/\/doi.org\/10.1007\/s12083-019-00798-0","DOI":"10.1007\/s12083-019-00798-0"},{"key":"8339_CR8","doi-asserted-by":"crossref","unstructured":"Biswas, K., & Muthukkumarasamy, V. (2016, December). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC\/SmartCity\/DSS) (pp.\u00a01392\u20131393). IEEE.","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"8339_CR9","doi-asserted-by":"publisher","first-page":"102252","DOI":"10.1016\/j.scs.2020.102252","volume":"60","author":"SK Singh","year":"2020","unstructured":"Singh, S. K., Jeong, Y. S., & Park, J. H. (2020). A Deep Learning-based IoT-oriented Infrastructure for Secure Smart City. Sustainable Cities and Society,Volume, 60, 102252.","journal-title":"Sustainable Cities and Society,Volume"},{"key":"8339_CR10","doi-asserted-by":"publisher","first-page":"102324","DOI":"10.1016\/j.scs.2020.102324","volume":"61","author":"MA Rahman","year":"2020","unstructured":"Rahman, M. A., Asyharia, A. T., Leong, L. S., Satrya, G. B., Tao, M. H., & Zolkipli, M. F. (2020). Scalable Machine Learning-Based Intrusion Detection System for IoT-Enabled Smart Cities. Sustainable Cities and Society, 61, 102324.","journal-title":"Sustainable Cities and Society"},{"key":"8339_CR11","doi-asserted-by":"crossref","unstructured":"Rahman, M. A., Asyhari, A. T., Kurniawan, I. F., Ali, M. J., Rahman, M. M., & Karim, M. (2020). A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks. Computer Communications.157, PP. 320\u2013328.","DOI":"10.1016\/j.comcom.2020.04.035"},{"key":"8339_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-18075-1_1","volume-title":"Security, Privacy and Trust in the IoT Environment","author":"SK Aikins","year":"2019","unstructured":"Aikins, S. K. (2019). Managing Cybersecurity Risks of SCADA Networks of Critical Infrastructures in the IoT Environment. In Security, Privacy and Trust in the IoT Environment (pp.\u00a03\u201323). Cham: Springer."},{"key":"8339_CR13","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-030-04984-3_11","volume-title":"Internet of Things Security and Data Protection","author":"S Ziegler","year":"2019","unstructured":"Ziegler, S., Menon, M., & Annichino, P. (2019). IoT Privacy and Security in Smart Cities. In Internet of Things Security and Data Protection (pp.\u00a0149\u2013171). Cham: Springer."},{"key":"8339_CR14","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-030-01659-3_37","volume-title":"Smart Technologies and Innovation for a Sustainable Future","author":"TA Butt","year":"2019","unstructured":"Butt, T. A., & Afzaal, M. (2019). Security and privacy in smart cities: issues and current solutions. In Smart Technologies and Innovation for a Sustainable Future (pp.\u00a0317\u2013323). Cham: Springer."},{"issue":"1","key":"8339_CR15","first-page":".PP29","volume":"20","author":"D Popescul","year":"2016","unstructured":"Popescul, D., & &Genete, L. D. (2016). Data security in smart cities: challenges and solutions. InformaticaEconomic\u0103, 20(1), .PP29\u201338.","journal-title":"InformaticaEconomic\u0103"},{"issue":"1","key":"8339_CR16","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2017.1600232CM","volume":"55","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob, I., Hashem, I. A. T., Mehmood, Y., Gani, A., Mokhtar, S., & Guizani, S. (2017). Enabling communication technologies for smart cities. IEEE Communications Magazine, 55(1), 112\u2013120.","journal-title":"IEEE Communications Magazine"},{"key":"8339_CR17","first-page":"1","volume-title":"Handbook of Smart Cities","author":"Q Le-Dang","year":"2018","unstructured":"Le-Dang, Q., & Le-Ngoc, T. (2018). Internet of Things (IoT) Infrastructures for Smart Cities. In Handbook of Smart Cities (pp.\u00a01\u201330). Cham: Springer."},{"key":"8339_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-981-15-1451-7_3","volume-title":"Cognitive Informatics and Soft Computing","author":"SN Raj","year":"2020","unstructured":"Raj, S. N., & Sherly, E. (2020). \u201cBlockchain-Based Shared Security Architecture. In \u201cIn Cognitive Informatics and Soft Computing (pp.\u00a029\u201335). Singapore: Springer."},{"key":"8339_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Z. H., & Wang, J. (2019, October). An IOT Data Collection Mechanism Based on Cloud-Edge Coordinated Deep Learning. In China Conference on Wireless Sensor Networks (pp.\u00a076\u201389). Springer, Singapore.","DOI":"10.1007\/978-981-15-1785-3_6"},{"issue":"4","key":"8339_CR20","first-page":"1","volume":"25","author":"CM de Morais","year":"2019","unstructured":"de Morais, C. M., Sadok, D., & Kelner, J. (2019). An IoT sensor and scenario survey for data researchers. Journal of the Brazilian Computer Society, 25(4), 1\u201317.","journal-title":"Journal of the Brazilian Computer Society"},{"key":"8339_CR21","first-page":"1","volume-title":"Blockchain Cybersecurity, Trust and Privacy,79","author":"RM Parizi","year":"2020","unstructured":"Parizi, R. M., Dehghantanha, A., Azmoodeh, A., & Choo, K. K. R. (2020). Blockchain in Cybersecurity Realm: An Overview. In Blockchain Cybersecurity, Trust and Privacy,79 (pp.\u00a01\u20135). Cham: Springer."},{"key":"8339_CR22","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-662-43505-2_28","volume-title":"Springer Handbook of Computational Intelligence","author":"K Chen","year":"2015","unstructured":"Chen, K. (2015). Deep and modular neural networks. In Springer Handbook of Computational Intelligence (pp.\u00a0473\u2013494). Berlin: Springer."},{"key":"8339_CR23","doi-asserted-by":"crossref","unstructured":"Tanaka, G., Yamane, T., Nakano, D., Nakane, R., & Katayama, Y. (2015, July). Regularity and randomness in modular network structures for neural associative memories. In 2015 International Joint Conference on Neural Networks (IJCNN) (pp.\u00a01\u20137). IEEE.","DOI":"10.1109\/IJCNN.2015.7280829"},{"issue":"3","key":"8339_CR24","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/TNNLS.2016.2634548","volume":"29","author":"E Emary","year":"2017","unstructured":"Emary, E., Zawbaa, H. M., & Grosan, C. (2017). Experienced gray wolf optimization through reinforcement learning and neural networks. IEEE transactions on neural networks and learning systems, 29(3), 681\u2013694.","journal-title":"IEEE transactions on neural networks and learning systems"},{"key":"8339_CR25","unstructured":"https:\/\/thingsboard.io\/smart-energy\/."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08339-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08339-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08339-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T17:30:37Z","timestamp":1626715837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08339-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,12]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["8339"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08339-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,3,12]]},"assertion":[{"value":"19 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}