{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:45:15Z","timestamp":1767919515412,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB0803400"],"award-info":[{"award-number":["2018YFB0803400"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFB0803403"],"award-info":[{"award-number":["2018YFB0803403"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11277-024-11375-x","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T06:02:55Z","timestamp":1719468175000},"page":"2299-2327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment"],"prefix":"10.1007","volume":"136","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8159-4984","authenticated-orcid":false,"given":"Hongsong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yiying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xintong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yongrui","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yongpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"issue":"1","key":"11375_CR1","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TSMC.2020.3042898","volume":"51","author":"G Fortino","year":"2022","unstructured":"Fortino, G., Savaglio, C., Spezzano, G., & Zhou, M. (2022). Internet of Things as system of systems: A review of methodologies, frameworks, platforms, and tools. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(1), 223\u2013236. https:\/\/doi.org\/10.1109\/TSMC.2020.3042898","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"1","key":"11375_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372136","volume":"53","author":"L Lao","year":"2020","unstructured":"Lao, L., et al. (2020). A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Computing Surveys (CSUR), 53(1), 1\u201332.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"11375_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100441","volume":"16","author":"C-H Hsiao","year":"2021","unstructured":"Hsiao, C.-H., & Lee, W.-P. (2021). OPIIoT: Design and Implementation of an open communication protocol platform for industrial Internet of Things. Internet of Things, 16, 100441. https:\/\/doi.org\/10.1016\/j.iot.2021.100441","journal-title":"Internet of Things"},{"issue":"11","key":"11375_CR4","doi-asserted-by":"publisher","first-page":"19866","DOI":"10.1109\/JIOT.2024.3371504","volume":"11","author":"MM Merlec","year":"2024","unstructured":"Merlec, M. M., & In, H. P. (2024). SC-CAAC: A smart-contract-based context-aware access control scheme for blockchain-enabled IoT systems. IEEE Internet of Things Journal, 11(11), 19866\u201319881. https:\/\/doi.org\/10.1109\/JIOT.2024.3371504","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"11375_CR5","doi-asserted-by":"publisher","first-page":"3505","DOI":"10.1007\/s11277-021-08284-8","volume":"117","author":"C Hongsong","year":"2021","unstructured":"Hongsong, C., Yongpeng, Z., Yongrui, C., et al. (2021). Security threats and defensive approaches in machine learning system under big data environment. Wireless Personal Communications, 117(4), 3505\u20133525.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"11375_CR6","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1016\/j.dcan.2021.02.001","volume":"4","author":"SONG Jie","year":"2022","unstructured":"Jie, S. O. N. G., et al. (2022). Research advances on blockchain-as-a-service: Architectures, applications and challenges. Digital Communications and Networks, 4(4), 466\u2013475.","journal-title":"Digital Communications and Networks"},{"key":"11375_CR7","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.future.2020.01.032","volume":"106","author":"A Zimba","year":"2020","unstructured":"Zimba, A., Chen, H., Wang, Z., et al. (2020). Modeling and detection of the multi-stages of advanced persistent threats attacks based on semi-supervised learning and complex networks characteristics. Future Generation Computer Systems, 106, 501\u2013517.","journal-title":"Future Generation Computer Systems"},{"key":"11375_CR8","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li, X., Jiang, P., Chen, T., et al. (2020). A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841\u2013853.","journal-title":"Future Generation Computer Systems"},{"key":"11375_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101330","volume":"72","author":"X Wu","year":"2021","unstructured":"Wu, X., & Liang, J. (2021). A blockchain-based trust management method for Internet of Things. Pervasive and Mobile Computing, 72, 101330.","journal-title":"Pervasive and Mobile Computing"},{"issue":"6","key":"11375_CR10","doi-asserted-by":"publisher","first-page":"4157","DOI":"10.1109\/JIOT.2020.3028368","volume":"8","author":"MB Mollah","year":"2020","unstructured":"Mollah, M. B., Zhao, J., Niyato, D., et al. (2020). Blockchain for the internet of vehicles towards intelligent transportation systems: A survey. IEEE Internet of Things Journal, 8(6), 4157\u20134185.","journal-title":"IEEE Internet of Things Journal"},{"key":"11375_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04452-1","author":"X Liu","year":"2022","unstructured":"Liu, X., Wang, Y., Wang, J., et al. (2022). Supply chain financial logistics supervision system based on blockchain technology. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-022-04452-1","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11375_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103007","volume":"181","author":"U Majeed","year":"2021","unstructured":"Majeed, U., Khan, L. U., Yaqoob, I., et al. (2021). Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. Journal of Network and Computer Applications, 181, 103007.","journal-title":"Journal of Network and Computer Applications"},{"key":"11375_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03718-y","author":"W Miloud Dahmane","year":"2022","unstructured":"Miloud Dahmane, W., Ouchani, S., & Bouarfa, H. (2022). Guaranteeing information integrity and access control in smart cities through blockchain. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-022-03718-y","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11375_CR14","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s12652-020-02017-8","volume":"12","author":"G Rathee","year":"2021","unstructured":"Rathee, G., Balasaraswathi, M., Chandran, K. P., et al. (2021). A secure IoT sensors communication in industry 4.0 using blockchain technology. Journal of Ambient Intelligence and Humanized Computing, 12, 533\u2013545. https:\/\/doi.org\/10.1007\/s12652-020-02017-8","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11375_CR15","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.comcom.2020.04.038","volume":"160","author":"A Meeuw","year":"2020","unstructured":"Meeuw, A., Schopfer, S., W\u00f6rner, A., et al. (2020). Implementing a blockchain-based local energy market: Insights on communication and scalability. Computer Communications, 160, 158\u2013171.","journal-title":"Computer Communications"},{"key":"11375_CR16","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.ins.2021.04.021","volume":"570","author":"L Ouyang","year":"2021","unstructured":"Ouyang, L., Yuan, Y., Cao, Y., et al. (2021). A novel framework of collaborative early warning for COVID-19 based on blockchain and smart contracts. Information Sciences, 570, 124\u2013143.","journal-title":"Information Sciences"},{"key":"11375_CR17","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.ins.2021.01.050","volume":"561","author":"G Li","year":"2021","unstructured":"Li, G., Ren, X., Wu, J., et al. (2021). Blockchain-based mobile edge computing system. Information Sciences, 561, 70\u201380.","journal-title":"Information Sciences"},{"issue":"2","key":"11375_CR18","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1109\/JIOT.2021.3119639","volume":"9","author":"TR Gadekallu","year":"2022","unstructured":"Gadekallu, T. R., et al. (2022). Blockchain for Edge of Things: Applications, opportunities, and challenges. IEEE Internet of Things Journal, 9(2), 964\u2013988.","journal-title":"IEEE Internet of Things Journal"},{"key":"11375_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103371","volume":"203","author":"S Pal","year":"2022","unstructured":"Pal, S., Dorri, A., & Jurdak, R. (2022). Blockchain for IoT access control: Recent trends and future research directions. Journal of Network and Computer Applications, 203, 103371.","journal-title":"Journal of Network and Computer Applications"},{"issue":"13","key":"11375_CR20","doi-asserted-by":"publisher","first-page":"10452","DOI":"10.1109\/JIOT.2021.3060508","volume":"8","author":"L Da Xu","year":"2021","unstructured":"Da Xu, L., Lu, Y., & Li, L. (2021). Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal, 8(13), 10452\u201310473.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"11375_CR21","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/JIOT.2020.3008906","volume":"8","author":"BK Mohanta","year":"2020","unstructured":"Mohanta, B. K., Jena, D., Ramasubbareddy, S., et al. (2020). Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet of Things Journal, 8(2), 881\u2013888.","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"11375_CR22","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MWC.2017.1800116","volume":"25","author":"Y Yu","year":"2018","unstructured":"Yu, Y., Li, Y., Tian, J., et al. (2018). Blockchain-based solutions to security and privacy issues in the Internet of Things. IEEE Wireless Communications, 25(6), 12\u201318.","journal-title":"IEEE Wireless Communications"},{"key":"11375_CR23","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Consulted."},{"key":"11375_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.intfin.2022.101577","volume":"79","author":"BM Cole","year":"2022","unstructured":"Cole, B. M., Dyhrberg, A. H., Foley, S., et al. (2022). Can bitcoin be trusted? Quantifying the economic value of blockchain transactions. Journal of International Financial Markets, Institutions and Money, 79, 101577.","journal-title":"Journal of International Financial Markets, Institutions and Money"},{"issue":"10","key":"11375_CR25","doi-asserted-by":"publisher","first-page":"7789","DOI":"10.1109\/JIOT.2020.3039359","volume":"8","author":"J Zhang","year":"2021","unstructured":"Zhang, J., & Tao, D. (2021). Empowering things with intelligence: A survey of the progress, challenges, and opportunities in artificial intelligence of things. IEEE Internet of Things Journal, 8(10), 7789\u20137817. https:\/\/doi.org\/10.1109\/JIOT.2020.3039359","journal-title":"IEEE Internet of Things Journal"},{"key":"11375_CR26","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TETC.2021.3099701","volume":"10","author":"A Rasheed","year":"2022","unstructured":"Rasheed, A., Mahapatra, R. N., Varol, C., & Narashimha, K. (2022). Exploiting zero knowledge proof and blockchains towards the enforcement of anonymity, data integrity and privacy (ADIP) in the IoT. IEEE Transaction on Emerging Topics in Computing, 10, 1476\u20131491.","journal-title":"IEEE Transaction on Emerging Topics in Computing"},{"key":"11375_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100627","volume":"20","author":"Z Yang","year":"2022","unstructured":"Yang, Z., Li, L., Fei, G., Ling, X., & Hajiee, M. (2022). TADR-EAODV: A trust-aware dynamic routing algorithm based on extended AODV protocol for secure communications in wireless sensor networks. Internet of Things, 20, 100627. https:\/\/doi.org\/10.1016\/j.iot.2022.100627","journal-title":"Internet of Things"},{"key":"11375_CR28","doi-asserted-by":"publisher","unstructured":"Singh, R., Sturley, S., Sharma, B. & Dhaou, I. B. (2023). Blockchain-enabled device authentication and authorisation for Internet of Things. In 2023 1st international conference on advanced innovations in smart cities (ICAISC). https:\/\/doi.org\/10.1109\/ICAISC56366.2023.10084957.","DOI":"10.1109\/ICAISC56366.2023.10084957"},{"issue":"1","key":"11375_CR29","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TCC.2019.2930259","volume":"10","author":"C Qiu","year":"2022","unstructured":"Qiu, C., Yao, H., Jiang, C., Guo, S., & Xu, F. (2022). Cloud computing assisted blockchain-enabled Internet of Things. IEEE Transactions on Cloud Computing, 10(1), 247\u2013257. https:\/\/doi.org\/10.1109\/TCC.2019.2930259","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"11375_CR30","doi-asserted-by":"publisher","unstructured":"Mallah, R. A., L\u00f3pez, D., Halabi, T. (2023). Blockchain-enabled efficient and secure federated learning in IoT and edge computing networks. In 2023 international conference on computing, networking and communications (ICNC) 511\u2013515. https:\/\/doi.org\/10.1109\/ICNC57223.2023.10074277.","DOI":"10.1109\/ICNC57223.2023.10074277"},{"key":"11375_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151359","author":"G Xu","year":"2022","unstructured":"Xu, G., Dong, J., Ma, C., Liu, J., & Cliff, U. G. O. (2022). A certificateless signcryption mechanism based on blockchain for edge computing. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2022.3151359","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"11375_CR32","first-page":"150","volume":"2","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Lin, T., Chen, J., Zeng, P., & Liu, P. (2022). Smart contract with fully homomorphic encryption under edge computing mode. Journal of Cyber Security, 2(2), 150\u2013162.","journal-title":"Journal of Cyber Security"},{"issue":"2","key":"11375_CR33","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/JAS.2020.1003039","volume":"7","author":"X Huang","year":"2020","unstructured":"Huang, X., Ye, D., Rong, Yu., & Shu, L. (2020). Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design. IEEE\/CAA Journal of Automatica Sinica, 7(2), 426\u2013441. https:\/\/doi.org\/10.1109\/JAS.2020.1003039","journal-title":"IEEE\/CAA Journal of Automatica Sinica"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11375-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11375-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11375-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T13:17:13Z","timestamp":1720531033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11375-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["11375"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11375-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"13 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}