{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:43:16Z","timestamp":1761396196941,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JBF211502"],"award-info":[{"award-number":["JBF211502"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central universities, the innovation Fund of Xidian University","award":["YJS2021"],"award-info":[{"award-number":["YJS2021"]}]},{"name":"Shaanxi Innovation Team Project","award":["2018TD-007"],"award-info":[{"award-number":["2018TD-007"]}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2018YFB0803900"],"award-info":[{"award-number":["2018YFB0803900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92067103","61772403"],"award-info":[{"award-number":["92067103","61772403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Shaanxi","award":["2021ZDLGY06-02"],"award-info":[{"award-number":["2021ZDLGY06-02"]}]},{"name":"Key Scientific Research Program of Education Department of Shaanxi","award":["20JY015"],"award-info":[{"award-number":["20JY015"]}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2019ZDLGY12-02"],"award-info":[{"award-number":["2019ZDLGY12-02"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2020JM-184"],"award-info":[{"award-number":["2020JM-184"]}]},{"name":"Xi\u2019an Science and technology innovation plan","award":["201809168CX9JC10"],"award-info":[{"award-number":["201809168CX9JC10"]}]},{"name":"National 111 Program of China","award":["B16037"],"award-info":[{"award-number":["B16037"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12083-021-01276-2","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T08:24:18Z","timestamp":1642407858000},"page":"1152-1162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Blockchain-based trust management for verifiable time synchronization service in IoT"],"prefix":"10.1007","volume":"15","author":[{"given":"Kai","family":"Fan","sequence":"first","affiliation":[]},{"given":"Zeyu","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4631-9274","authenticated-orcid":false,"given":"Ruidan","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yuhan","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Pei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"key":"1276_CR1","doi-asserted-by":"publisher","first-page":"111763","DOI":"10.1109\/ACCESS.2020.3002932","volume":"8","author":"AHM Aman","year":"2020","unstructured":"Aman AHM, Yadegaridehkordi E, Attarbashi ZS, Hassan R, Park Y (2020) A survey on trend and classification of internet of things reviews. IEEE Access 8:111763\u2013111782. https:\/\/doi.org\/10.1109\/ACCESS.2020.3002932","journal-title":"IEEE Access"},{"key":"1276_CR2","doi-asserted-by":"publisher","first-page":"23022","DOI":"10.1109\/ACCESS.2020.2970118","volume":"8","author":"K Shafique","year":"2020","unstructured":"Shafique K, Khawaja BA, Sabir F, Qazi S, Mustaqim M (2020) Internet of things (iot) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5g-iot scenarios. IEEE Access 8:23022\u201323040. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970118","journal-title":"IEEE Access"},{"key":"1276_CR3","doi-asserted-by":"publisher","first-page":"70961","DOI":"10.1109\/ACCESS.2021.3078549","volume":"9","author":"I Zhou","year":"2021","unstructured":"Zhou I, Makhdoom I, Shariati N, Raza MA, Keshavarz R, Lipman J, Abolhasan M, Jamalipour A (2021) Internet of things 2.0: Concepts, applications, and future directions. IEEE Access 9:70961\u201371012. https:\/\/doi.org\/10.1109\/ACCESS.2021.3078549","journal-title":"IEEE Access"},{"key":"1276_CR4","doi-asserted-by":"crossref","unstructured":"Zheng X, Sun S, Mukkamala RR, Vatrapu R, Ordieresmere J (2019) Accelerating health data sharing: A solution based on the internet of things and distributed ledger technologies. J Med Internet Res 21(6)","DOI":"10.2196\/13583"},{"key":"1276_CR5","doi-asserted-by":"publisher","unstructured":"Mani SK, Durairajan R, Barford P, Sommers J (2018) An architecture for iot clock synchronization. In: Janowicz K, Kuhn W, Cena F, Haller A, Vamvoudakis KG (eds) Proceedings of the 8th International Conference on the Internet of Things, IOT, Santa Barbara, CA, USA, ACM, pp. 17:1\u201317:8.\u00a0https:\/\/doi.org\/10.1145\/3277593.3277606","DOI":"10.1145\/3277593.3277606"},{"issue":"12","key":"1276_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2012.6384464","volume":"50","author":"A Sehgal","year":"2012","unstructured":"Sehgal A, Perelman V, Kuryla S, Sch\u00f6nw\u00e4lder J (2012) Management of resource constrained devices in the internet of things. IEEE Commun Mag 50(12):144\u2013149. https:\/\/doi.org\/10.1109\/MCOM.2012.6384464","journal-title":"IEEE Commun Mag"},{"key":"1276_CR7","doi-asserted-by":"crossref","unstructured":"Eidson JC, Fischer M, White J (2002) Ieee-1588 standard for a precision clock synchronization protocol for networked measurement and control systems. In: Proceedings of the 34th Annual Precise Time and Time Interval Systems and Applications Meeting, pp. 243\u2013254","DOI":"10.1109\/SFICON.2002.1159815"},{"issue":"10","key":"1276_CR8","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/26.103043","volume":"39","author":"DL Mills","year":"1991","unstructured":"Mills DL (1991) Internet time synchronization: the network time protocol. IEEE Trans Commun 39(10):1482\u20131493. https:\/\/doi.org\/10.1109\/26.103043","journal-title":"IEEE Trans Commun"},{"key":"1276_CR9","doi-asserted-by":"publisher","unstructured":"Alghamdi W, Schukat M (2020) Slave clock responses to precision time protocol attacks: A case study. In: 2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland,\u00a0IEEE, pp. 1\u20134. https:\/\/doi.org\/10.1109\/CyberSecurity49315.2020.9138888","DOI":"10.1109\/CyberSecurity49315.2020.9138888"},{"issue":"3","key":"1276_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2014.40","volume":"12","author":"C Bonebrake","year":"2014","unstructured":"Bonebrake C, O\u2019Neil LR (2014) Attacks on GPS time reliability. IEEE Secur Priv 12(3):82\u201384. https:\/\/doi.org\/10.1109\/MSP.2014.40","journal-title":"IEEE Secur Priv"},{"key":"1276_CR11","doi-asserted-by":"crossref","unstructured":"Malhotra A, Cohen IE, Brakke E, Goldberg S (2016) Attacking the network time protocol. In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, The Internet Society.\u00a0http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/attacking-network-time-protocol.pdf","DOI":"10.14722\/ndss.2016.23090"},{"issue":"2","key":"1276_CR12","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/TNET.2020.2977024","volume":"28","author":"Y Cao","year":"2020","unstructured":"Cao Y, Veitch D (2020) Toward trusted time: Remote server vetting and the misfiring heart of internet timing. IEEE\/ACM Trans Netw 28(2):944\u2013956. https:\/\/doi.org\/10.1109\/TNET.2020.2977024","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1276_CR13","doi-asserted-by":"publisher","unstructured":"Gore RN, Elizabeth N, Dzung D, Ashok S (2019) Towards robust synchronization in iot networks. In: 11th International Conference on Communication Systems & Networks, COMSNETS 2019, Bengaluru, India, IEEE, pp. 678\u2013683.\u00a0https:\/\/doi.org\/10.1109\/COMSNETS.2019.8711343","DOI":"10.1109\/COMSNETS.2019.8711343"},{"issue":"4","key":"1276_CR14","doi-asserted-by":"publisher","first-page":"6469","DOI":"10.1007\/s11277-017-4848-1","volume":"97","author":"RS Jha","year":"2017","unstructured":"Jha RS, Gupta P (2017) Clock synchronization in iot network using cloud computing. Wirel Pers Commun 97(4):6469\u20136481. https:\/\/doi.org\/10.1007\/s11277-017-4848-1","journal-title":"Wirel Pers Commun"},{"key":"1276_CR15","doi-asserted-by":"publisher","unstructured":"Regnath E, Shivaraman N, Shreejith S, Easwaran A, Steinhorst S (2020) Blockchain, what time is it? trustless datetime synchronization for iot. In: 2020 International Conference on Omni-layer Intelligent Systems, COINS 2020, Barcelona, Spain, IEEE, pp. 1\u20136.\u00a0https:\/\/doi.org\/10.1109\/COINS49042.2020.9191420","DOI":"10.1109\/COINS49042.2020.9191420"},{"issue":"5","key":"1276_CR16","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/JIOT.2015.2419740","volume":"2","author":"Z Sheng","year":"2015","unstructured":"Sheng Z, Wang H, Yin C, Hu X, Yang S, Leung VCM (2015) Lightweight management of resource-constrained sensor devices in internet of things. IEEE Internet Things J 2(5):402\u2013411. https:\/\/doi.org\/10.1109\/JIOT.2015.2419740","journal-title":"IEEE Internet Things J"},{"key":"1276_CR17","doi-asserted-by":"crossref","unstructured":"Wang S, Hou Y, Gao F, Ma S (2016) A novel clock synchronization architecture for iot access system. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), IEEE, pp. 1456\u20131459","DOI":"10.1109\/CompComm.2016.7924944"},{"key":"1276_CR18","unstructured":"Berkley J (2015) The promise of the blockchain the trust machine. The Economist 31"},{"key":"1276_CR19","doi-asserted-by":"publisher","unstructured":"Haberman B, Mills DL (2010) Network time protocol version 4: Autokey specification. RFC 5906:1\u201358.\u00a0https:\/\/doi.org\/10.17487\/RFC5906","DOI":"10.17487\/RFC5906"},{"key":"1276_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17487\/RFC5905","volume":"5905","author":"DL Mills","year":"2010","unstructured":"Mills DL, Martin J, Burbank JL, Kasch WT (2010) Network time protocol version 4: Protocol and algorithms specification. RFC 5905:1\u2013110. https:\/\/doi.org\/10.17487\/RFC5905","journal-title":"RFC"},{"key":"1276_CR21","unstructured":"Annessi R, Fabini J, Iglesias F, Zseby T (2018) Encryption is futile: Delay attacks on high-precision clock synchronization. CoRR abs\/1811.08569, arXiv:1811.08569"},{"key":"1276_CR22","unstructured":"Nakamoto S et\u00a0al. (2008) Bitcoin: A peer-to-peer electronic cash system"},{"key":"1276_CR23","doi-asserted-by":"publisher","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, Caro AD, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukolic M, Cocco SW, Yellick J (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Oliveira R, Felber P, Hu YC (eds) Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, ACM, pp. 30:1\u201330:15.\u00a0https:\/\/doi.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"issue":"2014","key":"1276_CR24","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1\u201332","journal-title":"Ethereum project yellow paper"},{"key":"1276_CR25","doi-asserted-by":"publisher","unstructured":"Merkle RC (1987) A digital signature based on a conventional encryption function. In: Pomerance C (ed) Advances in Cryptology - CRYPTO \u201987, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, Springer, Lecture Notes in Computer Science, vol. 293, pp. 369\u2013378.\u00a0https:\/\/doi.org\/10.1007\/3-540-48184-2_32","DOI":"10.1007\/3-540-48184-2_32"},{"key":"1276_CR26","unstructured":"NEM T (2018) Nem technical reference. https:\/\/www.nemio\/wpcontent\/themes\/nem\/files\/NEM_techRefpdf"},{"issue":"3","key":"1276_CR27","doi-asserted-by":"publisher","first-page":"4671","DOI":"10.1109\/JIOT.2018.2874222","volume":"6","author":"K Fan","year":"2018","unstructured":"Fan K, Wang S, Ren Y, Yang K, Yan Z, Li H, Yang Y (2018) Blockchain-based secure time protection scheme in iot. IEEE Internet Things J 6(3):4671\u20134679. https:\/\/doi.org\/10.1109\/JIOT.2018.2874222","journal-title":"IEEE Internet Things J"},{"key":"1276_CR28","doi-asserted-by":"publisher","unstructured":"Hartl A, Zseby T, Fabini J (2019) Beaconblocks: Augmenting proof-of-stake with on-chain time synchronization. In: IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, IEEE, pp. 353\u2013360.\u00a0https:\/\/doi.org\/10.1109\/Blockchain.2019.00055","DOI":"10.1109\/Blockchain.2019.00055"},{"key":"1276_CR29","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.future.2019.06.007","volume":"101","author":"K Fan","year":"2019","unstructured":"Fan K, Sun S, Yan Z, Pan Q, Li H, Yang Y (2019) A blockchain-based clock synchronization scheme in iot. Future Gener Comput Syst 101:524\u2013533. https:\/\/doi.org\/10.1016\/j.future.2019.06.007","journal-title":"Future Gener Comput Syst"},{"key":"1276_CR30","unstructured":"R\u00f6ttger S (2012) Analysis of the ntp autokey protocol. PhD thesis, Masters Thesis, Technische Universit\u00e4t Braunschweig"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01276-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01276-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01276-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T08:19:55Z","timestamp":1647418795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01276-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1276"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01276-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"5 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}]}}