{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:03:06Z","timestamp":1775066586140,"version":"3.50.1"},"reference-count":149,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01812-w","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T12:28:36Z","timestamp":1734611316000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions"],"prefix":"10.1007","volume":"18","author":[{"given":"Vinay","family":"Maurya","sequence":"first","affiliation":[]},{"given":"Vinay","family":"Rishiwal","sequence":"additional","affiliation":[]},{"given":"Mano","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Shiblee","sequence":"additional","affiliation":[]},{"given":"Preeti","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Udit","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Rashmi","family":"Chaudhry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"key":"1812_CR1","unstructured":"Rangsom K, Khan-Am W (2019) Readiness and reasoned for using internet of things. RMUTT Global Business Account Finance Rev 2(3)"},{"key":"1812_CR2","unstructured":"Statista: IoT Connected Devices Worldwide (2022). Accessed on: November 13, 2024"},{"key":"1812_CR3","unstructured":"Mordor Intelligence: IoT Devices Market. Accessed: November 13, 2024"},{"issue":"1","key":"1812_CR4","first-page":"1","volume":"12","author":"NV Dharwadkar","year":"2022","unstructured":"Dharwadkar NV, Dixit AA, Kannur AK, Kadampur MAB, Joshi S (2022) Identification of reasons behind infant crying using acoustic signal processing and deep neural network for neonatal intensive care unit. Int J Inf Retrieval Res (IJIRR) 12(1):1\u201317","journal-title":"Int J Inf Retrieval Res (IJIRR)"},{"key":"1812_CR5","doi-asserted-by":"crossref","unstructured":"Peddoju SK, Upadhyay H, Soni J, Prabakar N (2020) Natural language processing based anomalous system call sequences detection with virtual memory introspection. Int J Adv Comput Sci Appl 11(5)","DOI":"10.14569\/IJACSA.2020.0110559"},{"key":"1812_CR6","doi-asserted-by":"publisher","unstructured":"Yadav P, Sharma SC (2023) Q-learning based optimized localization in wsn. In: 2023 6th International conference on information systems and computer networks (ISCON), pp 1\u20135. https:\/\/doi.org\/10.1109\/ISCON57294.2023.10112130","DOI":"10.1109\/ISCON57294.2023.10112130"},{"key":"1812_CR7","doi-asserted-by":"crossref","unstructured":"Tambe A, Aung YL, Sridharan R, Ochoa M, Tippenhauer NO, Shabtai A, Elovici Y (2019) Detection of threats to iot devices using scalable vpn-forwarded honeypots. 85\u201396","DOI":"10.1145\/3292006.3300024"},{"key":"1812_CR8","doi-asserted-by":"crossref","unstructured":"Tufail S, Batool S, Sarwat AI (2022) A comparative study of binary class logistic regression and shallow neural network for ddos attack prediction, IEEE, 310\u2013315","DOI":"10.1109\/SoutheastCon48659.2022.9764108"},{"key":"1812_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100293","volume":"12","author":"K Khalil","year":"2020","unstructured":"Khalil K, Elgazzar K, Seliem M, Bayoumi M (2020) Resource discovery techniques in the internet of things: A review. Int Things 12:100293. https:\/\/doi.org\/10.1016\/j.iot.2020.100293","journal-title":"Int Things"},{"key":"1812_CR10","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based iot systems: Integration issues, prospects, challenges, and future research directions. Future Generation Comput Syst 97:512\u2013529","journal-title":"Future Generation Comput Syst"},{"key":"1812_CR11","first-page":"21","volume":"15","author":"W Viriyasitavat","year":"2019","unstructured":"Viriyasitavat W, Anuphaptrirong T, Hoonsopon D (2019) When blockchain meets internet of things: Characteristics, challenges, and business opportunities. J Indust Inf Integration 15:21\u201328","journal-title":"J Indust Inf Integration"},{"key":"1812_CR12","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.csi.2018.12.002","volume":"64","author":"AH Mohsin","year":"2019","unstructured":"Mohsin AH, Zaidan A, Zaidan B, Albahri OS, Albahri AS, Alsalem M, Mohammed K (2019) Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions. Comput Stand Interfaces 64:41\u201360","journal-title":"Comput Stand Interfaces"},{"key":"1812_CR13","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/s41635-019-00079-5","volume":"3","author":"P Cui","year":"2019","unstructured":"Cui P, Guin U, Skjellum A, Umphress D (2019) Blockchain in iot: current trends, challenges, and future roadmap. J Hardware Syst Sec 3:338\u2013364","journal-title":"J Hardware Syst Sec"},{"key":"1812_CR14","doi-asserted-by":"crossref","first-page":"58822","DOI":"10.1109\/ACCESS.2019.2914675","volume":"7","author":"SK Lo","year":"2019","unstructured":"Lo SK, Liu Y, Chia SY, Xu X, Lu Q, Zhu L, Ning H (2019) Analysis of blockchain solutions for iot: A systematic literature review. IEEE Access 7:58822\u201358835","journal-title":"IEEE Access"},{"key":"1812_CR15","doi-asserted-by":"crossref","DOI":"10.1016\/j.ymssp.2019.106382","volume":"135","author":"I Mistry","year":"2020","unstructured":"Mistry I, Tanwar S, Tyagi S, Kumar N (2020) Blockchain for 5g-enabled iot for industrial automation: A systematic review, solutions, and challenges. Mech Syst Sig Process 135:106382","journal-title":"Mech Syst Sig Process"},{"key":"1812_CR16","volume":"10","author":"AR Rao","year":"2020","unstructured":"Rao AR, Clarke D (2020) Perspectives on emerging directions in using iot devices in blockchain applications. Int Things 10:100079","journal-title":"Int Things"},{"key":"1812_CR17","doi-asserted-by":"crossref","unstructured":"Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2021) A survey on the adoption of blockchain in iot: Challenges and solutions. Blockchain: Res Appl 2(2):100006","DOI":"10.1016\/j.bcra.2021.100006"},{"issue":"5","key":"1812_CR18","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.irbm.2021.05.003","volume":"43","author":"K Azbeg","year":"2022","unstructured":"Azbeg K, Ouchetto O, Andaloussi S, Fetjah L (2022) A taxonomic review of the use of iot and blockchain in healthcare applications. Irbm 43(5):511\u2013519","journal-title":"Irbm"},{"key":"1812_CR19","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.103050","volume":"181","author":"S Saxena","year":"2021","unstructured":"Saxena S, Bhushan B, Ahad MA (2021) Blockchain based solutions to secure iot: Background, integration trends and a way forward. J Netw Comput Appl 181:103050","journal-title":"J Netw Comput Appl"},{"key":"1812_CR20","doi-asserted-by":"crossref","first-page":"13938","DOI":"10.1109\/ACCESS.2021.3051602","volume":"9","author":"S Singh","year":"2021","unstructured":"Singh S, Hosen AS, Yoon B (2021) Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access 9:13938\u201313959","journal-title":"IEEE Access"},{"issue":"12","key":"1812_CR21","doi-asserted-by":"crossref","first-page":"14461","DOI":"10.1007\/s11227-021-03841-1","volume":"77","author":"K Hameed","year":"2021","unstructured":"Hameed K, Garg S, Amin MB, Kang B (2021) A formally verified blockchain-based decentralised authentication scheme for the internet of things. J Supercomput 77(12):14461\u201314501","journal-title":"J Supercomput"},{"key":"1812_CR22","doi-asserted-by":"crossref","first-page":"156114","DOI":"10.1109\/ACCESS.2021.3129697","volume":"9","author":"EA Shammar","year":"2021","unstructured":"Shammar EA, Zahary AT, Al-Shargabi AA (2021) A survey of iot and blockchain integration: Security perspective. IEEE Access 9:156114\u2013156150","journal-title":"IEEE Access"},{"key":"1812_CR23","doi-asserted-by":"crossref","unstructured":"Al-Sarawi S, Anbar M, Alieyan K, Alzubaidi M (2017) Internet of things (iot) communication protocols. In: 2017 8th International conference on information technology (ICIT), IEEE, pp 685\u2013690","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"1812_CR24","doi-asserted-by":"crossref","unstructured":"Atlam HF, Wills GB (2019) Technical aspects of blockchain and iot. In: Advances in computers vol. 115, pp 1\u201339. Elsevier, ???","DOI":"10.1016\/bs.adcom.2018.10.006"},{"key":"1812_CR25","doi-asserted-by":"crossref","first-page":"92532","DOI":"10.1109\/ACCESS.2022.3199007","volume":"10","author":"A Al Sadawi","year":"2022","unstructured":"Al Sadawi A, Hassan MS, Ndiaye M (2022) On the integration of blockchain with iot and the role of oracle in the combined system: The full picture. IEEE Access 10:92532\u201392558","journal-title":"IEEE Access"},{"key":"1812_CR26","volume":"203","author":"G Zhang","year":"2022","unstructured":"Zhang G, Yang Z, Liu W (2022) Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Netw 203:108586","journal-title":"Comput Netw"},{"key":"1812_CR27","unstructured":"Khan AA, Laghari AA, Shaikh ZA, Dacko-Pikiewicz Z, Kot S (2022) Internet of things (iot) security with blockchain technology: A state-of-the-art review. IEEE Access"},{"key":"1812_CR28","volume":"35","author":"SA Bennacer","year":"2022","unstructured":"Bennacer SA, Aaroud A, Sabiri K, Rguibi MA, Cherradi B (2022) Design and implementation of a new blockchain-based digital health passport: A moroccan case study. Inf Med Unlocked 35:101125","journal-title":"Inf Med Unlocked"},{"key":"1812_CR29","doi-asserted-by":"publisher","unstructured":"Kumar P, Kumar R, Garg S, Kaur K, Zhang Y, Guizani M (2022) A secure data dissemination scheme for iot-based e-health systems using ai and blockchain. In: GLOBECOM 2022 - 2022 IEEE global communications conference, pp 1397\u20131403. https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000801","DOI":"10.1109\/GLOBECOM48099.2022.10000801"},{"key":"1812_CR30","doi-asserted-by":"publisher","unstructured":"Kumar R, Tripathi R (2022) Building an IPFS and Blockchain-Based Decentralized Storage Model for Medical Imaging, pp 916\u2013934. https:\/\/doi.org\/10.4018\/978-1-6684-7544-7.ch046","DOI":"10.4018\/978-1-6684-7544-7.ch046"},{"issue":"8","key":"1812_CR31","doi-asserted-by":"crossref","first-page":"6535","DOI":"10.1109\/JIOT.2022.3153653","volume":"10","author":"C Wang","year":"2022","unstructured":"Wang C, Cai Z, Li Y (2022) Sustainable blockchain-based digital twin management architecture for iot devices. IEEE Int Things J 10(8):6535\u20136548","journal-title":"IEEE Int Things J"},{"key":"1812_CR32","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2022.103801","volume":"144","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Srivastava G, Karimipour H (2023) Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks. Comput Industry 144:103801","journal-title":"Comput Industry"},{"key":"1812_CR33","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.procs.2022.04.046","volume":"202","author":"C Cheng","year":"2022","unstructured":"Cheng C, Yan B, Wang G (2022) The blockchain based access control scheme for the internet of things. Procedia Comput Sci 202:342\u2013347","journal-title":"Procedia Comput Sci"},{"issue":"10","key":"1812_CR34","doi-asserted-by":"publisher","first-page":"99","DOI":"10.3991\/ijoe.v19i10.41399","volume":"19","author":"V Rattanawiboomsom","year":"2023","unstructured":"Rattanawiboomsom V, Korejo MS, Ali J, Thatsaringkharnsakun U (2023) Blockchain-enabled internet of things (iot) applications in healthcare: A systematic review of current trends and future opportunities. Int J Online Biomed Eng (iJOE) 19(10):99\u2013117. https:\/\/doi.org\/10.3991\/ijoe.v19i10.41399","journal-title":"Int J Online Biomed Eng (iJOE)"},{"key":"1812_CR35","doi-asserted-by":"publisher","unstructured":"Trivedi C, Rao U, Parmar K (2024) A transformative shift towards blockchain-based iot environments: Consensus, smart contracts, and future directions. Authorea. https:\/\/doi.org\/10.22541\/au.170663514.49171896\/v1","DOI":"10.22541\/au.170663514.49171896\/v1"},{"key":"1812_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100585","volume":"50","author":"V Gugueoth","year":"2023","unstructured":"Gugueoth V, Safavat S, Shetty S, Rawat D (2023) A review of iot security and privacy using decentralized blockchain techniques. Comput Sci Rev 50:100585. https:\/\/doi.org\/10.1016\/j.cosrev.2023.100585","journal-title":"Comput Sci Rev"},{"key":"1812_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12652-023-04675-w","volume":"14","author":"H Chen","year":"2023","unstructured":"Chen H, Lei S, Zhang Y, Han X, Cao Y, Zhang Y (2023) Blockchain-based internet of things security architecture and applications. J Ambient Intell Human Comput 14:1\u201312. https:\/\/doi.org\/10.1007\/s12652-023-04675-w","journal-title":"J Ambient Intell Human Comput"},{"issue":"1","key":"1812_CR38","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TCE.2023.3320157","volume":"70","author":"R Kumar","year":"2024","unstructured":"Kumar R, Javeed D, Aljuhani A, Jolfaei A, Kumar P, Islam AKMN (2024) Blockchain-based authentication and explainable ai for securing consumer iot applications. IEEE Trans Consumer Electron 70(1):1145\u20131154. https:\/\/doi.org\/10.1109\/TCE.2023.3320157","journal-title":"IEEE Trans Consumer Electron"},{"issue":"3","key":"1812_CR39","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCE.2023.3296222","volume":"13","author":"P Kumar","year":"2024","unstructured":"Kumar P, Kumar R, Aloqaily M, Islam AKMN (2024) Explainable ai and blockchain for metaverse: A security and privacy perspective. IEEE Consumer Electron Magazine 13(3):90\u201397. https:\/\/doi.org\/10.1109\/MCE.2023.3296222","journal-title":"IEEE Consumer Electron Magazine"},{"issue":"2","key":"1812_CR40","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MCOM.001.2200294","volume":"61","author":"R Kumar","year":"2023","unstructured":"Kumar R, Kumar P, Aloqaily M, Aljuhani A (2023) Deep-learning-based blockchain for secure zero touch networks. IEEE Commun Magazine 61(2):96\u2013102. https:\/\/doi.org\/10.1109\/MCOM.001.2200294","journal-title":"IEEE Commun Magazine"},{"key":"1812_CR41","doi-asserted-by":"crossref","unstructured":"Vermesan O, Friess P, Guillemin P, Gusmeroli S, Sundmaeker H, Bassi A, Jubert IS, Mazura M, Harrison M, Eisenhauer M, et\u00a0al (2022) Internet of things strategic research roadmap. In: Internet of Things-global technological and societal trends from smart environments and spaces to green ICT, pp 9\u201352. River Publishers, ???","DOI":"10.1201\/9781003338604-2"},{"key":"1812_CR42","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"WH Hassan","year":"2019","unstructured":"Hassan WH et al (2019) Current research on internet of things (iot) security: A survey. Comput Netw 148:283\u2013294","journal-title":"Comput Netw"},{"key":"1812_CR43","doi-asserted-by":"crossref","unstructured":"Darianian M, Michael MP (2008) Smart home mobile rfid-based internet-of-things systems and services. In: 2008 International conference on advanced computer theory and engineering, IEEE, pp 116\u2013120","DOI":"10.1109\/ICACTE.2008.180"},{"key":"1812_CR44","doi-asserted-by":"crossref","unstructured":"Joshi S, Upadhyay H, Lagos L, Varga P, Plosz S, Soos G, Hegedus C (2017) Security threats and issues in automation iot. In: Proceedings of the 2017 IEEE 13th international workshop on factory communication systems (WFCS), Trondheim, Norway, pp 1\u20136","DOI":"10.1109\/WFCS.2017.7991968"},{"key":"1812_CR45","unstructured":"Sikder AK, Petracca G, Aksu H, Jaeger T, Uluagac AS (2018) A survey on sensor-based threats to internet-of-things (iot) devices and applications. arXiv:1802.02041"},{"key":"1812_CR46","unstructured":"Patel KK, Patel SM, Scholar P (2016) Internet of things-iot: definition, characteristics, architecture, enabling technologies, application & future challenges. Int J Eng Sci Comput 6(5)"},{"key":"1812_CR47","doi-asserted-by":"crossref","unstructured":"Fortino G, Savaglio C, Palau CE, Puga JS, Ganzha M, Paprzycki M, Montesinos M, Liotta A, Llop M (2018) Towards multi-layer interoperability of heterogeneous iot platforms: The inter-iot approach. Integration, interconnection, and interoperability of IoT systems, 199\u2013232","DOI":"10.1007\/978-3-319-61300-0_10"},{"key":"1812_CR48","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.jnca.2016.10.013","volume":"81","author":"G Aloi","year":"2017","unstructured":"Aloi G, Caliciuri G, Fortino G, Gravina R, Pace P, Russo W, Savaglio C (2017) Enabling iot interoperability through opportunistic smartphone-based mobile gateways. J Netw Comput Appl 81:74\u201384","journal-title":"J Netw Comput Appl"},{"key":"1812_CR49","doi-asserted-by":"crossref","unstructured":"Blackstock M, Lea R (2014) Iot interoperability: A hub-based approach. In: 2014 International conference on the internet of things (IOT), IEEE, pp 79\u201384","DOI":"10.1109\/IOT.2014.7030119"},{"issue":"1","key":"1812_CR50","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MS.2017.2","volume":"34","author":"A Br\u00f6ring","year":"2017","unstructured":"Br\u00f6ring A, Schmid S, Schindhelm C-K, Khelil A, K\u00e4bisch S, Kramer D, Le Phuoc D, Mitic J, Anicic D, Teniente E (2017) Enabling iot ecosystems through platform interoperability. IEEE Softw 34(1):54\u201361","journal-title":"IEEE Softw"},{"issue":"2","key":"1812_CR51","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1109\/TII.2014.2306772","volume":"10","author":"G Xiao","year":"2014","unstructured":"Xiao G, Guo J, Da Xu L, Gong Z (2014) User interoperability with heterogeneous iot devices through transformation. IEEE Trans Indust Inf 10(2):1486\u20131496","journal-title":"IEEE Trans Indust Inf"},{"key":"1812_CR52","doi-asserted-by":"crossref","unstructured":"Alzubaidi M, Anbar M, Al-Saleem S, Al-Sarawi S, Alieyan K (2017) Review on mechanisms for detecting sinkhole attacks on rpls. In: 2017 8th International conference on information technology (ICIT), IEEE, pp 369\u2013374","DOI":"10.1109\/ICITECH.2017.8080028"},{"key":"1812_CR53","doi-asserted-by":"crossref","unstructured":"Alzubaidi M, Anbar M, Hanshi SM (2017) Neighbor-passive monitoring technique for detecting sinkhole attacks in rpl networks. In: Proceedings of the 2017 international conference on computer science and artificial intelligence, pp 173\u2013182","DOI":"10.1145\/3168390.3168439"},{"issue":"3","key":"1812_CR54","doi-asserted-by":"crossref","first-page":"66","DOI":"10.36244\/ICJ.2021.3.7","volume":"13","author":"S Maksuti","year":"2021","unstructured":"Maksuti S, Zsilak M, Tauber M, Delsing J (2021) Security and autonomic management in system of systems. Infocommun J: A Publication Scientific Assoc Infocommun (HTE) 13(3):66\u201375","journal-title":"Infocommun J: A Publication Scientific Assoc Infocommun (HTE)"},{"key":"1812_CR55","volume":"97","author":"Y Meidan","year":"2020","unstructured":"Meidan Y, Sachidananda V, Peng H, Sagron R, Elovici Y, Shabtai A (2020) A novel approach for detecting vulnerable iot devices connected behind a home nat. Comput Sec 97:101968","journal-title":"Comput Sec"},{"key":"1812_CR56","volume":"11","author":"BK Mohanta","year":"2020","unstructured":"Mohanta BK, Jena D, Satapathy U, Patnaik S (2020) Survey on iot security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Int Things 11:100227","journal-title":"Int Things"},{"key":"1812_CR57","first-page":"22","volume":"1","author":"V Buterin","year":"2013","unstructured":"Buterin V et al (2013) Ethereum white paper. GitHub Reposit 1:22\u201323","journal-title":"Ethereum white paper. GitHub Reposit"},{"key":"1812_CR58","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"WH Hassan","year":"2019","unstructured":"Hassan WH et al (2019) Current research on internet of things (iot) security: A survey. Comput Netw 148:283\u2013294","journal-title":"Comput Netw"},{"key":"1812_CR59","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1007\/s11277-020-07947-2","volume":"117","author":"P Patil","year":"2021","unstructured":"Patil P, Sangeetha M, Bhaskar V (2021) Blockchain for iot access control, security and privacy: a review. Wireless Personal Commun 117:1815\u20131834","journal-title":"Wireless Personal Commun"},{"key":"1812_CR60","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","volume":"88","author":"A Reyna","year":"2018","unstructured":"Reyna A, Mart\u00edn C, Chen J, Soler E, D\u00edaz M (2018) On blockchain and its integration with iot. challenges and opportunities. Future Generation Comput Syst 88:173\u2013190","journal-title":"Future Generation Comput Syst"},{"key":"1812_CR61","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De\u00a0Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et\u00a0al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp 1\u201315","DOI":"10.1145\/3190508.3190538"},{"issue":"5","key":"1812_CR62","doi-asserted-by":"crossref","first-page":"3850","DOI":"10.1109\/JIOT.2021.3100797","volume":"9","author":"MJ Islam","year":"2021","unstructured":"Islam MJ, Rahman A, Kabir S, Karim MR, Acharjee UK, Nasir MK, Band SS, Sookhak M, Wu S (2021) Blockchain-sdn-based energy-aware and distributed secure architecture for iot in smart cities. IEEE Int Things J 9(5):3850\u20133864","journal-title":"IEEE Int Things J"},{"key":"1812_CR63","doi-asserted-by":"crossref","unstructured":"Cachin C, Vukoli\u0107 M (2017) Blockchain consensus protocols in the wild. arXiv:1707.01873","DOI":"10.1109\/EDCC.2017.36"},{"key":"1812_CR64","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized business review"},{"key":"1812_CR65","unstructured":"Innovations I (2024) Transactions as proof of stake"},{"key":"1812_CR66","first-page":"85","volume":"81","author":"D Larimer","year":"2014","unstructured":"Larimer D (2014) Delegated proof-of-stake (dpos). Bitshare Whitepaper 81:85","journal-title":"Bitshare Whitepaper"},{"issue":"3","key":"1812_CR67","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov I, Lee C, Mizrahi A, Rosenfeld M (2014) Proof of activity: Extending bitcoin\u2019s proof of work via proof of stake [extended abstract] y. ACM SIGMETRICS Perform Evaluat Rev 42(3):34\u201337","journal-title":"ACM SIGMETRICS Perform Evaluat Rev"},{"key":"1812_CR68","doi-asserted-by":"crossref","unstructured":"Vukoli\u0107 M (2016) The quest for scalable blockchain fabric: Proof-of-work vs. bft replication, Springer, 112\u2013125","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"1812_CR69","doi-asserted-by":"crossref","unstructured":"Kotla R, Alvisi L, Dahlin M, Clement A, Wong E (2007) Zyzzyva: speculative byzantine fault tolerance, 45\u201358","DOI":"10.1145\/1323293.1294267"},{"key":"1812_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100647","volume":"44","author":"KJ Raval","year":"2024","unstructured":"Raval KJ, Jadav NK, Rathod T, Tanwar S, Vimal V, Yamsani N (2024) A survey on safeguarding critical infrastructures: Attacks, ai security, and future directions. Int J Critical Infrastruct Protection 44:100647. https:\/\/doi.org\/10.1016\/j.ijcip.2023.100647","journal-title":"Int J Critical Infrastruct Protection"},{"key":"1812_CR71","unstructured":"Copeland C, Zhong H (2016) Tangaroa: a byzantine fault tolerant raft. Tech Rep"},{"key":"1812_CR72","unstructured":"Ren L (2014) Proof of stake velocity: Building the social currency of the digital age. Self-published white paper"},{"key":"1812_CR73","doi-asserted-by":"crossref","unstructured":"Homoliak I, Venugopalan S, Hum Q, Szalachowski P (2019) A security reference architecture for blockchains, IEEE, 390\u2013397","DOI":"10.1109\/Blockchain.2019.00060"},{"key":"1812_CR74","doi-asserted-by":"crossref","unstructured":"Borge M, Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Ford B (2017) Proof-of-personhood: Redemocratizing permissionless cryptocurrencies, IEEE, 23\u201326","DOI":"10.1109\/EuroSPW.2017.46"},{"issue":"2","key":"1812_CR75","doi-asserted-by":"crossref","first-page":"788","DOI":"10.3390\/s23020788","volume":"23","author":"HD Zubaydi","year":"2023","unstructured":"Zubaydi HD, Varga P, Moln\u00e1r S (2023) Leveraging blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review. Sensors 23(2):788","journal-title":"Sensors"},{"key":"1812_CR76","first-page":"1","volume":"32","author":"D Mazieres","year":"2015","unstructured":"Mazieres D (2015) The stellar consensus protocol: A federated model for internet-level consensus. Stellar Develop Found 32:1\u201345","journal-title":"Stellar Develop Found"},{"key":"1812_CR77","unstructured":"Eyal I, Gencer AE, Sirer EG, Van\u00a0Renesse R (2016) $$\\{$$Bitcoin-NG$$\\}$$: A scalable blockchain protocol, 45\u201359"},{"key":"1812_CR78","unstructured":"Cachin C, Schubert S, Vukoli\u0107 M (2016) Non-determinism in byzantine fault-tolerant replication. arXiv:1603.07351"},{"key":"1812_CR79","unstructured":"Kwon J (2014) Tendermint: Consensus without mining. Draft v. 0.6, fall 1(11):1\u201311"},{"issue":"6","key":"1812_CR80","doi-asserted-by":"crossref","first-page":"679","DOI":"10.3390\/electronics8060679","volume":"8","author":"HD Zubaydi","year":"2019","unstructured":"Zubaydi HD, Chong Y-W, Ko K, Hanshi SM, Karuppayah S (2019) A review on the role of blockchain technology in the healthcare domain. Electronics 8(6):679","journal-title":"Electronics"},{"issue":"5","key":"1812_CR81","doi-asserted-by":"crossref","first-page":"8114","DOI":"10.1109\/JIOT.2019.2922538","volume":"6","author":"M Wu","year":"2019","unstructured":"Wu M, Wang K, Cai X, Guo S, Guo M, Rong C (2019) A comprehensive survey of blockchain: From theory to iot applications and beyond. IEEE Int Things J 6(5):8114\u20138154","journal-title":"IEEE Int Things J"},{"key":"1812_CR82","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108005","volume":"191","author":"S Brotsis","year":"2021","unstructured":"Brotsis S, Limniotis K, Bendiab G, Kolokotronis N, Shiaeles S (2021) On the suitability of blockchain platforms for iot applications: Architectures, security, privacy, and performance. Comput Netw 191:108005","journal-title":"Comput Netw"},{"issue":"4","key":"1812_CR83","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: A survey. Int J Web Grid Serv 14(4):352\u2013375","journal-title":"Int J Web Grid Serv"},{"key":"1812_CR84","volume":"154","author":"SMH Bamakan","year":"2020","unstructured":"Bamakan SMH, Motavali A, Bondarti AB (2020) A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl 154:113385","journal-title":"Expert Syst Appl"},{"key":"1812_CR85","doi-asserted-by":"crossref","unstructured":"Frank\u00f3 A, Ol\u00e1h B, Sass Z, Heged\u00fcs C, Varga P (2022) Towards cbdc-supported smart contracts for industrial stakeholders. In: 2022 IEEE 5th International conference on industrial cyber-physical systems (ICPS), IEEE, pp 1\u20136","DOI":"10.1109\/ICPS51978.2022.9816857"},{"key":"1812_CR86","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Sec 1:36\u201363","journal-title":"Int J Inf Sec"},{"key":"1812_CR87","unstructured":"A Timeline and History of Blockchain Technology. https:\/\/www.techtarget.com\/whatis\/feature\/A-timeline-and-history-of-blockchain-technology"},{"key":"1812_CR88","doi-asserted-by":"crossref","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. Ieee Access 4:2292\u20132303","DOI":"10.1109\/ACCESS.2016.2566339"},{"issue":"6","key":"1812_CR89","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MS.2017.4121227","volume":"34","author":"Q Lu","year":"2017","unstructured":"Lu Q, Xu X (2017) Adaptable blockchain-based systems: A case study for product traceability. Ieee Softw 34(6):21\u201327","journal-title":"Ieee Softw"},{"key":"1812_CR90","doi-asserted-by":"crossref","unstructured":"Soni J, Prabakar N, Upadhyay H (2022) Towards detecting fake spammers groups in social media: An unsupervised deep learning approach, 237\u2013253","DOI":"10.1007\/978-3-031-10869-3_13"},{"issue":"18","key":"1812_CR91","doi-asserted-by":"crossref","first-page":"5894","DOI":"10.3390\/en14185894","volume":"14","author":"S Tufail","year":"2021","unstructured":"Tufail S, Parvez I, Batool S, Sarwat A (2021) A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies 14(18):5894","journal-title":"Energies"},{"key":"1812_CR92","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wen J (2015) An iot electric business model based on the protocol of bitcoin, IEEE, 184\u2013191","DOI":"10.1109\/ICIN.2015.7073830"},{"issue":"10","key":"1812_CR93","doi-asserted-by":"crossref","first-page":"0163477","DOI":"10.1371\/journal.pone.0163477","volume":"11","author":"J Yli-Huumo","year":"2016","unstructured":"Yli-Huumo J, Ko D, Choi S, Park S, Smolander K (2016) Where is current research on blockchain technology?-a systematic review. PloS one 11(10):0163477","journal-title":"PloS one"},{"issue":"12","key":"1812_CR94","doi-asserted-by":"crossref","first-page":"4215","DOI":"10.3390\/s18124215","volume":"18","author":"X Zhu","year":"2018","unstructured":"Zhu X, Badr Y (2018) Identity management systems for the internet of things: a survey towards blockchain solutions. Sensors 18(12):4215","journal-title":"Sensors"},{"issue":"10","key":"1812_CR95","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.3390\/s22103733","volume":"22","author":"S Wadhwa","year":"2022","unstructured":"Wadhwa S, Rani S, Verma S, Shafi J, Wozniak M (2022) Energy efficient consensus approach of blockchain for iot networks with edge computing. Sensors 22(10):3733","journal-title":"Sensors"},{"key":"1812_CR96","doi-asserted-by":"crossref","unstructured":"Sasikumar A, Ravi L, Devarajan M, Vairavasundaram S, Selvalakshmi A, Kotecha K, Abraham A (2023) A decentralized resource allocation in edge computing for secure iot environments. IEEE Access","DOI":"10.1109\/ACCESS.2023.3325056"},{"issue":"2","key":"1812_CR97","doi-asserted-by":"crossref","first-page":"38","DOI":"10.26480\/imcs.02.2020.38.41","volume":"3","author":"S Ali","year":"2020","unstructured":"Ali S, Rizvi SBA, Ali Y, Zafar A et al (2020) Survey paper on iot attacks and its prevention mechanisms. Inf Manag Comput Sci (IMCS) 3(2):38\u201341","journal-title":"Inf Manag Comput Sci (IMCS)"},{"key":"1812_CR98","doi-asserted-by":"crossref","unstructured":"Gao H, Guo X (2022) Deep reinforcement learning-based computation offloading and optimal resource allocation in industrial internet of things with noma, IEEE, pp 198\u2013203","DOI":"10.1109\/ICCCAS55266.2022.9825343"},{"issue":"8","key":"1812_CR99","doi-asserted-by":"crossref","first-page":"6598","DOI":"10.1109\/JIOT.2022.3159248","volume":"10","author":"Y Liu","year":"2022","unstructured":"Liu Y, Su Z, Wang Y (2022) Energy-efficient and physical-layer secure computation offloading in blockchain-empowered internet of things. IEEE Int Things J 10(8):6598\u20136610","journal-title":"IEEE Int Things J"},{"issue":"1","key":"1812_CR100","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.aej.2020.09.021","volume":"60","author":"W Hu","year":"2021","unstructured":"Hu W, Li H (2021) A blockchain-based secure transaction model for distributed energy in industrial internet of things. Alexandria Eng J 60(1):491\u2013500","journal-title":"Alexandria Eng J"},{"key":"1812_CR101","doi-asserted-by":"crossref","first-page":"16353","DOI":"10.1109\/ACCESS.2023.3244099","volume":"11","author":"A Salh","year":"2023","unstructured":"Salh A, Ngah R, Audah L, Kim KS, Abdullah Q, Al-Moliki YM, Aljaloud KA, Talib HN (2023) Energy-efficient federated learning with resource allocation for green iot edge intelligence in b5g. IEEE Access 11:16353\u201316367","journal-title":"IEEE Access"},{"key":"1812_CR102","doi-asserted-by":"crossref","first-page":"133682","DOI":"10.1109\/ACCESS.2022.3230985","volume":"10","author":"MA Al Ghamdi","year":"2022","unstructured":"Al Ghamdi MA (2022) An optimized and secure energy-efficient blockchain-based framework in iot. IEEE Access 10:133682\u2013133697","journal-title":"IEEE Access"},{"key":"1812_CR103","doi-asserted-by":"crossref","unstructured":"Sezer S (2018) T1c: Iot security:-threats, security challenges and iot security research and technology trends, IEEE, 1\u20132","DOI":"10.1109\/SOCC.2018.8618571"},{"key":"1812_CR104","unstructured":"Gangwani P, Soni J, Upadhyay H, Joshi S (2020) A deep learning approach for modeling of geothermal energy prediction. Int J Comput Sci Inf Sec (IJCSIS) 18(1)"},{"key":"1812_CR105","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/s41635-019-00079-5","volume":"3","author":"P Cui","year":"2019","unstructured":"Cui P, Guin U, Skjellum A, Umphress D (2019) Blockchain in iot: current trends, challenges, and future roadmap. J Hardw Syst Sec 3:338\u2013364","journal-title":"J Hardw Syst Sec"},{"key":"1812_CR106","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100982","volume":"24","author":"S Taj","year":"2023","unstructured":"Taj S, Imran AS, Kastrati Z, Daudpota SM, Memon RA, Ahmed J (2023) Iot-based supply chain management: A systematic literature review. Int Things 24:100982. https:\/\/doi.org\/10.1016\/j.iot.2023.100982","journal-title":"Int Things"},{"key":"1812_CR107","doi-asserted-by":"crossref","first-page":"54478","DOI":"10.1109\/ACCESS.2021.3070555","volume":"9","author":"A Al Sadawi","year":"2021","unstructured":"Al Sadawi A, Hassan MS, Ndiaye M (2021) A survey on the integration of blockchain with iot to enhance performance and eliminate challenges. IEEE Access 9:54478\u201354497","journal-title":"IEEE Access"},{"key":"1812_CR108","doi-asserted-by":"crossref","unstructured":"Alam T (2019) Blockchain and its role in the internet of things (iot). arXiv:1902.09779","DOI":"10.31219\/osf.io\/cmza5"},{"key":"1812_CR109","unstructured":"Georgescu M, Popescul D (2024) Security, privacy and trust in internet of things: A straight road?"},{"issue":"8","key":"1812_CR110","first-page":"2449","volume":"10","author":"P Ghuli","year":"2017","unstructured":"Ghuli P, Kumar UP, Shettar R (2017) A review on blockchain application for decentralized decision of ownership of iot devices. Adv Comput Sci Technol 10(8):2449\u20132456","journal-title":"Adv Comput Sci Technol"},{"key":"1812_CR111","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100568","volume":"19","author":"A Chatterjee","year":"2022","unstructured":"Chatterjee A, Ahmed BS (2022) Iot anomaly detection methods and applications: A survey. Int Things 19:100568. https:\/\/doi.org\/10.1016\/j.iot.2022.100568","journal-title":"Int Things"},{"key":"1812_CR112","doi-asserted-by":"crossref","unstructured":"Mohanta BK, Panda SS, Jena D (2018) An overview of smart contract and use cases in blockchain technology. In: 2018 9th International conference on computing, communication and networking technologies (ICCCNT), IEEE, pp 1\u20134","DOI":"10.1109\/ICCCNT.2018.8494045"},{"issue":"1","key":"1812_CR113","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-019-0205-6","volume":"10","author":"Y Lee","year":"2020","unstructured":"Lee Y, Rathore S, Park JH, Park JH (2020) A blockchain-based smart home gateway architecture for preventing data forgery. Human-centric Comput Inf Sci 10(1):1\u201314","journal-title":"Human-centric Comput Inf Sci"},{"issue":"6","key":"1812_CR114","first-page":"40","volume":"10","author":"HF Atlam","year":"2018","unstructured":"Atlam HF, Alenezi A, Alassafi MO, Wills G (2018) Blockchain with internet of things: Benefits, challenges, and future directions. Int J Intell Syst Appl 10(6):40\u201348","journal-title":"Int J Intell Syst Appl"},{"key":"1812_CR115","doi-asserted-by":"crossref","unstructured":"Agarwal U, Rishiwal V, Tanwar S, Chaudhary R, Sharma G, Bokoro PN, Sharma R (2022) Blockchain technology for secure supply chain management: A comprehensive review. IEEE Access","DOI":"10.1109\/ACCESS.2022.3194319"},{"key":"1812_CR116","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100982","volume":"24","author":"S Taj","year":"2023","unstructured":"Taj S, Imran AS, Kastrati Z, Daudpota SM, Memon RA, Ahmed J (2023) Iot-based supply chain management: A systematic literature review. Int Things 24:100982. https:\/\/doi.org\/10.1016\/j.iot.2023.100982","journal-title":"Int Things"},{"key":"1812_CR117","doi-asserted-by":"crossref","first-page":"96528","DOI":"10.1109\/ACCESS.2021.3094763","volume":"9","author":"A Amjad","year":"2021","unstructured":"Amjad A, Azam F, Anwar MW, Butt WH (2021) A systematic review on the data interoperability of application layer protocols in industrial iot. Ieee Access 9:96528\u201396545","journal-title":"Ieee Access"},{"key":"1812_CR118","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","volume":"88","author":"A Reyna","year":"2018","unstructured":"Reyna A, Mart\u00edn C, Chen J, Soler E, D\u00edaz M (2018) On blockchain and its integration with iot. challenges and opportunities. Fut Generat Comput Syst 88:173\u2013190","journal-title":"Fut Generat Comput Syst"},{"issue":"16","key":"1812_CR119","doi-asserted-by":"crossref","first-page":"5945","DOI":"10.3390\/s22165945","volume":"22","author":"H Wu","year":"2022","unstructured":"Wu H, O\u2019Connor NE, Bruton J, Hall A, Liu M (2022) Real-time anomaly detection for an admm-based optimal transmission frequency management system for iot devices. Sensors 22(16):5945","journal-title":"Sensors"},{"key":"1812_CR120","first-page":"4721","volume":"62","author":"MS Rahman","year":"2022","unstructured":"Rahman MS, Das RK (2022) Rtid: On-demand real-time data processing for iot network. Mater Today: Proceed 62:4721\u20134725","journal-title":"Mater Today: Proceed"},{"key":"1812_CR121","doi-asserted-by":"crossref","unstructured":"Yu T, Wang X (2022) Real-time data analytics in internet of things systems. In: Handbook of real-time computing, Springer, ??? pp 541\u2013568","DOI":"10.1007\/978-981-287-251-7_38"},{"key":"1812_CR122","doi-asserted-by":"crossref","unstructured":"Maurya V, Rishiwal V, Yadav M, Jat DS, Agarwal U, Verma VR (2023) Blockchain-powered solution to safeguard iot devices against attacks, IEEE, pp 209\u2013215","DOI":"10.1109\/ETNCC59188.2023.10284784"},{"key":"1812_CR123","doi-asserted-by":"publisher","unstructured":"HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2021) A survey on internet of things security: Requirements, challenges, and solutions. Int Things 14:100129. https:\/\/doi.org\/10.1016\/j.iot.2019.100129","DOI":"10.1016\/j.iot.2019.100129"},{"key":"1812_CR124","doi-asserted-by":"crossref","unstructured":"Ruminot-Ahumada N, Valencia-Cordero C, Abarz\u00faa-Ortiz R (2021) Side channel attack countermeasure for low power devices with aes encryption, IEEE, pp 1\u20137","DOI":"10.1109\/ICAACCA51523.2021.9465337"},{"key":"1812_CR125","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1109\/TIFS.2019.2963771","volume":"15","author":"M Hayashi","year":"2020","unstructured":"Hayashi M, V\u2019azquez-Castro A (2020) Physical layer security protocol for poisson channels for passive man-in-the-middle attack. IEEE Trans Inf Forensics Sec 15:2295\u20132305","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"1","key":"1812_CR126","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2019","unstructured":"Butun I, \u00d6sterberg P, Song H (2019) Security of the internet of things: Vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutorials 22(1):616\u2013644","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1812_CR127","doi-asserted-by":"crossref","first-page":"41757","DOI":"10.1109\/ACCESS.2021.3065123","volume":"9","author":"N Mazhar","year":"2021","unstructured":"Mazhar N, Salleh R, Zeeshan M, Hameed MM (2021) Role of device identification and manufacturer usage description in iot security: A survey. IEEE Access 9:41757\u201341786","journal-title":"IEEE Access"},{"key":"1812_CR128","doi-asserted-by":"crossref","unstructured":"Gallais A, Hedli T-H, Loscri V, Mitton N (2019) Denial-of-sleep attacks against iot networks, IEEE, pp 1025\u20131030","DOI":"10.1109\/CoDIT.2019.8820402"},{"key":"1812_CR129","doi-asserted-by":"crossref","unstructured":"Hafeez I, Antikainen M, Tarkoma S (2019) Protecting iot-environments against traffic analysis attacks with traffic morphing, IEEE, pp 196\u2013201","DOI":"10.1109\/PERCOMW.2019.8730787"},{"key":"1812_CR130","doi-asserted-by":"crossref","first-page":"156114","DOI":"10.1109\/ACCESS.2021.3129697","volume":"9","author":"EA Shammar","year":"2021","unstructured":"Shammar EA, Zahary AT, Al-Shargabi AA (2021) A survey of iot and blockchain integration: Security perspective. IEEE Access 9:156114\u2013156150","journal-title":"IEEE Access"},{"key":"1812_CR131","unstructured":"Moinet A, Darties B, Baril J-L (2017) Blockchain based trust & authentication for decentralized sensor networks. arXiv:1706.01730"},{"key":"1812_CR132","doi-asserted-by":"crossref","unstructured":"Liu H, Shen F, Liu Z, Long Y, Liu Z, Sun S, Tang S, Gu D (2019) A secure and practical blockchain scheme for iot, IEEE, pp 538\u2013545","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00078"},{"issue":"5","key":"1812_CR133","doi-asserted-by":"crossref","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"H-N Dai","year":"2019","unstructured":"Dai H-N, Zheng Z, Zhang Y (2019) Blockchain for internet of things: A survey. IEEE Int Things J 6(5):8076\u20138094","journal-title":"IEEE Int Things J"},{"issue":"3","key":"1812_CR134","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.11591\/ijece.v10i3.pp2787-2796","volume":"10","author":"H Hosseinian","year":"2020","unstructured":"Hosseinian H, Shahinzadeh H, Gharehpetian GB, Azani Z, Shaneh M (2020) Blockchain outlook for deployment of iot in distribution networks and smart homes. Int J Electrical Comput Eng 10(3):2787\u20132796","journal-title":"Int J Electrical Comput Eng"},{"issue":"4","key":"1812_CR135","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MCC.2018.043221010","volume":"5","author":"B Yu","year":"2018","unstructured":"Yu B, Wright J, Nepal S, Zhu L, Liu J, Ranjan R (2018) Iotchain: Establishing trust in the internet of things ecosystem using blockchain. IEEE Cloud Comput 5(4):12\u201323","journal-title":"IEEE Cloud Comput"},{"key":"1812_CR136","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.future.2019.12.020","volume":"105","author":"D Mazzei","year":"2020","unstructured":"Mazzei D, Baldi G, Fantoni G, Montelisciani G, Pitasi A, Ricci L, Rizzello L (2020) A blockchain tokenizer for industrial iot trustless applications. Future Generation Comput Syst 105:432\u2013445","journal-title":"Future Generation Comput Syst"},{"key":"1812_CR137","doi-asserted-by":"crossref","unstructured":"Yao H, Mai T, Wang J, Ji Z, Jiang C, Qian Y (2019) Resource trading in blockchain-based industrial internet of things. IEEE Trans Indust Inf 15(6):3602\u20133609","DOI":"10.1109\/TII.2019.2902563"},{"issue":"1","key":"1812_CR138","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/LCOMM.2019.2949557","volume":"24","author":"A Rovira-Sugranes","year":"2019","unstructured":"Rovira-Sugranes A, Razi A (2019) Optimizing the age of information for blockchain technology with applications to iot sensors. IEEE Commun Lett 24(1):183\u2013187","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"1812_CR139","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MNET.001.1900179","volume":"34","author":"J Wu","year":"2020","unstructured":"Wu J, Dong M, Ota K, Li J, Yang W (2020) Application-aware consensus management for software-defined intelligent blockchain in iot. IEEE Netw 34(1):69\u201375","journal-title":"IEEE Netw"},{"key":"1812_CR140","doi-asserted-by":"crossref","unstructured":"Huckle S, Bhattacharya R, White M, Beloff N (2016) Internet of things, blockchain and shared economy applications. Procedia Comput Sci 98:461\u2013466","DOI":"10.1016\/j.procs.2016.09.074"},{"key":"1812_CR141","doi-asserted-by":"crossref","unstructured":"Guo S, Dai Y, Guo S, Qiu X, Qi F (2020) Blockchain meets edge computing: Stackelberg game and double auction based task offloading for mobile blockchain. IEEE Trans Vehic Technol 69(5):5549\u20135561","DOI":"10.1109\/TVT.2020.2982000"},{"issue":"4","key":"1812_CR142","doi-asserted-by":"crossref","first-page":"2939","DOI":"10.1007\/s11277-022-09497-1","volume":"124","author":"V Rishiwal","year":"2022","unstructured":"Rishiwal V, Singh O, Yadav M (2022) Ecmr: energy constrained mobile routing for wireless sensor networks. Wireless Personal Commun 124(4):2939\u20132964","journal-title":"Wireless Personal Commun"},{"issue":"10","key":"1812_CR143","doi-asserted-by":"crossref","first-page":"7664","DOI":"10.1109\/JIOT.2021.3139989","volume":"9","author":"L Wei","year":"2022","unstructured":"Wei L, Yang Y, Wu J, Long C, Li B (2022) Trust management for internet of things: A comprehensive study. IEEE Int Things J 9(10):7664\u20137679","journal-title":"IEEE Int Things J"},{"key":"1812_CR144","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100227","volume":"11","author":"BK Mohanta","year":"2020","unstructured":"Mohanta BK, Jena D, Satapathy U, Patnaik S (2020) Survey on iot security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Int Things 11:100227. https:\/\/doi.org\/10.1016\/j.iot.2020.100227","journal-title":"Int Things"},{"issue":"2","key":"1812_CR145","doi-asserted-by":"crossref","first-page":"572","DOI":"10.3390\/s22020572","volume":"22","author":"A Ali","year":"2022","unstructured":"Ali A, Almaiah MA, Hajjej F, Pasha MF, Fang OH, Khan R, Teo J, Zakarya M (2022) An industrial iot-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 22(2):572","journal-title":"Sensors"},{"key":"1812_CR146","doi-asserted-by":"crossref","unstructured":"Alsharari N (2021) Integrating blockchain technology with internet of things to efficiency. Int J Technol, Innovation Manag (IJTIM) 1(2):01\u201313","DOI":"10.54489\/ijtim.v1i2.25"},{"key":"1812_CR147","volume":"39","author":"R Chaudhry","year":"2023","unstructured":"Chaudhry R, Rishiwal V (2023) An efficient task allocation with fuzzy reptile search algorithm for disaster management in urban and rural area. Sustainable Comput: Inf Syst 39:100893","journal-title":"Sustainable Comput: Inf Syst"},{"issue":"4","key":"1812_CR148","first-page":"1","volume":"10","author":"V Rishiwal","year":"2021","unstructured":"Rishiwal V, Yadav P, Singh O, Prasad B (2021) Optimizing energy consumption in iot-based scalable wireless sensor networks. Int J Syst Dynamics Appl (IJSDA) 10(4):1\u201320","journal-title":"Int J Syst Dynamics Appl (IJSDA)"},{"key":"1812_CR149","doi-asserted-by":"crossref","first-page":"137163","DOI":"10.1109\/ACCESS.2023.3338861","volume":"11","author":"M Yadav","year":"2023","unstructured":"Yadav M, Agarwal U, Rishiwal V, Tanwar S, Kumar S, Alqahtani F, Tolba A (2023) Exploring synergy of blockchain and 6g network for industrial automation. IEEE Access 11:137163\u2013137187","journal-title":"IEEE Access"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01812-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01812-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01812-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:33:51Z","timestamp":1747474431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01812-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":149,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1812"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01812-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"3 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not Applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Authors have no conflict, and they have consent to publish.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"53"}}