{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:50:07Z","timestamp":1770277807742,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01857-x","type":"journal-article","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T09:10:17Z","timestamp":1733303417000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An enhanced deep learning integrated blockchain framework for securing industrial IoT"],"prefix":"10.1007","volume":"18","author":[{"given":"G.","family":"Suneetha","sequence":"first","affiliation":[]},{"given":"D.","family":"Haripriya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"key":"1857_CR1","doi-asserted-by":"crossref","unstructured":"Kumar R, Kumar P, Aljuhani A, Islam AN, Jolfaei A, Garg S (2022) Deep learning and smart contract-assisted secure data sharing for IoT-based intelligent agriculture. IEEE Intelligent Systems","DOI":"10.1109\/MIS.2022.3201553"},{"key":"1857_CR2","doi-asserted-by":"crossref","unstructured":"Afaq Y, Manocha A (2022) Blockchain Technology with deep learning adoptation for various applications: vision and future opportunities","DOI":"10.21203\/rs.3.rs-2094803\/v3"},{"key":"1857_CR3","unstructured":"Lucio YI, Donado SA, M\u00e1rceles K (2022) Architecture of an intelligent cybersecurity framework based on blockchain technology for IIoT. Syst Eng 24(2)"},{"issue":"4","key":"1857_CR4","doi-asserted-by":"publisher","first-page":"e4222","DOI":"10.1002\/ett.4222","volume":"32","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R (2021) DBTP2SF: a deep blockchain-based trustworthy privacy-preserving secured framework in industrial Internet of things systems. Trans Emerg Telecommun Technol 32(4):e4222","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"16","key":"1857_CR5","doi-asserted-by":"publisher","first-page":"8232","DOI":"10.3390\/app12168232","volume":"12","author":"A Heidari","year":"2022","unstructured":"Heidari A, JabraeilJamali MA, JafariNavimipour N, Akbarpour S (2022) Deep Q-learning technique for offloading offline\/online computation in blockchain-enabled green IoT-edge scenarios. Appl Sci 12(16):8232","journal-title":"Appl Sci"},{"key":"1857_CR6","doi-asserted-by":"crossref","unstructured":"Sheth HSK, Ilavarasi AK, Tyagi AK (2022) Deep learning, blockchain based multi-layered authentication and security architectures. In 2022 international conference on applied artificial intelligence and computing (ICAAIC). IEEE, pp 476-485","DOI":"10.1109\/ICAAIC53929.2022.9793179"},{"key":"1857_CR7","first-page":"1","volume":"2021","author":"M Azrour","year":"2021","unstructured":"Azrour M, Mabrouki J, Guezzaz A, Kanwal A (2021) Internet of things security: challenges and key issues. Secur Commun Netw 2021:1\u201311","journal-title":"Secur Commun Netw"},{"key":"1857_CR8","doi-asserted-by":"publisher","first-page":"107819","DOI":"10.1016\/j.comnet.2021.107819","volume":"187","author":"R Kumar","year":"2021","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G (2021) SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles. Comput Netw 187:107819","journal-title":"Comput Netw"},{"issue":"14","key":"1857_CR9","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.3390\/su11143974","volume":"11","author":"S Rathore","year":"2019","unstructured":"Rathore S, Pan Y, Park JH (2019) BlockDeepNet: a blockchain-based secure deep learning for IoT network. Sustainability 11(14):3974","journal-title":"Sustainability"},{"key":"1857_CR10","doi-asserted-by":"publisher","unstructured":"Nguyen DC, Nguyen VD, Ding M, Chatzinotas S, Pathirana PN, Seneviratne A, Dobre O, Zomaya AY (2022) Intelligent blockchain-based edge computing via deep reinforcement learning: Solutions and challenges. IEEE Netw. https:\/\/doi.org\/10.1109\/MNET.002.2100188","DOI":"10.1109\/MNET.002.2100188"},{"issue":"14","key":"1857_CR11","doi-asserted-by":"publisher","first-page":"4884","DOI":"10.3390\/s21144884","volume":"21","author":"D Javeed","year":"2021","unstructured":"Javeed D, Gao T, Khan MT, Ahmad I (2021) A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT). Sensors 21(14):4884","journal-title":"Sensors"},{"key":"1857_CR12","doi-asserted-by":"crossref","unstructured":"Shareef AAA, Yannawar PL, Ahmed ZA, Al-madani AM (2021) Applying blockchain technology to secure object detection Data. In 2021 third international conference on intelligent communication technologies and virtual mobile networks (ICICV). IEEE, pp 874-879","DOI":"10.1109\/ICICV50876.2021.9388473"},{"key":"1857_CR13","doi-asserted-by":"publisher","unstructured":"Ma R, Yi Z, Xiang Y, Shi D, Xu C, Wu H (2022) A blockchain-enabled demand management and control framework driven by deep reinforcement learning. IEEE Trans Ind Electron. https:\/\/doi.org\/10.1109\/TIE.2022.3146631","DOI":"10.1109\/TIE.2022.3146631"},{"key":"1857_CR14","doi-asserted-by":"publisher","unstructured":"Mishra KN, Bhattacharjee V, Saket S, Mishra SP (2022) Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach. https:\/\/doi.org\/10.2139\/ssrn.4039990","DOI":"10.2139\/ssrn.4039990"},{"issue":"4","key":"1857_CR15","doi-asserted-by":"publisher","first-page":"305","DOI":"10.36548\/jtcsst.2021.4.006","volume":"3","author":"HK Andi","year":"2021","unstructured":"Andi HK (2021) Estimating the role of blockchain, deep learning and cryptography algorithms in cloud security. J Trends Comput Sci Smart Technol 3(4):305\u2013313","journal-title":"J Trends Comput Sci Smart Technol"},{"issue":"2","key":"1857_CR16","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1007\/s11276-020-02535-5","volume":"27","author":"SK Mousavi","year":"2021","unstructured":"Mousavi SK, Ghaffari A, Besharat S, Afshari H (2021) Security of Internet of things based on cryptographic algorithms: a survey. Wireless Netw 27(2):1515\u20131555","journal-title":"Wireless Netw"},{"issue":"3","key":"1857_CR17","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, Xiong NN (2021) PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans Netw Sci Eng 8(3):2326\u20132341","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1857_CR18","doi-asserted-by":"publisher","unstructured":"Thilagam K, Beno A, Lakshmi MV, Wilfred CB, George SM, Karthikeyan M, Peroumal V, Ramesh C, Karunakaran P (2022) Secure IoT healthcare architecture with deep learning-based access control system. J Nanomater 2022. https:\/\/doi.org\/10.1155\/2022\/2638613","DOI":"10.1155\/2022\/2638613"},{"key":"1857_CR19","doi-asserted-by":"crossref","unstructured":"Shaukat K, Alam TM, Hameed IA, Khan WA, Abbas N, Luo S (2021) A review on security challenges in internet of things (IoT). In 2021 26th international conference on automation and computing (ICAC). IEEE, pp 1-6","DOI":"10.23919\/ICAC50006.2021.9594183"},{"key":"1857_CR20","doi-asserted-by":"publisher","unstructured":"Yue Y, Li S, Legg P, Li F (2021) Deep learning-based security behaviour analysis in iot environments: a survey. Secur Commun Netw 2021. https:\/\/doi.org\/10.1155\/2021\/8873195","DOI":"10.1155\/2021\/8873195"},{"issue":"2","key":"1857_CR21","doi-asserted-by":"publisher","first-page":"572","DOI":"10.3390\/s22020572","volume":"22","author":"A Ali","year":"2022","unstructured":"Ali A, Almaiah MA, Hajjej F, Pasha MF, Fang OH, Khan R, Zakarya M (2022) An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 22(2):572","journal-title":"Sensors"},{"issue":"7","key":"1857_CR22","doi-asserted-by":"publisher","first-page":"e4137","DOI":"10.1002\/ett.4137","volume":"32","author":"M Sharma","year":"2021","unstructured":"Sharma M, Pant S, Kumar Sharma D, Datta Gupta K, Vashishth V, Chhabra A (2021) Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions. Trans Emerg Telecommun Technol 32(7):e4137","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1857_CR23","doi-asserted-by":"publisher","unstructured":"Kumar P, Kumar R, Kumar A, Franklin AA, Garg S, Singh S (2022) Blockchain and deep learning for secure communication in digital twin empowered industrial IoT Network. IEEE Trans Netw Sci Eng. https:\/\/doi.org\/10.1109\/TNSE.2022.3191601","DOI":"10.1109\/TNSE.2022.3191601"},{"issue":"11","key":"1857_CR24","doi-asserted-by":"publisher","first-page":"7725","DOI":"10.1109\/TII.2021.3049405","volume":"17","author":"X Wang","year":"2021","unstructured":"Wang X, Garg S, Lin H, Piran MJ, Hu J, Hossain MS (2021) Enabling secure authentication in industrial iot with transfer learning empowered blockchain. IEEE Trans Ind Inform 17(11):7725\u20137733","journal-title":"IEEE Trans Ind Inform"},{"issue":"6","key":"1857_CR25","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.3390\/s22062112","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah MA, Ali A, Hajjej F, Pasha MF, Alohali MA (2022) A lightweight hybrid deep learning privacy preserving model for FC-based industrial Internet of medical things. Sensors 22(6):2112","journal-title":"Sensors"},{"key":"1857_CR26","doi-asserted-by":"publisher","unstructured":"Ajao LA, Umar BU, Olajide DO, Misra S (2022) Application of crypto-blockchain technology for securing electronic voting systems. In Blockchain applications in the smart Era. Cham: Springer International Publishing, pp 85-105. https:\/\/doi.org\/10.1007\/978-3-030-89546-4_5","DOI":"10.1007\/978-3-030-89546-4_5"},{"issue":"17","key":"1857_CR27","doi-asserted-by":"publisher","first-page":"2110","DOI":"10.3390\/electronics10172110","volume":"10","author":"D Ngabo","year":"2021","unstructured":"Ngabo D, Wang D, Iwendi C, Anajemba JH, Ajao LA, Biamba C (2021) Blockchain-based security mechanism for the medical data at fog computing architecture of Internet of things. Electronics 10(17):2110","journal-title":"Electronics"},{"key":"1857_CR28","first-page":"2653","volume":"37","author":"P Velmurugadass","year":"2021","unstructured":"Velmurugadass P, Dhanasekaran S, Anand SS, Vasudevan V (2021) Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Mater Today: Proc 37:2653\u20139","journal-title":"Mater Today: Proc"},{"key":"1857_CR29","first-page":"200216","volume":"18","author":"LA Ajao","year":"2023","unstructured":"Ajao LA, Apeh ST (2023) Secure edge computing vulnerabilities in smart cities sustainability using petri net and genetic algorithm-based reinforcement learning. Intell Syst Appl 18:200216","journal-title":"Intell Syst Appl"},{"issue":"9","key":"1857_CR30","doi-asserted-by":"publisher","first-page":"716","DOI":"10.3390\/e20090716","volume":"20","author":"S Zhu","year":"2018","unstructured":"Zhu S, Zhu C, Wang W (2018) A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20(9):716","journal-title":"Entropy"},{"key":"1857_CR31","doi-asserted-by":"crossref","unstructured":"Saraswat P, Garg K, Tripathi R, Agarwal A (2019) Encryption algorithm based on neural network. In 2019 4th international conference on internet of things: smart innovation and usages (IoT-SIU). IEEE, pp 1-5","DOI":"10.1109\/IoT-SIU.2019.8777637"},{"key":"1857_CR32","doi-asserted-by":"publisher","first-page":"154732","DOI":"10.1109\/ACCESS.2019.2946712","volume":"7","author":"Y Cao","year":"2019","unstructured":"Cao Y, Yang F, Tang Q, Lu X (2019) An attention enhanced bidirectional LSTM for early forest fire smoke recognition. IEEE Access 7:154732\u201342","journal-title":"IEEE Access"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01857-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01857-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01857-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:33:16Z","timestamp":1747474396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01857-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1857"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01857-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"21 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors involved have agreed to participate in this submitted article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors involved in this manuscript give full consent for publication of this submitted article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"28"}}