{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T06:59:28Z","timestamp":1770965968663,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-01907-y","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T22:27:39Z","timestamp":1755642459000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing cybersecurity through hybrid blockchain-enabled intrusion detection systems: A machine learning approach"],"prefix":"10.1007","volume":"18","author":[{"given":"Isaac Osei","family":"Asante","sequence":"first","affiliation":[]},{"given":"Libing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,20]]},"reference":[{"key":"1907_CR1","doi-asserted-by":"publisher","unstructured":"Saba T Real time anomalies detection in crowd using convolutional long short-term memory network. J Inform Sci 2021:1\u20138. https:\/\/doi.org\/10.1177\/01655515211022665","DOI":"10.1177\/01655515211022665"},{"issue":"5","key":"1907_CR2","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E, Williams L, S\u0142owinska M, Theodorakopoulos G, Burnap P A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J\u00b42019 ;6(5):9042\u20139053","journal-title":"IEEE Internet Things J\u00b42019"},{"key":"1907_CR3","doi-asserted-by":"crossref","unstructured":"Wang Z, Jiang D, Lv Z, Song HA (2022) Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular Networks. In Proceedings of the IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Virtual, 2\u20135 May ; pp. 1\u20136","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798344"},{"key":"1907_CR4","doi-asserted-by":"publisher","first-page":"16492","DOI":"10.1109\/TITS.2021.3098636","volume":"23","author":"R Kumar","year":"2021","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Kumar N, Hassan MM (2021) A privacy-preserving-based secure framework using blockchain-enabled deep-learning in the cooperative intelligent transport system. IEEE Trans Intell Transp Syst 23:16492\u201316503 [CrossRef]","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1907_CR5","first-page":"102311","volume":"52","author":"M Ragab","year":"2022","unstructured":"Ragab M, Sabir MFS (2022) Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment. Sustain Energy Technol Assess 52:102311 [CrossRef]","journal-title":"Sustain Energy Technol Assess"},{"key":"1907_CR6","doi-asserted-by":"publisher","first-page":"6143","DOI":"10.1109\/JIOT.2020.2977196","volume":"7","author":"DV Medhane","year":"2020","unstructured":"Medhane DV, Sangaiah AK, Hossain MS, Muhammad G, Wang J (2020) Blockchain-enabled distributed security framework for next-generation IoT: an edge cloud and software-defined network-integrated approach. IEEE Internet Things J 7:6143\u20136149 [CrossRef]","journal-title":"IEEE Internet Things J"},{"key":"1907_CR7","doi-asserted-by":"publisher","first-page":"7326","DOI":"10.48084\/etasr.4245","volume":"11","author":"NK Al-Shammari","year":"2021","unstructured":"Al-Shammari NK, Syed TH, Syed MB (2021) An Edge\u2013IoT framework and prototype based on blockchain for smart healthcare applications. Eng Technol Appl Sci Res 11:7326\u20137331 [CrossRef]","journal-title":"Eng Technol Appl Sci Res"},{"issue":"2","key":"1907_CR8","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Com- Mun. Surv Tutor 18(2):1153\u20131176. https:\/\/doi.org\/10.1109\/COMST.2015.2494502","journal-title":"Surv Tutor"},{"key":"1907_CR9","doi-asserted-by":"publisher","first-page":"12937","DOI":"10.1038\/s41598-022-17043-z","volume":"12","author":"RF Mansour","year":"2022","unstructured":"Mansour RF (2022) Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci Rep 12:12937 [CrossRef] [PubMed]","journal-title":"Sci Rep"},{"key":"1907_CR10","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.3390\/healthcare10061110","volume":"10","author":"E Ashraf","year":"2022","unstructured":"Ashraf E, Areed NF, Salem H, Abdelhay EH, Farouk A (2022) Fidchain: Federated intrusion detection system for blockchain-enabled iot healthcare applications. Healthcare 10:1110. [CrossRef]","journal-title":"Healthcare"},{"key":"1907_CR11","doi-asserted-by":"publisher","first-page":"108379","DOI":"10.1016\/j.compeleceng.2022.108379","volume":"103","author":"M Sarhan","year":"2022","unstructured":"Sarhan M, Lo WW, Layeghy S, Portmann MHBFL (2022) A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection. Comput Electr Eng 103:108379 [CrossRef]","journal-title":"Comput Electr Eng"},{"key":"1907_CR12","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi O, Moustafa N, Turnbull B, Choo KK (2020) R. A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and Cloud networks. IEEE Internet Things J 8:9463\u20139472 [CrossRef]","journal-title":"IEEE Internet Things J"},{"key":"1907_CR13","doi-asserted-by":"publisher","first-page":"1969","DOI":"10.1109\/JBHI.2021.3101686","volume":"26","author":"S Nandy","year":"2021","unstructured":"Nandy S, Adhikari M, Khan MA, Menon VG, Verma S (2021) An intrusion detection mechanism for secured IoMT framework based on swarm-neural network. IEEE J Biomed Health Inf 26:1969\u20131976 [CrossRef] [PubMed]","journal-title":"IEEE J Biomed Health Inf"},{"key":"1907_CR14","doi-asserted-by":"crossref","unstructured":"Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J in press. [CrossRef]","DOI":"10.1109\/JIOT.2023.3237661"},{"key":"1907_CR15","volume-title":"IoT-fog\u2010blockchain framework: Opportunities and challenges. Research Anthology on Convergence of Blockchain","author":"T Alam","year":"2023","unstructured":"Alam T (2023) IoT-fog\u2010blockchain framework: opportunities and challenges. Research Anthology on Convergence of Blockchain. Internet of Things, and Security 258\u201077"},{"key":"1907_CR16","first-page":"103404","volume":"72","author":"S Javanmardi","year":"2023","unstructured":"Javanmardi S, Shojafar M, Mohammadi R, Persico V, Pescap\u00e8 A (2023) S-fos: a secure workflow scheduling approach for performance optimization in sdn\u2010based iot\u2010fog networks. J Inform Secur Appl 72:103404","journal-title":"J Inform Secur Appl"},{"key":"1907_CR17","first-page":"45","volume-title":"Predictive Data Security using AI: insights and issues of Blockchain, IoT, and DevOps","author":"M Jena","year":"2022","unstructured":"Jena M, Das U, Das M (2022) A pragmatic analysis of security concerns in Cloud, Fog, and Edge Environment. Predictive Data Security using AI: insights and issues of Blockchain, IoT, and DevOps. Springer Nature Singapore, Singapore, pp 45\u201359"},{"issue":"1","key":"1907_CR18","doi-asserted-by":"publisher","first-page":"103155","DOI":"10.1016\/j.ipm.2022.103155","volume":"60","author":"C Martinez-Rendon","year":"2023","unstructured":"Martinez-Rendon C, Gonz\u00e1lez\u2010Compe\u00e1n J, S\u00e1nchez\u2010Gallegos DD, Carretero J (2023) Cd\/cv: Blockchain\u2010based schemes for continuous verifiability and traceability of iot data for edge\u2010fog\u2010cloud. Inf Process Manag 60(1):103155","journal-title":"Inf Process Manag"},{"issue":"1","key":"1907_CR19","first-page":"15","volume":"4","author":"R Qamar","year":"2023","unstructured":"Qamar R, Zardari BA (2023) A study of blockchain-based internet of things. Iraqi J Comput Sci Math 4(1):15\u201323","journal-title":"Iraqi J Comput Sci Math"},{"key":"1907_CR20","first-page":"1","volume":"18","author":"H Mittal","year":"2022","unstructured":"Mittal H, Tripathi AK, Pandey AC, Venu P, Menon VG, Pal R (2022) A novel fuzzy clustering-based method for human activity recognition in cloud\u2010 based industrial IoT environment. Wireless Netw 18:1\u20133","journal-title":"Wireless Netw"},{"key":"1907_CR21","doi-asserted-by":"crossref","unstructured":"Badshah A, Waqas M, Tu S, Abbas G (2022) Enhancing Security in The Internet of Things Ecosystem using Reinforcement Learning and Blockchain. In 2022 International Wireless Communications and Mobile Computing (IWCMC). IEEE, Dubrovnik pp. 243-247","DOI":"10.1109\/IWCMC55113.2022.9824557"},{"issue":"6","key":"1907_CR22","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.1007\/s10586-022-03645-9","volume":"25","author":"SS Mathew","year":"2022","unstructured":"Mathew SS, Hayawi K, Dawit NA, Taleb I, Trabelsi Z (2022) Integration of blockchain and collaborative intrusion detection for secure data transac- tions in industrial IoT: a survey. Cluster Comput 25(6):4129\u20134149","journal-title":"Cluster Comput"},{"key":"1907_CR23","doi-asserted-by":"publisher","unstructured":"Abi Sen A, Eassa F, Jambi K, Yamin M (2018) Preserving privacy in internet of things: a survey. Int J Inform Technol 10. https:\/\/doi.org\/10.1007\/s41870-018-0113-4","DOI":"10.1007\/s41870-018-0113-4"},{"key":"1907_CR24","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.image.2016.06.007","volume":"47","author":"W Shifu Zhou","year":"2016","unstructured":"Shifu Zhou W, Shen D, Zeng M, Fang Y, Wei, Zhang Z (2016) Spatial\u2013 temporal convolutional neural networks for anomaly detection and localization in crowded scenes. Sig Process Image Commun 47:358\u2013368","journal-title":"Sig Process Image Commun"},{"key":"1907_CR25","unstructured":"Sara Sabour N, Frosst, Geoffrey E, Hinton Dynamic routing between capsules. In Advances in neural information processing systems.2017, pages 3856\u20133866"},{"key":"1907_CR26","doi-asserted-by":"publisher","first-page":"111434","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"Y Saheed","year":"2024","unstructured":"Saheed Y, Abdulganiyu O, Ait Tchakoucht T (2024) Modified genetic Algorithm and Fine-Tuned Long Short-Term Memory Network for Intrusion Detection in the internet of things networks with Edge Capabilities. Appl Soft Comput 155:111434. https:\/\/doi.org\/10.1016\/j.asoc.2024.111434","journal-title":"Appl Soft Comput"},{"key":"1907_CR27","doi-asserted-by":"publisher","first-page":"103171","DOI":"10.1016\/j.rineng.2024.103171","volume":"24","author":"Y Saheed","year":"2024","unstructured":"Saheed Y, Chukwuere J (2024) XAIEnsembleTL-IoV: a New eXplainable Artificial Intelligence Ensemble transfer learning for zero-day botnet attack detection in the Internet of vehicles. Results Eng 24:103171. https:\/\/doi.org\/10.1016\/j.rineng.2024.103171","journal-title":"Results Eng"},{"key":"1907_CR28","doi-asserted-by":"publisher","first-page":"108626","DOI":"10.1016\/j.compeleceng.2023.108626","volume":"107","author":"B Sharma","year":"2023","unstructured":"Sharma B, Sharma L, Lal C, Roy S (2023) Anomaly based network intrusion detection for IoT attacks using deep learning technique. Comput Electr Eng 107:108626 [CrossRef]","journal-title":"Comput Electr Eng"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01907-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01907-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01907-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:00Z","timestamp":1760683140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01907-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,20]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["1907"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01907-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,20]]},"assertion":[{"value":"21 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors are permitted to Consent to publish.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"Authors provide the Ethics Approval for the given manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"268"}}