{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T12:08:46Z","timestamp":1772798926103,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01935-8","type":"journal-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T07:00:48Z","timestamp":1741849248000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A hybrid software-defined networking approach for enhancing IoT cybersecurity with deep learning and blockchain in smart cities"],"prefix":"10.1007","volume":"18","author":[{"given":"Jamal","family":"Alotaibi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"issue":"11","key":"1935_CR1","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.3390\/s21113838","volume":"21","author":"M Umair","year":"2021","unstructured":"Umair M, Cheema MA, Cheema O, Li H, Lu H (2021) Impact of COVID-19 on IoT adoption in healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT. Sensors 21(11):3838","journal-title":"Sensors"},{"issue":"5","key":"1935_CR2","doi-asserted-by":"publisher","first-page":"2672","DOI":"10.3390\/app12052672","volume":"12","author":"A Razmjoo","year":"2022","unstructured":"Razmjoo A, Gandomi A, Mahlooji M, Astiaso Garcia D, Mirjalili S, Rezvani A, Ahmadzadeh S, Memon S (2022) An investigation of the policies and crucial sectors of smart cities based on IoT application. Appl Sci 12(5):2672","journal-title":"Appl Sci"},{"issue":"1","key":"1935_CR3","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","volume":"28","author":"IH Sarker","year":"2023","unstructured":"Sarker IH, Khan AI, Abushark YB, Alsolami F (2023) Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Networks Appl 28(1):296\u2013312","journal-title":"Mobile Networks Appl"},{"issue":"16","key":"1935_CR4","doi-asserted-by":"publisher","first-page":"e8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"Asrin Vakili","year":"2024","unstructured":"Vakili Asrin, Al-Khafaji Hamza Mohammed Ridha, Darbandi Mehdi, Heidari Arash, Navimipour NimaJafari, Unal Mehmet (2024) A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurrency Computation: Practice Experience 36(16):e8091","journal-title":"Concurrency Computation: Practice Experience"},{"key":"1935_CR5","doi-asserted-by":"publisher","first-page":"121286","DOI":"10.1016\/j.techfore.2021.121286","volume":"174","author":"Kun-Huang Huarng","year":"2022","unstructured":"Huarng Kun-Huang, Tiffany Hui-Kuang Yu, Lee Cheng Fang (2022) Adoption model of healthcare wearable devices. Technol Forecast Soc Chang 174:121286","journal-title":"Technol Forecast Soc Chang"},{"issue":"2","key":"1935_CR6","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1108\/ITP-01-2021-0049","volume":"36","author":"C Bianchi","year":"2023","unstructured":"Bianchi C, Tuzovic S, Kuppelwieser VG (2023) Investigating the drivers of wearable technology adoption for healthcare in South America. Inf Technol People 36(2):916\u2013939","journal-title":"Inf Technol People"},{"key":"1935_CR7","doi-asserted-by":"publisher","unstructured":"Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput 16, 1073\u20131091. https:\/\/doi.org\/10.1007\/s12559-024-10255-7","DOI":"10.1007\/s12559-024-10255-7"},{"key":"1935_CR8","doi-asserted-by":"publisher","unstructured":"Heidari, Arash, Nima Jafari Navimipour, and Akira Otsuki (2024) Cloud-based non-destructive characterization. Non-destructive material characterization methods. pp 727\u2013765. https:\/\/doi.org\/10.1016\/B978-0-323-91150-4.00006-9","DOI":"10.1016\/B978-0-323-91150-4.00006-9"},{"issue":"4","key":"1935_CR9","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s00530-020-00694-1","volume":"27","author":"C Bhatt","year":"2021","unstructured":"Bhatt C, Kumar I, Vijayakumar V, Singh KU, Kumar A (2021) The state of the art of deep learning models in medical science and their challenges. Multimedia Syst 27(4):599\u2013613","journal-title":"Multimedia Syst"},{"key":"1935_CR10","doi-asserted-by":"publisher","unstructured":"Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Computing, 27, 7521\u20137539. https:\/\/doi.org\/10.1007\/s10586-024-04351-4","DOI":"10.1007\/s10586-024-04351-4"},{"issue":"10","key":"1935_CR11","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"Arash Heidari","year":"2023","unstructured":"Heidari Arash, Navimipour NimaJafari, Unal Mehmet (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J 10(10):8445\u20138454","journal-title":"IEEE Internet Things J"},{"issue":"15","key":"1935_CR12","doi-asserted-by":"publisher","first-page":"5551","DOI":"10.3390\/s22155551","volume":"22","author":"Mudassar Hussain","year":"2022","unstructured":"Hussain Mudassar, Shah Nadir, Amin Rashid, Alshamrani Sultan S, Alotaibi Aziz, Raza Syed Mohsan (2022) Software-defined networking: Categories, analysis, and future directions. Sensors 22(15):5551","journal-title":"Sensors"},{"key":"1935_CR13","doi-asserted-by":"publisher","first-page":"43620","DOI":"10.1109\/ACCESS.2021.3065880","volume":"9","author":"B Lashkari","year":"2021","unstructured":"Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620\u201343652","journal-title":"IEEE Access"},{"key":"1935_CR14","doi-asserted-by":"publisher","unstructured":"Rani P, Lamba R, Sachdeva RK, Kumar K, Iwendi C (2024) A machine learning model for Alzheimer's disease prediction. IET cyber\u2010physical systems: Theory & Applications, 9(2):125\u2013134. https:\/\/doi.org\/10.1049\/cps2.12090","DOI":"10.1049\/cps2.12090"},{"key":"1935_CR15","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.ijcce.2023.07.004","volume":"4","author":"C Iwendi","year":"2023","unstructured":"Iwendi C (2023) Innovative augmented and virtual reality applications for disease diagnosis based on integrated genetic algorithms. Int J Cognitive Comput Eng 4:266\u2013276","journal-title":"Int J Cognitive Comput Eng"},{"issue":"13","key":"1935_CR16","doi-asserted-by":"publisher","first-page":"10474","DOI":"10.1109\/JIOT.2021.3062630","volume":"8","author":"MN Bhuiyan","year":"2021","unstructured":"Bhuiyan MN, Rahman MM, Billah MM, Saha D (2021) Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities. IEEE Internet Things J 8(13):10474\u201310498","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"1935_CR17","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan \u00d6, Aktu\u011f SS, Ozkan-Okay M, Yilmaz AA, Akin E (2023) A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6):1333","journal-title":"Electronics"},{"issue":"12","key":"1935_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571728","volume":"55","author":"Arash Heidari","year":"2023","unstructured":"Heidari Arash, Navimipour NimaJafari, Unal Mehmet, Zhang Guodao (2023) Machine learning applications in internet-of-drones: Systematic review, recent deployments, and open issues. ACM Comput Surveys 55(12):1\u201345","journal-title":"ACM Comput Surveys"},{"issue":"6","key":"1935_CR19","doi-asserted-by":"publisher","first-page":"e4969","DOI":"10.1002\/ett.4969","volume":"35","author":"Zahra Amiri","year":"2024","unstructured":"Amiri Zahra, Heidari Arash, Zavvar Mohammad, Navimipour NimaJafari, Esmaeilpour Mansour (2024) The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review. Trans Emerg Telecommun Technol 35(6):e4969","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1935_CR20","unstructured":"Larsen BS (2022) Synthetic minority over-sampling technique (SMOTE). GitHub https:\/\/github.com\/dkbsl\/matlab_smote\/releases\/tag\/1.0. Accessed 6 Sept 2024"},{"issue":"14","key":"1935_CR21","doi-asserted-by":"publisher","first-page":"4884","DOI":"10.3390\/s21144884","volume":"21","author":"D Javeed","year":"2021","unstructured":"Javeed D, Gao T, Khan MT, Ahmad I (2021) A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT). Sensors 21(14):4884","journal-title":"Sensors"},{"key":"1935_CR22","doi-asserted-by":"publisher","first-page":"134695","DOI":"10.1109\/ACCESS.2020.3009849","volume":"8","author":"J Malik","year":"2020","unstructured":"Malik J, Akhunzada A, Bibi I, Imran M, Musaddiq A, Kim SW (2020) Hybrid deep learning: An efficient reconnaissance and surveillance detection mechanism in SDN. IEEE Access 8:134695\u2013134706","journal-title":"IEEE Access"},{"key":"1935_CR23","doi-asserted-by":"publisher","unstructured":"Alkhamisi A, Katib I, Buhari SM (2023) Blockchain -assisted hybrid deep learning-based secure mechanism for software defined networks. In: 2023 IEEE International Conference on Consumer Electronics (ICCE) pp 1\u20138. https:\/\/doi.org\/10.1109\/ICCE56470.2023.10043401","DOI":"10.1109\/ICCE56470.2023.10043401"},{"key":"1935_CR24","doi-asserted-by":"publisher","unstructured":"Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. In: IEEE Internet Things J 10(10):8445\u20138454. https:\/\/doi.org\/10.1109\/JIOT.2023.3237661","DOI":"10.1109\/JIOT.2023.3237661"},{"issue":"6","key":"1935_CR25","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.3390\/s22062112","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah MA, Ali A, Hajjej F, Pasha MF, Alohali MA (2022) A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things. Sensors 22(6):2112","journal-title":"Sensors"},{"issue":"2","key":"1935_CR26","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.dcan.2022.11.003","volume":"9","author":"A Rahman","year":"2023","unstructured":"Rahman A, Islam MJ, Band SS, Muhammad G, Hasan K, Tiwari P (2023) Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT. Digital Commun Networks 9(2):411\u2013421","journal-title":"Digital Commun Networks"},{"issue":"4","key":"1935_CR27","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/TSC.2020.2966970","volume":"13","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, Choo KKR (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans Serv Comput 13(4):625\u2013638","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"1935_CR28","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1007\/s10207-023-00803-x","volume":"23","author":"Yakub Kayode Saheed","year":"2024","unstructured":"Saheed Yakub Kayode, Misra Sanjay (2024) A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things. Int J Inf Secur 23(3):1557\u20131581","journal-title":"Int J Inf Secur"},{"key":"1935_CR29","doi-asserted-by":"publisher","first-page":"100297","DOI":"10.1016\/j.sintl.2024.100297","volume":"6","author":"Yakub Kayode Saheed","year":"2025","unstructured":"Saheed Yakub Kayode, Omole Adekunle Isaac, Sabit Musa Odunayo (2025) GA-mADAM-IIoT: A new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sensors Int 6:100297","journal-title":"Sensors Int"},{"issue":"8","key":"1935_CR30","doi-asserted-by":"publisher","first-page":"4953","DOI":"10.3390\/app13084953","volume":"13","author":"R Jmal","year":"2023","unstructured":"Jmal R, Ghabri W, Guesmi R, Alshammari BM, Alshammari AS, Alsaif H (2023) Distributed blockchain-SDN secure IoT system based on ANN to mitigate DDoS attacks. Appl Sci 13(8):4953","journal-title":"Appl Sci"},{"issue":"5","key":"1935_CR31","doi-asserted-by":"publisher","first-page":"3850","DOI":"10.1109\/JIOT.2021.3100797","volume":"9","author":"MJ Islam","year":"2021","unstructured":"Islam MJ, Rahman A, Kabir S, Karim MR, Acharjee UK, Nasir MK, Band SS, Sookhak M, Wu S (2021) Blockchain-SDN-based energy-aware and distributed secure architecture for IoT in smart cities. IEEE Internet Things J 9(5):3850\u20133864","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1935_CR32","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/MNET.011.2000514","volume":"35","author":"MA Khan","year":"2020","unstructured":"Khan MA, Abbas S, Rehman A, Saeed Y, Zeb A, Uddin MI, Nasser N, Ali A (2020) A machine learning approach for blockchain-based smart home networks security. IEEE Network 35(3):223\u2013229","journal-title":"IEEE Network"},{"issue":"8","key":"1935_CR33","doi-asserted-by":"publisher","first-page":"5522","DOI":"10.1109\/TII.2020.3040968","volume":"17","author":"S Rathore","year":"2020","unstructured":"Rathore S, Park JH (2020) A blockchain-based deep learning approach for cyber security in next generation industrial cyber-physical systems. IEEE Trans Industr Inf 17(8):5522\u20135532","journal-title":"IEEE Trans Industr Inf"},{"issue":"8","key":"1935_CR34","doi-asserted-by":"publisher","first-page":"918","DOI":"10.3390\/electronics10080918","volume":"10","author":"D Javeed","year":"2021","unstructured":"Javeed D, Gao T, Khan MT (2021) SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT. Electronics 10(8):918","journal-title":"Electronics"},{"key":"1935_CR35","doi-asserted-by":"publisher","unstructured":"P. Kumar, R. Kumar, A. Kumar, A. A. Franklin, S. Garg and S. Singh (2023) Blockchain and deep learning for secure communication in digital twin empowered industrial IoT network. In: IEEE Trans Netw Sci Eng 10(5):2802\u20132813. https:\/\/doi.org\/10.1109\/TNSE.2022.3191601","DOI":"10.1109\/TNSE.2022.3191601"},{"key":"1935_CR36","doi-asserted-by":"publisher","first-page":"102252","DOI":"10.1016\/j.scs.2020.102252","volume":"60","author":"SK Singh","year":"2020","unstructured":"Singh SK, Jeong YS, Park JH (2020) A deep learning-based IoT-oriented infrastructure for secure smart city. Sustain Cities Soc 60:102252","journal-title":"Sustain Cities Soc"},{"issue":"23","key":"1935_CR37","doi-asserted-by":"publisher","first-page":"16002","DOI":"10.3390\/su142316002","volume":"14","author":"S Alharbi","year":"2022","unstructured":"Alharbi S, Attiah A, Alghazzawi D (2022) Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends. Sustainability 14(23):16002","journal-title":"Sustainability"},{"key":"1935_CR38","doi-asserted-by":"publisher","first-page":"103156","DOI":"10.1016\/j.jnca.2021.103156","volume":"190","author":"Y Cui","year":"2021","unstructured":"Cui Y, Qian Q, Guo C, Shen G, Tian Y, Xing H, Yan L (2021) Towards DDoS detection mechanisms in software-defined networking. J Netw Comput Appl 190:103156","journal-title":"J Netw Comput Appl"},{"key":"1935_CR39","doi-asserted-by":"publisher","first-page":"108919","DOI":"10.1016\/j.knosys.2022.108919","volume":"249","author":"A Zhang","year":"2022","unstructured":"Zhang A, Hualong Yu, Zhou S, Huan Z, Yang X (2022) Instance weighted SMOTE by indirectly exploring the data distribution. Knowl-Based Syst 249:108919","journal-title":"Knowl-Based Syst"},{"key":"1935_CR40","doi-asserted-by":"publisher","unstructured":"Hussien AG, Chhabra A, Hashim FA, Pop A (2024) A novel hybrid artificial gorilla troops optimizer with honey badger algorithm for solving cloud scheduling problem. Cluster Comput 27, 13093\u201313128. https:\/\/doi.org\/10.1007\/s10586-024-04605-1","DOI":"10.1007\/s10586-024-04605-1"},{"key":"1935_CR41","doi-asserted-by":"publisher","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","volume":"8","author":"D Stiawan","year":"2020","unstructured":"Stiawan D, Idris MYB, Bamhdi AM, Budiarto R (2020) CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8:132911\u2013132921","journal-title":"IEEE Access"},{"issue":"9","key":"1935_CR42","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.3390\/electronics9091533","volume":"9","author":"Tuan Anh Tang","year":"2020","unstructured":"Tang Tuan Anh, Mhamdi Lotfi, McLernon Des, Zaidi Syed Ali Raza, Ghogho Mounir, El Moussa Fadi (2020) DeepIDS: Deep learning approach for intrusion detection in software defined networking. Electronics 9(9):1533","journal-title":"Electronics"},{"issue":"10","key":"1935_CR43","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.3390\/electronics11101531","volume":"11","author":"M-T Kao","year":"2022","unstructured":"Kao M-T, Sung D-Y, Kao S-J, Chang F-M (2022) A novel two-stage deep learning structure for network flow anomaly detection. Electronics 11(10):1531","journal-title":"Electronics"},{"issue":"3","key":"1935_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09589-6","volume":"29","author":"Y Otoum","year":"2021","unstructured":"Otoum Y, Nayak A (2021) \u2018AS-IDS: Anomaly and signature-based IDS for the Internet of Things.\u2019 J Netw Syst Manage 29(3):1\u201326","journal-title":"J Netw Syst Manage"},{"key":"1935_CR45","unstructured":"https:\/\/www.kaggle.com\/datasets\/chethuhn\/network-intrusion-dataset"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01935-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01935-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01935-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:50Z","timestamp":1746844310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01935-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,13]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1935"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01935-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,13]]},"assertion":[{"value":"21 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"123"}}