{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:32:52Z","timestamp":1774539172060,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["NSTC 112-2221-E-011- 092-MY2"],"award-info":[{"award-number":["NSTC 112-2221-E-011- 092-MY2"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007530","name":"National Taiwan University of Science and Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007530","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02031-7","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T04:46:09Z","timestamp":1749444369000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A robust and efficient blockchain-based framework for updating firmware in IoT environments"],"prefix":"10.1007","volume":"18","author":[{"given":"Alexander","family":"Yohan","sequence":"first","affiliation":[]},{"given":"Nai-Wei","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Liem Peter","family":"Santoso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"2031_CR1","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan MA, Salah K (2018) Iot security: Review, blockchain solutions, and open challenges. Future Gen Comput Syst 82:395\u2013411. https:\/\/doi.org\/10.1016\/j.future.2017.11.022","journal-title":"Future Gen Comput Syst"},{"key":"2031_CR2","unstructured":"Miller C (2011) Battery firmware hacking: Inside the innards of a smart battery. Technical report, Accuvant Labs"},{"key":"2031_CR3","unstructured":"Zetter K How the NSA\u2019s Firmware Hacking Works and Why It\u2019s So Unsettling. https:\/\/www.wired.com\/2015\/02\/nsa-firmware-hacking\/ Accessed 2 May 2019"},{"issue":"7","key":"2031_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80\u201384. https:\/\/doi.org\/10.1109\/MC.2017.201","journal-title":"Computer"},{"issue":"7","key":"2031_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.2018.3011046","volume":"51","author":"N Vlajic","year":"2018","unstructured":"Vlajic N, Zhou D (2018) Iot as a land of opportunity for ddos hackers. Computer 51(7):26\u201334. https:\/\/doi.org\/10.1109\/MC.2018.3011046","journal-title":"Computer"},{"key":"2031_CR6","unstructured":"Miessler D, Smith C OWASP Internet of Things Project - OWASP. https:\/\/wiki.owasp.org\/index.php\/OWASP_Internet_of_Things_Project#tab=IoT_Vulnerabilities Accessed 10 Apr 2018"},{"key":"2031_CR7","unstructured":"Gajjar MJ (2015) Mobile Sensors and Context-Aware Computing, p 356. https:\/\/www.sciencedirect.com\/book\/9780128016602\/mobile-sensors-and-context-aware-computing"},{"key":"2031_CR8","doi-asserted-by":"publisher","unstructured":"Hassan R, Markantonakis K, Akram RN (2016) Can you call the software in your device be firmware? In: 2016 IEEE 13th international conference on e-business engineering (ICEBE), pp 188\u2013195. https:\/\/doi.org\/10.1109\/ICEBE.2016.040","DOI":"10.1109\/ICEBE.2016.040"},{"key":"2031_CR9","unstructured":"Ford B How Do You Know It\u2019s On the Blockchain? With a SkipChain. http:\/\/bford.info\/2017\/08\/01\/skipchain\/ Accessed 2019-05-02"},{"key":"2031_CR10","unstructured":"Nikitin K, Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Khoffi I, Cappos J, Ford B (2017) Chainiac: Proactive software-update transparency via collectively signed skipchains and verified builds. In: 26th USENIX security symposium (USENIX Security 17), pp 1271\u20131287"},{"key":"2031_CR11","unstructured":"Cui A, Costello M, Stolfo SJ (2013) When firmware modifications attack : a case study of embedded exploitation. 20th Annual Network Distributed System Security Symposium"},{"key":"2031_CR12","doi-asserted-by":"publisher","unstructured":"Doddapaneni K, Lakkundi R, Rao S, Kulkarni SG, Bhat B (2017) Secure fota object for iot. In: 2017 IEEE 42nd conference on local computer networks workshops (LCN Workshops), pp 154\u2013159. https:\/\/doi.org\/10.1109\/LCN.Workshops.2017.78","DOI":"10.1109\/LCN.Workshops.2017.78"},{"key":"2031_CR13","doi-asserted-by":"publisher","unstructured":"Syta E, Tamas I, Visher D, Wolinsky DI, Jovanovic P, Gasser L, Gailly N, Khoffi I, Ford B (2016) Keeping authorities \"honest or bust\" with decentralized witness cosigning. In: 2016 IEEE symposium on security and privacy (SP), pp 526\u2013545. https:\/\/doi.org\/10.1109\/SP.2016.38","DOI":"10.1109\/SP.2016.38"},{"key":"2031_CR14","unstructured":"MedCo: MedCo | Collective protection of medical data. https:\/\/medco-ch.github.io\/index.html"},{"key":"2031_CR15","doi-asserted-by":"publisher","unstructured":"Raisaro JL, Troncoso-Pastoriza JR, Misbach M, Sousa J.S, Pradervand S, Missiaglia E, Michielin O, Ford B, Hubaux J-P (2018) Ieee\/acm transactions on computational biology and bioinformatics 1 medco: Enabling secure and privacy-preserving exploration of distributed clinical and genomic data. https:\/\/doi.org\/10.1109\/TCBB.2018.2854776","DOI":"10.1109\/TCBB.2018.2854776"},{"key":"2031_CR16","unstructured":"ByzGen (2021) ByzGen | Blockchain Data Exchange. https:\/\/www.byzgen.com\/"},{"issue":"3","key":"2031_CR17","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","volume":"73","author":"B Lee","year":"2017","unstructured":"Lee B, Lee J-H (2017) Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. J Supercomput 73(3):1152\u20131167. https:\/\/doi.org\/10.1007\/s11227-016-1870-0","journal-title":"J Supercomput"},{"key":"2031_CR18","doi-asserted-by":"publisher","unstructured":"Lee B, Malik S, Wi S, Lee J-H (2017) Firmware verification of embedded devices based on a blockchain. In: Lee J.-H, Pack S. (eds.) Quality, Reliability, Security and Robustness in Heterogeneous Networks, pp 52\u201361. Springer,. https:\/\/doi.org\/10.1007\/978-3-319-60717-7_6","DOI":"10.1007\/978-3-319-60717-7_6"},{"key":"2031_CR19","doi-asserted-by":"publisher","unstructured":"Boudguiga A, Bouzerna N, Granboulan L, Olivereau A, Quesnel F, Roger A, Sirdey R (2017) Towards better availability and accountability for iot updates by means of a blockchain. In: 2017 IEEE european symposium on security and privacy workshops (EuroS &PW), pp 50\u201358. https:\/\/doi.org\/10.1109\/EuroSPW.2017.50","DOI":"10.1109\/EuroSPW.2017.50"},{"key":"2031_CR20","doi-asserted-by":"publisher","first-page":"44879","DOI":"10.1109\/ACCESS.2023.3272899","volume":"11","author":"G Solomon","year":"2023","unstructured":"Solomon G, Zhang P, Brooks R, Liu Y (2023) A secure and cost-efficient blockchain facilitated iot software update framework. IEEE Access 11:44879\u201344894. https:\/\/doi.org\/10.1109\/ACCESS.2023.3272899","journal-title":"IEEE Access"},{"key":"2031_CR21","doi-asserted-by":"publisher","unstructured":"Wijesundara WMAB, Lee J.S, Tith D, Aloupogianni E, Suzuki H, Obi T (2024) Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies. International Journal of Information Security, pp 1\u201311. https:\/\/doi.org\/10.1007\/S10207-024-00827-X\/TABLES\/1","DOI":"10.1007\/S10207-024-00827-X\/TABLES\/1"},{"key":"2031_CR22","unstructured":"Kokoris-Kogias E, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B (2016) Enhancing bitcoin security and performance with strong consistency via collective signing. Proceedings of the 25th USENIX Security Symposium, pp 279\u2013296"},{"key":"2031_CR23","unstructured":"Yohan A, Lo N-W, Achawapong S (2018) Blockchain-based Firmware Update Framework for Internet-of-Things Environment. In: Conf. information and knowledge engineering, pp 151\u2013155. https:\/\/csce.ucmss.com\/cr\/books\/2018\/LFS\/CSREA2018\/IKE9004.pdfhttps:\/\/csce.ucmss.com\/cr\/books\/2018\/ConferenceReport?ConferenceKey=IKE"},{"key":"2031_CR24","unstructured":"Dai W (2009) Speed Comparison of Popular Crypto Algorithms. https:\/\/www.cryptopp.com\/benchmarks.html Accessed 2 May 2019"},{"key":"2031_CR25","doi-asserted-by":"publisher","unstructured":"Yeh K-H, Su C, Choo K-KR, Chiu W (2017) A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things. Sensors 17(5):1001. https:\/\/doi.org\/10.3390\/s17051001","DOI":"10.3390\/s17051001"},{"issue":"3","key":"2031_CR26","first-page":"89","volume":"2","author":"G Singh Tanwar","year":"2010","unstructured":"Singh Tanwar G, Singh G, Gaur V (2010) Secured Encryption - Concept and Challenge. Int J Comput Appl 2(3):89\u201394","journal-title":"Int J Comput Appl"},{"key":"2031_CR27","unstructured":"Almarwani M, Konev B, Lisitsa A (2022) Data querying with ciphertext policy attribute based encryption. arXiv:2209.15103"},{"key":"2031_CR28","unstructured":"Cremers C, Mauw S, Vink EP, Dimitrakos T, Martinelli F (2003) Defining authentication in a trace model. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.10.4205"},{"key":"2031_CR29","doi-asserted-by":"publisher","unstructured":"Cremers CJF (2008) The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Computer aided verification vol. 5123 LNCS, pp. 414\u2013418. Springer. https:\/\/doi.org\/10.1007\/978-3-540-70545-1_38. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-540-70545-1_38","DOI":"10.1007\/978-3-540-70545-1_38"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02031-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02031-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02031-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:38Z","timestamp":1758986558000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02031-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2031"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02031-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"8 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"207"}}