{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:56:00Z","timestamp":1771613760663,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02062-0","type":"journal-article","created":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T10:14:02Z","timestamp":1756721642000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["AI-optimized blockchain security for smart agriculture using post-quantum cryptography and graph neural network-based threat detection"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3795-3513","authenticated-orcid":false,"given":"Ibraheem M.","family":"Alharbi","sequence":"first","affiliation":[]},{"given":"Najah Kalifah","family":"Almazmomi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,1]]},"reference":[{"key":"2062_CR1","doi-asserted-by":"crossref","unstructured":"Abdel-Basset M, Hawash H, Abdel-Fatah L (2024) Artificial intelligence and internet of things in smart farming. CRC Press","DOI":"10.1201\/9781003400103"},{"issue":"1","key":"2062_CR2","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/2126734","volume":"2024","author":"S Getahun","year":"2024","unstructured":"Getahun S, Kefale H, Gelaye Y (2024) Application of precision agriculture technologies for sustainable crop production and environmental sustainability: a systematic review. Sci World J 2024(1):2126734","journal-title":"Sci World J"},{"key":"2062_CR3","doi-asserted-by":"publisher","first-page":"100350","DOI":"10.1016\/j.atech.2023.100350","volume":"6","author":"H-Y Chen","year":"2023","unstructured":"Chen H-Y, Sharma K, Sharma C, Sharma S (2023) Integrating explainable artificial intelligence and blockchain to smart agriculture: Research prospects for decision making and improved security. Smart agricultural technology 6:100350","journal-title":"Smart agricultural technology"},{"issue":"16","key":"2062_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/foods12163026","volume":"12","author":"RM Ellahi","year":"2023","unstructured":"Ellahi RM, Wood LC, Bekhit AE (2023) Blockchain-based frameworks for food traceability: a systematic review. Foods 12(16):3026","journal-title":"Foods"},{"key":"2062_CR5","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2024.054556","author":"MM Yakubu","year":"2024","unstructured":"Yakubu MM, Hassan FB, Danyaro KU, Junejo AZ, Siraj M, Yahaya S, Adamu S, Abdulsalam K (2024) A systematic literature review on blockchain consensus mechanisms\u2019 security: applications and open challenges. Comput Syst Sci Eng. https:\/\/doi.org\/10.32604\/csse.2024.054556","journal-title":"Comput Syst Sci Eng"},{"key":"2062_CR6","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1109\/ACCESS.2021.3138160","volume":"10","author":"ET Bouali","year":"2021","unstructured":"Bouali ET, Abid MR, Boufounas EM, Hamed TA, Benhaddou D (2021) Renewable energy integration into cloud & IoT-based smart agriculture. IEEE Access 10:1175\u20131191","journal-title":"IEEE Access"},{"issue":"4","key":"2062_CR7","first-page":"252","volume":"2","author":"ME Hossain","year":"2023","unstructured":"Hossain ME, Tarafder MT, Ahmed N, Al Noman A, Sarkar MI, Hossain Z (2023) Integrating AI with edge computing and cloud services for real-time data processing and decision making. Int J Multidiscip Sci Arts 2(4):252\u2013261","journal-title":"Int J Multidiscip Sci Arts"},{"key":"2062_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2022.107105","author":"M Gheisari","year":"2022","unstructured":"Gheisari M, Yaraziz MS, Alzubi JA, Fern\u00e1ndez-Campusano C, Feylizadeh MR, Pirasteh S, Abbasi AA, Liu Y, Lee CC (2022) An efficient cluster head selection for wireless sensor network-based smart agriculture systems. Comput Electron Agric. https:\/\/doi.org\/10.1016\/j.compag.2022.107105","journal-title":"Comput Electron Agric"},{"key":"2062_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109634","volume":"224","author":"P Bothra","year":"2023","unstructured":"Bothra P, Karmakar R, Bhattacharya S, De S (2023) How can applications of blockchain and artificial intelligence improve performance of internet of things?\u2013a survey. Comput Netw 224:109634","journal-title":"Comput Netw"},{"key":"2062_CR10","doi-asserted-by":"publisher","unstructured":"Rani SS, Alzubi JA, Lakshmanaprabu SK, Gupta D, Manikandan R (2019) Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-07760-5","DOI":"10.1007\/s11042-019-07760-5"},{"issue":"5","key":"2062_CR11","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.3390\/s23052528","volume":"23","author":"X Zou","year":"2023","unstructured":"Zou X, Liu W, Huo Z, Wang S, Chen Z, Xin C, Bai Y et al (2023) Current status and prospects of research on sensor fault diagnosis of agricultural internet of things. Sensors 23(5):2528","journal-title":"Sensors"},{"key":"2062_CR12","doi-asserted-by":"crossref","unstructured":"Thangamani R, Sathya D, Kamalam GK, Lyer GN (2024) Ai green revolution: reshaping agriculture\u2019s future. In: Intelligent robots and drones for precision agriculture, pp 421\u2013461. Springer Nature Switzerland, Cham","DOI":"10.1007\/978-3-031-51195-0_19"},{"key":"2062_CR13","doi-asserted-by":"publisher","first-page":"103107","DOI":"10.1016\/j.jnca.2021.103107","volume":"187","author":"M Raj","year":"2021","unstructured":"Raj M, Gupta S, Chamola V, Elhence A, Garg T, Atiquzzaman M, Niyato D (2021) A survey on the role of internet of things for adopting and promoting Agriculture 4.0. J Netw Comput Appl 187:103107","journal-title":"J Netw Comput Appl"},{"key":"2062_CR14","doi-asserted-by":"publisher","unstructured":"\u00a0Alzubi JA, Manikandan R, Alzubi OA, Qiqieh I, Rahim R, Gupta D, Khanna A (2020) Hashed Needham Schroeder industrial IoT based cost optimized deep secured data transmission in cloud. Measurement 150:107077. https:\/\/doi.org\/10.1016\/j.measurement.2019.107077","DOI":"10.1016\/j.measurement.2019.107077"},{"issue":"12","key":"2062_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/app11125585","volume":"11","author":"S Al-Farsi","year":"2021","unstructured":"Al-Farsi S, Rathore MM, Bakiras S (2021) Security of blockchain-based supply chain management systems: challenges and opportunities. Appl Sci 11(12):5585","journal-title":"Appl Sci"},{"issue":"1","key":"2062_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/agriculture12010040","volume":"12","author":"SA Bhat","year":"2021","unstructured":"Bhat SA, Huang NF, Sofi IB, Sultan M (2021) Agriculture-food supply chain management based on blockchain and IoT: A narrative on enterprise blockchain interoperability. Agriculture 12(1):40","journal-title":"Agriculture"},{"key":"2062_CR17","doi-asserted-by":"crossref","unstructured":"Sarwar MI, Maghrabi LA, Khan I, Naith QH, Nisar K (2023) Blockchain: a crypto-intensive technology\u2014A comprehensive review. IEEE Access 11: 141926\u2013141955","DOI":"10.1109\/ACCESS.2023.3342079"},{"key":"2062_CR18","doi-asserted-by":"crossref","unstructured":"Gulia P, Gill NS, Yahya M, Gupta P, Shukla PK, Shukla PK (2024) Exploring the potential of blockchain technology in an IoT-enabled environment: A review. IEEE Access 12:31197\u201331227","DOI":"10.1109\/ACCESS.2024.3366656"},{"key":"2062_CR19","doi-asserted-by":"crossref","unstructured":"Jeyakumar ST, Eugene Yugarajah AC, H\u00f3u Z, Muthukkumarasamy V (2023) Detecting malicious blockchain transactions using graph neural networks. In: International symposium on distributed ledger technology, pp 55\u201371. Springer Nature Singapore, Singapore","DOI":"10.1007\/978-981-97-0006-6_4"},{"issue":"2","key":"2062_CR20","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.1007\/s10207-023-00797-6","volume":"23","author":"N Ukeje","year":"2024","unstructured":"Ukeje N, Gutierrez J, Petrova K (2024) Information security and privacy challenges of cloud computing for government adoption: a systematic review. Int J Inf Secur 23(2):1459\u20131475","journal-title":"Int J Inf Secur"},{"issue":"4","key":"2062_CR21","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1007\/s11277-021-08388-1","volume":"119","author":"R Fotohi","year":"2021","unstructured":"Fotohi R, Pakdel H (2021) A lightweight and scalable physical layer attack detection mechanism for the internet of things (IoT) using hybrid security schema. Wireless Pers Commun 119(4):3089\u20133106","journal-title":"Wireless Pers Commun"},{"key":"2062_CR22","doi-asserted-by":"crossref","unstructured":"Yadav DK, Sahu H, Ammanamanchi SG, Murali OM, Rana S, Chaudhary D (2023) Post Quantum Secure Blockchain Architecture for Data Dissemination. International Conference on Power Engineering and Intelligent Systems (PEIS). Springer Nature Singapore, Singapore, pp 105\u2013116","DOI":"10.1007\/978-981-99-7216-6_9"},{"key":"2062_CR23","doi-asserted-by":"crossref","unstructured":"El Haddouti S, El Kettani MD, Chaoui H (2024) Unveiling Blockchain Security and Resilience in the Quantum Age: An Analytical Study of Post-Quantum and Quantum Approaches. In: 2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet), IEEE, pp 1\u20138","DOI":"10.1109\/CommNet63022.2024.10793363"},{"key":"2062_CR24","doi-asserted-by":"crossref","unstructured":"Karakaya A, Ulu A (2023) A review on latest developments in post-quantum based secure blockchain systems. In: 2023 11th International Symposium on Digital Forensics and Security (ISDFS), IEEE, pp 1\u20136","DOI":"10.1109\/ISDFS58141.2023.10131840"},{"key":"2062_CR25","doi-asserted-by":"crossref","unstructured":"Khan WZ, Raza M, Imran M (2022) Quantum Cryptography a real threat to classical blockchain: requirements and challenges. Authorea Preprints","DOI":"10.36227\/techrxiv.21341817"},{"key":"2062_CR26","doi-asserted-by":"publisher","first-page":"584","DOI":"10.37394\/23203.2021.16.54","volume":"16","author":"S Sumathi","year":"2021","unstructured":"Sumathi S, Rajesh R (2021) Comparative study on TCP SYN flood DDoS attack detection: a machine learning algorithm-based approach. WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL 16:584\u2013591","journal-title":"WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL"},{"key":"2062_CR27","doi-asserted-by":"crossref","unstructured":"Mancer MH, Terrissa LS, Ayad S, Laouz H (2022) A blockchain-based approach to securing data in smart agriculture. In: 2022 International Symposium on iNnovative Informatics of Biskra (ISNIB), IEEE, pp 1\u20135","DOI":"10.1109\/ISNIB57382.2022.10075693"},{"key":"2062_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.102310","volume":"22","author":"K Taji","year":"2024","unstructured":"Taji K, Ghanimi F (2024) Enhancing security and privacy in smart agriculture: a novel homomorphic signcryption system. Results Eng 22:102310","journal-title":"Results Eng"},{"key":"2062_CR29","doi-asserted-by":"publisher","unstructured":"Yu HF, Mu WZ (2024) ABE-based postquantum cross-blockchain data exchange approach for smart agriculture. In: IEEE Transactions on Industrial Informatics 20(10):12083\u201312091. https:\/\/doi.org\/10.1109\/TII.2024.3413684","DOI":"10.1109\/TII.2024.3413684"},{"key":"2062_CR30","unstructured":"CICIDS-2017 dataset. Available at: https:\/\/www.kaggle.com\/datasets\/chethuhn\/network-intrusion-dataset. Accessed 10 Jan 2024"},{"key":"2062_CR31","unstructured":"The TON_IoT Datasets. Publically available at: https:\/\/research.unsw.edu.au\/projects\/toniot-datasets. Accessed 10 Jan 2024"},{"key":"2062_CR32","doi-asserted-by":"publisher","first-page":"9296","DOI":"10.1109\/ACCESS.2021.3050112","volume":"9","author":"Lu Wang","year":"2021","unstructured":"Wang Lu, Longqin Xu, Zheng Z, Liu S, Li X, Cao L, Li J, Sun C (2021) Smart contract-based agricultural food supply chain traceability. IEEE Access 9:9296\u20139307","journal-title":"IEEE Access"},{"key":"2062_CR33","doi-asserted-by":"publisher","unstructured":"Ganguly A, Dash D, Mohapatra P et al (2023) Empirical vulnerability analysis of automated smart contracts security testing on agricultural blockchains. PREPRINT (Version 1) available at Research Square https:\/\/doi.org\/10.21203\/rs.3.rs-3496298\/v1","DOI":"10.21203\/rs.3.rs-3496298\/v1"},{"issue":"3","key":"2062_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.58496\/MJCS\/2024\/012","volume":"4","author":"DH Tahayur","year":"2024","unstructured":"Tahayur DH, Al-Zubaidie M (2024) Enhancing electronic agriculture data security with a blockchain-based search method and e-signatures. Mesopot J CyberSec 4(3):1\u201321","journal-title":"Mesopot J CyberSec"},{"issue":"5","key":"2062_CR35","doi-asserted-by":"publisher","first-page":"053028","DOI":"10.1117\/1.JEI.26.5.053028","volume":"26","author":"Y Li","year":"2017","unstructured":"Li Y, Cao Z, Xiao Y, Cremers AB (2017) DeepCotton: in-field cotton seg-mentation using deep fully convolutional network. J Electron Imaging 26(5):053028","journal-title":"J Electron Imaging"},{"key":"2062_CR36","doi-asserted-by":"crossref","unstructured":"Nuriev M, Aygumov T, Zaripova R, Nikolaeva S, Gumerova G (2024) Evolving network systems through blockchain innovation for smart agriculture IoT networks. In: BIO Web of Conferences, vol. 138, p 02002. EDP Sciences","DOI":"10.1051\/bioconf\/202413802002"},{"issue":"43","key":"2062_CR37","doi-asserted-by":"publisher","first-page":"3890","DOI":"10.17485\/IJST\/v16i43.1718","volume":"16","author":"S Sumathi","year":"2023","unstructured":"Sumathi S, Rajesh R (2023) A Dynamic BPN-MLP Neural Network DDoS Detection Model Using Hybrid Swarm Intelligent Framework. Indian J Sci Technol 16(43):3890\u20133904","journal-title":"Indian J Sci Technol"},{"key":"2062_CR38","doi-asserted-by":"publisher","first-page":"107105","DOI":"10.1016\/j.compag.2022.107105","volume":"198","author":"M Gheisari","year":"2022","unstructured":"Gheisari M, Yaraziz MS, Alzubi JA, Fern\u00e1ndez-Campusano C, Feylizadeh MR, Pirasteh S, Abbasi AA, Liu Y, Lee CC (2022) An efficient cluster head selection for wireless sensor network-based smart agriculture systems. Comput Electron Agric 198:107105","journal-title":"Comput Electron Agric"},{"issue":"3","key":"2062_CR39","first-page":"1","volume":"16","author":"R Yadawad","year":"2024","unstructured":"Yadawad R, Kulkarni UP, Alzubi JA (2024) Auto-metric graph neural network for attack detection on IoT-based smart environment and secure data transmission using advanced wild horse standard encryption method. Int J Comput Netw Inf Secur 16(3):1\u201315","journal-title":"Int J Comput Netw Inf Secur"},{"key":"2062_CR40","volume":"66","author":"S Wang","year":"2022","unstructured":"Wang S, Li H, Chen J, Wang J, Deng Y (2022) DAG blockchain-based lightweight authentication and authorization scheme for IoT devices. J Inf Secur Appl 66:103134","journal-title":"J Inf Secur Appl"},{"key":"2062_CR41","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.future.2022.01.017","volume":"131","author":"N Deepa","year":"2022","unstructured":"Deepa N, Pham QV, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR, Maddikunta PK, Fang F, Pathirana PN (2022) A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener Comput Syst 131:209\u2013226","journal-title":"Future Gener Comput Syst"},{"key":"2062_CR42","unstructured":"Swathi P, Dragan B (2022) A survey on quantum-safe blockchain system. In: Proceedings of Annual Computer Security Applications Conference (ACSAC) (Vol 1, No. 1). Association for Computing Machinery"},{"key":"2062_CR43","doi-asserted-by":"crossref","unstructured":"Aouedi O, Vu TH, Sacco A, Nguyen DC, Piamrat K, Marchetto G, Pham QV (2024) A survey on intelligent Internet of Things: applications, security, privacy, and future directions. IEEE communications surveys & tutorials","DOI":"10.1109\/COMST.2024.3430368"},{"issue":"6","key":"2062_CR44","doi-asserted-by":"publisher","first-page":"7689","DOI":"10.1109\/TII.2022.3213603","volume":"19","author":"L Tan","year":"2022","unstructured":"Tan L, Kuang Z, Gao J, Zhao L (2022) Energy-efficient collaborative multi-access edge computing via deep reinforcement learning. IEEE Trans Ind Inf 19(6):7689\u20137699","journal-title":"IEEE Trans Ind Inf"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02062-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02062-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02062-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:43Z","timestamp":1760683183000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02062-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2062"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02062-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"8 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"276"}}