{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T09:30:28Z","timestamp":1769938228825,"version":"3.49.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02083-9","type":"journal-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T14:21:30Z","timestamp":1756218090000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient blockchain-based mutual remote authentication for enhancing privacy and security in cloud internet of things environment"],"prefix":"10.1007","volume":"18","author":[{"given":"Attiq Ur","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Songfeng","family":"lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5307-9582","authenticated-orcid":false,"given":"Md Belal Bin","family":"Heyat","sequence":"additional","affiliation":[]},{"given":"Mohd Ammar Bin","family":"Hayat","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9926-4150","authenticated-orcid":false,"given":"Faijan","family":"Akhtar","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Usman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9092-1708","authenticated-orcid":false,"given":"Rashid","family":"Abbasi","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Abdullah Y.","family":"Muaad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,26]]},"reference":[{"issue":"3","key":"2083_CR1","doi-asserted-by":"publisher","first-page":"4118","DOI":"10.1109\/JIOT.2018.2875544","volume":"6","author":"B Omoniwa","year":"2019","unstructured":"Omoniwa B, Hussain R, Javed MA, Bouk SH, Malik SA (2019) Fog\/edge computing-based IoT (FECIoT): architecture, applications, and research issues. IEEE Internet Things J 6(3):4118\u20134149. https:\/\/doi.org\/10.1109\/JIOT.2018.2875544","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2083_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MIE.2017.2788850","volume":"12","author":"B Cheng","year":"2018","unstructured":"Cheng B, Zhang J, Hancke GP, Karnouskos S, Colombo AW (2018) Industrial cyberphysical systems: realizing Cloud-Based big data infrastructures. IEEE Ind Electron Mag 12(1):25\u201335. https:\/\/doi.org\/10.1109\/MIE.2017.2788850","journal-title":"IEEE Ind Electron Mag"},{"key":"2083_CR3","doi-asserted-by":"publisher","unstructured":"Pathak M, Mishra KN, Singh SP (Oct. 2024) Data security and privacy preservation in Cloud-Based IoT technologies: an analysis of risks and the creation of robust countermeasures. Recent Adv Comput Sci Commun 18. https:\/\/doi.org\/10.2174\/0126662558319054241003054922","DOI":"10.2174\/0126662558319054241003054922"},{"issue":"12","key":"2083_CR4","doi-asserted-by":"publisher","first-page":"11037","DOI":"10.1002\/int.23032","volume":"37","author":"A Dahiya","year":"2022","unstructured":"Dahiya A, Gupta BB, Alhalabi W, Ulrichd K (2022) A comprehensive analysis of blockchain and its applications in intelligent systems based on iot, cloud and social media. Int J Intell Syst 37(12):11037\u201311077. https:\/\/doi.org\/10.1002\/int.23032","journal-title":"Int J Intell Syst"},{"key":"2083_CR5","unstructured":"Pathak M, Mishra K S. S.-R. A. in Computer, and undefined (2024), Data Security and Privacy Preservation in Cloud-Based IoT Technologies: an Analysis of Risks and the Creation of Robust Countermeasures, benthamdirect.com"},{"key":"2083_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.448","author":"M Ataullah","year":"2024","unstructured":"Ataullah M, Chauhan N (2024) Exploring security and privacy enhancement technologies in the internet of things: A comprehensive review. Secur Priv. https:\/\/doi.org\/10.1002\/spy2.448","journal-title":"Secur Priv"},{"key":"2083_CR7","doi-asserted-by":"publisher","unstructured":"Elghaish F et al (2021) Blockchain and the \u2018internet of things\u2019\u2019 for the construction industry: research trends and opportunities\u2019. Autom Constr 132. https:\/\/doi.org\/10.1016\/j.autcon.2021.103942","DOI":"10.1016\/j.autcon.2021.103942"},{"key":"2083_CR8","doi-asserted-by":"publisher","unstructured":"Wu X, Zou B, Lu C, Wang L, Zhang Y, Wang H (2025) Dynamic Security Computing Framework With Zero Trust Based on Privacy Domain Prevention and Control Theory, IEEE J. Sel. Areas Commun., vol. 43, no. 6, pp. 2266\u20132278, Jun. https:\/\/doi.org\/10.1109\/JSAC.2025.3560036","DOI":"10.1109\/JSAC.2025.3560036"},{"key":"2083_CR9","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","volume":"102","author":"SN Mohanty","year":"2020","unstructured":"Mohanty SN et al (2020) An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Futur Gener Comput Syst 102:1027\u20131037. https:\/\/doi.org\/10.1016\/j.future.2019.09.050","journal-title":"Futur Gener Comput Syst"},{"key":"2083_CR10","doi-asserted-by":"publisher","unstructured":"Gugueoth V, Safavat S, Shetty S, Rawat D (2023) A review of IoT security and privacy using decentralized blockchain techniques. Comput Sci Rev 50. https:\/\/doi.org\/10.1016\/j.cosrev.2023.100585","DOI":"10.1016\/j.cosrev.2023.100585"},{"key":"2083_CR11","doi-asserted-by":"publisher","unstructured":"Muaad AY, Raza S, Bin Heyat MB, Alabrah A, Hanumanthappa J (2024) An Intelligent COVID-19-Related Arabic Text Detection Framework Based on Transfer Learning Using Context Representation, Int. J. Intell. Syst., vol. pp. 1\u201315, May 2024. https:\/\/doi.org\/10.1155\/2024\/8014111","DOI":"10.1155\/2024\/8014111"},{"key":"2083_CR12","doi-asserted-by":"publisher","unstructured":"Velmurugan S, Prakash M, Neelakandan S, Martinson EO (2024) An Efficient Secure Sharing of Electronic Health Records Using IoT-Based Hyperledger Blockchain, Int. J. Intell. Syst., vol. pp. 1\u201316, Mar. 2024. https:\/\/doi.org\/10.1155\/2024\/6995202","DOI":"10.1155\/2024\/6995202"},{"key":"2083_CR13","doi-asserted-by":"publisher","unstructured":"Rehman AU et al (Jan. 2025) Internet of things in healthcare research: trends, innovations, security considerations, challenges and future strategy. Int J Intell Syst 2025(1). https:\/\/doi.org\/10.1155\/int\/8546245","DOI":"10.1155\/int\/8546245"},{"key":"2083_CR14","doi-asserted-by":"publisher","unstructured":"Bin Heyat MB et al (2025) Intelligent internet of medical things for depression: current advancements, challenges, and trends. Int J Intell Syst 2025(1). https:\/\/doi.org\/10.1155\/int\/6801530","DOI":"10.1155\/int\/6801530"},{"issue":"4","key":"2083_CR15","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1109\/COMST.2023.3323640","volume":"25","author":"S Khan","year":"2023","unstructured":"Khan S et al (2023) A survey on X.509 Public-Key infrastructure, certificate revocation, and their modern implementation on blockchain and Ledger technologies. IEEE Commun Surv Tutorials 25(4):2529\u20132568. https:\/\/doi.org\/10.1109\/COMST.2023.3323640","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2083_CR16","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13786","author":"I Ahmed","year":"2024","unstructured":"Ahmed I, Ahmad M, Ghazouani H, Barhoumi W, Jeon G (2024) Intelligent computing for crop monitoring in ciot: leveraging AI and big data technologies. Expert Syst Feb. https:\/\/doi.org\/10.1111\/exsy.13786","journal-title":"Expert Syst Feb"},{"key":"2083_CR17","doi-asserted-by":"publisher","unstructured":"Firouzi F, Farahani B, Marin\u0161ek A (2022) The convergence and interplay of edge, fog, and cloud in the AI-driven internet of things (IoT). Inf Syst 107. https:\/\/doi.org\/10.1016\/j.is.2021.101840","DOI":"10.1016\/j.is.2021.101840"},{"key":"2083_CR18","doi-asserted-by":"crossref","unstructured":"Dhatterwal J, Malik K K. K.-I. of T. (CIoT), undefined (2025), K. K.-I. in Blockchain, and undefined 2025, Blockchain-Based Identity Management for Secure CIoT Interactions, igi-global.com","DOI":"10.4018\/979-8-3693-2157-7.ch003"},{"key":"2083_CR19","doi-asserted-by":"crossref","unstructured":"J. Dhatterwal, K. Kaswan,\u2026 K. M.-I. in B., undefined (2025), K. M.-\u2026 I. of T. (CIoT),and undefined 2025, Decentralized Data Management for CIoT Using Blockchain Technology,igi-global.com","DOI":"10.4018\/979-8-3693-2157-7.ch008"},{"key":"2083_CR20","doi-asserted-by":"publisher","unstructured":"Kaswan KS, Dhatterwal JS, Malik K, Sharma M (2024) Smart Contracts in CIoT, in igi-global.com, pp. 315\u2013340. https:\/\/doi.org\/10.4018\/979-8-3693-2157-7.ch011","DOI":"10.4018\/979-8-3693-2157-7.ch011"},{"key":"2083_CR21","doi-asserted-by":"crossref","unstructured":"Kaswan K, Dhatterwal J K. M.-I. of T. (CIoT), undefined (2025), K. M.-I. in Blockchain, and undefined 2025, AI Predictive Maintenance in CIoT Using Blockchain, igi-global.com","DOI":"10.4018\/979-8-3693-2157-7.ch013"},{"key":"2083_CR22","doi-asserted-by":"publisher","unstructured":"Akhtar F et al (2019) Potential of Blockchain Technology in Digital Currency: A Review, in., 16th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2019, Chengdu, Sichuan, China: IEEE, 2019, pp. 85\u201391. https:\/\/doi.org\/10.1109\/ICCWAMTIP47768.2019.9067546","DOI":"10.1109\/ICCWAMTIP47768.2019.9067546"},{"key":"2083_CR23","doi-asserted-by":"publisher","unstructured":"Bin Heyat MB et al (2022) Wearable flexible electronics based cardiac electrode for researcher mental stress detection system using machine learning models on single lead electrocardiogram signal. Biosensors 12(6):427. https:\/\/doi.org\/10.3390\/bios12060427","DOI":"10.3390\/bios12060427"},{"key":"2083_CR24","doi-asserted-by":"publisher","unstructured":"Pal R et al (2022) A Novel Smart Belt for Anxiety Detection, Classification, and Reduction Using IIoMT on Students\u2019 Cardiac Signal and MSY, Bioengineering, vol. 9, no. 12, p. 793, Dec. https:\/\/doi.org\/10.3390\/bioengineering9120793","DOI":"10.3390\/bioengineering9120793"},{"key":"2083_CR25","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13544","author":"S Selvarajan","year":"2024","unstructured":"Selvarajan S, Shankar A, Uddin M, Alqahtani AS, Al-Shehari T, Viriyasitavat W (2024) A smart decentralized identifiable distributed Ledger technology-based blockchain (DIDLT-BC) model for cloud-IoT security. Expert Syst. https:\/\/doi.org\/10.1111\/exsy.13544","journal-title":"Expert Syst"},{"key":"2083_CR26","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292\u20132303. https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339","journal-title":"IEEE Access"},{"key":"2083_CR27","doi-asserted-by":"publisher","unstructured":"Kosinski M, Stillwell D, Graepel T (2013) Private traits and attributes are predictable from digital records of human behavior, Proc. Natl. Acad. Sci. U. S. A., vol. 110, no. 15, pp. 5802\u20135805. https:\/\/doi.org\/10.1073\/pnas.1218772110","DOI":"10.1073\/pnas.1218772110"},{"key":"2083_CR28","doi-asserted-by":"publisher","unstructured":"Kumar V, Ali R, Sharma PK (2024) IoV-6G+: A secure blockchain-based data collection and sharing framework for internet of vehicles in 6G-assisted environment. Veh Commun 47. https:\/\/doi.org\/10.1016\/j.vehcom.2024.100783","DOI":"10.1016\/j.vehcom.2024.100783"},{"key":"2083_CR29","doi-asserted-by":"publisher","unstructured":"Liao Y, Tang Z, Gao K, Trik M (2024) Optimization of resources in intelligent electronic health systems based on internet of things to predict heart diseases via artificial neural network. Heliyon 10(11). https:\/\/doi.org\/10.1016\/j.heliyon.2024.e32090","DOI":"10.1016\/j.heliyon.2024.e32090"},{"key":"2083_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18931-4","author":"AC R","year":"2024","unstructured":"R AC, Pani AK, Kumar P (2024) Blockchain-enabled smart contracts and the internet of things: advancing the research agenda through a narrative review. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18931-4","journal-title":"Multimed Tools Appl"},{"key":"2083_CR31","doi-asserted-by":"crossref","unstructured":"Singh R, Gupta A, Research PM-DLT, (2024) undefined A Systematic Literature Review on Blockchain-based Smart Contracts: Platforms, Applications, and Challenges, dl.acm.org","DOI":"10.1145\/3704741"},{"key":"2083_CR32","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-981-97-3588-4_39","volume":"1020 LNNS","author":"V Kumar","year":"2024","unstructured":"Kumar V, Ali R, Sharma PK (2024) A secure Multi-factor authentication framework for IoT-Environment using cloud computing. Lect Notes Networks Syst 1020 LNNS:477\u2013494. https:\/\/doi.org\/10.1007\/978-981-97-3588-4_39","journal-title":"Lect Notes Networks Syst"},{"key":"2083_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDECS59733.2023.10503046","author":"N Suresh Kumar","year":"2024","unstructured":"Suresh Kumar N, Dolly S, Brinthakumari, Partheeban N (2024) Navigating the blockchain landscape with a comprehensive survey of smart contracts, ethereum, and consensus mechanisms. IEEE Int Conf Data Eng Commun Syst ICDECS 2024. https:\/\/doi.org\/10.1109\/ICDECS59733.2023.10503046","journal-title":"IEEE Int Conf Data Eng Commun Syst ICDECS 2024"},{"key":"2083_CR34","doi-asserted-by":"publisher","unstructured":"Javadpour A, Sangaiah AK, Zhang W, Vidyarthi A, Ahmadi HR (2024) Decentralized AI-Based task distribution on blockchain for cloud industrial internet of things. J Grid Comput 22(1). https:\/\/doi.org\/10.1007\/s10723-024-09751-9","DOI":"10.1007\/s10723-024-09751-9"},{"key":"2083_CR35","doi-asserted-by":"publisher","unstructured":"Kumar V, Ali R, Sharma PK (2024) IoEPM+: A secured and lightweight 6G-enabled pollution monitoring authentication framework using IoT and blockchain technology. Comput Networks 250. https:\/\/doi.org\/10.1016\/j.comnet.2024.110554","DOI":"10.1016\/j.comnet.2024.110554"},{"key":"2083_CR36","unstructured":"Dorri A, Kanhere SS, Jurdak R (2016) Blockchain in internet of things: Challenges and Solutions, Aug. [Online]. Available: http:\/\/arxiv.org\/abs\/1608.05187"},{"key":"2083_CR37","doi-asserted-by":"publisher","unstructured":"Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telemat Inf 36:55\u201381. https:\/\/doi.org\/10.1016\/j.tele.2018.11.006","DOI":"10.1016\/j.tele.2018.11.006"},{"issue":"1","key":"2083_CR38","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s00607-023-01216-3","volume":"106","author":"Z Shamsa","year":"2024","unstructured":"Shamsa Z, Rezaee A, Adabi S, Rahmani AM (2024) A decentralized prediction-based workflow load balancing architecture for cloud\/fog\/iot environments. Computing 106(1):201\u2013239. https:\/\/doi.org\/10.1007\/s00607-023-01216-3","journal-title":"Computing"},{"key":"2083_CR39","doi-asserted-by":"publisher","unstructured":"Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) FairAccess: a new Blockchain-based access control framework for the Internet of Things, Secur. Commun. Networks, vol. 9, no. 18, pp. 5943\u20135964, Dec. https:\/\/doi.org\/10.1002\/sec.1748","DOI":"10.1002\/sec.1748"},{"key":"2083_CR40","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput Secur 78:126\u2013142. https:\/\/doi.org\/10.1016\/j.cose.2018.06.004","journal-title":"Comput Secur"},{"key":"2083_CR41","doi-asserted-by":"publisher","unstructured":"Sharma N, Dhiman P (2025) A survey on IoT security: challenges and their solutions using machine learning and blockchain technology. Cluster Comput 28(5):313. https:\/\/doi.org\/10.1007\/s10586-025-05208-0","DOI":"10.1007\/s10586-025-05208-0"},{"key":"2083_CR42","doi-asserted-by":"publisher","unstructured":"Wang K et al (2024) A blockchain-based publicly verifiable data access control scheme without pairing. Comput Electr Eng 120:109724. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109724","DOI":"10.1016\/j.compeleceng.2024.109724"},{"key":"2083_CR43","doi-asserted-by":"publisher","unstructured":"Velmurugan S, Prakash M, Neelakandan S, Radhakrishnan A (2024) Provably secure data selective sharing scheme with cloud-based decentralized trust management systems. J Cloud Comput 13(1). https:\/\/doi.org\/10.1186\/s13677-024-00634-8","DOI":"10.1186\/s13677-024-00634-8"},{"issue":"1","key":"2083_CR44","doi-asserted-by":"publisher","first-page":"3098","DOI":"10.1109\/TCE.2024.3367494","volume":"70","author":"S Xu","year":"2024","unstructured":"Xu S, Xia H, Xu L, Zhang R, Hu C (2024) MIGAN: A privacy leakage evaluation scheme for CIoT-Based federated learning users. IEEE Trans Consum Electron 70(1):3098\u20133110. https:\/\/doi.org\/10.1109\/TCE.2024.3367494","journal-title":"IEEE Trans Consum Electron"},{"key":"2083_CR45","doi-asserted-by":"publisher","unstructured":"Sharma N, Dhiman P (2025) Design of secure and unique addressing with mutual authentication scheme in IoT networks. Peer-to-Peer Netw Appl 18(1):1\u201318. https:\/\/doi.org\/10.1007\/s12083-024-01882-w","DOI":"10.1007\/s12083-024-01882-w"},{"key":"2083_CR46","unstructured":"Moinet A, Darties B, Baril J-L (2017) Blockchain based trust & authentication for decentralized sensor networks, Jun. [Online]. Available: http:\/\/arxiv.org\/abs\/1706.01730"},{"key":"2083_CR47","doi-asserted-by":"publisher","unstructured":"Narayanan U, Paul V, Joseph S (2022) Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec. J Ambient Intell Humaniz Comput 13(2):769\u2013787. https:\/\/doi.org\/10.1007\/s12652-021-02929-z","DOI":"10.1007\/s12652-021-02929-z"},{"key":"2083_CR48","doi-asserted-by":"publisher","unstructured":"Adjeroud I, Cherbal S, Benrebbouh C, Baaraoui H (2024) Authentication scheme based on blockchain and Proof-of-Work for IoT, PAIS 2024 - Proc. 6th Int. Conf. Pattern Anal. Intell. Syst., https:\/\/doi.org\/10.1109\/PAIS62114.2024.10541147","DOI":"10.1109\/PAIS62114.2024.10541147"},{"key":"2083_CR49","doi-asserted-by":"publisher","unstructured":"Khalid U, Asim M, Baker T, Hung PCK, Tariq MA, Rafferty L (2020) A decentralized lightweight blockchain-based authentication mechanism for IoT systems, Cluster Comput., vol. 23, no. 3, pp. 2067\u20132087, Sep. https:\/\/doi.org\/10.1007\/s10586-020-03058-6","DOI":"10.1007\/s10586-020-03058-6"},{"issue":"14","key":"2083_CR50","doi-asserted-by":"publisher","first-page":"25394","DOI":"10.1109\/JIOT.2024.3396488","volume":"11","author":"CM Chen","year":"2024","unstructured":"Chen CM, Chen Z, Kumari S, Obaidat MS, Rodrigues JJPC, Khan MK (2024) Blockchain-Based mutual authentication protocol for IoT-Enabled decentralized healthcare environment. IEEE Internet Things J 11(14):25394\u201325412. https:\/\/doi.org\/10.1109\/JIOT.2024.3396488","journal-title":"IEEE Internet Things J"},{"key":"2083_CR51","doi-asserted-by":"publisher","first-page":"175","DOI":"10.3233\/APC210138","volume":"39","author":"R Pavithra","year":"2021","unstructured":"Pavithra R, Prathiksha S, Shruthi SG, Bhanumathi M (2021) A new approach for security in cloud data storage for Iot applications using hybrid cryptography technique. Adv Parallel Comput 39:175\u2013182. https:\/\/doi.org\/10.3233\/APC210138","journal-title":"Adv Parallel Comput"},{"key":"2083_CR52","doi-asserted-by":"publisher","unstructured":"Jamil F, Hang L, Kim KH, Kim DH (2019) A novel medical blockchain model for drug supply chain integrity management in a smart hospital. Electron 8(5). https:\/\/doi.org\/10.3390\/electronics8050505","DOI":"10.3390\/electronics8050505"},{"key":"2083_CR53","doi-asserted-by":"publisher","unstructured":"Sharma N, Dhiman P (2024) A secure addressing mutual authentication scheme for smart IoT home network. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-19898-y","DOI":"10.1007\/s11042-024-19898-y"},{"key":"2083_CR54","doi-asserted-by":"publisher","unstructured":"Sharma N, Dhiman P (2023) Lightweight Privacy Preserving Scheme for IoT based Smart Home, Recent Adv. Electr. Electron. Eng. (Formerly Recent Patents Electr. Electron. Eng., vol. 17, no. 8, pp. 763\u2013777, Oct. https:\/\/doi.org\/10.2174\/0123520965267339230928061410","DOI":"10.2174\/0123520965267339230928061410"},{"issue":"1","key":"2083_CR55","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TCSS.2021.3056540","volume":"9","author":"G Cheng","year":"2022","unstructured":"Cheng G, Chen Y, Deng S, Gao H, Yin J (2022) A Blockchain-Based mutual authentication scheme for collaborative edge computing. IEEE Trans Comput Soc Syst 9(1):146\u2013158. https:\/\/doi.org\/10.1109\/TCSS.2021.3056540","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"5","key":"2083_CR56","doi-asserted-by":"publisher","first-page":"5897","DOI":"10.1109\/TMC.2023.3315510","volume":"23","author":"BD Deebak","year":"2024","unstructured":"Deebak BD, Hwang SO (2024) Healthcare applications using blockchain with a Cloud-Assisted decentralized Privacy-Preserving framework. IEEE Trans Mob Comput 23(5):5897\u20135916. https:\/\/doi.org\/10.1109\/TMC.2023.3315510","journal-title":"IEEE Trans Mob Comput"},{"key":"2083_CR57","doi-asserted-by":"publisher","unstructured":"Yang T, Zhai F, Xu HQ, Li W (2022) Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs, Energy Reports, vol. 8, pp. 1200\u20131211, Jul. https:\/\/doi.org\/10.1016\/j.egyr.2022.02.061","DOI":"10.1016\/j.egyr.2022.02.061"},{"issue":"6","key":"2083_CR58","doi-asserted-by":"publisher","first-page":"10551","DOI":"10.1109\/JIOT.2023.3326547","volume":"11","author":"C Narmatha","year":"2024","unstructured":"Narmatha C, Manimurugan S, Karthikeyan P (2024) A smart CIoT with secure healthcare framework using optimized deep recuperator neural network long Short-Term memory. IEEE Internet Things J 11(6):10551\u201310562. https:\/\/doi.org\/10.1109\/JIOT.2023.3326547","journal-title":"IEEE Internet Things J"},{"key":"2083_CR59","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1109\/TCSS.2019.2924054","volume":"6","author":"S Zhao","year":"2019","unstructured":"Zhao S, Li S, Yao Y (2019) Blockchain enabled industrial internet of things technology. IEEE Trans Comput Soc Syst 6:1442\u20131453. https:\/\/doi.org\/10.1109\/TCSS.2019.2924054","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2083_CR60","doi-asserted-by":"publisher","unstructured":"Sun G, Liao D, Zhao D, Xu Z, Yu H (2018) Live Migration for Multiple Correlated Virtual Machines in Cloud-Based Data Centers, IEEE Trans. Serv. Comput., vol. 11, no. 2, pp. 279\u2013291, Mar. https:\/\/doi.org\/10.1109\/TSC.2015.2477825","DOI":"10.1109\/TSC.2015.2477825"},{"key":"2083_CR61","doi-asserted-by":"publisher","unstructured":"Zhang M, Wei E, Berry R, Huang J (2024) Age-Dependent differential privacy. IEEE Trans Inf Theory 70(2):1300\u20131319. https:\/\/doi.org\/10.1109\/TIT.2023.3340147","DOI":"10.1109\/TIT.2023.3340147"},{"key":"2083_CR62","doi-asserted-by":"publisher","unstructured":"Xu F, Yang H-C, Alouini M-S (2022) Energy Consumption Minimization for Data Collection From Wirelessly-Powered IoT Sensors: Session-Specific Optimal Design With DRL, IEEE Sens. J., vol. 22, no. 20, pp. 19886\u201319896, Oct. https:\/\/doi.org\/10.1109\/JSEN.2022.3205017","DOI":"10.1109\/JSEN.2022.3205017"},{"key":"2083_CR63","doi-asserted-by":"publisher","unstructured":"Luo H, Sun G, Chi C, Yu H, Guizani M (2025) Convergence of Symbiotic Communications and Blockchain for Sustainable and Trustworthy 6G Wireless Networks, IEEE Wirel. Commun., vol. 32, no. 2, pp. 18\u201325, Apr. https:\/\/doi.org\/10.1109\/MWC.001.2400245","DOI":"10.1109\/MWC.001.2400245"},{"key":"2083_CR64","doi-asserted-by":"publisher","unstructured":"Luo H, Zhang Q, Sun G, Yu H, Niyato D (2024) Symbiotic Blockchain Consensus: Cognitive Backscatter Communications-Enabled Wireless Blockchain Consensus, IEEE\/ACM Trans. Netw., vol. 32, no. 6, pp. 5372\u20135387, Dec. https:\/\/doi.org\/10.1109\/TNET.2024.3462539","DOI":"10.1109\/TNET.2024.3462539"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02083-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02083-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02083-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:40Z","timestamp":1760683180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02083-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":64,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2083"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02083-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,26]]},"assertion":[{"value":"5 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"275"}}