{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T06:52:24Z","timestamp":1773903144437,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02085-7","type":"journal-article","created":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:59:59Z","timestamp":1755849599000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing security and privacy in AI-driven industrial IoT with blockchain integration"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9988-7590","authenticated-orcid":false,"given":"Rishita","family":"Verma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0669-1933","authenticated-orcid":false,"given":"Gaurav","family":"Indra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,22]]},"reference":[{"key":"2085_CR1","doi-asserted-by":"publisher","unstructured":"A. Behravan et al\u00a0(2022) Introducing sensing into future wireless communication systems. In: 2022 2nd IEEE International Symposium on Joint Communications & Sensing (JC&S), Seefeld, Austria, pp 1\u20135. https:\/\/doi.org\/10.1109\/JCS54387.2022.9743513","DOI":"10.1109\/JCS54387.2022.9743513"},{"key":"2085_CR2","doi-asserted-by":"publisher","first-page":"66374","DOI":"10.1109\/ACCESS.2022.3185049","volume":"10","author":"M Alabadi","year":"2022","unstructured":"Alabadi M, Habbal A, Wei X (2022) Industrial Internet of Things: Requirements, Architecture, Challenges, and Future Research Directions. IEEE Access 10:66374\u201366400. https:\/\/doi.org\/10.1109\/ACCESS.2022.3185049","journal-title":"IEEE Access"},{"key":"2085_CR3","doi-asserted-by":"publisher","unstructured":"R. Anusha, S. N, V. S. Shetty and S. B. K, (2022) \"Analysis and Comparison of Symmetric Key Cryptographic Algorithms on FPGA,\" 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 293\u2013300. https:\/\/doi.org\/10.1109\/ICSSIT53264.2022.9716416.","DOI":"10.1109\/ICSSIT53264.2022.9716416"},{"key":"2085_CR4","doi-asserted-by":"publisher","unstructured":"Z. Meng and Y. Wang, (2022) \"Asymmetric Encryption Algorithms: Primitives and Applications,\" 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI), Changchun, China, 876\u2013881. https:\/\/doi.org\/10.1109\/ICETCI55101.2022.9832032.","DOI":"10.1109\/ICETCI55101.2022.9832032"},{"key":"2085_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.comcom.2019.01.006","volume":"136","author":"X Wang","year":"2019","unstructured":"Wang X, Zha X, Ni W, Liu RP, Guo YJ, Niu X, Zheng K (2019) Survey on Blockchain for Internet of Things. Comput Commun 136:10\u201329","journal-title":"Comput Commun"},{"issue":"2","key":"2085_CR6","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","volume":"21","author":"MS Ali","year":"2019","unstructured":"Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2019) Applications of Blockchains in the Internet of Things: A Comprehensive Survey. IEEE Commun Surv Tutor 21(2):1676\u20131717","journal-title":"IEEE Commun Surv Tutor"},{"issue":"6","key":"2085_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/3359982","volume":"52","author":"Q Zhu","year":"2019","unstructured":"Zhu Q, Loke SW, Trujillo-Rasua R, Jiang F, Xiang Y (2019) Applications of Distributed Ledger Technologies to the Internet of Things: A Survey. CM Comput Surv 52(6):120. https:\/\/doi.org\/10.1145\/3359982","journal-title":"CM Comput Surv"},{"key":"2085_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1155\/2021\/5547530","volume":"5547530","author":"R Duan","year":"2021","unstructured":"Duan R, Guo L (2021) Application of Blockchain for Internet of Things: A Bibliometric Analysis. Math Probl Eng 5547530:16. https:\/\/doi.org\/10.1155\/2021\/5547530","journal-title":"Math Probl Eng"},{"key":"2085_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1155\/2022\/8996629","volume":"8996629","author":"KA Al-Dhlan","year":"2022","unstructured":"Al-Dhlan KA, Alreshidi HA, Pervez S, Paraveen Z, Zeki AM, Sid Ahmed NMO, Alshammari EJ, Lingamuthu V (2022) Customizable Encryption Algorithms to Manage Data Assets Based on Blockchain Technology in Smart City. Math Prob Eng 8996629:8. https:\/\/doi.org\/10.1155\/2022\/8996629","journal-title":"Math Prob Eng"},{"key":"2085_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1155\/2021\/9954599","volume":"9954599","author":"J Zhang","year":"2021","unstructured":"Zhang J, Wu M (2021) Blockchain-Based Authentication with Optional Privacy Preservation for Internet of Vehicles. Math Prob Eng 9954599:13. https:\/\/doi.org\/10.1155\/2021\/9954599","journal-title":"Math Prob Eng"},{"key":"2085_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1155\/2022\/9679050","volume":"9679050","author":"DA Rizwan","year":"2022","unstructured":"Rizwan DA, Karras J, Kumar M, S\u00e1nchez-Chero MM, Taboada GC, Altamirano, (2022) An Internet of Things (IoT) Based Block Chain Technology to Enhance the Quality of Supply Chain Management (SCM). Math Prob Eng 9679050:12. https:\/\/doi.org\/10.1155\/2022\/9679050","journal-title":"Math Prob Eng"},{"key":"2085_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1155\/2022\/3162871","volume":"3162871","author":"Q Zhang","year":"2022","unstructured":"Zhang Q (2022) Analysis of Agricultural Products Supply Chain Traceability System Based on Internet of Things and Blockchain. Math Probl Eng 3162871:9. https:\/\/doi.org\/10.1155\/2022\/3162871","journal-title":"Math Probl Eng"},{"issue":"6","key":"2085_CR13","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1109\/TII.2019.2897805","volume":"15","author":"M Liu","year":"2019","unstructured":"Liu M, Yu FR, Teng Y, Leung VCM, Song M (June2019) Performance Optimization for Blockchain-Enabled Industrial Internet of Things (IIoT) Systems: A Deep Reinforcement Learning Approach. IEEE Trans Industr Inf 15(6):3559\u20133570","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"2085_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/3372136","volume":"53","author":"L Lao","year":"2020","unstructured":"Lao L, Li Z, Hou S, Xiao B, Guo S, Yang Y (2020) A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling. ACM Comput Surv 53(1):18. https:\/\/doi.org\/10.1145\/3372136","journal-title":"ACM Comput Surv"},{"issue":"1","key":"2085_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du X, Xiao Y, Guizani MM, Chen HH (2007) An effective key management scheme for heterogeneous sensor networks. Ad Hoc Net 5(1):24\u201334","journal-title":"Ad Hoc Net"},{"issue":"2","key":"2085_CR16","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.jpdc.2012.10.004","volume":"73","author":"Q Shi","year":"2013","unstructured":"Shi Q, Zhang N, Merabti M, Kifayat K (2013) Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J Parall Distribut Comput 73(2):235\u2013249","journal-title":"J Parall Distribut Comput"},{"issue":"4","key":"2085_CR17","doi-asserted-by":"publisher","first-page":"3057","DOI":"10.1007\/s11277-015-2582-0","volume":"83","author":"W Yao","year":"2015","unstructured":"Yao W, Han S, Li X (2015) LKH++ based group key management scheme for wireless sensor network. Wireless Pers Commun 83(4):3057\u20133073","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"2085_CR18","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11277-016-3281-1","volume":"89","author":"CC Chang","year":"2016","unstructured":"Chang CC, Hsueh WY, Cheng TF (2016) A dynamic user authentication and key agreement scheme for heterogeneous wireless sensor networks. Wireless Pers Commun 89(2):447\u2013465","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"2085_CR19","doi-asserted-by":"publisher","first-page":"670","DOI":"10.3390\/s17040670","volume":"17","author":"Z Mahmood","year":"2017","unstructured":"Mahmood Z, Ning H, Ghafoor A (2017) A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors 17(4):670\u2013690","journal-title":"Sensors"},{"issue":"2","key":"2085_CR20","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIFS.2014.2375555","volume":"10","author":"S Seo","year":"2015","unstructured":"Seo S, Won J, Sultana S, Bertino E (2015) Effective Key Management in Dynamic Wireless Sensor Networks. IEEE Trans Inf Forensics Secur 10(2):371\u2013383. https:\/\/doi.org\/10.1109\/TIFS.2014.2375555","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"2085_CR21","doi-asserted-by":"publisher","first-page":"6193","DOI":"10.1109\/TII.2020.2965975","volume":"16","author":"Y Tian","year":"2020","unstructured":"Tian Y, Wang Z, Xiong J, Ma J (2020) A Blockchain-Based Secure Key Management Scheme with Trustworthiness in DWSNs. IEEE Trans Industr Inf 16(9):6193\u20136202. https:\/\/doi.org\/10.1109\/TII.2020.2965975","journal-title":"IEEE Trans Industr Inf"},{"key":"2085_CR22","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2017.10.026","volume":"92","author":"S Athmani","year":"2019","unstructured":"Athmani S, Bilami A, Boubiche DE (2019) EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Futur Gener Comput Syst 92:789\u2013799","journal-title":"Futur Gener Comput Syst"},{"key":"2085_CR23","doi-asserted-by":"publisher","unstructured":"Khan, B. U. I., Ahmad, M., Shah, Z., Alam, M., Tariq, M., (2024) \"Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions\". Information, 15(2). https:\/\/doi.org\/10.3390\/info15020212","DOI":"10.3390\/info15020212"},{"key":"2085_CR24","doi-asserted-by":"publisher","unstructured":"Khan, B. U. I., Alam, M., Ahmad, M., Shah, Z., Tariq, M., (2024) \"Integrating AI and Blockchain for Enhanced Data Security in IoT-Driven Smart Cities\" . Processes, 12(18). https:\/\/doi.org\/10.3390\/pr12181825","DOI":"10.3390\/pr12181825"},{"key":"2085_CR25","doi-asserted-by":"publisher","unstructured":"Khan, B. U. I., Alam, M., Shah, Z., Ahmad, M., Tariq, M., (2025) \"Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain\" Symmetry, 17(6). https:\/\/doi.org\/10.3390\/sym17060061","DOI":"10.3390\/sym17060061"},{"key":"2085_CR26","doi-asserted-by":"crossref","unstructured":"Duan, S., Zhang, H., Ma, Y., Han, Z., (2024) \"MOTO: Mobility-Aware Online Task Offloading With Adaptive Load Balancing in Small-Cell MEC,\" IEEE Transactions on Mobile Computing","DOI":"10.1109\/TMC.2022.3220720"},{"key":"2085_CR27","doi-asserted-by":"crossref","unstructured":"Lu, H., Zhang, Y., Liu, Z., Wang, H., (2024) \"CODE+: Fast and Accurate Inference for Compact Distributed IoT Data Collection,\" IEEE Transactions on Parallel and Distributed Systems","DOI":"10.1109\/TPDS.2024.3453607"},{"key":"2085_CR28","doi-asserted-by":"crossref","unstructured":"Lu, H., Zhang, Y., Liu, Z., Wang, H., (2023) \"FL-AMM: Federated Learning Augmented Map Matching With Heterogeneous Cellular Moving Trajectories,\" IEEE Journal on Selected Areas in Communications","DOI":"10.1109\/JSAC.2023.3322841"},{"key":"2085_CR29","doi-asserted-by":"publisher","unstructured":"Huang, M., Zhao, Y., Song, J., (2022) \"Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT,\" Electronics, 11(3). https:\/\/doi.org\/10.3390\/electronics11131982","DOI":"10.3390\/electronics11131982"},{"key":"2085_CR30","unstructured":"Zhou, Y., Wei, K., Duan, S., Xiong, N. N., (2022) \"Scalability Enhancement Scheme for Ethereum Blockchains: A Graph-based Decentralized Approach,\" Engineering Technology & Applied Science Research"},{"key":"2085_CR31","doi-asserted-by":"publisher","unstructured":"Wu, L., Ma, Z., Zhang, X., \"SGM: Strategic Game Model for Resisting Node Misbehavior in IoT-Cloud Ecosystem,\" Information, 13(5). https:\/\/doi.org\/10.3390\/info13050544","DOI":"10.3390\/info13050544"},{"issue":"12","key":"2085_CR32","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.1109\/JSAC.2022.3213306","volume":"40","author":"W Wang","year":"2022","unstructured":"Wang W, Zong J, Wang C, Shen J, Su C (2022) BSIF: Blockchain-Based Secure, Interactive, and Fair Mobile Crowdsensing. IEEE J Sel Areas Commun 40(12):3452\u20133469. https:\/\/doi.org\/10.1109\/JSAC.2022.3213306","journal-title":"IEEE J Sel Areas Commun"},{"key":"2085_CR33","doi-asserted-by":"publisher","unstructured":"Zong, J., Wang, C., Shen, J., Su, C., Wang, W., (2023) \"ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics,\" IEEE Transactions on Consumer Electronics. https:\/\/doi.org\/10.1109\/TCE.2023.3279652","DOI":"10.1109\/TCE.2023.3279652"},{"key":"2085_CR34","unstructured":"D. Larimer, \u201cDelegated proof-of-stake (Dpos),\u201d 2014. https:\/\/bitcointalk.org\/index.php?topic=558316.0."},{"key":"2085_CR35","doi-asserted-by":"publisher","first-page":"7270624","DOI":"10.1155\/2020\/7270624","volume":"2020","author":"Y Wu","year":"2020","unstructured":"Wu Y, Song P, Wang F (2020) Hybrid Consensus Algorithm Optimization: A Mathematical Method Based on POS and PBFT and Its Application in Blockchain. Math Probl Eng 2020:7270624. https:\/\/doi.org\/10.1155\/2020\/7270624","journal-title":"Math Probl Eng"},{"issue":"5","key":"2085_CR36","doi-asserted-by":"publisher","first-page":"8114","DOI":"10.1109\/JIOT.2019.2922538","volume":"6","author":"M Wu","year":"2019","unstructured":"Wu M, Wang K, Cai X, Guo S, Guo M, Rong C (2019) A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond. IEEE Internet Things J 6(5):8114\u20138154. https:\/\/doi.org\/10.1109\/JIOT.2019.2922538","journal-title":"IEEE Internet Things J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02085-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02085-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02085-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:20Z","timestamp":1760683160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02085-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,22]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2085"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02085-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,22]]},"assertion":[{"value":"6 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"272"}}