{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T04:11:02Z","timestamp":1772943062503,"version":"3.50.1"},"reference-count":126,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s13198-025-02992-1","type":"journal-article","created":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T15:47:09Z","timestamp":1761234429000},"page":"694-730","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Data dissemination in IoT networks: state-of-the-art, techniques and open research challenges"],"prefix":"10.1007","volume":"17","author":[{"given":"Bisma","family":"Mashooq","sequence":"first","affiliation":[]},{"given":"Yashwant","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3775-0844","authenticated-orcid":false,"given":"Sheikh Imroza","family":"Manzoor","sequence":"additional","affiliation":[]},{"given":"Pradeep Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"2992_CR2","doi-asserted-by":"publisher","unstructured":"Aazam M, Huh EN (2014) Fog computing and smart gateway based communication for cloud of things. Proc. - 2014 Int. Conf. Futur. Internet Things Cloud, FiCloud 2014, 464\u2013470, 2014, https:\/\/doi.org\/10.1109\/FiCloud.2014.83.","DOI":"10.1109\/FiCloud.2014.83"},{"key":"2992_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5597679","author":"K Abbas","year":"2021","unstructured":"Abbas K, Tawalbeh LA, Rafiq A, Muthanna A, Elgendy IA, Abd El-Latif AA (2021) Convergence of blockchain and IoT for secure transportation systems in smart cities. Secur Commun Networks. https:\/\/doi.org\/10.1155\/2021\/5597679","journal-title":"Secur Commun Networks"},{"issue":"no. 3","key":"2992_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.5815\/ijcnis.2015.03.07","volume":"7","author":"I Abdullah","year":"2015","unstructured":"Abdullah I, Rahman MM, Roy MC (2015) Detecting sinkhole attacks in wireless sensor network using hop count. Int J Comput Netw Inf Secur 7(3):50\u201356. https:\/\/doi.org\/10.5815\/ijcnis.2015.03.07","journal-title":"Int J Comput Netw Inf Secur"},{"key":"2992_CR5","first-page":"26521","volume":"5","author":"AM Abdulshahed","year":"2017","unstructured":"Abdulshahed AM (2017) Internet of things for smart healthcare. Ssrn 5:26521\u201326544","journal-title":"Ssrn"},{"key":"2992_CR6","doi-asserted-by":"publisher","unstructured":"Acharya AD, Patil SN (2020) IoT based Health Care Monitoring Kit. Proc. 4th Int. Conf. Comput. Methodol. Commun. ICCMC 2020, no. Iccmc, pp. 363\u2013368 https:\/\/doi.org\/10.1109\/ICCMC48092.2020.ICCMC-00068.","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00068"},{"key":"2992_CR7","doi-asserted-by":"publisher","unstructured":"Aliyu A, Abdullah AH, Kaiwartya O, Ullah F, Joda UM, Hassan AN (2017) Multi-path video streaming in vehicular communication: Approaches and challenges\u2019, 6th ICT Int. Student Proj. Conf. Elev. Community Through ICT, ICT-ISPC 2017, vol. 2017-Janua, pp. 1\u20134, 2017, https:\/\/doi.org\/10.1109\/ICT-ISPC.2017.8075315.","DOI":"10.1109\/ICT-ISPC.2017.8075315"},{"issue":"4","key":"2992_CR8","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TCCN.2019.2922263","volume":"5","author":"AM Almasoud","year":"2019","unstructured":"Almasoud AM, Kamal AE (2019) Data dissemination in IoT using a cognitive UAV. IEEE Trans Cogn Commun Netw 5(4):849\u2013862. https:\/\/doi.org\/10.1109\/TCCN.2019.2922263","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"2992_CR9","doi-asserted-by":"publisher","unstructured":"Almulhim M, Zaman N (2018) Proposing secure and lightweight authentication scheme for IoT based E-health applications. Int. Conf. Adv. Commun. Technol. ICACT, vol. 2018-Febru, pp. 481\u2013487 https:\/\/doi.org\/10.23919\/ICACT.2018.8323802.","DOI":"10.23919\/ICACT.2018.8323802"},{"key":"2992_CR10","doi-asserted-by":"publisher","first-page":"24095","DOI":"10.1109\/ACCESS.2022.3151967","volume":"10","author":"HAH Alobaidy","year":"2022","unstructured":"Alobaidy HAH, Singh MJ, Behjati M, Nordin R, Abdullah NF (2022) Wireless transmissions, propagation and channel modelling for IoT technologies: applications and challenges. IEEE Access 10:24095\u201324131. https:\/\/doi.org\/10.1109\/ACCESS.2022.3151967","journal-title":"IEEE Access"},{"issue":"7","key":"2992_CR11","doi-asserted-by":"publisher","first-page":"232","DOI":"10.14569\/ijacsa.2019.0100733","volume":"10","author":"F Alshohoumi","year":"2019","unstructured":"Alshohoumi F, Sarrab M, AlHamadani A, Al-Abri D (2019) Systematic review of existing IoT architectures security and privacy issues and concerns. Int J Adv Comput Sci Appl 10(7):232\u2013251. https:\/\/doi.org\/10.14569\/ijacsa.2019.0100733","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"4","key":"2992_CR12","doi-asserted-by":"publisher","first-page":"2820","DOI":"10.1109\/COMST.2017.2720195","volume":"19","author":"MR Asghar","year":"2017","unstructured":"Asghar MR, D\u00e1n G, Miorandi D, Chlamtac I (2017) Smart meter data privacy: a survey. IEEE Commun Surv Tutor 19(4):2820\u20132835. https:\/\/doi.org\/10.1109\/COMST.2017.2720195","journal-title":"IEEE Commun Surv Tutor"},{"key":"2992_CR13","doi-asserted-by":"publisher","unstructured":"Ben Arbia D, Alam MM, Attia R, Ben Hamida E (2015) Data dissemination strategies for emerging wireless body-to-body networks based Internet of Humans. 2015 IEEE 11th Int. Conf. Wirel. Mob. Comput. Netw. Commun. WiMob 2015, pp. 1\u20138, 2015, https:\/\/doi.org\/10.1109\/WiMOB.2015.7347933.","DOI":"10.1109\/WiMOB.2015.7347933"},{"key":"2992_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3881","author":"E Benalia","year":"2020","unstructured":"Benalia E, Bitam S, Mellouk A (2020) Data dissemination for internet of vehicle based on 5G communications: a survey. Trans Emerging Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.3881","journal-title":"Trans Emerging Telecommun Technol"},{"key":"2992_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2956964","author":"J Bhatia","year":"2019","unstructured":"Bhatia J, Kakadia P, Bhavsar M, Tanwar S (2019) SDN-enabled Network Coding Based Secure Data Dissemination in VANET Environment. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2019.2956964","journal-title":"IEEE Internet Things J"},{"key":"2992_CR16","doi-asserted-by":"publisher","unstructured":"Bhomble B, Katkar S, Dhere D, Rage GA, Bagwan S, Jadhav M (2017) IoT based smart sniper. Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, pp. 557\u2013561 https:\/\/doi.org\/10.1109\/I-SMAC.2017.8058241.","DOI":"10.1109\/I-SMAC.2017.8058241"},{"key":"2992_CR17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/IADCC.2015.7154707","volume":"2015","author":"R Billure","year":"2015","unstructured":"Billure R, Tayur VM, Mahesh V (2015) \u2018Internet of Things - A study on the security challenges. Souvenir 2015 IEEE Int Adv Comput Conf IACC 2015:247\u2013252. https:\/\/doi.org\/10.1109\/IADCC.2015.7154707","journal-title":"Souvenir 2015 IEEE Int Adv Comput Conf IACC"},{"issue":"17","key":"2992_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5120\/ijca2015907654","volume":"131","author":"S Biswas","year":"2015","unstructured":"Biswas S, Adhikari S (2015) A survey of security attacks, defenses and security mechanisms in wireless sensor network. Int J Comput Appl 131(17):28\u201335. https:\/\/doi.org\/10.5120\/ijca2015907654","journal-title":"Int J Comput Appl"},{"issue":"6","key":"2992_CR19","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1049\/iet-sen.2020.0006","volume":"14","author":"U Bodkhe","year":"2020","unstructured":"Bodkhe U, Tanwar S (2020) Taxonomy of secure data dissemination techniques for IoT environment. IET Softw 14(6):563\u2013571. https:\/\/doi.org\/10.1049\/iet-sen.2020.0006","journal-title":"IET Softw"},{"issue":"12","key":"2992_CR20","doi-asserted-by":"publisher","first-page":"2469","DOI":"10.1002\/spe.2811","volume":"51","author":"U Bodkhe","year":"2021","unstructured":"Bodkhe U, Tanwar S (2021) Secure data dissemination techniques for IoT applications: research challenges and opportunities. Softw-Pract Exp 51(12):2469\u20132491. https:\/\/doi.org\/10.1002\/spe.2811","journal-title":"Softw-Pract Exp"},{"key":"2992_CR21","doi-asserted-by":"publisher","first-page":"79764","DOI":"10.1109\/ACCESS.2020.2988579","volume":"8","author":"U Bodkhe","year":"2020","unstructured":"Bodkhe U et al (2020) Blockchain for industry 4.0: a comprehensive review. IEEE Access 8:79764\u201379800. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988579","journal-title":"IEEE Access"},{"key":"2992_CR22","doi-asserted-by":"publisher","unstructured":"Bodkhe U, Tanwar S (2023) BiOIoV: Biometric-based secure data dissemination for IoV ecosystem. Proc. 13th Int. Conf. Cloud Comput. Data Sci. Eng. Conflu. 2023, 677\u2013682 https:\/\/doi.org\/10.1109\/Confluence56041.2023.10048828.","DOI":"10.1109\/Confluence56041.2023.10048828"},{"issue":"2","key":"2992_CR23","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/JIOT.2018.2846803","volume":"6","author":"J Cao","year":"2019","unstructured":"Cao J, Yu P, Ma M, Gao W (2019) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561\u20131575. https:\/\/doi.org\/10.1109\/JIOT.2018.2846803","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2992_CR24","doi-asserted-by":"publisher","first-page":"108","DOI":"10.23919\/JCC.2021.01.010","volume":"18","author":"W Cao","year":"2021","unstructured":"Cao W et al (2021) CNN-based intelligent safety surveillance in green IoT applications. China Commun 18(1):108\u2013119. https:\/\/doi.org\/10.23919\/JCC.2021.01.010","journal-title":"China Commun"},{"issue":"10","key":"2992_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s16101653","volume":"16","author":"Y Chung","year":"2016","unstructured":"Chung Y, Choi S, Lee YS, Park N, Won D (2016) An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors (Switzerland) 16(10):1\u201321. https:\/\/doi.org\/10.3390\/s16101653","journal-title":"Sensors (Switzerland)"},{"key":"2992_CR26","doi-asserted-by":"publisher","unstructured":"Daneels G et al. (2017) Real-time data dissemination and analytics platform for challenging IoT environments. 2017 Glob. Inf. Infrastruct. Netw. Symp. GIIS 2017, 2017-Decem, 23\u201330 https:\/\/doi.org\/10.1109\/GIIS.2017.8169799.","DOI":"10.1109\/GIIS.2017.8169799"},{"issue":"December","key":"2992_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICSPIS48872.2019.9066025","volume":"2019","author":"Z Davoody-Beni","year":"2019","unstructured":"Davoody-Beni Z, Sheini-Shahvand N, Shahinzadeh H, Moazzami M, Shaneh M, Gharehpetian GB (2019) \u2018Application of IoT in Smart Grid: Challenges and Solutions\u2019, 5th Iran. Conf Signal Process Intell Syst ICSPIS 2019(December):1\u20138. https:\/\/doi.org\/10.1109\/ICSPIS48872.2019.9066025","journal-title":"Conf Signal Process Intell Syst ICSPIS"},{"key":"2992_CR28","doi-asserted-by":"publisher","unstructured":"Deogirikar J Vidhate A (2017) Security attacks in IoT: A survey. Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, 32\u201337, 2017, https:\/\/doi.org\/10.1109\/I-SMAC.2017.8058363.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"issue":"7","key":"2992_CR29","doi-asserted-by":"publisher","first-page":"1776","DOI":"10.1109\/TPDS.2013.176","volume":"25","author":"W Dong","year":"2014","unstructured":"Dong W, Liu Y, Zhao Z, Liu X, Chen C, Bu J (2014) Link quality aware code dissemination in wireless sensor networks. IEEE Trans Parallel Distrib Syst 25(7):1776\u20131786. https:\/\/doi.org\/10.1109\/TPDS.2013.176","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2992_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100214","volume":"23","author":"Z El-Rewini","year":"2020","unstructured":"El-Rewini Z, Sadatsharan K, Selvaraj DF, Plathottam SJ, Ranganathan P (2020) Cybersecurity challenges in vehicular communications. Vehicular Commun 23:100214. https:\/\/doi.org\/10.1016\/j.vehcom.2019.100214","journal-title":"Vehicular Commun"},{"key":"2992_CR31","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2150524","author":"X Fan","year":"2019","unstructured":"Fan X (2019) Replication-based data dissemination in connected internet of vehicles. Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2019\/2150524","journal-title":"Wirel Commun Mob Comput"},{"issue":"4","key":"2992_CR32","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1109\/TWC.2018.2799860","volume":"17","author":"MJ Farooq","year":"2018","unstructured":"Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans Wirel Commun 17(4):2618\u20132632. https:\/\/doi.org\/10.1109\/TWC.2018.2799860","journal-title":"IEEE Trans Wirel Commun"},{"key":"2992_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/CSITSS54238.2021.9683672","author":"B Gadgay","year":"2021","unstructured":"Gadgay B, Shubhangi DC, Abhijeet R (2021) \u2018VTU campus surveillance and student smart accessibility system using IOT\u2019, CSITSS 2021\u20132021 5th Int. Conf Comput Syst Inf Technol Sustain Solut Proc. https:\/\/doi.org\/10.1109\/CSITSS54238.2021.9683672","journal-title":"Conf Comput Syst Inf Technol Sustain Solut Proc"},{"key":"2992_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/inventions4010022","author":"A Ghasempour","year":"2019","unstructured":"Ghasempour A (2019) Internet of things in smart grid: architecture, applications, services, key technologies, and challenges. Inventions. https:\/\/doi.org\/10.3390\/inventions4010022","journal-title":"Inventions"},{"key":"2992_CR35","doi-asserted-by":"publisher","unstructured":"Goyal M, Dutta M (2018) Intrusion detection of wormhole attack in IoT: a review. 2018 Int. Conf. Circuits Syst. Digit. Enterp. Technol. ICCSDET 2018, pp. 1\u20135, 2018, https:\/\/doi.org\/10.1109\/ICCSDET.2018.8821160.","DOI":"10.1109\/ICCSDET.2018.8821160"},{"issue":"4","key":"2992_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/FI12040063","volume":"12","author":"N Gupta","year":"2020","unstructured":"Gupta N, Manaswini R, Saikrishna B, Silva F, Teles A (2020a) Authentication-based secure data dissemination protocol and framework for 5G-enabled VANET. Futur Internet 12(4):1\u201318. https:\/\/doi.org\/10.3390\/FI12040063","journal-title":"Futur Internet"},{"key":"2992_CR37","doi-asserted-by":"publisher","unstructured":"Gupta AK, Johari R (2019) IOT based electrical device surveillance and control system. Proc. - 2019 4th Int. Conf. Internet Things Smart Innov. Usages, IoT-SIU 2019, pp. 1\u20135, 2019, https:\/\/doi.org\/10.1109\/IoT-SIU.2019.8777342.","DOI":"10.1109\/IoT-SIU.2019.8777342"},{"key":"2992_CR38","doi-asserted-by":"publisher","unstructured":"Gupta SK, Vanjale S, Rasal S, Vanjale M (2020) Securing IoT devices in smart city environments. 2020 Int. Conf. Emerg. Smart Comput. Informatics, ESCI 2020, pp. 119\u2013123, 2020, https:\/\/doi.org\/10.1109\/ESCI48226.2020.9167630.","DOI":"10.1109\/ESCI48226.2020.9167630"},{"key":"2992_CR39","doi-asserted-by":"publisher","unstructured":"Gupta R, Jadav NK, Nair A, Tanwar S, Shahinzadeh H (2022) Blockchain and ai-based secure onion routing framework for data dissemination in IoT environment underlying 6G networks. Proceeding 6th Int. Conf. Smart Cities, Internet Things Appl. SCIoT 2022, 2022, https:\/\/doi.org\/10.1109\/SCIoT56583.2022.9953671.","DOI":"10.1109\/SCIoT56583.2022.9953671"},{"key":"2992_CR40","unstructured":"Haas ZJ, Halpern JY, Li L (2000) Proceedings - 9th International Conference on Computer Communications and Networks, ICCCN 2000. Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, vol. 2000-Octob, no. c, pp. 1707\u20131716."},{"key":"2992_CR41","unstructured":"Haq IU, Muhammad K, Sajjad M, Lee MY, Han D, Baik SW (2017) A study of data dissemination in CCTV surveillance systems pp. 157\u2013158."},{"issue":"2020","key":"2992_CR1","doi-asserted-by":"publisher","first-page":"68379","DOI":"10.1109\/ACCESS.2020.2985851","volume":"8","author":"K Haseeb","year":"2020","unstructured":"Haseeb K et al. (2020a) RTS: a robust and trusted scheme for IoT-based mobile wireless mesh networks. IEEE Access 8(2020):68379\u201368390 https:\/\/doi.org\/10.1109\/ACCESS.2020.2985851","journal-title":"IEEE Access"},{"key":"2992_CR42","doi-asserted-by":"publisher","DOI":"10.3390\/s20072081","author":"K Haseeb","year":"2020","unstructured":"Haseeb K, Din IU, Almogren A, Islam N (2020b) An energy efficient and secure IoT-based WSN framework: an application to smart agriculture. Sensors (Switzerland). https:\/\/doi.org\/10.3390\/s20072081","journal-title":"Sensors (Switzerland)"},{"key":"2992_CR43","doi-asserted-by":"publisher","unstructured":"Heinzelman WR, Kulik J, Balakrishnan H (1999) Adaptive protocols for information dissemination in wireless sensor networks. Proc. Annu. Int. Conf. Mob. Comput. Networking, MOBICOM, vol. 1999-Augus, 174\u2013185 https:\/\/doi.org\/10.1145\/313451.313529.","DOI":"10.1145\/313451.313529"},{"key":"2992_CR44","doi-asserted-by":"publisher","unstructured":"Hong L, Yong HC, Zhang QH (2012) The survey of RFID attacks and defenses. 2012 Int. Conf. Wirel. Commun. Netw. Mob. Comput. WiCOM 2012, 1\u20134 https:\/\/doi.org\/10.1109\/WiCOM.2012.6478720.","DOI":"10.1109\/WiCOM.2012.6478720"},{"key":"2992_CR45","doi-asserted-by":"publisher","unstructured":"Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. Proc. - 2015 IEEE World Congr. Serv. Serv. 2015, 21\u201328 https:\/\/doi.org\/10.1109\/SERVICES.2015.12.","DOI":"10.1109\/SERVICES.2015.12"},{"issue":"2","key":"2992_CR46","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/JIOT.2017.2705560","volume":"5","author":"L Hu","year":"2018","unstructured":"Hu L, Ni Q (2018) Iot-driven automated object detection algorithm for urban surveillance systems in smart cities. IEEE Internet Things J 5(2):747\u2013754. https:\/\/doi.org\/10.1109\/JIOT.2017.2705560","journal-title":"IEEE Internet Things J"},{"key":"2992_CR47","doi-asserted-by":"publisher","unstructured":"Jiang JC, Kantarci B, Oktug S, Soyata T (2020) Federated learning in smart city sensing. 1\u201329 https:\/\/doi.org\/10.3390\/s20216230.","DOI":"10.3390\/s20216230"},{"key":"2992_CR48","doi-asserted-by":"publisher","unstructured":"Jino Ramson SR, Vishnu S, Shanmugam M (2020) Applications of internet of things (IoT)-An overview. ICDCS 2020 - 2020 5th Int. Conf. Devices, Circuits Syst., pp. 92\u201395, 2020, https:\/\/doi.org\/10.1109\/ICDCS48716.2020.243556.","DOI":"10.1109\/ICDCS48716.2020.243556"},{"issue":"27","key":"2992_CR49","doi-asserted-by":"publisher","first-page":"57","DOI":"10.15623\/ijret.2014.0327011","volume":"3","author":"JM Jose","year":"2014","unstructured":"Jose JM, John J (2014) Secure data dissemination protocol in wireless sensor networks using Xor network coding. Int J Res Eng Technol 3(27):57\u201361","journal-title":"Int J Res Eng Technol"},{"key":"2992_CR50","doi-asserted-by":"publisher","unstructured":"Kaaniche N, Jung EEJ, Gehani A (2018) Efficiently validating aggregated IoT data integrity. Proc. - IEEE 4th Int. Conf. Big Data Comput. Serv. Appl. BigDataService 2018, pp. 260\u2013265, 2018, https:\/\/doi.org\/10.1109\/BigDataService.2018.00046.","DOI":"10.1109\/BigDataService.2018.00046"},{"key":"2992_CR51","doi-asserted-by":"publisher","unstructured":"Kamesh and Sakthi Priya N (2012) A survey of cyber crimes Yanping. Secur Commun Networks, 5(June) 422\u2013437, 2012, https:\/\/doi.org\/10.1002\/sec.","DOI":"10.1002\/sec"},{"key":"2992_CR52","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/ICOS50156.2020.9293672","volume":"2020","author":"MRM Kassim","year":"2020","unstructured":"Kassim MRM (2020) \u2018IoT applications in smart agriculture: issues and challenges. 2020 IEEE Conf Open Syst ICOS 2020:19\u201324. https:\/\/doi.org\/10.1109\/ICOS50156.2020.9293672","journal-title":"2020 IEEE Conf Open Syst ICOS"},{"key":"2992_CR53","doi-asserted-by":"publisher","unstructured":"Khan JY (2019) Introduction to IoT Systems. Internet of Things (IoT), pp. 1\u201324, 2019, https:\/\/doi.org\/10.1201\/9780429399084-1.","DOI":"10.1201\/9780429399084-1"},{"issue":"2","key":"2992_CR54","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MNET.2019.1800236","volume":"33","author":"HA Khattak","year":"2019","unstructured":"Khattak HA, Farman H, Jan B, Ud Din I (2019) Toward integrating vehicular clouds with IoT for smart city services. IEEE Netw 33(2):65\u201371. https:\/\/doi.org\/10.1109\/MNET.2019.1800236","journal-title":"IEEE Netw"},{"key":"2992_CR55","doi-asserted-by":"publisher","unstructured":"Kott A, Swami A, West BJ (2016) The internet of battle things. Computer (Long. Beach. Calif)., 49(12), 70\u201375 https:\/\/doi.org\/10.1109\/MC.2016.355.","DOI":"10.1109\/MC.2016.355"},{"issue":"no. 1","key":"2992_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1325651.1325653","volume":"4","author":"MD Krasniewski","year":"2008","unstructured":"Krasniewski MD, Panta RK, Bagchi S, Yang CL, Chappell WJ (2008) Energy-efficient on-demand reprogramming of large-scale sensor networks. ACM Trans Sens Networks 4(1):1\u201338. https:\/\/doi.org\/10.1145\/1325651.1325653","journal-title":"ACM Trans Sens Networks"},{"key":"2992_CR57","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.procs.2018.05.170","volume":"132","author":"NM Kumar","year":"2018","unstructured":"Kumar NM, Mallick PK (2018) \u2018The Internet of Things: Insights into the building blocks, component interactions, and architecture layers.\u2019 Procedia Comput Sci 132:109\u2013117. https:\/\/doi.org\/10.1016\/j.procs.2018.05.170","journal-title":"Procedia Comput Sci"},{"key":"2992_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107819","author":"R Kumar","year":"2021","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G (2021) SP2F: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Networks. https:\/\/doi.org\/10.1016\/j.comnet.2021.107819","journal-title":"Comput Networks"},{"key":"2992_CR59","doi-asserted-by":"publisher","unstructured":"Kumar S, Solanki SS (2016) Remote home surveillance system. Proc. - 2016 Int. Conf. Adv. Comput. Commun. Autom. ICACCA 2016, pp. 2\u20135, 2016, https:\/\/doi.org\/10.1109\/ICACCA.2016.7578890.","DOI":"10.1109\/ICACCA.2016.7578890"},{"key":"2992_CR60","doi-asserted-by":"publisher","unstructured":"Kumar NM, Dash A, Singh NK (2019) Internet of Things (IoT): An opportunity for energy-food-water nexus. 2018 Int. Conf. Power Energy, Environ. Intell. Control. PEEIC 2018, pp. 68\u201372, 2019, https:\/\/doi.org\/10.1109\/PEEIC.2018.8665632.","DOI":"10.1109\/PEEIC.2018.8665632"},{"key":"2992_CR61","doi-asserted-by":"publisher","unstructured":"Kumar P, Kumar R, Garg S, Kaur K, Zhang Y, Guizani M (2022) A Secure data dissemination scheme for IoT-Based e-health systems using AI and Blockchain. 2022 IEEE Glob. Commun. Conf. GLOBECOM 2022 - Proc., pp. 1397\u20131403 https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000801.","DOI":"10.1109\/GLOBECOM48099.2022.10000801"},{"key":"2992_CR62","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56\u201375. https:\/\/doi.org\/10.1016\/j.future.2016.04.016","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"2992_CR63","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/MNET.011.2000355","volume":"35","author":"A Kumari","year":"2021","unstructured":"Kumari A, Tanwar S, Tyagi S, Kumar N (2021) Blockchain-based massive data dissemination handling in IIoT environment. IEEE Netw 35(1):318\u2013325. https:\/\/doi.org\/10.1109\/MNET.011.2000355","journal-title":"IEEE Netw"},{"key":"2992_CR64","doi-asserted-by":"publisher","unstructured":"Kyasanur P, Choudhury RR, Gupta I (2006) Smart gossip: An adaptive gossip-based broadcasting service for sensor networks. 2006 IEEE Int. Conf. Mob. Ad Hoc Sens. Syst. MASS, vol. 1, pp. 91\u2013100, 2006, https:\/\/doi.org\/10.1109\/MOBHOC.2006.278671.","DOI":"10.1109\/MOBHOC.2006.278671"},{"key":"2992_CR65","doi-asserted-by":"publisher","first-page":"2328","DOI":"10.1016\/j.procs.2017.08.265","volume":"112","author":"C Li","year":"2017","unstructured":"Li C, Hu X, Zhang L (2017) The IoT-based heart disease monitoring system for pervasive healthcare service. Procedia Comput Sci 112:2328\u20132334. https:\/\/doi.org\/10.1016\/j.procs.2017.08.265","journal-title":"Procedia Comput Sci"},{"key":"2992_CR66","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.vehcom.2018.05.002","volume":"13","author":"L Liu","year":"2018","unstructured":"Liu L, Chen C, Qiu T, Zhang M, Li S, Zhou B (2018) A data dissemination scheme based on clustering and probabilistic broadcasting in VANETs. Veh Commun 13:78\u201388. https:\/\/doi.org\/10.1016\/j.vehcom.2018.05.002","journal-title":"Veh Commun"},{"key":"2992_CR67","doi-asserted-by":"publisher","unstructured":"Machado C, Frohlich AA (2018) IoT data integrity verification for cyber-physical systems using blockchain. Proc. - 2018 IEEE 21st Int. Symp. Real-Time Comput. ISORC 2018, 83\u201390 https:\/\/doi.org\/10.1109\/ISORC.2018.00019.","DOI":"10.1109\/ISORC.2018.00019"},{"key":"2992_CR68","doi-asserted-by":"publisher","unstructured":"Maia G, Guidoni DL, Aquino ALL, Loureiro AAF (2009) Improving an over-the-air programming protocol for wireless sensor networks based on small world concepts. MSWiM\u201909 - Proc. 12th ACM Int. Conf. Model. Anal. Simul. Wirel. Mob. Syst., pp. 261\u2013267, 2009, https:\/\/doi.org\/10.1145\/1641804.1641848.","DOI":"10.1145\/1641804.1641848"},{"key":"2992_CR69","doi-asserted-by":"publisher","unstructured":"Makhdoom I et al (2019) PrivySharing\u202f: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput. Secur 101653, https:\/\/doi.org\/10.1016\/j.cose.2019.101653.","DOI":"10.1016\/j.cose.2019.101653"},{"key":"2992_CR70","doi-asserted-by":"publisher","unstructured":"Mann P, Tyagi N, Gautam S, Rana A (2020) Classification of Various Types of Attacks in IoT Environment. Proc. - 2020 12th Int. Conf. Comput. Intell. Commun. Networks, CICN 2020, 346\u2013350 https:\/\/doi.org\/10.1109\/CICN49253.2020.9242592.","DOI":"10.1109\/CICN49253.2020.9242592"},{"key":"2992_CR71","doi-asserted-by":"crossref","unstructured":"Manogaran G, Alazab M, Shakeel PM, Hsu C (2021) Blockchain assisted secure data sharing model for internet of things based smart industries 1\u201311.","DOI":"10.1109\/TR.2020.3047833"},{"key":"2992_CR72","doi-asserted-by":"publisher","first-page":"42248","DOI":"10.1109\/ACCESS.2023.3269880","volume":"11","author":"SI Manzoor","year":"2023","unstructured":"Manzoor SI, Jain S, Singh Y, Singh H (2023) Federated learning based privacy ensured sensor communication in IoT networks: a taxonomy, threats and attacks. IEEE Access 11:42248\u201342275. https:\/\/doi.org\/10.1109\/ACCESS.2023.3269880","journal-title":"IEEE Access"},{"issue":"9","key":"2992_CR73","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2017.1600514","volume":"55","author":"Y Mehmood","year":"2017","unstructured":"Mehmood Y, Ahmad F, Yaqoob I, Adnane A, Imran M, Guizani S (2017) Internet-of-things-based smart cities: recent advances and challenges. IEEE Commun Mag 55(9):16\u201324. https:\/\/doi.org\/10.1109\/MCOM.2017.1600514","journal-title":"IEEE Commun Mag"},{"key":"2992_CR74","doi-asserted-by":"crossref","unstructured":"Mishra N, Singhal P, Kundu S (2020) Application of IoT products in smart cities of India. 2020\u20132022.","DOI":"10.1109\/SMART50582.2020.9337150"},{"issue":"2","key":"2992_CR75","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/JIOT.2017.2720855","volume":"5","author":"F Montori","year":"2018","unstructured":"Montori F, Bedogni L, Bononi L (2018) A collaborative internet of things architecture for smart cities and environmental monitoring. IEEE Internet Things J 5(2):592\u2013605. https:\/\/doi.org\/10.1109\/JIOT.2017.2720855","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"2992_CR76","doi-asserted-by":"publisher","first-page":"3679","DOI":"10.1109\/TII.2018.2791944","volume":"14","author":"K Muhammad","year":"2018","unstructured":"Muhammad K, Hamza R, Ahmad J, Lloret J, Wang H, Baik SW (2018) Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans Ind Inform 14(8):3679\u20133689. https:\/\/doi.org\/10.1109\/TII.2018.2791944","journal-title":"IEEE Trans Ind Inform"},{"issue":"6","key":"2992_CR77","doi-asserted-by":"publisher","first-page":"6481","DOI":"10.1109\/TSG.2019.2906016","volume":"10","author":"MA Mustafa","year":"2019","unstructured":"Mustafa MA, Cleemput S, Aly A, Abidin A (2019) A secure and privacy-preserving protocol for smart metering operational data collection. IEEE Trans Smart Grid 10(6):6481\u20136490. https:\/\/doi.org\/10.1109\/TSG.2019.2906016","journal-title":"IEEE Trans Smart Grid"},{"key":"2992_CR78","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2005.37","author":"V Naik","year":"2005","unstructured":"Naik V, Arora A, Sinha P, Zhang H (2005) Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. Proc - Real-Time Syst Symp. https:\/\/doi.org\/10.1109\/RTSS.2005.37","journal-title":"Proc - Real-Time Syst Symp"},{"issue":"2","key":"2992_CR79","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/JIOT.2020.3007329","volume":"8","author":"TD Nguyen","year":"2021","unstructured":"Nguyen TD, Le DT, Vo VV, Kim M, Choo H (2021) Fast sensory data aggregation in IoT networks: collision-resistant dynamic approach. IEEE Internet Things J 8(2):766\u2013777. https:\/\/doi.org\/10.1109\/JIOT.2020.3007329","journal-title":"IEEE Internet Things J"},{"key":"2992_CR80","doi-asserted-by":"publisher","unstructured":"Ni S-Y, Tseng Y-C, Chen Y-S, Sheu J-P (1999) The broadcast storm problem in a mobile ad hoc network. pp. 151\u2013162, 1999, https:\/\/doi.org\/10.1145\/313451.313525.","DOI":"10.1145\/313451.313525"},{"issue":"11","key":"2992_CR81","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5120\/12006-7132","volume":"70","author":"S NUke","year":"2013","unstructured":"NUke S, Mahajan AR, Thool RC (2013) UML modeling of physical and data link layer security attacks in WSN. Int J Comput Appl 70(11):25\u201328. https:\/\/doi.org\/10.5120\/12006-7132","journal-title":"Int J Comput Appl"},{"issue":"30","key":"2992_CR82","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.ifacol.2016.11.137","volume":"49","author":"RL Ohta","year":"2016","unstructured":"Ohta RL, Santos MN, Alecio P, Marcelo N (2016) Cloud-based for the cloud-based for architecture for the the internet things industrial things industrial of things targeting industrial control. IFAC-PapersOnLine 49(30):108\u2013113. https:\/\/doi.org\/10.1016\/j.ifacol.2016.11.137","journal-title":"IFAC-PapersOnLine"},{"issue":"4","key":"2992_CR83","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TEM.2019.2950410","volume":"67","author":"JC Olivares-Rojas","year":"2020","unstructured":"Olivares-Rojas JC, Reyes-Archundia E, Gutierrez-Gnecchi JA, Cerda-Jacobo J, Gonzalez-Murueta JW (2020) A novel multitier blockchain architecture to protect data in smart metering systems. IEEE Trans Eng Manag 67(4):1271\u20131284. https:\/\/doi.org\/10.1109\/TEM.2019.2950410","journal-title":"IEEE Trans Eng Manag"},{"issue":"3","key":"2992_CR84","doi-asserted-by":"publisher","first-page":"4118","DOI":"10.1109\/JIOT.2018.2875544","volume":"6","author":"B Omoniwa","year":"2019","unstructured":"Omoniwa B, Hussain R, Javed MA, Bouk SH, Malik SA (2019) Fog\/edge computing-based IoT (FECIoT): architecture, applications, and research issues. IEEE Internet Things J 6(3):4118\u20134149. https:\/\/doi.org\/10.1109\/JIOT.2018.2875544","journal-title":"IEEE Internet Things J"},{"key":"2992_CR85","doi-asserted-by":"publisher","unstructured":"Osuwa AA, Ekhoragbon EB, Fat LT (2018) Application of artificial intelligence in Internet of Things. Proc. - 9th Int. Conf. Comput. Intell. Commun. Networks, CICN 2017, vol. 2018-Janua, pp. 169\u2013173 https:\/\/doi.org\/10.1109\/CICN.2017.8319379.","DOI":"10.1109\/CICN.2017.8319379"},{"key":"2992_CR86","doi-asserted-by":"publisher","unstructured":"Perry DE and Kaiser GE (1987) Infuse. pp. 292\u2013299, 1987, https:\/\/doi.org\/10.1145\/322917.322963.","DOI":"10.1145\/322917.322963"},{"key":"2992_CR87","doi-asserted-by":"crossref","unstructured":"Pradyumna A (2022) IoT Based Smart Grid Communication with Transmission Line Fault Identification.","DOI":"10.1109\/ICICCSP53532.2022.9862383"},{"key":"2992_CR88","doi-asserted-by":"crossref","unstructured":"Preethi V, Harish G (2016) Design and implementation of smart energy meter. In: 2016 International conference on inventive computation technologies (ICICT), vol 1. IEEE","DOI":"10.1109\/INVENTIVE.2016.7823225"},{"key":"2992_CR89","doi-asserted-by":"publisher","unstructured":"Rajab H, Cinkelr T (2018) IoT based Smart Cities\u2019, 2018 Int. Symp. Networks, Comput. Commun. ISNCC 2018, pp. 1\u20134, 2018, https:\/\/doi.org\/10.1109\/ISNCC.2018.8530997.","DOI":"10.1109\/ISNCC.2018.8530997"},{"key":"2992_CR90","doi-asserted-by":"publisher","unstructured":"Rajesh K, Riyaz K, Pallavi B, Reddy CSS, Raamkumar A, Baranitharan B (2022) A Smart Agriculture Storaging System with IOT Based. 2022 Int. Conf. Intell. Controll. Comput. Smart Power, ICICCSP 2022 https:\/\/doi.org\/10.1109\/ICICCSP53532.2022.9862427.","DOI":"10.1109\/ICICCSP53532.2022.9862427"},{"key":"2992_CR91","doi-asserted-by":"publisher","unstructured":"Ranjith J, Mahantesh K (2019) Privacy and Security issues in Smart Health Care. 4th Int. Conf. Electr. Electron. Commun. Comput. Technol. Optim. Tech. ICEECCOT 2019, pp. 378\u2013383, 2019, https:\/\/doi.org\/10.1109\/ICEECCOT46775.2019.9114681.","DOI":"10.1109\/ICEECCOT46775.2019.9114681"},{"key":"2992_CR92","doi-asserted-by":"publisher","unstructured":"Reyes RP, Vaca HP, Calderon MP, Montoya L, Aguilar WG (2017) Milnova: An approach to the IoT solution based on Model-Driven Engineering for the military health monitoring. 2017 Chil. Conf. Electr. Electron. Eng. Inf. Commun. Technol. CHILECON 2017 - Proc., vol. 2017-Janua, no. 2, pp. 1\u20135, 2017, https:\/\/doi.org\/10.1109\/CHILECON.2017.8229585.","DOI":"10.1109\/CHILECON.2017.8229585"},{"issue":"2","key":"2992_CR93","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"A Riahi Sfar","year":"2018","unstructured":"Riahi Sfar A, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digit Commun Networks 4(2):118\u2013137. https:\/\/doi.org\/10.1016\/j.dcan.2017.04.003","journal-title":"Digit Commun Networks"},{"key":"2992_CR94","doi-asserted-by":"publisher","unstructured":"Rizvi S, Kurtz A, Pfeffer J, Rizvi M (2018) Securing the Internet of Things (IoT): A Security Taxonomy for IoT. Proc. - 17th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. Trust. 2018, 163\u2013168, https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00034.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00034"},{"key":"2992_CR95","doi-asserted-by":"publisher","unstructured":"Routray SK, Javali A, Sahoo A, Sharmila KP, Anand S (2020) Military applications of satellite based IoT. Proc. 3rd Int. Conf. Smart Syst. Inven. Technol. ICSSIT 2020, no. Icssit, pp. 122\u2013127 https:\/\/doi.org\/10.1109\/ICSSIT48917.2020.9214284.","DOI":"10.1109\/ICSSIT48917.2020.9214284"},{"key":"2992_CR96","unstructured":"Saarika ST, Sandhya K (2017) 6Pduw 7Udqvsruwdwlrq 6\\Vwhp Xvlqj ,R7\u2019, 978-1-5386-0569-1$31.00 c?2017 IEEE, vol. 6, pp. 1104\u20131107, 2017."},{"key":"2992_CR97","doi-asserted-by":"publisher","unstructured":"Saifuzzaman M, Moon NN, Nur FN (2018) IoT based street lighting and traffic management system. 5th IEEE Reg. 10 Humanit. Technol. Conf. 2017, R10-HTC 2017, vol. 2018-Janua, 121\u2013124, 2018, https:\/\/doi.org\/10.1109\/R10-HTC.2017.8288921.","DOI":"10.1109\/R10-HTC.2017.8288921"},{"issue":"1","key":"2992_CR98","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1504\/ijitca.2018.090162","volume":"1","author":"QI Sarhan","year":"2018","unstructured":"Sarhan QI (2018) Internet of things: a survey of challenges and issues. Int J Internet Things Cyber-Assurance 1(1):40. https:\/\/doi.org\/10.1504\/ijitca.2018.090162","journal-title":"Int J Internet Things Cyber-Assurance"},{"key":"2992_CR99","doi-asserted-by":"publisher","unstructured":"Sarker S, Rakib A, Islam S, Shafin SS (2021) An IoT-based Smart Grid Technology\u202f: Bidirectional Power Flow, Smart Energy Metering, and Home Automation\u2019. https:\/\/doi.org\/10.1109\/ICMIAM54662.2021.9715188","DOI":"10.1109\/ICMIAM54662.2021.9715188"},{"issue":"1","key":"2992_CR100","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1032761","volume":"2018","author":"M Seliem","year":"2018","unstructured":"Seliem M, Elgazzar K, Khalil K (2018) Towards privacy preserving IoT environments: a survey. Wirel Commun Mob Comput 2018(1):1032761. https:\/\/doi.org\/10.1155\/2018\/1032761","journal-title":"Wirel Commun Mob Comput"},{"key":"2992_CR101","doi-asserted-by":"publisher","unstructured":"Sen P, Jha V, Abinash AA, Das SP, Srimat S (2022) Design of Smart Grid And Monitoring System Using IoT. 2022 Int. Conf. Intell. Controll. Comput. Smart Power, ICICCSP 2022 https:\/\/doi.org\/10.1109\/ICICCSP53532.2022.9862507.","DOI":"10.1109\/ICICCSP53532.2022.9862507"},{"key":"2992_CR102","unstructured":"Seskar I (2021) Communication Congestion Impact on State Estimation for Smart Grid Infrastructure, 0\u20133."},{"issue":"1","key":"2992_CR103","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MCOM.2018.1700467","volume":"56","author":"SAA Shah","year":"2018","unstructured":"Shah SAA, Ahmed E, Imran M, Zeadally S (2018) 5G for vehicular communications. IEEE Commun Mag 56(1):111\u2013117. https:\/\/doi.org\/10.1109\/MCOM.2018.1700467","journal-title":"IEEE Commun Mag"},{"issue":"11","key":"2992_CR104","doi-asserted-by":"publisher","first-page":"8809","DOI":"10.1109\/TIM.2020.2999175","volume":"69","author":"AL Shah","year":"2020","unstructured":"Shah AL, Mesbah W, Al-Awami AT (2020) An algorithm for accurate detection and correction of technical and nontechnical losses using smart metering. IEEE Trans Instrum Meas 69(11):8809\u20138820. https:\/\/doi.org\/10.1109\/TIM.2020.2999175","journal-title":"IEEE Trans Instrum Meas"},{"key":"2992_CR105","doi-asserted-by":"publisher","unstructured":"Sharmila P, Nandhini JM, Anuratha K, Joshi S (2022) An IoT based intelligent transport and road safety system. 2022 Int. Conf. Innov. Trends Inf. Technol. ICITIIT 2022, pp. 0\u20134, 2022, https:\/\/doi.org\/10.1109\/ICITIIT54346.2022.9744248.","DOI":"10.1109\/ICITIIT54346.2022.9744248"},{"key":"2992_CR106","doi-asserted-by":"publisher","unstructured":"Singh K, Singh Tomar DD (2019) Architecture, enabling technologies, security and privacy, and applications of internet of things: A survey\u2019, Proc. Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud), I-SMAC 2018, pp. 642\u2013646, 2019, https:\/\/doi.org\/10.1109\/I-SMAC.2018.8653708.","DOI":"10.1109\/I-SMAC.2018.8653708"},{"key":"2992_CR107","doi-asserted-by":"publisher","unstructured":"Singh AK, Verma K, Raj M (2021) IoT based Smart Agriculture System. 2021 5th Int. Conf. Inf. Syst. Comput. Networks, ISCON 2021, pp. 1\u20134, 2021, https:\/\/doi.org\/10.1109\/ISCON52037.2021.9702478.","DOI":"10.1109\/ISCON52037.2021.9702478"},{"key":"2992_CR108","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICMCIS.2016.7496574","volume":"2016","author":"N Suri","year":"2016","unstructured":"Suri N et al (2016) \u2018Analyzing the applicability of Internet of Things to the battlefield environment. 2016 Int Conf Mil Commun Inf Syst ICMCIS 2016:1\u20138. https:\/\/doi.org\/10.1109\/ICMCIS.2016.7496574","journal-title":"2016 Int Conf Mil Commun Inf Syst ICMCIS"},{"key":"2992_CR109","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/WF-IoT.2016.7845429","volume":"2016","author":"M Tellez","year":"2016","unstructured":"Tellez M, El-Tawab S, Heydari MH (2016) \u2018IoT security attacks using reverse engineering methods on WSN applications. 2016 IEEE 3rd World Forum Internet Things WF-IoT 2016:182\u2013187. https:\/\/doi.org\/10.1109\/WF-IoT.2016.7845429","journal-title":"2016 IEEE 3rd World Forum Internet Things WF-IoT"},{"key":"2992_CR110","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2021.101284","author":"A Tolba","year":"2021","unstructured":"Tolba A, Al-Makhadmeh Z (2021) A cybersecurity user authentication approach for securing smart grid communications. Sustain Energy Technol Assessments. https:\/\/doi.org\/10.1016\/j.seta.2021.101284","journal-title":"Sustain Energy Technol Assessments"},{"key":"2992_CR111","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105476","author":"M Torky","year":"2020","unstructured":"Torky M, Hassanein AE (2020) Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and challenges. Comput Electron Agric. https:\/\/doi.org\/10.1016\/j.compag.2020.105476","journal-title":"Comput Electron Agric"},{"key":"2992_CR112","doi-asserted-by":"publisher","unstructured":"Ullah A, Sehr I, Akbar M, Ning H (2018) FoG assisted secure de-duplicated data dissemination in smart healthcare IoT. 2018 IEEE Int. Conf. Smart Internet Things, 166\u2013171, https:\/\/doi.org\/10.1109\/smartiot.2018.00038.","DOI":"10.1109\/smartiot.2018.00038"},{"key":"2992_CR113","doi-asserted-by":"publisher","unstructured":"Ulybyshev D, Alsalem AO, Bhargava B, Savvides S, Mani G, Ben Othmane L (2018) Secure data communication in autonomous V2X systems. Proc. - 2018 IEEE Int. Congr. Internet Things, ICIOT 2018 - Part 2018 IEEE World Congr. Serv., pp. 156\u2013163, 2018, https:\/\/doi.org\/10.1109\/ICIOT.2018.00029.","DOI":"10.1109\/ICIOT.2018.00029"},{"key":"2992_CR114","doi-asserted-by":"publisher","unstructured":"Utsav A, Abhishek A, Suraj P, Badhai RK (2021) An IoT Based UAV network for military applications. 2021 Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2021, pp. 122\u2013125 https:\/\/doi.org\/10.1109\/WiSPNET51692.2021.9419470.","DOI":"10.1109\/WiSPNET51692.2021.9419470"},{"key":"2992_CR115","doi-asserted-by":"publisher","unstructured":"Vishnu S, Jino Ramson SR (2021) An internet of things paradigm: pandemic management (incl. COVID-19). Proc. - Int. Conf. Artif. Intell. Smart Syst. ICAIS 2021, pp. 1371\u20131375 https:\/\/doi.org\/10.1109\/ICAIS50930.2021.9395966.","DOI":"10.1109\/ICAIS50930.2021.9395966"},{"key":"2992_CR116","doi-asserted-by":"publisher","unstructured":"Vishnu S, Jino Ramson SR, Jegan R (2020) Internet of Medical Things (IoMT)-An overview. ICDCS 2020 - 2020 5th Int. Conf. Devices, Circuits Syst., 101\u2013104, 2020, https:\/\/doi.org\/10.1109\/ICDCS48716.2020.243558.","DOI":"10.1109\/ICDCS48716.2020.243558"},{"key":"2992_CR117","doi-asserted-by":"publisher","unstructured":"Vishwakarma SK, Upadhyaya P, Kumari B, Mishra AK (2019) Smart energy efficient home automation system using IoT\u2019, Proc. - 2019 4th Int. Conf. Internet Things Smart Innov. Usages, IoT-SIU 2019, pp. 1\u20134, 2019, https:\/\/doi.org\/10.1109\/IoT-SIU.2019.8777607.","DOI":"10.1109\/IoT-SIU.2019.8777607"},{"issue":"3","key":"2992_CR118","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSG.2012.2192487","volume":"3","author":"S Wang","year":"2012","unstructured":"Wang S et al (2012) A randomized response model for privacy preserving smart metering. IEEE Trans Smart Grid 3(3):1317\u20131324. https:\/\/doi.org\/10.1109\/TSG.2012.2192487","journal-title":"IEEE Trans Smart Grid"},{"key":"2992_CR119","doi-asserted-by":"publisher","first-page":"72862","DOI":"10.1109\/ACCESS.2018.2881447","volume":"6","author":"B Xu","year":"2018","unstructured":"Xu B et al (2018) A security design for the detecting of buffer overflow attacks in IoT device. IEEE Access 6:72862\u201372869. https:\/\/doi.org\/10.1109\/ACCESS.2018.2881447","journal-title":"IEEE Access"},{"issue":"2","key":"2992_CR120","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/TSG.2016.2585963","volume":"8","author":"Z Zhang","year":"2017","unstructured":"Zhang Z, Qin Z, Zhu L, Weng J, Ren K (2017a) Cost-friendly differential privacy for smart meters: exploiting the dual roles of the noise. IEEE Trans Smart Grid 8(2):619\u2013626. https:\/\/doi.org\/10.1109\/TSG.2016.2585963","journal-title":"IEEE Trans Smart Grid"},{"key":"2992_CR121","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comnet.2016.11.009","volume":"117","author":"X Zhang","year":"2017","unstructured":"Zhang X, Wen M, Lu K, Lei J (2017b) A privacy-aware data dissemination scheme for smart grid with abnormal data traceability. Comput Networks 117:32\u201341. https:\/\/doi.org\/10.1016\/j.comnet.2016.11.009","journal-title":"Comput Networks"},{"key":"2992_CR122","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2021.101208","author":"X Zhang","year":"2021","unstructured":"Zhang X, Manogaran G, Muthu BA (2021) IoT enabled integrated system for green energy into smart cities. Sustain Energy Technol Assessments. https:\/\/doi.org\/10.1016\/j.seta.2021.101208","journal-title":"Sustain Energy Technol Assessments"},{"issue":"3","key":"2992_CR123","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/s11390-014-1443-8","volume":"29","author":"XL Zheng","year":"2014","unstructured":"Zheng XL, Wan M (2014) A survey on data dissemination in wireless sensor networks. J Comput Sci Technol 29(3):470\u2013486. https:\/\/doi.org\/10.1007\/s11390-014-1443-8","journal-title":"J Comput Sci Technol"},{"issue":"5","key":"2992_CR124","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1109\/TC.2015.2435778","volume":"65","author":"X Zheng","year":"2016","unstructured":"Zheng X, Wang J, Dong W, He Y, Liu Y (2016) Bulk data dissemination in wireless sensor networks: analysis, implications and improvement. IEEE Trans Comput 65(5):1428\u20131439. https:\/\/doi.org\/10.1109\/TC.2015.2435778","journal-title":"IEEE Trans Comput"},{"key":"2992_CR125","doi-asserted-by":"publisher","unstructured":"Zhou XS, Cui LQ, Ma YJ (2010) Research on smart grid technology. ICCASM 2010 - 2010 Int. Conf. Comput. Appl. Syst. Model. Proc., vol. 3, no. Iccasm, pp. 599\u2013603, 2010, https:\/\/doi.org\/10.1109\/ICCASM.2010.5620576.","DOI":"10.1109\/ICCASM.2010.5620576"},{"key":"2992_CR126","doi-asserted-by":"publisher","first-page":"90036","DOI":"10.1109\/ACCESS.2019.2924486","volume":"7","author":"H Zhu","year":"2019","unstructured":"Zhu H et al (2019) A secure and efficient data integrity verification scheme for Cloud-IoT based on short signature. IEEE Access 7:90036\u201390044. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924486","journal-title":"IEEE Access"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02992-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02992-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02992-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T12:22:52Z","timestamp":1772886172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02992-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"references-count":126,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["2992"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02992-1","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"18 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest with each other or any external parties.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This is not applicable as the current research does not involve humans and animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}