{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:19:16Z","timestamp":1776183556915,"version":"3.50.1"},"reference-count":103,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:00:00Z","timestamp":1642723200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:00:00Z","timestamp":1642723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Healthcare has evolved significantly in recent years primarily due to the advancements in and increasing adoption of technology in healthcare processes such as data collection, storage, diagnostics, and treatment. The emergence of the industrial internet of things (IIoT) has further evolved e-Health by facilitating the development of connected healthcare systems which can significantly improve data connectivity, visibility, and interoperability leading to improved quality of service delivered to patients. However, such technological advancements come with their perils\u2014there are growing concerns with regards to the security and privacy of healthcare data especially when collected, shared, and processed using cutting-edge connected sensor devices affecting the adoption of next-generation e-healthcare systems. In particular, during the front-end and back-end data transfer in health information exchange (HIE) there exist a security risk in term of confidentiality, integrity, authentication and access control of the data due to the limited capabilities of IoT devices involved. In this paper, we investigate the use of distributed ledger technologies (DLT) to address such security concerns for emerging healthcare systems. In particular, we use masked authenticated messaging (MAM) over the<jats:italic>Tangle<\/jats:italic>to achieve secure data sharing within a healthcare system and provide a proof-of-concept of applying the proposed approach for securing healthcare data in a connected IIoT environment. Further, we have performed the evaluation and analysis of data communication against the metrics of encryption and efficiency in transaction time.<\/jats:p>","DOI":"10.1007\/s40747-021-00610-8","type":"journal-article","created":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T05:31:54Z","timestamp":1642743114000},"page":"3023-3041","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle"],"prefix":"10.1007","volume":"9","author":[{"given":"Sidrah","family":"Abdullah","sequence":"first","affiliation":[]},{"given":"Junaid","family":"Arshad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0011-9525","authenticated-orcid":false,"given":"Muhammad Mubashir","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Salah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,21]]},"reference":[{"key":"610_CR1","doi-asserted-by":"publisher","unstructured":"Hammi B, Khatoun R, Zeadally S,Fayad A, Khoukhi L Internet of things (iot) technologies for smart cities, IET Networks 7. https:\/\/doi.org\/10.1049\/iet-net.2017.0163","DOI":"10.1049\/iet-net.2017.0163"},{"key":"610_CR2","doi-asserted-by":"publisher","unstructured":"Samih H (2019) Smart cities and internet of things. J Inf Technol Case Appl Res pp 1\u201310. https:\/\/doi.org\/10.1080\/15228053.2019.1587572","DOI":"10.1080\/15228053.2019.1587572"},{"key":"610_CR3","doi-asserted-by":"publisher","unstructured":"Rajab H, Cinkler T (2018). Iot based smart cities. https:\/\/doi.org\/10.1109\/ISNCC.2018.8530997","DOI":"10.1109\/ISNCC.2018.8530997"},{"issue":"2","key":"610_CR4","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/TII.2014.2306397","volume":"10","author":"F Tao","year":"2014","unstructured":"Tao F, Zuo Y, Da Xu L, Zhang L (2014) Iot-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans Industr Inf 10(2):1547\u20131557","journal-title":"IEEE Trans Industr Inf"},{"key":"610_CR5","first-page":"10","volume":"10","author":"J Cheng","year":"2018","unstructured":"Cheng J, Chen W, Tao F, Lin C-L (2018) Industrial iot in 5g environment towards smart manufacturing, Journal of Industrial Information. Integration 10:10\u201319","journal-title":"Integration"},{"key":"610_CR6","doi-asserted-by":"publisher","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): a vision, architectural elements, and future directions. Fut Gen Comput Syst 29(7):1645\u20131660, including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services and Cloud Computing and Scientific Applications - Big Data, Scalable Analytics, and Beyond. https:\/\/doi.org\/10.1016\/j.future.2013.01.010","DOI":"10.1016\/j.future.2013.01.010"},{"key":"610_CR7","doi-asserted-by":"publisher","unstructured":"Alansari Z, Soomro S, Belgaum MR, Shamshirband S (2010) The rise of internet of things (iot) in big healthcare data: review and open research issues. arXiv:1904.09270. https:\/\/doi.org\/10.1007\/978-981-10-6875-1_66","DOI":"10.1007\/978-981-10-6875-1_66"},{"key":"610_CR8","doi-asserted-by":"publisher","unstructured":"Bashshur R, Shannon G, Krupinski E, Grigsby J (2012) Sustaining and realizing the promise of telemedicine, Telemedicine journal and e-health: the official journal of the American Telemedicine Association 19. https:\/\/doi.org\/10.1089\/tmj.2012.0282","DOI":"10.1089\/tmj.2012.0282"},{"key":"610_CR9","doi-asserted-by":"publisher","unstructured":"Eysenbach G (2001) What is e-health? J Med Internet Res 3(2):e20. https:\/\/doi.org\/10.2196\/jmir.3.2.e20","DOI":"10.2196\/jmir.3.2.e20"},{"key":"610_CR10","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1089\/tmj.2014.0102","volume":"21","author":"X Zheng","year":"2015","unstructured":"Zheng X, Rodr\u00edguez-Monroy C (2015) The development of intelligent healthcare in China. Telemed e-Health 21:443\u2013448. https:\/\/doi.org\/10.1089\/tmj.2014.0102","journal-title":"Telemed e-Health"},{"key":"610_CR11","doi-asserted-by":"publisher","unstructured":"Fatehi F, Wootton R (2012) Telemedicine, telehealth or e-health? A bibliometric analysis of the trends in the use of these terms. J Telemed Telecare 18. https:\/\/doi.org\/10.1258\/jtt.2012.GTH108","DOI":"10.1258\/jtt.2012.GTH108"},{"key":"610_CR12","doi-asserted-by":"publisher","unstructured":"Hwang YH (2015) Iot security & privacy: threats and challenges. In: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, IoTPTS\u201915, association for computing machinery, New York, NY. https:\/\/doi.org\/10.1145\/2732209.2732216","DOI":"10.1145\/2732209.2732216"},{"key":"610_CR13","doi-asserted-by":"publisher","unstructured":"Dabbagh M, Rayes A (2017) Internet of things security and privacy, pp 195\u2013223. https:\/\/doi.org\/10.1007\/978-3-319-44860-2_8","DOI":"10.1007\/978-3-319-44860-2_8"},{"key":"610_CR14","unstructured":"Peterson KJ, Deeduvanu R, Kanjamala P, Mayo K (2016) A blockchain-based approach to health information exchange networks"},{"key":"610_CR15","doi-asserted-by":"publisher","first-page":"155079","DOI":"10.4108\/eai.13-7-2018.155079","volume":"4","author":"A Chacko","year":"2018","unstructured":"Chacko A, Hayajneh T (2018) Security and privacy issues with iot in healthcare. EAI Endorsed Trans Pervasive Health Technol 4:155079. https:\/\/doi.org\/10.4108\/eai.13-7-2018.155079","journal-title":"EAI Endorsed Trans Pervasive Health Technol"},{"key":"610_CR16","doi-asserted-by":"publisher","unstructured":"Butt S, Diaz-Martinez J, Jamal T, Ali A, De la Hoz E, Shoaib M (2019) Iot smart health security threats. https:\/\/doi.org\/10.1109\/ICCSA.2019.000-8","DOI":"10.1109\/ICCSA.2019.000-8"},{"key":"610_CR17","doi-asserted-by":"crossref","unstructured":"Sadek I, Rehman SU, Codjo J, Abdulrazak B (2019) Privacy and security of iot based healthcare systems: Concerns, solutions, and recommendations. In: Pag\u00e1n J, Mokhtari M, Aloulou H, Abdulrazak B, Cabrera MF (eds) How AI impacts urban living and public health. Springer, Cham, pp 3\u201317","DOI":"10.1007\/978-3-030-32785-9_1"},{"key":"610_CR18","unstructured":"Regulation (eu) (2016) 2016\/679 of the European parliament and of the council, [Online; accessed March 07, 2020]. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679"},{"key":"610_CR19","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1093\/jamia\/ocx068","volume":"24","author":"T-T Kuo","year":"2017","unstructured":"Kuo T-T, Kim H, Ohno-Machado L (2017) Blockchain distributed ledger technologies for biomedical and health care applications. J Am Med Inform Assoc 24:1211\u20131220. https:\/\/doi.org\/10.1093\/jamia\/ocx068","journal-title":"J Am Med Inform Assoc"},{"key":"610_CR20","doi-asserted-by":"publisher","unstructured":"Angraal S, Krumholz H, Schulz W (2017) Blockchain technology: applications in health care. Circ Cardiovasc Qual Outcomes 10:e003800. https:\/\/doi.org\/10.1161\/CIRCOUTCOMES.117.003800","DOI":"10.1161\/CIRCOUTCOMES.117.003800"},{"key":"610_CR21","doi-asserted-by":"publisher","unstructured":"Gordon WJ, Catalini C (2018) Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability, computational and structural. Biotechnol J 16:224\u2013230. https:\/\/doi.org\/10.1016\/j.csbj.2018.06.003. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S200103701830028X","DOI":"10.1016\/j.csbj.2018.06.003"},{"key":"610_CR22","doi-asserted-by":"publisher","unstructured":"Brogan J, Baskaran I, Ramachandran N (2018) Authenticating health activity data using distributed ledger technologies, computational and structural. Biotechnol J 16:257\u2013266. https:\/\/doi.org\/10.1016\/j.csbj.2018.06.004. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2001037018300345","DOI":"10.1016\/j.csbj.2018.06.004"},{"issue":"6","key":"610_CR23","doi-asserted-by":"publisher","first-page":"e13665","DOI":"10.2196\/13665","volume":"21","author":"D Hawig","year":"2019","unstructured":"Hawig D, Zhou C, Fuhrhop S, Fialho AS, Ramachandran N (2019) Designing a distributed ledger technology system for interoperable and general data protection regulation-compliant health data exchange: A use case in blood glucose data. J Med Internet Res 21(6):e13665","journal-title":"J Med Internet Res"},{"key":"610_CR24","doi-asserted-by":"publisher","unstructured":"Bartolomeu P, Vieira E, Ferreira J (2018) Iota feasibility and perspectives for enabling vehicular applications 1\u20137. https:\/\/doi.org\/10.1109\/GLOCOMW.2018.8644201","DOI":"10.1109\/GLOCOMW.2018.8644201"},{"key":"610_CR25","unstructured":"Gropper A (2016) Powering the physician-patient relationship with hie of one blockchain health"},{"key":"610_CR26","doi-asserted-by":"publisher","unstructured":"Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: using blockchain for medical data access and permission management, pp 25\u201330. https:\/\/doi.org\/10.1109\/OBD.2016.11","DOI":"10.1109\/OBD.2016.11"},{"key":"610_CR27","doi-asserted-by":"publisher","unstructured":"Biradar DMN (2018) Iota-next generation block chain. Int J Eng Comput Sci 7 23823\u201323826. https:\/\/doi.org\/10.18535\/ijecs\/v7i4.05","DOI":"10.18535\/ijecs\/v7i4.05"},{"key":"610_CR28","unstructured":"Popov S (2015) The tangle"},{"key":"610_CR29","doi-asserted-by":"publisher","first-page":"e1","DOI":"10.2196\/jmir.7.1.e1","volume":"7","author":"H Oh","year":"2005","unstructured":"Oh H, Rizo C, Enkin M, Jadad A (2005) What is ehealth (3): a systematic review of published definitions. J Med Internet Res 7:e1. https:\/\/doi.org\/10.2196\/jmir.7.1.e1","journal-title":"J Med Internet Res"},{"key":"610_CR30","doi-asserted-by":"publisher","first-page":"e9","DOI":"10.2196\/jmir.7.1.e9","volume":"7","author":"C Pagliari","year":"2005","unstructured":"Pagliari C, Sloan D, Gregor P, Sullivan F, Detmer D, Kahan J, Oortwijn W, Macgillivray S (2005) What is ehealth (4): a scoping exercise to map the field. J Med Internet Res 7:e9. https:\/\/doi.org\/10.2196\/jmir.7.1.e9","journal-title":"J Med Internet Res"},{"key":"610_CR31","unstructured":"WHO (2020) World health organization, Retrieved from https:\/\/www.who.int\/ [Online; accessed April 20, 2020]"},{"key":"610_CR32","unstructured":"WHO (2020) ehealth at who, Retrieved from https:\/\/www.who.int\/ehealth\/about\/en\/ [Online; accessed April 20, 2020]"},{"key":"610_CR33","doi-asserted-by":"publisher","unstructured":"Sahama T, Simpson L, Lane B (2013) Security and privacy in ehealth: Is it possible? pp 249\u2013253. https:\/\/doi.org\/10.1109\/HealthCom.2013.6720676","DOI":"10.1109\/HealthCom.2013.6720676"},{"key":"610_CR34","doi-asserted-by":"crossref","unstructured":"Acheson ED (1964) Oxford record linkage study. A central file of morbidity and mortality records for a pilot population. Br J Prevent Soc Med 18:8\u201313","DOI":"10.1136\/jech.18.1.8"},{"key":"610_CR35","doi-asserted-by":"publisher","first-page":"24","DOI":"10.4066\/AMJ.2014.1900","volume":"7","author":"E Fahy","year":"2014","unstructured":"Fahy E, Hardikar R, Fox A, Mackay S (2014) Quality of patient health information on the internet: reviewing a complex and evolving landscape. Aust Med J 7:24\u201328. https:\/\/doi.org\/10.4066\/AMJ.2014.1900","journal-title":"Aust Med J"},{"key":"610_CR36","doi-asserted-by":"crossref","unstructured":"Marks P (2014) Hacked to death","DOI":"10.1016\/S0262-4079(14)62137-0"},{"key":"610_CR37","doi-asserted-by":"publisher","unstructured":"Plante T, Urrea B, MacFarlane Z, Blumenthal R, Miller E, Appel L, Martin S (2016) Validation of the instant blood pressure smartphone app. JAMA Int Med. https:\/\/doi.org\/10.1001\/jamainternmed.2016.0157","DOI":"10.1001\/jamainternmed.2016.0157"},{"key":"610_CR38","doi-asserted-by":"publisher","first-page":"e36","DOI":"10.2196\/mhealth.3505","volume":"3","author":"E Hekler","year":"2015","unstructured":"Hekler E, Buman M, Grieco L, Rosenberger M, Winter S, Haskell W, King A (2015) Validation of physical activity tracking via android smartphones compared to actigraph accelerometer: laboratory-based and free-living validation studies. JMIR Mhealth Uhealth 3:e36. https:\/\/doi.org\/10.2196\/mhealth.3505","journal-title":"JMIR Mhealth Uhealth"},{"key":"610_CR39","unstructured":"Haque ME, Ahsan MA, Rahman F, Islam A, EmdadulHaque M (2019) The challenges of ehealth implementation in developing countries: a literature review"},{"key":"610_CR40","doi-asserted-by":"publisher","unstructured":"Gardiyawasam\u00a0Pussewalage H, Oleshchuk V (2016) Privacy preserving mechanisms for enforcing security and privacy requirements in e-health solutions. Int J Inf Manag 36:1161\u20131173. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2016.07.006","DOI":"10.1016\/j.ijinfomgt.2016.07.006"},{"key":"610_CR41","doi-asserted-by":"publisher","unstructured":"Ghazvini A, Shukur Z Security challenges and success factors of electronic healthcare system. Procedia Technol. https:\/\/doi.org\/10.1016\/j.protcy.2013.12.183","DOI":"10.1016\/j.protcy.2013.12.183"},{"key":"610_CR42","doi-asserted-by":"publisher","unstructured":"Coppolino L, D\u2019Antonio S, Mazzeo G, Romano L (2017) Cloud security: emerging threats and current solutions. Comput Electr Eng 59:126\u2013140. https:\/\/doi.org\/10.1016\/j.compeleceng.2016.03.004. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0045790616300544","DOI":"10.1016\/j.compeleceng.2016.03.004"},{"key":"610_CR43","unstructured":"U.\u00a0D. of\u00a0Health, H.\u00a0Services (2013) Federal register, Retrieved from https:\/\/www.govinfo.gov\/content\/pkg\/FR-2013-01-25\/pdf\/2013-01073.pdf"},{"key":"610_CR44","doi-asserted-by":"publisher","unstructured":"Dom\u00ednguez\u00a0Mayo F.\u00a0J, Escalona M, Mej\u00edas M, Arag\u00f3n G, Garcia-Garcia J, Torres J, Enr\u00edquez J (2015) A strategic study about quality characteristics in e-health systems based on a systematic literature review. Sci World J 2015:1\u201311. https:\/\/doi.org\/10.1155\/2015\/863591","DOI":"10.1155\/2015\/863591"},{"key":"610_CR45","unstructured":"Scholl M, Stine K, Hash J, Bowen P, Johnson A, Dancy\u00a0Smith C, Steinberg DI (2013) An introductory resource guide for implementing the health insurance portability and accountability act (hipaa) security rule. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-66r1.pdf"},{"key":"610_CR46","doi-asserted-by":"publisher","unstructured":"Bleikertz S, Schunter M, Probst C, Pendarakis D, Eriksson K (2010) Security audits of multi-tier virtual infrastructures in public infrastructure clouds, pp 93\u2013102. https:\/\/doi.org\/10.1145\/1866835.1866853","DOI":"10.1145\/1866835.1866853"},{"issue":"2","key":"610_CR47","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Privacy 9(2):50\u201357","journal-title":"IEEE Secur Privacy"},{"key":"610_CR48","doi-asserted-by":"publisher","unstructured":"Vora J, Nayyar A, Tanwar S, Tyagi S, Kumar N, Obaidat M, Rodrigues J (2019) Bheem: a blockchain-based framework for securing electronic health records. https:\/\/doi.org\/10.1109\/GLOCOMW.2018.8644088","DOI":"10.1109\/GLOCOMW.2018.8644088"},{"key":"610_CR49","doi-asserted-by":"crossref","unstructured":"Badr S, Gomaa IA, Abd-Elrahman E (2018) Multi-tier blockchain framework for iot-ehrs systems. In: EUSPN\/ICTH","DOI":"10.1016\/j.procs.2018.10.162"},{"key":"610_CR50","doi-asserted-by":"publisher","unstructured":"Radanovic I, Likic R (2018) Opportunities for use of blockchain technology in medicine. Appl Health Econ Health Policy 16. https:\/\/doi.org\/10.1007\/s40258-018-0412-8","DOI":"10.1007\/s40258-018-0412-8"},{"key":"610_CR51","first-page":"650","volume":"2017","author":"A Dubovitskaya","year":"2017","unstructured":"Dubovitskaya A, Xu Z, Ryu S, Schumacher M, Wang F (2017) Secure and trustable electronic medical records sharing using blockchain, AMIA Annual Symposium proceedings. AMIA Sympos 2017:650\u2013659","journal-title":"AMIA Sympos"},{"key":"610_CR52","doi-asserted-by":"crossref","unstructured":"Rifi N, Rachkidi EE, Agoulmine N, Taher NC (2017) Towards using blockchain technology for ehealth data access management. In: 2017 Fourth international conference on advances in biomedical engineering (ICABME), pp 1\u20134","DOI":"10.1109\/ICABME.2017.8167555"},{"key":"610_CR53","unstructured":"da\u00a0Concei\u00e7\u00e3o AF, da Silva FSC, Rocha V, Locoro A, Barguil JM. Eletronic health records using blockchain technology. arXiv:1804.10078"},{"key":"610_CR54","doi-asserted-by":"crossref","unstructured":"Dias J.\u00a0P, Ferreira H.\u00a0S, Martins A(2018) A blockchain-based scheme for access control in e-health scenarios, in: SoCPaR","DOI":"10.1007\/978-3-030-17065-3_24"},{"key":"610_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0982-x","volume":"42","author":"KN Griggs","year":"2018","unstructured":"Griggs KN, Ossipova O, Kohlios CP, Baccarini AN, Howson EA, Hayajneh T (2018) Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J Med Syst 42:1\u20137","journal-title":"J Med Syst"},{"key":"610_CR56","doi-asserted-by":"publisher","unstructured":"Zheng X, Sun S, Mukkamala RR, Vatrapu R, Ordieres-Mer\u00e9 J (2019) Accelerating health data sharing: A solution based on the internet of things and distributed ledger technologies. J Med Internet Res 21(6):e13583. https:\/\/doi.org\/10.2196\/13583","DOI":"10.2196\/13583"},{"key":"610_CR57","doi-asserted-by":"crossref","unstructured":"Decker C, Wattenhofer R (2013) Information propagation in the bitcoin network. IEEE 1\u201310","DOI":"10.1109\/P2P.2013.6688704"},{"key":"610_CR58","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system, Bitcoin"},{"key":"610_CR59","doi-asserted-by":"crossref","unstructured":"Narayanan A, Bonneau J, Felten E, Miller A, Goldfeder S (2016) Bitcoin and cryptocurrency technologies. Network Security 2016(8):4 10.1016\/S1353-4858(16)30074-5. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1353485816300745","DOI":"10.1016\/S1353-4858(16)30074-5"},{"key":"610_CR60","unstructured":"Walport M (2016) Distributed ledger technology: Beyond block-chain, Retrieved from https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/492972\/gs-16-1-distributed-ledger-technology.pdf"},{"key":"610_CR61","unstructured":"Al-Kuwari S, Davenport J, Bradford R (2011) Cryptographic hash functions: Recent design trends and security notions., IACR Cryptology ePrint Archive 2011 565"},{"key":"610_CR62","unstructured":"Wikipedia contributors, Online transaction processing \u2014 Wikipedia, the free encyclopedia, https:\/\/en.wikipedia.org\/w\/index.php?title=Online_transaction_processing&oldid=945154394, [Online; accessed 14-April-2020] (2020)"},{"key":"610_CR63","unstructured":"Sultan K, Ruhi U, Lakhani R (2018) Conceptualizing blockchains: Characteristics & applications"},{"key":"610_CR64","doi-asserted-by":"publisher","unstructured":"Gupta S, Sadoghi M Blockchain transaction processing https:\/\/doi.org\/10.1007\/978-3-319-63962-8_333-1","DOI":"10.1007\/978-3-319-63962-8_333-1"},{"key":"610_CR65","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H.-N, Chen X, Wang H An overview of blockchain technology: Architecture, consensus, and future trends, 2017. https:\/\/doi.org\/10.1109\/BigDataCongress.2017.85","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"610_CR66","unstructured":"NRI, Survey on blockchain technologies and related services fy2015 report, 2016, online. https:\/\/www.meti.go.jp\/english\/press\/2016\/pdf\/0531_01f.pdf"},{"key":"610_CR67","unstructured":"Evans D (2011) How the next evolution of the internet is changing everything"},{"key":"610_CR68","unstructured":"Greenspan D.\u00a0G (2015) Multichain private blockchain, [Online; accessed March 07, 2020]. https:\/\/www.multichain.com\/download\/MultiChain-White-Paper.pdf"},{"key":"610_CR69","unstructured":"Filippi P.\u00a0D (2016) The interplay between decentralization and privacy: The case of blockchain technologies"},{"key":"610_CR70","unstructured":"M\u00f6ser M (2013) Anonymity of bitcoin transactions an analysis of mixing services"},{"key":"610_CR71","unstructured":"Confirmed transactions per day, [Online; accessed March 12, 2020]. https:\/\/www.blockchain.com\/charts\/n-transactions"},{"key":"610_CR72","doi-asserted-by":"publisher","first-page":"5665","DOI":"10.18632\/oncotarget.22345","volume":"9","author":"P Mamoshina","year":"2018","unstructured":"Mamoshina P, Ojomoko L, Yanovich Y, Ostrovski A, Botezatu A, Prikhodko P, Izumchenko E, Aliper A, Romantsov K, Zhebrak A, Ogu I, Zhavoronkov A (2018) Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare. Oncotarget 9:5665\u20135690. https:\/\/doi.org\/10.18632\/oncotarget.22345","journal-title":"Oncotarget"},{"key":"610_CR73","unstructured":"Ethereum, [Online; accessed March 12, 2020]. https:\/\/ethereum.org\/developers\/"},{"key":"610_CR74","unstructured":"Iota blog, [Online; accessed March 12, 2020]. https:\/\/www.iota.org\/research\/meet-the-tangle"},{"key":"610_CR75","unstructured":"Bitcoin confirmation, [Online; accessed March 12, 2020]. https:\/\/en.bitcoin.it\/wiki\/Confirmation"},{"key":"610_CR76","unstructured":"Baird L The swirlds hashgraph consensus algorithm: fair, fast, byzantine fault tolerance[Online; accessed September 30, 2020]"},{"key":"610_CR77","doi-asserted-by":"crossref","unstructured":"Schueffel P Alternative distributed ledger technologies blockchain vs. tangle vs. hashgraph - a high-level overview and comparison -, SSRN Electronic Journal https:\/\/doi.org\/10.2139\/ssrn.3144241","DOI":"10.2139\/ssrn.3144241"},{"key":"610_CR78","doi-asserted-by":"publisher","unstructured":"N. El Ioini, C. Pahl, A Review of Distributed Ledger Technologies: Confederated International Conferences: CoopIS, C&TC, and ODBASE (2018) Valletta, Malta, October 22\u201326, 2018. Proceedings, Part II 2018:277\u2013288. https:\/\/doi.org\/10.1007\/978-3-030-02671-4_16","DOI":"10.1007\/978-3-030-02671-4_16"},{"key":"610_CR79","unstructured":"Bu G, Hana W, Potop-Butucaru M Metamorphic iota (07 2019)"},{"key":"610_CR80","doi-asserted-by":"crossref","unstructured":"Akhtar M.\u00a0M, Rizvi D.\u00a0R, Ahad M.\u00a0A, Kanhere S.\u00a0S, Amjad M, Coviello G Efficient data communication using distributed ledger technology and iota-enabled internet of things for a future machine-to-machine economy, Sensors 21\u00a0(13). https:\/\/doi.org\/10.3390\/s21134354 URL https:\/\/www.mdpi.com\/1424-8220\/21\/13\/4354","DOI":"10.3390\/s21134354"},{"key":"610_CR81","unstructured":"Back A Hashcash - a denial of service counter-measure"},{"key":"610_CR82","doi-asserted-by":"publisher","first-page":"30","DOI":"10.3390\/asi2030030","volume":"2","author":"O Lamtzidis","year":"2019","unstructured":"Lamtzidis O, Pettas D, Gialelis J (2019) A novel combination of distributed ledger technologies on internet of things: Use case on precision agriculture. Applied System Innovation 2:30. https:\/\/doi.org\/10.3390\/asi2030030","journal-title":"Applied System Innovation"},{"key":"610_CR83","unstructured":"Wikipedia contributors, Double-spending \u2014 Wikipedia, the free encyclopedia, [Online; accessed 29-April-2020 ] (2020). https:\/\/en.wikipedia.org\/w\/index.php?title=Double-spending&oldid=944880185"},{"issue":"6","key":"610_CR84","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MNET.2019.1900002","volume":"33","author":"B Cao","year":"2019","unstructured":"Cao B, Li Y, Zhang L, Zhang L, Mumtaz S, Zhou Z, Peng M (2019) When internet of things meets blockchain: Challenges in distributed consensus. IEEE Network 33(6):133\u2013139","journal-title":"IEEE Network"},{"key":"610_CR85","doi-asserted-by":"crossref","unstructured":"Alsbou\u2019i T, Qin Y, Hill R (2019) Towards a scalable iota tangle-based distributed intelligence approach for the internet of things","DOI":"10.1007\/978-3-030-52246-9_35"},{"key":"610_CR86","unstructured":"MobiFish, Trit & tryte (2021). https:\/\/www.mobilefish.com\/download\/iota\/trits_trytes_part2.pdf"},{"key":"610_CR87","unstructured":"Handy P (2017) Introducing masked authenticated messaging, https:\/\/blog.iota.org\/introducing-masked-authenticated-messaging-e55c1822d50e"},{"key":"610_CR88","unstructured":"IOTA, Masked authenticated messaging, https:\/\/github.com\/iotaledger\/mam.client.js\/ (2020)"},{"key":"610_CR89","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume":"435","author":"R Merkle","year":"1989","unstructured":"Merkle R (1989) A certified digital signature 435:218\u2013238. https:\/\/doi.org\/10.1007\/0-387-34805-0_21","journal-title":"A certified digital signature"},{"key":"610_CR90","unstructured":"ABmushi, Iota: Mam eloquently explained (2018). https:\/\/medium.com\/coinmonks\/iota-mam-eloquently-explained-d7505863b413"},{"key":"610_CR91","unstructured":"The google fit sdk, [Online; accessed March 07, 2020]. https:\/\/developers.google.com\/fit"},{"key":"610_CR92","unstructured":"Raspberry pi, [Online; accessed March 07, 2020]. https:\/\/www.raspberrypi.org\/"},{"key":"610_CR93","unstructured":"Google fit, [Online; accessed March 07, 2020]. https:\/\/www.google.com\/fit\/"},{"key":"610_CR94","unstructured":"Firebase, [Online; accessed March 07, 2020]. https:\/\/firebase.google.com\/"},{"key":"610_CR95","unstructured":"Qr code, [Online; accessed March 07, 2020]. https:\/\/en.wikipedia.org\/wiki\/QR_code"},{"key":"610_CR96","unstructured":"Devnet, [Online; accessed March 07, 2020]. https:\/\/devnet.thetangle.org\/nodes"},{"key":"610_CR97","unstructured":"Node.js, [Online; accessed March 07, 2020]. https:\/\/nodejs.org\/en\/"},{"key":"610_CR98","unstructured":"Mam, [Online; accessed March 07, 2020]. https:\/\/github.com\/iotaledger\/MAM"},{"key":"610_CR99","unstructured":"Mam wrapper, [Online; accessed March 07, 2020]. https:\/\/github.com\/iotaledger\/mam.client.js\/"},{"key":"610_CR100","unstructured":"Amazon, Amazon web services, https:\/\/aws.amazon.com\/ (2020)"},{"key":"610_CR101","unstructured":"IOTA, Pyota: The iota python api library, https:\/\/github.com\/iotaledger\/iota.py (2020)"},{"key":"610_CR102","unstructured":"Lamberti R (2018) Random access authenticated messaging - an alternative messaging protocol for iota . https:\/\/blog.usejournal.com\/random-access-authenticated-messaging-45a5f40f2532"},{"key":"610_CR103","unstructured":"Smart health it (2020). https:\/\/smarthealthit.org\/"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00610-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00610-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00610-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T17:57:37Z","timestamp":1726509457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00610-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,21]]},"references-count":103,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["610"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00610-8","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,21]]},"assertion":[{"value":"9 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}