{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:52:04Z","timestamp":1777593124870,"version":"3.51.4"},"reference-count":174,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very important aspect of peer-to-peer communication. Secure session keys enable these resource-constrained devices to authenticate each other. After successful authentication, a device can be authorized and can be granted access to shared resources. The need for validating a device requesting data transfer to avoid data privacy breaches that may compromise confidentiality and integrity. Blockchain and artificial intelligence (AI) both are extensively being used as an integrated part of IoT networks for security enhancements. Blockchain provides a decentralized mechanism to store validated session keys that can be allotted to the network devices. Blockchain is also used to load balance the stressing edge devices during low battery levels. AI on the other hand provides better learning and adaptiveness towards IoT attacks. The integration of newer technologies in IoT key management yields enhanced security features. In this article, we systematically survey recent trending technologies from an IoT security point of view and discuss traditional key security mechanisms. This article delivers a comprehensive quality study for researchers on\u00a0authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity.<\/jats:p>","DOI":"10.1007\/s40747-022-00667-z","type":"journal-article","created":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T03:03:44Z","timestamp":1645671824000},"page":"3559-3591","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":92,"title":["Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7898-3922","authenticated-orcid":false,"given":"Ankit","family":"Attkan","sequence":"first","affiliation":[]},{"given":"Virender","family":"Ranga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,24]]},"reference":[{"key":"667_CR1","doi-asserted-by":"crossref","unstructured":"Badamasi YA (2014) The working principle of an Arduino. In: 2014 11th international conference on electronics, computer and computation (ICECCO). IEEE, pp 1\u20134","DOI":"10.1109\/ICECCO.2014.6997578"},{"key":"667_CR2","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.procs.2020.02.041","volume":"166","author":"K Zhou","year":"2020","unstructured":"Zhou K, Yuan Y (2020) A smart ammunition library management system based on raspberry pie. Procedia Comput Sci 166:165\u2013169","journal-title":"Procedia Comput Sci"},{"key":"667_CR3","doi-asserted-by":"crossref","unstructured":"Abdelhafez HA, Halawa H, Pattabiraman K, Ripeanu M (2021) Snowflakes at the Edge: A Study of Variability among NVIDIA Jetson AGX Xavier Boards. In: Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking, pp 1\u20136","DOI":"10.1145\/3434770.3459729"},{"issue":"12","key":"667_CR4","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2012.6384464","volume":"50","author":"A Sehgal","year":"2012","unstructured":"Sehgal A, Perelman V, Kuryla S, Schonwalder J (2012) Management of resource constrained devices in the internet of things. IEEE Commun Mag 50(12):144\u2013149","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"667_CR5","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.3390\/s20041042","volume":"20","author":"L Garc\u00eda","year":"2020","unstructured":"Garc\u00eda L, Parra L, Jimenez JM, Lloret J, Lorenz P (2020) IoT-based smart irrigation systems: an overview on the recent trends on sensors and IoT systems for irrigation in precision agriculture. Sensors 20(4):1042","journal-title":"Sensors"},{"issue":"1","key":"667_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-019-1925-y","volume":"2","author":"S Selvaraj","year":"2020","unstructured":"Selvaraj S, Sundaravaradhan S (2020) Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl Sci 2(1):1\u20138","journal-title":"SN Appl Sci"},{"key":"667_CR7","doi-asserted-by":"crossref","unstructured":"Seregni M, Sassanelli C, Cerri D, Zanetti C, Terzi S (2016) The impact of IoT technologies on product-oriented PSS: The \u201chome delivery\u201d service case. In: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI). IEEE, pp 1\u20135","DOI":"10.1109\/RTSI.2016.7740631"},{"key":"667_CR8","first-page":"463","volume-title":"European Symposium on Research in Computer Security","author":"G Avoine","year":"2019","unstructured":"Avoine G, Canard S, Ferreira L (2019) IoT-friendly AKE: forward secrecy and session resumption meet symmetric-key cryptography. European Symposium on Research in Computer Security. Springer, Cham, pp 463\u2013483"},{"issue":"2","key":"667_CR9","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TII.2014.2306772","volume":"10","author":"G Xiao","year":"2014","unstructured":"Xiao G, Guo J, Da Xu L, Gong Z (2014) User interoperability with heterogeneous IoT devices through transformation. IEEE Trans Industr Inf 10(2):1486\u20131496","journal-title":"IEEE Trans Industr Inf"},{"issue":"7","key":"667_CR10","first-page":"1617","volume":"13","author":"A Gupta","year":"2017","unstructured":"Gupta A, Christie R, Manjula PR (2017) Scalability in internet of things: features, techniques and research challenges. Int J Comput Intell Res 13(7):1617\u20131627","journal-title":"Int J Comput Intell Res"},{"key":"667_CR11","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-981-15-1301-5_27","volume-title":"International Conference on Smart City and Informatization","author":"G Srivastava","year":"2019","unstructured":"Srivastava G, Parizi RM, Dehghantanha A, Choo KKR (2019) Data sharing and privacy for patient iot devices using blockchain. International Conference on Smart City and Informatization. Springer, Singapore, pp 334\u2013348"},{"key":"667_CR12","doi-asserted-by":"crossref","unstructured":"Shaw RN, Walde P, Ghosh A (2020) IOT based MPPT for performance improvement of solar PV arrays operating under partial shade dispersion. In: 2020 IEEE 9th Power India International Conference (PIICON). IEEE, pp 1\u20134","DOI":"10.1109\/PIICON49524.2020.9112952"},{"issue":"7","key":"667_CR13","doi-asserted-by":"publisher","first-page":"6046","DOI":"10.1109\/JIOT.2019.2958097","volume":"7","author":"F Song","year":"2019","unstructured":"Song F, Zhu M, Zhou Y, You I, Zhang H (2019) Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE Int Things J 7(7):6046\u20136055","journal-title":"IEEE Int Things J"},{"key":"667_CR14","doi-asserted-by":"crossref","unstructured":"Dey M, Nazari A, Zajic A, Prvulovic M (2018) Emprof: Memory profiling via em-emanation in iot and hand-held devices. In: 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, pp 881\u2013893","DOI":"10.1109\/MICRO.2018.00076"},{"issue":"6","key":"667_CR15","doi-asserted-by":"publisher","first-page":"4965","DOI":"10.1109\/JIOT.2018.2875240","volume":"5","author":"O Shwartz","year":"2018","unstructured":"Shwartz O, Mathov Y, Bohadana M, Elovici Y, Oren Y (2018) Reverse engineering IoT devices: effective techniques and methods. IEEE Int Things J 5(6):4965\u20134976","journal-title":"IEEE Int Things J"},{"issue":"2","key":"667_CR16","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/JSEN.2013.2282292","volume":"14","author":"C Perera","year":"2013","unstructured":"Perera C, Zaslavsky A, Liu CH, Compton M, Christen P, Georgakopoulos D (2013) Sensor search techniques for sensing as a service architecture for the internet of things. IEEE Sens J 14(2):406\u2013420","journal-title":"IEEE Sens J"},{"key":"667_CR17","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-319-60435-0_18","volume-title":"Internet of things and big data analytics toward next-generation intelligence","author":"HD Tsague","year":"2018","unstructured":"Tsague HD, Twala B (2018) Practical techniques for securing the Internet of Things (IoT) against side channel attacks. Internet of things and big data analytics toward next-generation intelligence. Springer, Cham, pp 439\u2013481"},{"key":"667_CR18","doi-asserted-by":"crossref","unstructured":"Deogirikar J, Vidhate A (2017) Security attacks in IoT: A survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, pp 32\u201337","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"667_CR19","doi-asserted-by":"publisher","first-page":"71856","DOI":"10.1109\/ACCESS.2021.3079312","volume":"9","author":"AK Das","year":"2021","unstructured":"Das AK, Bera B, Wazid M, Jamal SS, Park Y (2021) On the security of a secure and lightweight authentication scheme for next generation IoT infrastructure. IEEE Access 9:71856\u201371867","journal-title":"IEEE Access"},{"key":"667_CR20","doi-asserted-by":"crossref","unstructured":"Yadav P, Feraudo A, Arief B, Shahandashti SF, Vassilakis VG (2020) Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. In: Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, pp 62\u201368","DOI":"10.1145\/3417313.3429384"},{"key":"667_CR21","doi-asserted-by":"crossref","unstructured":"Ni T, Gu X, Wang H, Li Y (2013) Real-time detection of application-layer DDoS attack using time series analysis. J Control Sci Eng","DOI":"10.1155\/2013\/821315"},{"key":"667_CR22","doi-asserted-by":"crossref","unstructured":"Schellenberg F, Gnad DR, Moradi A, Tahoori MB (2018) An inside job: Remote power analysis attacks on FPGAs. In: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, pp 1111\u20131116","DOI":"10.23919\/DATE.2018.8342177"},{"key":"667_CR23","volume-title":"Fault analysis in cryptography (Vol. 147)","year":"2012","unstructured":"Joye M, Tunstall M (eds) (2012) Fault analysis in cryptography (Vol. 147). Springer, Heidelberg"},{"key":"667_CR24","doi-asserted-by":"crossref","unstructured":"Yoshikawa M, Nozaki Y, Asahi K (2016) Electromagnetic analysis attack for a lightweight block cipher TWINE. In: 2016 IEEE\/ACES International Conference on Wireless Information Technology and Systems (ICWITS) and Applied Computational Electromagnetics (ACES). IEEE, pp 1\u20132","DOI":"10.1109\/ROPACES.2016.7465354"},{"key":"667_CR25","unstructured":"Tushir B, Sehgal H, Nair R, Dezfouli B, Liu Y (2021) The Impact of DoS Attacks onResource-constrained IoT Devices: A Study on the Mirai Attack.\u00a0arXiv preprint arXiv:2104.09041"},{"key":"667_CR26","doi-asserted-by":"crossref","unstructured":"Rizvi S, Kurtz A, Pfeffer J, Rizvi M (2018) Securing the internet of things (IoT): A security taxonomy for IoT. In: 2018 17th IEEE International Conference On Trust, Security And Privacy in Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, pp 163\u2013168","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00034"},{"key":"667_CR27","doi-asserted-by":"crossref","unstructured":"Gallais A, Hedli TH, Loscri V, Mitton N (2019) Denial-of-sleep attacks against IoT networks. In: 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT). IEEE, pp 1025\u20131030","DOI":"10.1109\/CoDIT.2019.8820402"},{"key":"667_CR28","doi-asserted-by":"crossref","unstructured":"Ahemd MM, Shah MA, Wahid A (2017) IoT security: A layered approach for attacks & defenses. In: 2017 international conference on Communication Technologies (ComTech). IEEE, pp 104\u2013110","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"667_CR29","doi-asserted-by":"crossref","unstructured":"Meijer C, Verdult R (2015) Ciphertext-only cryptanalysis on hardened Mifare classic cards. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp 18\u201330","DOI":"10.1145\/2810103.2813641"},{"key":"667_CR30","doi-asserted-by":"crossref","unstructured":"Banik S, Barooti K, Durak FB, Vaudenay S (2020) Cryptanalysis of LowMC instances using single plaintext\/ciphertext pair.\u00a0IACR Trans Symmetric Cryptol 130\u2013146","DOI":"10.46586\/tosc.v2020.i4.130-146"},{"issue":"2","key":"667_CR31","first-page":"287","volume":"3","author":"AK Kendhe","year":"2013","unstructured":"Kendhe AK, Agrawal H (2013) A survey report on various cryptanalysis techniques. Int J Soft Comput Eng (IJSCE) 3(2):287\u2013293","journal-title":"Int J Soft Comput Eng (IJSCE)"},{"issue":"2","key":"667_CR32","doi-asserted-by":"publisher","first-page":"109","DOI":"10.22373\/cj.v2i2.3453","volume":"2","author":"A Mallik","year":"2019","unstructured":"Mallik A (2019) Man-in-the-middle-attack: understanding in simple words. Cyberspace Jurnal Pendidikan Teknologi Informasi 2(2):109\u2013134","journal-title":"Cyberspace Jurnal Pendidikan Teknologi Informasi"},{"key":"667_CR33","doi-asserted-by":"crossref","unstructured":"Rughoobur P, Nagowah L (2017) A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. In: 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS). IEEE, pp 811\u2013817","DOI":"10.1109\/ICTUS.2017.8286118"},{"key":"667_CR34","doi-asserted-by":"crossref","unstructured":"Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IOT: Modelling and defenses. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, pp 2323\u20132327","DOI":"10.1109\/ICACCI.2017.8126193"},{"key":"667_CR35","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","volume":"101","author":"R Amin","year":"2016","unstructured":"Amin R, Islam SH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42\u201362","journal-title":"Comput Netw"},{"key":"667_CR36","doi-asserted-by":"crossref","unstructured":"Alani MM (2018) IoT lotto: Utilizing IoT devices in brute-force attacks. In: Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, pp 140\u2013144","DOI":"10.1145\/3301551.3301606"},{"issue":"7","key":"667_CR37","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"key":"667_CR38","doi-asserted-by":"crossref","unstructured":"Haji SH, Ameen SY (2021) Attack and anomaly detection in iot networks using machine learning techniques: A review. Asian J Res Comput Sci 30\u201346","DOI":"10.9734\/ajrcos\/2021\/v9i230218"},{"key":"667_CR39","doi-asserted-by":"crossref","unstructured":"Sahmi I, Mazri T, Hmina N (2018) Security study of different threats in Internet of Things. In: The Proceedings of the Third International Conference on Smart City Applications. Springer, Cham, pp 785\u2013791","DOI":"10.1007\/978-3-030-11196-0_64"},{"key":"667_CR40","doi-asserted-by":"crossref","unstructured":"Bhasin S, Danger JL, Guilley S, Ngo XT, Sauvage L (2013) Hardware Trojan horses in cryptographic IP cores. In: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, pp 15\u201329","DOI":"10.1109\/FDTC.2013.15"},{"key":"667_CR41","doi-asserted-by":"crossref","unstructured":"Elmalaki S, Ho BJ, Alzantot M, Shoukry Y, Srivastava M (2019) Spycon: Adaptation based spyware in human-in-the-loop iot. In: 2019 IEEE Security and Privacy Workshops (SPW). IEEE, pp 163\u2013168","DOI":"10.1109\/SPW.2019.00039"},{"key":"667_CR42","doi-asserted-by":"crossref","unstructured":"Arul E, Punidha A (2020) Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT). In: Congress on Intelligent Systems. Springer, Singapore, pp 167\u2013176","DOI":"10.1007\/978-981-33-6981-8_14"},{"key":"667_CR43","doi-asserted-by":"crossref","unstructured":"Huseynov H, Kourai K, Saadawi T, Igbe O (2020) Virtual Machine Introspection for Anomaly-Based Keylogger Detection. In: 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR). IEEE, pp 1\u20136","DOI":"10.1109\/HPSR48589.2020.9098980"},{"key":"667_CR44","doi-asserted-by":"crossref","unstructured":"Magness JM (2020) SLIVer: Simulation-Based Logic Bomb Identification\/Verification for Unmanned Aerial Vehicles","DOI":"10.1007\/978-3-030-62840-6_2"},{"key":"667_CR45","doi-asserted-by":"crossref","unstructured":"Luo Z, Zhao S, Lu Z, Sagduyu YE, Xu J (2020) Adversarial machine learning based partial-model attack in IoT. In: Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, pp 13\u201318","DOI":"10.1145\/3395352.3402619"},{"key":"667_CR46","doi-asserted-by":"crossref","unstructured":"English KV, Obaidat I, Sridhar M (2019) Exploiting memory corruption vulnerabilities in connman for iot devices. In: 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, pp 247\u2013255","DOI":"10.1109\/DSN.2019.00036"},{"key":"667_CR47","doi-asserted-by":"crossref","unstructured":"Nirmal K, Janet B, Kumar R (2020) Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection. Peer-to-Peer Networking and Applications, 1\u201313","DOI":"10.1007\/s12083-020-00944-z"},{"key":"667_CR48","doi-asserted-by":"crossref","unstructured":"Airehrour D, Gutierrez J, Ray SK (2016) A lightweight trust design for IoT routing. In: 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech). IEEE, pp 552\u2013557","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.105"},{"key":"667_CR49","doi-asserted-by":"crossref","unstructured":"Stiawan D, Idris M, Malik RF, Nurmaini S, Alsharif N, Budiarto R (2019) Investigating brute force attack patterns in IoT network.\u00a0J Electr Comput Eng","DOI":"10.1155\/2019\/4568368"},{"key":"667_CR50","unstructured":"Damghani H, Damghani L, Hosseinian H, Sharifi R (2019) Classification of attacks on IoT. In: 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation"},{"issue":"3","key":"667_CR51","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s00607-020-00855-0","volume":"103","author":"S Kwon","year":"2021","unstructured":"Kwon S, Park S, Cho H, Park Y, Kim D, Yim K (2021) Towards 5G-based IoT security analysis against Vo5G eavesdropping. Computing 103(3):425\u2013447","journal-title":"Computing"},{"issue":"8","key":"667_CR52","doi-asserted-by":"publisher","first-page":"794326","DOI":"10.1155\/2013\/794326","volume":"9","author":"L Wallgren","year":"2013","unstructured":"Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sensor Netw 9(8):794326","journal-title":"Int J Distrib Sensor Netw"},{"issue":"5","key":"667_CR53","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.3390\/s20051300","volume":"20","author":"S Pundir","year":"2020","unstructured":"Pundir S, Wazid M, Singh DP, Das AK, Rodrigues JPC, Park Y (2020) Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment. Sensors 20(5):1300","journal-title":"Sensors"},{"key":"667_CR54","unstructured":"Chugh K, Aboubaker L, Loo J (2012) Case study of a black hole attack on LoWPAN-RPL. In: Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy (August 2012), pp 157\u2013162"},{"key":"667_CR55","doi-asserted-by":"crossref","unstructured":"Hariri A, Giannelos N, Arief B (2019). Selective Forwarding Attack on IoT Home Security Kits. In: CyberICPS\/SECPRE\/SPOSE\/ADIoT@ ESORICS, pp 360\u2013373","DOI":"10.1007\/978-3-030-42048-2_23"},{"key":"667_CR56","doi-asserted-by":"crossref","unstructured":"Rajashree S, Soman KS, Shah PG (2018) Security with IP address assignment and spoofing for smart IOT devices. In: 2018 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 1914\u20131918","DOI":"10.1109\/ICACCI.2018.8554660"},{"key":"667_CR57","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-981-15-0694-9_5","volume-title":"Advances in data and information sciences","author":"ST Siddiqui","year":"2020","unstructured":"Siddiqui ST, Alam S, Ahmad R, Shuaib M (2020) Security threats, attacks, and possible countermeasures in internet of things. Advances in data and information sciences. Springer, Singapore, pp 35\u201346"},{"key":"667_CR58","doi-asserted-by":"crossref","unstructured":"Aman MN, Chua KC, Sikdar B (2016) Position paper: Physical unclonable functions for iot security. In: Proceedings of the 2nd ACM international workshop on IoT privacy, trust, and security, pp 10\u201313","DOI":"10.1145\/2899007.2899013"},{"key":"667_CR59","doi-asserted-by":"crossref","unstructured":"Bettayeb M, Nasir Q, Talib MA (2019) Firmware update attacks and security for IoT devices: Survey. In: Proceedings of the ArabWIC 6th Annual International Conference Research Track, pp 1\u20136","DOI":"10.1145\/3333165.3333169"},{"key":"667_CR60","doi-asserted-by":"crossref","unstructured":"Hosseinzadeh S, Rauti S, Hyrynsalmi S, Lepp\u00e4nen V (2015) Security in the internet of things through obfuscation and diversification. In: 2015 International Conference on Computing, Communication and Security (ICCCS). IEEE, pp 1\u20135","DOI":"10.1109\/CCCS.2015.7374189"},{"key":"667_CR61","doi-asserted-by":"crossref","unstructured":"Burange AW, Misalkar HD (2015) Review of Internet of Things in development of smart cities with data management & privacy. In: 2015 International Conference on Advances in Computer Engineering and Applications. IEEE, pp 189\u2013195","DOI":"10.1109\/ICACEA.2015.7164693"},{"key":"667_CR62","doi-asserted-by":"crossref","unstructured":"Zegzhda P, Zegzhda D, Kalinin M, Pechenkin A, Minin A, Lavrova D (2016) Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing. In: Proceedings of the 9th International Conference on Security of Information and Networks, pp 81\u201387","DOI":"10.1145\/2947626.2947639"},{"key":"667_CR63","doi-asserted-by":"crossref","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE, pp 29\u201335","DOI":"10.1109\/SPW.2018.00013"},{"issue":"17","key":"667_CR64","doi-asserted-by":"publisher","first-page":"21947","DOI":"10.1007\/s11042-017-5540-x","volume":"77","author":"A Ahmed","year":"2018","unstructured":"Ahmed A, Latif R, Latif S, Abbas H, Khan FA (2018) Malicious insiders attack in IoT based multi-cloud e-healthcare environment: a systematic literature review. Multimed Tools Appl 77(17):21947\u201321965","journal-title":"Multimed Tools Appl"},{"key":"667_CR65","doi-asserted-by":"crossref","unstructured":"Uwagbole SO, Buchanan WJ, Fan L (2017) An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In: 2017 Seventh International Conference on Emerging Security Technologies (EST). IEEE, pp 12\u201317","DOI":"10.1109\/EST.2017.8090392"},{"key":"667_CR66","doi-asserted-by":"crossref","unstructured":"Vojkovi\u0107 G, Milenkovi\u0107 M, Katuli\u0107 T (2019) IoT and Smart Home Data Breach Risks from the Perspective of Croatian Data Protection and Information Security Law. In: Proceedings of the ENTRENOVA-ENTerprise REsearch InNOVAtion Conference (Online), Vol. 5, No. 1, pp 253\u2013263","DOI":"10.2139\/ssrn.3490606"},{"issue":"8","key":"667_CR67","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.3390\/s16081299","volume":"16","author":"J Jung","year":"2016","unstructured":"Jung J, Kim J, Choi Y, Won D (2016) An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors 16(8):1299","journal-title":"Sensors"},{"issue":"6","key":"667_CR68","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MWC.2017.1800109","volume":"25","author":"S Wang","year":"2018","unstructured":"Wang S, Wang J, Yu Z (2018) Privacy-preserving authentication in wireless IoT: applications, approaches, and challenges. IEEE Wirel Commun 25(6):60\u201367","journal-title":"IEEE Wirel Commun"},{"key":"667_CR69","doi-asserted-by":"crossref","unstructured":"Amos R, Georgiou M, Kiayias A, Zhandry M (2020) One-shot signatures and applications to hybrid quantum\/classical authentication. In: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, pp 255\u2013268","DOI":"10.1145\/3357713.3384304"},{"issue":"12","key":"667_CR70","doi-asserted-by":"publisher","first-page":"e5238","DOI":"10.1002\/cpe.5238","volume":"32","author":"OJA Pinno","year":"2020","unstructured":"Pinno OJA, Gr\u00e9gio ARA, De Bona LC (2020) ControlChain: a new stage on the IoT access control authorization. Concurr Comput Pract Exp 32(12):e5238","journal-title":"Concurr Comput Pract Exp"},{"issue":"1","key":"667_CR71","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/s16010020","volume":"16","author":"N Park","year":"2016","unstructured":"Park N, Kang N (2016) Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors 16(1):20","journal-title":"Sensors"},{"key":"667_CR72","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.procs.2019.11.245","volume":"161","author":"W Najib","year":"2019","unstructured":"Najib W, Sulistyo S (2019) Survey on trust calculation methods in Internet of Things. Procedia Comput Sci 161:1300\u20131307","journal-title":"Procedia Comput Sci"},{"issue":"5","key":"667_CR73","doi-asserted-by":"publisher","first-page":"8739","DOI":"10.1109\/JIOT.2019.2923373","volume":"6","author":"S Banerjee","year":"2019","unstructured":"Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019) A provably secure and lightweight anonymous user authenticated session key exchange scheme for internet of things deployment. IEEE Internet Things J 6(5):8739\u20138752","journal-title":"IEEE Internet Things J"},{"key":"667_CR74","unstructured":"Liu A, Alqazzaz A, Ming H, Dharmalingam B (2019) Iotverif: Automatic verification of SSL\/TLS certificate for IoT applications.\u00a0IEEE Access"},{"key":"667_CR75","doi-asserted-by":"crossref","unstructured":"Panwar M, Kumar A (2015) Security for IoT: An effective DTLS with public certificates. In: 2015 International Conference on Advances in Computer Engineering and Applications. IEEE, pp 163\u2013166","DOI":"10.1109\/ICACEA.2015.7164688"},{"key":"667_CR76","doi-asserted-by":"crossref","unstructured":"Oniga B, Farr SH, Munteanu A, Dadarlat V (2018) Iot infrastructure secured by tls level authentication and pki identity system. In: 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4). IEEE, pp 78\u201383","DOI":"10.1109\/WorldS4.2018.8611563"},{"key":"667_CR77","doi-asserted-by":"crossref","unstructured":"Jalbani KB, Jalbani AH, Soomro SS (2020) IoT Security: To Secure IoT Devices with Two-Factor Authentication by Using a Secure Protocol. In: Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital. IGI Global, pp. 98\u2013118","DOI":"10.4018\/978-1-7998-2803-7.ch006"},{"issue":"2","key":"667_CR78","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1007\/s11276-020-02523-9","volume":"27","author":"HAN Far","year":"2021","unstructured":"Far HAN, Bayat M, Das AK, Fotouhi M, Pournaghi SM, Doostari MA (2021) LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wirel Netw 27(2):1389\u20131412","journal-title":"Wirel Netw"},{"issue":"24","key":"667_CR79","doi-asserted-by":"publisher","first-page":"5539","DOI":"10.3390\/s19245539","volume":"19","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Shetty S, Rodrigues JPC, Park Y (2019) LDAKM-EIoT: lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24):5539","journal-title":"Sensors"},{"issue":"5\u20136","key":"667_CR80","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1166\/jctn.2019.7904","volume":"16","author":"SK Jena","year":"2019","unstructured":"Jena SK, Tripathy BK, Gupta P, Das S (2019) A Kerberos based secure communication system in smart (internet of things) environment. J Comput Theor Nanosci 16(5\u20136):2381\u20132388","journal-title":"J Comput Theor Nanosci"},{"issue":"2","key":"667_CR81","doi-asserted-by":"publisher","first-page":"177","DOI":"10.3103\/S0146411621020024","volume":"55","author":"N Barkovskis","year":"2021","unstructured":"Barkovskis N, Ozols K, Elsts A (2021) Survey of low-power wireless network technologies for the internet of things. Autom Control Comput Sci 55(2):177\u2013194","journal-title":"Autom Control Comput Sci"},{"key":"667_CR82","doi-asserted-by":"crossref","unstructured":"Durand A, Gremaud P, Pasquier J (2017) Decentralized web of trust and authentication for the internet of things. In: Proceedings of the Seventh International Conference on the Internet of Things, pp 1\u20132","DOI":"10.1145\/3131542.3140263"},{"key":"667_CR83","first-page":"100190","volume":"21","author":"S Latif","year":"2021","unstructured":"Latif S, Idrees Z, Ahmad J, Zheng L, Zou Z (2021) A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things. J Ind Inf Integr 21:100190","journal-title":"J Ind Inf Integr"},{"issue":"2","key":"667_CR84","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s12083-019-00739-x","volume":"13","author":"S Hong","year":"2020","unstructured":"Hong S (2020) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw Appl 13(2):579\u2013589","journal-title":"Peer-to-Peer Netw Appl"},{"key":"667_CR85","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199\u2013221","journal-title":"Comput Netw"},{"issue":"1","key":"667_CR86","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3390\/s19010015","volume":"19","author":"M Su\u00e1rez-Albela","year":"2019","unstructured":"Su\u00e1rez-Albela M, Fraga-Lamas P, Castedo L, Fern\u00e1ndez-Caram\u00e9s TM (2019) Clock frequency impact on the performance of high-security cryptographic cipher suites for energy-efficient resource-constrained IoT devices. Sensors 19(1):15","journal-title":"Sensors"},{"issue":"01","key":"667_CR87","doi-asserted-by":"publisher","first-page":"29","DOI":"10.38094\/jastt20190","volume":"2","author":"FEF Samann","year":"2021","unstructured":"Samann FEF, Zeebaree SR, Askar S (2021) IoT provisioning QoS based on cloud and fog computing. J Appl Sci Technol Trends 2(01):29\u201340","journal-title":"J Appl Sci Technol Trends"},{"issue":"1","key":"667_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3375837","volume":"1","author":"H Kim","year":"2020","unstructured":"Kim H, Kang E, Broman D, Lee EA (2020) Resilient authentication and authorization for the Internet of Things (IoT) using edge computing. ACM Trans Internet Things 1(1):1\u201327","journal-title":"ACM Trans Internet Things"},{"issue":"2","key":"667_CR89","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","volume":"6","author":"K Sha","year":"2020","unstructured":"Sha K, Yang TA, Wei W, Davari S (2020) A survey of edge computing-based designs for IoT security. Digit Commun Netw 6(2):195\u2013202","journal-title":"Digit Commun Netw"},{"key":"667_CR90","unstructured":"Rao BB, Waoo AA (2021) Design a novel approach for token based authentication in IOT networkS.\u00a0Ilkogretim Online 20(4)"},{"key":"667_CR91","doi-asserted-by":"crossref","unstructured":"Ejaz M, Kumar T, Ylianttila M, Harjula E (2020) Performance and efficiency optimization of multi-layer IoT edge architecture. In: 2020 2nd 6G Wireless Summit (6G SUMMIT). IEEE, pp 1\u20135","DOI":"10.1109\/6GSUMMIT49458.2020.9083896"},{"key":"667_CR92","doi-asserted-by":"crossref","unstructured":"Mubarakali A (2021) An efficient authentication scheme using blockchain technology for wireless sensor networks.\u00a0Wirel Pers Commun 1\u201315","DOI":"10.1007\/s11277-021-08212-w"},{"key":"667_CR93","doi-asserted-by":"crossref","unstructured":"Muzammal SM, Murugesan RK (2019) A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology. In: International Conference on Advances in Cyber Security. Springer, Singapore, pp 18\u201332","DOI":"10.1007\/978-981-15-2693-0_2"},{"key":"667_CR94","first-page":"156","volume":"45","author":"M Alshahrani","year":"2019","unstructured":"Alshahrani M, Traore I (2019) Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain. J Inf Secur Appl 45:156\u2013175","journal-title":"J Inf Secur Appl"},{"key":"667_CR95","doi-asserted-by":"crossref","unstructured":"Ali I, Ahmed AIA, Almogren A, Raza MA, Shah SA, Khan A, Gani A (2020) Systematic literature review on IoT-based botnet attack. IEEE Access","DOI":"10.1109\/ACCESS.2020.3039985"},{"issue":"3\u20134","key":"667_CR96","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1504\/IJITCA.2020.112524","volume":"1","author":"S Yamaguchi","year":"2020","unstructured":"Yamaguchi S, Tanaka H, Ahmadon MAB (2020) Modelling and evaluation of mitigation methods against IoT malware Mirai with agent-oriented Petri net PN2. Int J Internet Things Cyber-Assurance 1(3\u20134):195\u2013213","journal-title":"Int J Internet Things Cyber-Assurance"},{"key":"667_CR97","doi-asserted-by":"crossref","unstructured":"Shamshad S, Mahmood K, Kumari S (2020) Comments on \u201cA Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things\u201d.\u00a0Wirel Pers Commun, 1\u20134","DOI":"10.1007\/s11277-020-07038-2"},{"issue":"1","key":"667_CR98","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","volume":"15","author":"F Wu","year":"2020","unstructured":"Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2020) A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst J 15(1):1120\u20131129","journal-title":"IEEE Syst J"},{"issue":"10","key":"667_CR99","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.3390\/s19102358","volume":"19","author":"J Lee","year":"2019","unstructured":"Lee J, Yu S, Park K, Park Y, Park Y (2019) Secure three-factor authentication protocol for multi-gateway IoT environments. Sensors 19(10):2358","journal-title":"Sensors"},{"key":"667_CR100","doi-asserted-by":"crossref","unstructured":"Zhu X, Badr Y, Pacheco J, Hariri S (2017) Autonomic identity framework for the internet of things. In: 2017 International Conference on Cloud and Autonomic Computing (ICCAC). IEEE, pp 69\u201379","DOI":"10.1109\/ICCAC.2017.14"},{"key":"667_CR101","first-page":"95","volume":"42","author":"G Sharma","year":"2018","unstructured":"Sharma G, Kalra S (2018) A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications. J Inf Secur Appl 42:95\u2013106","journal-title":"J Inf Secur Appl"},{"key":"667_CR102","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jnca.2016.12.008","volume":"89","author":"F Wu","year":"2017","unstructured":"Wu F, Xu L, Kumari S, Li X, Shen J, Choo KKR, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J Netw Comput Appl 89:72\u201385","journal-title":"J Netw Comput Appl"},{"key":"667_CR103","doi-asserted-by":"crossref","unstructured":"Cui J, Zhang Z, Li H, Sui R (2018) An improved user authentication protocol for IoT. In: 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, pp 59\u2013593","DOI":"10.1109\/CyberC.2018.00022"},{"key":"667_CR104","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2018","unstructured":"Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194\u2013204","journal-title":"J Netw Comput Appl"},{"key":"667_CR105","doi-asserted-by":"crossref","unstructured":"Islam SH, Biswas GP (2011) Improved remote login scheme based on ECC. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, pp 1221\u20131226","DOI":"10.1109\/ICRTIT.2011.5972366"},{"issue":"6","key":"667_CR106","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TITB.2012.2206115","volume":"16","author":"Z Zhang","year":"2012","unstructured":"Zhang Z, Wang H, Vasilakos AV, Fang H (2012) ECG-cryptography and authentication in body area networks. IEEE Trans Inf Technol Biomed 16(6):1070\u20131078","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"7","key":"667_CR107","doi-asserted-by":"publisher","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","volume":"11","author":"H Xia","year":"2013","unstructured":"Xia H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096\u20132114","journal-title":"Ad Hoc Netw"},{"key":"667_CR108","doi-asserted-by":"crossref","unstructured":"Shone N, Dobbins C, Hurst W, Shi Q (2015) Digital memories based mobile user authentication for IoT. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, pp 1796\u20131802","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.270"},{"issue":"7","key":"667_CR109","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1109\/TIFS.2015.2414399","volume":"10","author":"H Xiong","year":"2015","unstructured":"Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442\u20131455","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"667_CR110","doi-asserted-by":"crossref","unstructured":"Xie L, Wang W, Shi X, Qin T (2017) Lightweight mutual authentication among sensors in body area networks through physical unclonable functions. In: 2017 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2017.7996735"},{"key":"667_CR111","doi-asserted-by":"crossref","unstructured":"Sun W, Cai Z, Li Y, Liu F, Fang S, Wang G (2018) Security and privacy in the medical internet of things: a review.\u00a0Secur Commun Netw","DOI":"10.1155\/2018\/5978636"},{"issue":"8","key":"667_CR112","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas GP (2015) A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J Med Syst 39(8):1\u201319","journal-title":"J Med Syst"},{"key":"667_CR113","doi-asserted-by":"crossref","unstructured":"Kasyoka P, Kimwele M, Angolo SM (2020) Cryptoanalysis of a pairing-free certificateless signcryption scheme.\u00a0ICT Express","DOI":"10.1016\/j.icte.2020.07.006"},{"issue":"1","key":"667_CR114","doi-asserted-by":"publisher","first-page":"36","DOI":"10.26599\/TST.2019.9010048","volume":"26","author":"X Tan","year":"2020","unstructured":"Tan X, Zhang J, Zhang Y, Qin Z, Ding Y, Wang X (2020) A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network. Tsinghua Sci Technol 26(1):36\u201347","journal-title":"Tsinghua Sci Technol"},{"key":"667_CR115","doi-asserted-by":"publisher","first-page":"102932","DOI":"10.1016\/j.jnca.2020.102932","volume":"176","author":"L Loffi","year":"2021","unstructured":"Loffi L, Westphall CM, Gr\u00fcdtner LD, Westphall CB (2021) Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J Netw Comput Appl 176:102932","journal-title":"J Netw Comput Appl"},{"key":"667_CR116","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system.\u00a0Decent Bus Rev"},{"key":"667_CR117","unstructured":"Bertoni G, Daemen J, Peeters M, Van Assche G (2009) Keccak sponge function family main document.\u00a0Submission to NIST (Round 2) 3(30):320\u2013337"},{"key":"667_CR118","doi-asserted-by":"crossref","unstructured":"Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W, Qijun C (2017) A review on consensus algorithm of blockchain. In: 2017 IEEE international conference on systems, man, and cybernetics(SMC). IEEE, pp 2567\u20132572","DOI":"10.1109\/SMC.2017.8123011"},{"key":"667_CR119","doi-asserted-by":"crossref","unstructured":"Bach LM, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 1545\u20131550","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"667_CR120","doi-asserted-by":"crossref","unstructured":"Huh S, Cho S, Kim S (2017) Managing IoT devices using blockchain platform. In: 2017 19th international conference on advanced communication technology (ICACT). IEEE, pp 464\u2013467","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"667_CR121","doi-asserted-by":"crossref","unstructured":"Zhang Y, He D, Choo KKR (2018) BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. Wirel Commun Mobile Comput","DOI":"10.1155\/2018\/2783658"},{"issue":"4","key":"667_CR122","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1186\/s40852-017-0073-0","volume":"3","author":"F Kodama","year":"2017","unstructured":"Kodama F, Shibata T (2017) Beyond fusion towards IoT by way of open innovation: an investigation based on the Japanese machine tool industry 1975\u20132015. J Open Innov Technol Mark Complex 3(4):23","journal-title":"J Open Innov Technol Mark Complex"},{"issue":"10","key":"667_CR123","doi-asserted-by":"publisher","first-page":"8119","DOI":"10.1109\/JIOT.2020.3042433","volume":"8","author":"WZ Zhang","year":"2020","unstructured":"Zhang WZ, Elgendy IA, Hammad M, Iliyasu AM, Du X, Guizani M, Abd El-Latif AA (2020) Secure and optimized load balancing for multitier IoT and edge-cloud computing systems. IEEE Internet Things J 8(10):8119\u20138132","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"667_CR124","doi-asserted-by":"publisher","first-page":"27","DOI":"10.7236\/IJASC.2016.5.3.27","volume":"5","author":"SH Park","year":"2016","unstructured":"Park SH, Park JK (2016) IoT industry & security technology trends. Int J Adv Smart Converg 5(3):27\u201331","journal-title":"Int J Adv Smart Converg"},{"issue":"11","key":"667_CR125","doi-asserted-by":"publisher","first-page":"3068","DOI":"10.3390\/s20113068","volume":"20","author":"V Ribeiro","year":"2020","unstructured":"Ribeiro V, Holanda R, Ramos A, Rodrigues JJ (2020) Enhancing key management in LoRaWAN with permissioned blockchain. Sensors 20(11):3068","journal-title":"Sensors"},{"issue":"7","key":"667_CR126","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSPEC.2020.9126102","volume":"57","author":"S Cass","year":"2020","unstructured":"Cass S (2020) Nvidia makes it easy to embed AI: the Jetson nano packs a lot of machine-learning power into DIY projects-[Hands on]. IEEE Spectr 57(7):14\u201316","journal-title":"IEEE Spectr"},{"key":"667_CR127","doi-asserted-by":"crossref","unstructured":"Tyson G, Sastry N, Rimac I, Cuevas R, Mauthe A (2012) A survey of mobility in information-centric networks: Challenges and research directions. In: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design-Architecture, Algorithms, and Applications, pp 1\u20136","DOI":"10.1145\/2248361.2248363"},{"key":"667_CR128","doi-asserted-by":"crossref","unstructured":"Gupta S, Parne BL, Chaudhari NS (2021) ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network.\u00a0Fut Gen Comput Syst","DOI":"10.1016\/j.future.2021.06.038"},{"key":"667_CR129","doi-asserted-by":"crossref","unstructured":"Shivraj VL, Rajan MA, Singh M, Balamuralidhar P (2015) One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW). IEEE, pp 1\u20136","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"667_CR130","doi-asserted-by":"publisher","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","volume":"6","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM, Fraga-Lamas P (2018) A review on the use of blockchain for the internet of things. Ieee Access 6:32979\u201333001","journal-title":"Ieee Access"},{"key":"667_CR131","doi-asserted-by":"crossref","unstructured":"Fiorentino G, Occhipinti C, Corsi A, Moro E, Davies J, Duke A (2020) Blockchain: Enabling Trust on the Internet of Things. The Internet of Things: From Data to Insight 141\u2013157","DOI":"10.1002\/9781119545293.ch11"},{"key":"667_CR132","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jmoneco.2019.07.002","volume":"106","author":"L Schilling","year":"2019","unstructured":"Schilling L, Uhlig H (2019) Some simple bitcoin economics. J Monet Econ 106:16\u201326","journal-title":"J Monet Econ"},{"issue":"2014","key":"667_CR133","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"667_CR134","doi-asserted-by":"crossref","unstructured":"Fu MH (2020) Integrated Technologies of Blockchain and Biometrics Based on Wireless Sensor Network for Library Management. Inf Technol Libr 39(3)","DOI":"10.6017\/ital.v39i3.11883"},{"key":"667_CR135","doi-asserted-by":"crossref","unstructured":"Rui-jun YANG, Jin-bo HU, Yan CHENG (2019) Design of data sharing module based on medical block chain. In: 2019 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS). IEEE, pp 149\u2013152","DOI":"10.1109\/ICIIBMS46890.2019.8991529"},{"key":"667_CR136","doi-asserted-by":"crossref","unstructured":"Chen Y, Meng L, Zhou H, Xue G (2021) A blockchain-based medical data sharing mechanism with attribute-based access control and privacy protection.\u00a0Wirel Commun Mobile Comput","DOI":"10.1155\/2021\/6685762"},{"key":"667_CR137","doi-asserted-by":"crossref","unstructured":"Shafagh H, Burkhalter L, Hithnawi A, Duquennoy S (2017) Towards blockchain-based auditable storage and sharing of iot data. In: Proceedings of the 2017 on cloud computing security workshop, pp 45\u201350","DOI":"10.1145\/3140649.3140656"},{"key":"667_CR138","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MobiSecServ48690.2020.9042942","volume":"2020","author":"K Gagneja","year":"2020","unstructured":"Gagneja K, Kiefer R (2020) IoT devices with non-interactive key management protocol. Sixth Int Conf Mobile Secure Serv (MobiSecServ) 2020:1\u20136. https:\/\/doi.org\/10.1109\/MobiSecServ48690.2020.9042942","journal-title":"Sixth Int Conf Mobile Secure Serv (MobiSecServ)"},{"key":"667_CR139","doi-asserted-by":"crossref","unstructured":"Dedeoglu V, Dorri A, Jurdak R, Michelin RA, Lunardi RC, Kanhere SS, Zorzo AF (2020) A journey in applying blockchain for cyberphysical systems. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, pp 383\u2013390","DOI":"10.1109\/COMSNETS48256.2020.9027487"},{"issue":"6","key":"667_CR140","doi-asserted-by":"publisher","first-page":"5836","DOI":"10.1109\/TVT.2020.2972923","volume":"69","author":"Z Ma","year":"2020","unstructured":"Ma Z, Zhang J, Guo Y, Liu Y, Liu X, He W (2020) An efficient decentralized key management mechanism for VANET with blockchain. IEEE Trans Veh Technol 69(6):5836\u20135849","journal-title":"IEEE Trans Veh Technol"},{"key":"667_CR141","doi-asserted-by":"crossref","unstructured":"Chen T, Zhang L, Choo KKR, Zhang R, Meng X (2021) Blockchain Based Key Management Scheme in Fog-enabled IoT Systems.\u00a0IEEE Internet Things J","DOI":"10.1109\/JIOT.2021.3050562"},{"key":"667_CR142","doi-asserted-by":"crossref","unstructured":"Panda SS, Jena D, Mohanta BK, Ramasubbareddy S, Daneshmand M, Gandomi AH (2021) Authentication and Key Management in Distributed IoT using Blockchain Technology. IEEE Internet Things J","DOI":"10.1109\/JIOT.2021.3063806"},{"key":"667_CR143","doi-asserted-by":"crossref","unstructured":"Lou J, Zhang Q, Qi Z, Lei K (2018) A blockchain-based key management scheme for named data networking. In: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN). IEEE, pp 141\u2013146","DOI":"10.1109\/HOTICN.2018.8605993"},{"issue":"6","key":"667_CR144","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832\u20131843","journal-title":"IEEE Internet Things J"},{"key":"667_CR145","doi-asserted-by":"publisher","first-page":"34045","DOI":"10.1109\/ACCESS.2019.2904042","volume":"7","author":"M Ma","year":"2019","unstructured":"Ma M, Shi G, Li F (2019) Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 7:34045\u201334059","journal-title":"IEEE Access"},{"issue":"9","key":"667_CR146","doi-asserted-by":"publisher","first-page":"6193","DOI":"10.1109\/TII.2020.2965975","volume":"16","author":"Y Tian","year":"2020","unstructured":"Tian Y, Wang Z, Xiong J, Ma J (2020) A blockchain-based secure key management scheme with trustworthiness in DWSNs. IEEE Trans Industr Inf 16(9):6193\u20136202","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"667_CR147","doi-asserted-by":"publisher","first-page":"1984","DOI":"10.1109\/TII.2019.2936278","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang J, Wu L, Choo KKR, He D (2019) Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans Ind Inf 16(3):1984\u20131992","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"667_CR148","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.aej.2020.08.019","volume":"60","author":"C Jia","year":"2021","unstructured":"Jia C, Ding H, Zhang C, Zhang X (2021) Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology. Alex Eng J 60(1):337\u2013346","journal-title":"Alex Eng J"},{"key":"667_CR149","doi-asserted-by":"crossref","unstructured":"Chen CM, Deng X, Gan W, Chen J, Islam SH (2021) A secure blockchain-based group key agreement protocol for IoT. J Supercomput 1\u201323","DOI":"10.1007\/s11227-020-03561-y"},{"key":"667_CR150","doi-asserted-by":"crossref","unstructured":"Uddin MI, Alamgir MS, Rahman MM, Bhuiyan MS, Moral MA (2021) AI Traffic Control System Based on Deepstream and IoT Using NVIDIA Jetson Nano. In: 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). IEEE, pp 115\u2013119","DOI":"10.1109\/ICREST51555.2021.9331256"},{"key":"667_CR151","doi-asserted-by":"crossref","unstructured":"Bermudez I, Traverso S, Mellia M, Munafo M (2013) Exploring the cloud from passive measurements: The Amazon AWS case. In: 2013 Proceedings IEEE INFOCOM. IEEE, pp 230\u2013234","DOI":"10.1109\/INFCOM.2013.6566769"},{"issue":"3","key":"667_CR152","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.dcan.2017.10.002","volume":"4","author":"MS Mahdavinejad","year":"2018","unstructured":"Mahdavinejad MS, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth AP (2018) Machine learning for internet of things data analysis: a survey. Digit Commun Netw 4(3):161\u2013175","journal-title":"Digit Commun Netw"},{"key":"667_CR153","doi-asserted-by":"publisher","first-page":"102364","DOI":"10.1016\/j.scs.2020.102364","volume":"63","author":"S Singh","year":"2020","unstructured":"Singh S, Sharma PK, Yoon B, Shojafar M, Cho GH, Ra IH (2020) Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain Cities Soc 63:102364","journal-title":"Sustain Cities Soc"},{"issue":"19","key":"667_CR154","doi-asserted-by":"publisher","first-page":"5480","DOI":"10.3390\/s20195480","volume":"20","author":"P Trakadas","year":"2020","unstructured":"Trakadas P, Simoens P, Gkonis P, Sarakis L, Angelopoulos A, Ramallo-Gonz\u00e1lez AP, Karkazis P (2020) An artificial intelligence-based collaboration approach in industrial iot manufacturing: key concepts, architectural extensions and potential applications. Sensors 20(19):5480","journal-title":"Sensors"},{"key":"667_CR155","doi-asserted-by":"crossref","unstructured":"Do\u0161ilovi\u0107 FK, Br\u010di\u0107 M, Hlupi\u0107 N (2018) Explainable artificial intelligence: A survey. In: 2018 41st International convention on information and communication technology, electronics and microelectronics (MIPRO). IEEE, pp 0210\u20130215","DOI":"10.23919\/MIPRO.2018.8400040"},{"issue":"7","key":"667_CR156","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S0969-4765(17)30138-8","volume":"2017","author":"P Punithavathi","year":"2017","unstructured":"Punithavathi P, Subbiah G (2017) Can cancellable biometrics preserve privacy? Biom Technol Today 2017(7):8\u201311","journal-title":"Biom Technol Today"},{"key":"667_CR157","doi-asserted-by":"crossref","unstructured":"Bezawada B, Bachani M, Peterson J, Shirazi H, Ray I, Ray I (2018) Behavioral fingerprinting of iot devices. In: Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, pp 41\u201350","DOI":"10.1145\/3266444.3266452"},{"key":"667_CR158","doi-asserted-by":"crossref","unstructured":"Chakraborty N, Li J, Mondal S, Luo C, Wang H, Alazab M, Pan Y (2020) On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine Learning based Threats in Internet of Things.\u00a0IEEE Internet Things J","DOI":"10.1109\/JIOT.2020.3025274"},{"issue":"6","key":"667_CR159","doi-asserted-by":"publisher","first-page":"4829","DOI":"10.1109\/JIOT.2018.2846040","volume":"5","author":"F Restuccia","year":"2018","unstructured":"Restuccia F, D\u2019Oro S, Melodia T (2018) Securing the internet of things in the age of machine learning and software-defined networking. IEEE Internet Things J 5(6):4829\u20134842","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"667_CR160","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MWC.001.1900054","volume":"26","author":"H Fang","year":"2019","unstructured":"Fang H, Wang X, Tomasin S (2019) Machine learning for intelligent authentication in 5G and beyond wireless networks. IEEE Wirel Commun 26(5):55\u201361","journal-title":"IEEE Wirel Commun"},{"key":"667_CR161","doi-asserted-by":"crossref","unstructured":"Sridhar S, Smys S (2017) Intelligent security framework for iot devices cryptography based end-to-end security architecture. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, pp 1\u20135","DOI":"10.1109\/ICISC.2017.8068718"},{"key":"667_CR162","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1016\/j.future.2020.10.001","volume":"115","author":"PM Shakeel","year":"2021","unstructured":"Shakeel PM, Baskar S, Fouad H, Manogaran G, Saravanan V, Montenegro-Marin CE (2021) Internet of things forensic data analysis using machine learning to identify roots of data scavenging. Futur Gen Comput Syst 115:756\u2013768","journal-title":"Futur Gen Comput Syst"},{"key":"667_CR163","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ins.2019.01.073","volume":"484","author":"P Punithavathi","year":"2019","unstructured":"Punithavathi P, Geetha S, Karuppiah M, Islam SH, Hassan MM, Choo KKR (2019) A lightweight machine learning-based authentication framework for smart IoT devices. Inf Sci 484:255\u2013268","journal-title":"Inf Sci"},{"key":"667_CR164","unstructured":"Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, Guarnizo JD, Elovici Y (2017) Detection of unauthorized IoT devices using machine learning techniques.\u00a0arXiv preprint arXiv:1709.04647, pp 255\u2013268"},{"key":"667_CR165","doi-asserted-by":"crossref","unstructured":"Raza A, Ikram AA, Amin A, Ikram AJ (2016) A review of low cost and power efficient development boards for IoT applications. In: 2016 Future Technologies Conference (FTC). IEEE, pp 786\u2013790","DOI":"10.1109\/FTC.2016.7821693"},{"key":"667_CR166","unstructured":"https:\/\/www.fireeye.com\/current-threats\/annual-threat-report\/mtrends.html"},{"issue":"9","key":"667_CR167","doi-asserted-by":"publisher","first-page":"9044","DOI":"10.1021\/acsnano.6b05815","volume":"10","author":"K Zhao","year":"2016","unstructured":"Zhao K, Wang ZL, Yang Y (2016) Self-powered wireless smart sensor node enabled by an ultrastable, highly efficient, and superhydrophobic-surface-based triboelectric nanogenerator. ACS Nano 10(9):9044\u20139052","journal-title":"ACS Nano"},{"issue":"16","key":"667_CR168","doi-asserted-by":"publisher","first-page":"17430","DOI":"10.1109\/JSEN.2020.3017695","volume":"21","author":"J Song","year":"2021","unstructured":"Song J, Zhong Q, Wang W, Su C, Tan Z, Liu Y (2021) FPDP: flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sensors J 21(16):17430\u201317438. https:\/\/doi.org\/10.1109\/JSEN.2020.3017695","journal-title":"IEEE Sensors J"},{"issue":"8","key":"667_CR169","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2018.1701095","volume":"56","author":"Z Xiong","year":"2018","unstructured":"Xiong Z, Zhang Y, Niyato D, Wang P, Han Z (2018) When mobile blockchain meets edge computing. IEEE Commun Mag 56(8):33\u201339","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"667_CR170","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TWC.2018.2885266","volume":"18","author":"M Liu","year":"2018","unstructured":"Liu M, Yu FR, Teng Y, Leung VC, Song M (2018) Distributed resource allocation in blockchain-based video streaming systems with mobile edge computing. IEEE Trans Wirel Commun 18(1):695\u2013708","journal-title":"IEEE Trans Wirel Commun"},{"key":"667_CR171","doi-asserted-by":"crossref","unstructured":"Wang W, Qiu C, Yin Z, Srivastava G, Gadekallu TR, Alsolami F, Su C (2021) Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks.\u00a0IEEE Internet Things J","DOI":"10.1109\/JIOT.2021.3117762"},{"key":"667_CR172","doi-asserted-by":"crossref","unstructured":"Wang T, Quan Y, Shen XS, Gadekallu TR, Wang W, Dev K (2021) A privacy-enhanced retrieval technology for the cloud-assisted Internet of Things.\u00a0IEEE Trans Ind Inform","DOI":"10.1109\/TII.2021.3103547"},{"key":"667_CR173","doi-asserted-by":"crossref","unstructured":"Wang W, Fida MH, Lian Z, Yin Z, Pham QV, Gadekallu TR, Su C (2021) Secure-enhanced federated learning for ai-empowered electric vehicle energy prediction.\u00a0IEEE Consumer Electron Mag","DOI":"10.1109\/MCE.2021.3116917"},{"key":"667_CR174","doi-asserted-by":"crossref","unstructured":"Lian Z, Wang W, Su C (2021) COFEL: Communication-Efficient and Optimized Federated Learning with Local Differential Privacy. In: ICC 2021-IEEE International Conference on Communications. IEEE, pp 1\u20136","DOI":"10.1109\/ICC42927.2021.9500632"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00667-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00667-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00667-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T13:05:32Z","timestamp":1666616732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00667-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":174,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["667"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00667-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,24]]},"assertion":[{"value":"25 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. The authors declare the following financial interests\/personal relationships which may be considered as potential competing interests:","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}