{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T18:24:34Z","timestamp":1776363874178,"version":"3.51.2"},"reference-count":112,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:00:00Z","timestamp":1603497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:00:00Z","timestamp":1603497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s40860-020-00116-z","type":"journal-article","created":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T01:02:23Z","timestamp":1603501343000},"page":"115-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5926-9520","authenticated-orcid":false,"given":"Abraham Ayegba","family":"Alfa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9289-0404","authenticated-orcid":false,"given":"John Kolo","family":"Alhassan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2294-5545","authenticated-orcid":false,"given":"Olayemi Mikail","family":"Olaniyi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6055-2198","authenticated-orcid":false,"given":"Morufu","family":"Olalere","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,24]]},"reference":[{"key":"116_CR1","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1016\/j.future.2017.03.001","volume":"76","author":"PP Jayaraman","year":"2017","unstructured":"Jayaraman PP, Yang X, Yavari A, Georgakopoulos D, Yi X (2017) Privacy preserving Internet of Things: from privacy techniques to a blueprint architecture and efficient implementation. Future Gener Comput Syst 76:540\u2013549. https:\/\/doi.org\/10.1016\/j.future.2017.03.001","journal-title":"Future Gener Comput Syst"},{"key":"116_CR2","first-page":"56","volume":"2016","author":"VN Malavade","year":"2017","unstructured":"Malavade VN, Akulwar PK (2017) Role of IoT in Agriculture. IOSR Journal of Computer Engineering 2016:56\u201357","journal-title":"IOSR Journal of Computer Engineering"},{"key":"116_CR3","first-page":"163","volume":"2","author":"FZ Berrehili","year":"2016","unstructured":"Berrehili FZ, Belmekki A (2016) Privacy preservation in the Internet of Things. Intl Symposium Ubiquitous Netw 2:163\u2013175","journal-title":"Intl Symposium Ubiquitous Netw"},{"key":"116_CR4","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/978-3-319-77703-0_113","volume":"745","author":"A Brand\u00e3o","year":"2018","unstructured":"Brand\u00e3o A, Mamede HS, Gon\u00e7alves R (2018) Systematic review of the literature, research on Blockchain technology as support to the trust model proposed applied to smart places. Adv Intell Syst Comput 745:1163\u20131174. https:\/\/doi.org\/10.1007\/978-3-319-77703-0_113","journal-title":"Adv Intell Syst Comput"},{"key":"116_CR5","doi-asserted-by":"publisher","unstructured":"Atlam HF, Wills GB (2019) Technical aspects of Blockchain and IoT. In role of Blockchain technology in IoT Applications, 1st edn, vol. 115. Elsevier, pp 1\u201339, https:\/\/doi.org\/https:\/\/doi.org\/10.1016\/bs.adcom.2018.10.006","DOI":"10.1016\/bs.adcom.2018.10.006"},{"key":"116_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4","author":"S Singh","year":"2017","unstructured":"Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-017-0494-4","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"116_CR7","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1007\/978-981-10-7605-3_185","volume":"474","author":"AS Patil","year":"2018","unstructured":"Patil AS, Tama BA, Park RKH (2018) A framework for Blockchain based secure smart green house farming. Lecture Notes Elect Eng 474:1162\u20131167. https:\/\/doi.org\/10.1007\/978-981-10-7605-3_185","journal-title":"Lecture Notes Elect Eng"},{"key":"116_CR8","doi-asserted-by":"crossref","unstructured":"Islam M, Tonmoy SS, Quayum S, Sarker AR, Hani SU, Mannan MA (2019) Smart poultry farm incorporating GSM and IoT. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques, pp 277\u2013280","DOI":"10.1109\/ICREST.2019.8644300"},{"key":"116_CR9","doi-asserted-by":"publisher","unstructured":"Shehzad K, Afrasayab M, Khan M, Mushtaq MA, Ahmed RL, Saleemi MM (2019) Use of Blockchain in Internet of Things\u202f: 2019 cybersecurity and cyberforensics conference, pp 165\u2013171. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/CCC.2019.00012","DOI":"10.1109\/CCC.2019.00012"},{"issue":"4","key":"116_CR10","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2017","unstructured":"Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans EmergTop Comput 5(4):586\u2013602. https:\/\/doi.org\/10.1109\/TETC.2016.2606384","journal-title":"IEEE Trans EmergTop Comput"},{"key":"116_CR11","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.autcon.2019.02.005","volume":"102","author":"J Li","year":"2019","unstructured":"Li J, Greenwood D, Kassem M (2019) Automation in Construction Blockchain in the built environment and construction industry: a systematic review, conceptual models and practical use cases. Autom Construct 102:288\u2013307. https:\/\/doi.org\/10.1016\/j.autcon.2019.02.005","journal-title":"Autom Construct"},{"key":"116_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/bs.adcom.2019.05.001","volume":"115","author":"P Zhang","year":"2019","unstructured":"Zhang P, Schmidt DC, White J, Dubey A (2019) Consensus mechanisms and information security technologies. Role Blockchain Technol IoT Appl 115:181. https:\/\/doi.org\/10.1016\/bs.adcom.2019.05.001","journal-title":"Role Blockchain Technol IoT Appl"},{"issue":"8","key":"116_CR13","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10916-018-0998-2","volume":"42","author":"Y Ji","year":"2018","unstructured":"Ji Y, Zhang J, Ma J, Yang C, Yao X (2018) BMPLS: Blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems. J Med Syst 42(8):147. https:\/\/doi.org\/10.1007\/s10916-018-0998-2","journal-title":"J Med Syst"},{"key":"116_CR14","unstructured":"Zhu L, Zheng B, Shen M, Yu S, Gao F, Li H, Shi K, Gai K (2018) Research on the security of Blockchain data: a survey. arXiv perprint. https:\/\/arxiv.org\/abs\/1812.02009"},{"key":"116_CR15","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in Blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Gener Comput Syst 97:512\u2013529. https:\/\/doi.org\/10.1016\/j.future.2019.02.060","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"116_CR16","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.1109\/JIOT.2018.2882794","volume":"6","author":"MA Ferrag","year":"2018","unstructured":"Ferrag MA, Derdour M, Mukherjee M, Derhab A, Maglaras L, Janicke H (2018) Blockchain technologies for the Internet of Things: research issues and challenges. IEEE Internet Things J 6(2):2188\u20132204. https:\/\/doi.org\/10.1109\/JIOT.2018.2882794","journal-title":"IEEE Internet Things J"},{"key":"116_CR17","doi-asserted-by":"publisher","unstructured":"Huh S, Cho S, Kim S (2017) Managing IoT devices using Blockchain platform. Int Conf Adv Commun Technol. https:\/\/doi.org\/https:\/\/doi.org\/10.23919\/ICACT.2017.7890132","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"116_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95037-2_5","author":"W Ejaz","year":"2018","unstructured":"Ejaz W, Anpalagan A (2018) Blockchain technology for security and privacy in Internet of Things. Internet Things Smart Cities. https:\/\/doi.org\/10.1007\/978-3-319-95037-2_5","journal-title":"Internet Things Smart Cities"},{"key":"116_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOMW.2018.8644522","volume":"2018","author":"A Ensor","year":"2019","unstructured":"Ensor A, Schefer-Wenzl S, Miladinovic I (2019) Blockchains for IoT payments: a survey. IEEE Globecom Workshops 2018:1\u20136. https:\/\/doi.org\/10.1109\/GLOCOMW.2018.8644522","journal-title":"IEEE Globecom Workshops"},{"key":"116_CR20","doi-asserted-by":"publisher","unstructured":"Sultan A, Mushtaq MA, Abubakar M (2019) IOT security issues via Blockchain\u202f: a review paper. ACM ICBCT-2019 60-65. https:\/\/doi.org\/https:\/\/doi.org\/10.1145\/3320154.3320163","DOI":"10.1145\/3320154.3320163"},{"issue":"7","key":"116_CR21","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","volume":"30","author":"TTA Dinh","year":"2018","unstructured":"Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling Blockchain: a data processing view of Blockchain systems. IEEE Trans Knowl Data Eng 30(7):1366\u20131385. https:\/\/doi.org\/10.1109\/TKDE.2017.2781227","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"116_CR22","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-00018-9_7","volume":"11067","author":"Y Yang","year":"2018","unstructured":"Yang Y, Yang Y, Chen J, Liu M (2018) Application of Blockchain in Internet of Things. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11067:73\u201382. https:\/\/doi.org\/10.1007\/978-3-030-00018-9_7","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"116_CR23","doi-asserted-by":"publisher","first-page":"58822","DOI":"10.1109\/ACCESS.2019.2914675","volume":"7","author":"SK Lo","year":"2019","unstructured":"Lo SK, Liu Y, Chia SY, Xu X, Lu Q, Zhu L, Ning H (2019) Analysis of Blockchain solutions for IoT: a systematic literature review. IEEE Access 7:58822\u201358835. https:\/\/doi.org\/10.1109\/ACCESS.2019.2914675","journal-title":"IEEE Access"},{"key":"116_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2019.05.002","author":"W Viriyasitavat","year":"2019","unstructured":"Viriyasitavat W, Anuphaptrirong T, Hoonsopon D (2019) When Blockchain meets Internet of Things: characteristics, challenges, and business opportunities. J Indust Inf Integr. https:\/\/doi.org\/10.1016\/j.jii.2019.05.002","journal-title":"J Indust Inf Integr"},{"key":"116_CR25","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-030-20948-3","volume":"349","author":"M Iqbal","year":"2019","unstructured":"Iqbal M, Matulevicius R (2019) Blockchain-based application security risks: a systematic literature review. Intern Conf Adv Inf Syst Eng 349:176\u2013188. https:\/\/doi.org\/10.1007\/978-3-030-20948-3","journal-title":"Intern Conf Adv Inf Syst Eng"},{"key":"116_CR26","doi-asserted-by":"publisher","unstructured":"Maroufi M, Abdolee R, Tazekand BM (2019) On the convergence of Blockchain and Internet of Things (IoT) technologies. https:\/\/doi.org\/https:\/\/doi.org\/10.33423\/jsis.v14i1.990","DOI":"10.33423\/jsis.v14i1.990"},{"key":"116_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100050","author":"M Aly","year":"2019","unstructured":"Aly M, Khomh F, Haoues M, Quintero A, Yacout S (2019) Enforcing security in Internet of Things frameworks: a systematic literature review. Internet Things. https:\/\/doi.org\/10.1016\/j.iot.2019.100050","journal-title":"Internet Things"},{"key":"116_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casino","year":"2019","unstructured":"Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of Blockchain-based applications: current status, classification and open issues. Telematics Inform 36:55\u201381. https:\/\/doi.org\/10.1016\/j.tele.2018.11.006","journal-title":"Telematics Inform"},{"issue":"4","key":"116_CR29","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti M, Sandeep KE, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE Commun Surv Tut 20(4):3416\u20133452. https:\/\/doi.org\/10.1109\/COMST.2018.2842460","journal-title":"IEEE Commun Surv Tut"},{"key":"116_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97289-3_15","author":"W Yang","year":"2018","unstructured":"Yang W, Garg S, Raza A, Herbert D, Kang B (2018) Blockchain: trends and future. Pacific Rim Know Acquisit Workshop. https:\/\/doi.org\/10.1007\/978-3-319-97289-3_15","journal-title":"Pacific Rim Know Acquisit Workshop"},{"key":"116_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020","author":"X Li","year":"2018","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2018) A survey on the security of Blockchain systems. Future Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2017.08.020","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"116_CR32","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1007\/s12083-016-0456-1","volume":"10","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Wen J (2017) The IoT electric business model: using Blockchain technology for the Internet of Things. Peer-to-Peer Netw Appl 10(4):983\u2013994. https:\/\/doi.org\/10.1007\/s12083-016-0456-1","journal-title":"Peer-to-Peer Netw Appl"},{"key":"116_CR33","doi-asserted-by":"publisher","unstructured":"Pan L, Xu M, Xi L, Hao Y (2017) Research of livestock farming IoT system based on RESTful web services. In: 2016 5th International Conference on Computer Science and Network Technology, IEEE 113\u2013116. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/ICCSNT.2016.8070130","DOI":"10.1109\/ICCSNT.2016.8070130"},{"issue":"3","key":"116_CR34","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/JIOT.2017.2781251","volume":"5","author":"Y Li","year":"2018","unstructured":"Li Y, Cheng X, Cao Y, Wang D, Yang L (2018) Smart choice for the smart grid: narrowband Internet of Things (NB-IoT). IEEE Internet Things J 5(3):1505\u20131515. https:\/\/doi.org\/10.1109\/JIOT.2017.2781251","journal-title":"IEEE Internet Things J"},{"issue":"2018","key":"116_CR35","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of Things security: a top-down survey. Comput Netw 141(2018):199\u2013221. https:\/\/doi.org\/10.1016\/j.comnet.2018.03.012","journal-title":"Comput Netw"},{"issue":"4","key":"116_CR36","doi-asserted-by":"publisher","first-page":"264","DOI":"10.7326\/0003-4819-151-4-200908180-00135","volume":"151","author":"D Moher","year":"2009","unstructured":"Moher D, Liberati A, Tetzlaff J, Altman DG (2009) Preferred reporting items for systematic reviews and meta-analyses. Ann Intern Med 151(4):264\u2013269","journal-title":"Ann Intern Med"},{"key":"116_CR37","volume-title":"Guidelines for performing systematic literature reviews in software engineering","author":"B Kitchenham","year":"2007","unstructured":"Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Software Engineering Group, Keele"},{"key":"116_CR38","doi-asserted-by":"publisher","unstructured":"Chatterjee R, Chatterjee R (2017) An overview of the emerging technology: Blockchain. In: Proceedings - 2017 International Conference on Computational Intelligence and Networks, pp 126\u2013127. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/CINE.2017.33","DOI":"10.1109\/CINE.2017.33"},{"key":"116_CR39","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.agsy.2017.01.023","volume":"153","author":"S Wolfert","year":"2017","unstructured":"Wolfert S, Ge L, Verdouw C, Bogaardt MJ (2017) Big data in smart farming\u2014a review. Agric Syst 153:69\u201380. https:\/\/doi.org\/10.1016\/j.agsy.2017.01.023","journal-title":"Agric Syst"},{"key":"116_CR40","doi-asserted-by":"publisher","unstructured":"Gupta Y, Shorey R, Kulkarni D, Tew J (2018) The applicability of Blockchain in the Internet of Things. In: 2018 10th International Conference on Communication Systems and Networks, pp 561\u2013564. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/COMSNETS.2018.8328273","DOI":"10.1109\/COMSNETS.2018.8328273"},{"key":"116_CR41","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/SPW.2015.27","volume":"2015","author":"G Zyskind","year":"2015","unstructured":"Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using Blockchain to protect personal data. IEEE Secur Privacy Workshops 2015:180\u2013184. https:\/\/doi.org\/10.1109\/SPW.2015.27","journal-title":"IEEE Secur Privacy Workshops"},{"key":"116_CR42","doi-asserted-by":"crossref","unstructured":"Dorri A, Roulin C, Jurdak R, Kanhere S (2018) On the activity privacy of Blockchain for IoT. arXiv preprint. https:\/\/arxiv.org\/abs\/1812.08970","DOI":"10.1109\/LCN44214.2019.8990819"},{"key":"116_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93931-5_28","author":"I Konstantinidis","year":"2018","unstructured":"Konstantinidis I, Siaminos G, Timplalexis C, Zervas P, Peristeras V, Decker S (2018) Blockchain for business applications: a systematic literature review. Int Conf Bus Inf Syst. https:\/\/doi.org\/10.1007\/978-3-319-93931-5_28","journal-title":"Int Conf Bus Inf Syst"},{"issue":"3","key":"116_CR44","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.bushor.2019.01.009","volume":"62","author":"VJ Morkunas","year":"2019","unstructured":"Morkunas VJ, Paschen J, Boon E (2019) How Blockchain technologies impact your business model. Bus Horiz 62(3):295\u2013306. https:\/\/doi.org\/10.1016\/j.bushor.2019.01.009","journal-title":"Bus Horiz"},{"issue":"3","key":"116_CR45","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.dcan.2017.10.006","volume":"4","author":"M Banerjee","year":"2018","unstructured":"Banerjee M, Lee J, Choo KKR (2018) A Blockchain future for Internet of Things security: a position paper. Digital Commun Netw 4(3):149\u2013160. https:\/\/doi.org\/10.1016\/j.dcan.2017.10.006","journal-title":"Digital Commun Netw"},{"issue":"2","key":"116_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijhiot.2017070101","volume":"1","author":"AA Ben","year":"2018","unstructured":"Ben AA, Belhajji MA (2018) The Blockchain technology. Int J Hyperconnect Internet Things 1(2):1\u201311. https:\/\/doi.org\/10.4018\/ijhiot.2017070101","journal-title":"Int J Hyperconnect Internet Things"},{"key":"116_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5547-8_28","author":"S Bhardwaj","year":"2018","unstructured":"Bhardwaj S, Kaushik M (2018) Blockchain\u2014technology to drive the future. Smart Innov Syst Technol. https:\/\/doi.org\/10.1007\/978-981-10-5547-8_28","journal-title":"Smart Innov Syst Technol"},{"issue":"6","key":"116_CR48","doi-asserted-by":"publisher","first-page":"4890","DOI":"10.1109\/JIOT.2018.2879579","volume":"5","author":"N Ahmed","year":"2018","unstructured":"Ahmed N, De D, Hussain I (2018) Internet of Things (IoT) for smart precision agriculture and farming in rural areas. IEEE Internet Things J 5(6):4890\u20134899. https:\/\/doi.org\/10.1109\/JIOT.2018.2879579","journal-title":"IEEE Internet Things J"},{"key":"116_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/bs.adcom.2018.10.006","volume":"115","author":"HF Atlam","year":"2018","unstructured":"Atlam HF, Wills GB (2018) Technical aspects of Blockchain and IoT. Adv Comput 115:1\u201339. https:\/\/doi.org\/10.1016\/bs.adcom.2018.10.006","journal-title":"Adv Comput"},{"issue":"4","key":"116_CR50","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/EMR.2018.2881149","volume":"46","author":"RR Mukkamala","year":"2018","unstructured":"Mukkamala RR, Vatrapu R, Ray PK, Sengupta G, Halder S (2018) Blockchain for social business: principles and applications. IEEE Eng Manage Rev 46(4):94\u201399. https:\/\/doi.org\/10.1109\/EMR.2018.2881149","journal-title":"IEEE Eng Manage Rev"},{"key":"116_CR51","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.comcom.2019.01.006","volume":"136","author":"X Wang","year":"2019","unstructured":"Wang X, Zha X, Ni W, Ping R, Guo YJ, Niu X (2019) Survey on Blockchain for Internet of Things. Comput Commun 136:10\u201329. https:\/\/doi.org\/10.1016\/j.comcom.2019.01.006","journal-title":"Comput Commun"},{"key":"116_CR52","unstructured":"Ellervee A, Matulevicius R, Mayer N (2017) A comprehensive reference model for Blockchain-based distributed ledger technology. ER Forum\/Demos 306\u2013319"},{"key":"116_CR53","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in Blockchain system. J Netw Comput Appl 126:45\u201358. https:\/\/doi.org\/10.1016\/j.jnca.2018.10.020","journal-title":"J Netw Comput Appl"},{"key":"116_CR54","doi-asserted-by":"publisher","unstructured":"Hackius N, Petersen M (2017) Blockchain in logistics and supply chain: trick or treat? In digital supply chain management and logistics: smart and digital solutions for an industry 4.0 environment. In: Proceedings of the Hamburg International Conference of Logistics, vol. 23, pp 3\u201318. https:\/\/doi.org\/https:\/\/doi.org\/10.15480\/882.1444","DOI":"10.15480\/882.1444"},{"key":"116_CR55","unstructured":"Wahab J (2018) Privacy in Blockchain systems. arXiv preprint. https:\/\/arxiv.org\/abs\/1809.10642"},{"issue":"1","key":"116_CR56","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2019","unstructured":"Salman T, Member S, Zolanvari M, Member S, Erbad A, Jain R, Samaka M (2019) Security services using Blockchains: a state of the art survey. IEEE Commun Surv Tut 21(1):858\u2013880. https:\/\/doi.org\/10.1109\/COMST.2018.2863956","journal-title":"IEEE Commun Surv Tut"},{"key":"116_CR57","doi-asserted-by":"publisher","unstructured":"Fabiano, N. (2018). The Internet of Things ecosystem: the Blockchain and privacy issues. In: The challenge for a global standard. International Conference on Internet of Things for the Global Community, pp 1\u20137. https:\/\/doi.org\/https:\/\/doi.org\/10.25046\/aj030201","DOI":"10.25046\/aj030201"},{"key":"116_CR58","doi-asserted-by":"publisher","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","volume":"6","author":"W Meng","year":"2018","unstructured":"Meng W, Tischhauser EW, Wang Q, Wang Y, Han J (2018) When intrusion detection meets Blockchain technology: a review. IEEE Access 6:10179\u201310188. https:\/\/doi.org\/10.1109\/ACCESS.2018.2799854","journal-title":"IEEE Access"},{"key":"116_CR59","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Salah K (2018) IoT security: review, Blockchain solutions, and open challenges. Future Gener Comput Syst 82:395\u2013411. https:\/\/doi.org\/10.1016\/j.future.2017.11.022","journal-title":"Future Gener Comput Syst"},{"key":"116_CR60","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.jii.2019.04.002","volume":"15","author":"Y Lu","year":"2019","unstructured":"Lu Y (2019) The Blockchain: state-of-the-art and research challenges. J Indust Inf Integr 15:80\u201390. https:\/\/doi.org\/10.1016\/j.jii.2019.04.002","journal-title":"J Indust Inf Integr"},{"key":"116_CR61","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.jnca.2018.11.003","volume":"127","author":"L Wang","year":"2019","unstructured":"Wang L, Shen X, Li J, Shao J, Yang Y (2019) Applications cryptographic primitives in Blockchains. J Netw Comput Appl 127:43\u201358. https:\/\/doi.org\/10.1016\/j.jnca.2018.11.003","journal-title":"J Netw Comput Appl"},{"issue":"11","key":"116_CR62","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang FY (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybernet 49(11):2266\u20132277. https:\/\/doi.org\/10.1109\/TSMC.2019.2895123","journal-title":"IEEE Trans Syst Man Cybernet"},{"key":"116_CR63","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.procs.2019.01.220","volume":"147","author":"J Wang","year":"2019","unstructured":"Wang J, Wang S, Guo J, Du Y, Cheng S, Li X (2019) A summary of research on Blockchain in the filed of intellectual property. Procedia Comput Sci 147:191\u2013197. https:\/\/doi.org\/10.1016\/j.procs.2019.01.220","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"116_CR64","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.dcan.2019.01.007","volume":"6","author":"M Westerkamp","year":"2019","unstructured":"Westerkamp M, Victor F, K\u00fcpper A (2019) Tracing manufacturing processes using Blockchain-based token compositions. Digital Commun Netw 6(2):167\u2013176. https:\/\/doi.org\/10.1016\/j.dcan.2019.01.007","journal-title":"Digital Commun Netw"},{"key":"116_CR65","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.csi.2018.12.002","volume":"64","author":"AH Mohsin","year":"2019","unstructured":"Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI (2019) Computer Standards & Interfaces Blockchain authentication of network applications: Taxonomy, classi fi cation, capabilities, open challenges, motivations, recommendations and future directions. Comput Stand Interfaces 64:41\u201360. https:\/\/doi.org\/10.1016\/j.csi.2018.12.002","journal-title":"Comput Stand Interfaces"},{"key":"116_CR66","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.procs.2018.03.017","volume":"129","author":"M Pusti\u0161ek","year":"2018","unstructured":"Pusti\u0161ek M, Kos A (2018) Approaches to front-end IoT application development for the approaches to front-end IoT application development for the ethereum Blockchain ethereum Blockchain. Procedia Comput Sci 129:410\u2013419. https:\/\/doi.org\/10.1016\/j.procs.2018.03.017","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"116_CR67","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2019","unstructured":"Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KR (2019) A systematic literature review of Blockchain cyber security. Digital Commun Netw 6(2):147\u2013156. https:\/\/doi.org\/10.1016\/j.dcan.2019.01.005","journal-title":"Digital Commun Netw"},{"key":"116_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.04.003","author":"R Shrestha","year":"2019","unstructured":"Shrestha R, Bajracharya R, Shrestha AP, Yeob S (2019) A new type of Blockchain for secure message exchange in VANET. Digital Commun Netw. https:\/\/doi.org\/10.1016\/j.dcan.2019.04.003","journal-title":"Digital Commun Netw"},{"issue":"2","key":"116_CR69","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","volume":"21","author":"MS Ali","year":"2019","unstructured":"Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH, Member S (2019) Applications of Blockchains in the Internet of Things: a comprehensive survey. IEEE Commun Surv Tut 21(2):1676\u20131717. https:\/\/doi.org\/10.1109\/COMST.2018.2886932","journal-title":"IEEE Commun Surv Tut"},{"key":"116_CR70","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Hoang DT (2019) A survey on consensus mechanisms and mining strategy management in Blockchain networks. IEEE Access 7:22328\u201322370. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896108","journal-title":"IEEE Access"},{"key":"116_CR71","doi-asserted-by":"publisher","first-page":"36500","DOI":"10.1109\/ACCESS.2019.2903554","volume":"7","author":"J Al-jaroodi","year":"2019","unstructured":"Al-jaroodi J (2019) Blockchain in industries: a survey. IEEE Access 7:36500\u201336515. https:\/\/doi.org\/10.1109\/ACCESS.2019.2903554","journal-title":"IEEE Access"},{"key":"116_CR72","doi-asserted-by":"publisher","first-page":"47615","DOI":"10.1109\/ACCESS.2019.2909924","volume":"7","author":"Z Liu","year":"2019","unstructured":"Liu Z, Luong NC, Wang W, Niyato D, Wang P, Member S (2019) A survey on Blockchain: a game theoretical perspective. IEEE Access 7:47615\u201347643. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909924","journal-title":"IEEE Access"},{"key":"116_CR73","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the Internet of Things. IEEE Access 4:2292\u20132303. https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339","journal-title":"IEEE Access"},{"key":"116_CR74","unstructured":"Mondal A, Rehena Z (2018) IoT based intelligent agriculture field monitoring system. In: 2018 8th International Conference on Cloud Computing, Data Science and Engineering Confluence, pp 625\u2013629"},{"key":"116_CR75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93797-7","author":"A Sedrati","year":"2018","unstructured":"Sedrati A, Abdelraheem MA, Raza S (2018) Blockchain and IoT: Mind the Gap. Interoper Safe Secur IoT. https:\/\/doi.org\/10.1007\/978-3-319-93797-7","journal-title":"Interoper Safe Secur IoT"},{"key":"116_CR76","doi-asserted-by":"crossref","unstructured":"Svetinovic D (2016) Blockchain engineering for the Internet of Things: systems security perspective. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust and Security 1\u20131","DOI":"10.1145\/3055245.3055256"},{"key":"116_CR77","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40860-018-00055-4","volume":"4","author":"A Palade","year":"2018","unstructured":"Palade A, Cabrera C, Li F, White G, Razzaque MA, Clarke S (2018) Middleware for Internet of Things: an evaluation in a small-scale IoT environment. J Reliable Intell 4:3\u201323. https:\/\/doi.org\/10.1007\/s40860-018-00055-4","journal-title":"J Reliable Intell"},{"key":"116_CR78","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s40860-019-00075-0","volume":"5","author":"RC Staudemeyer","year":"2019","unstructured":"Staudemeyer RC, Pohls HC, Wojcik M (2019) What it takes to boost Intenet of Things privacy beyound encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net. J Reliable Intell 5:41\u201346. https:\/\/doi.org\/10.1007\/s40860-019-00075-0","journal-title":"J Reliable Intell"},{"key":"116_CR79","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s40860-017-0046-x","volume":"3","author":"G Sharma","year":"2017","unstructured":"Sharma G, Kalra SA (2017) Asecure remote user authentication scheme for smart cities e-governance applications. J Reliable Intell Environ 3:177\u2013188. https:\/\/doi.org\/10.1007\/s40860-017-0046-x","journal-title":"J Reliable Intell Environ"},{"issue":"2","key":"116_CR80","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s40860-019-00080-3","volume":"5","author":"AM Maigida","year":"2019","unstructured":"Maigida AM, Abdulhahid SM, Olalere M, Alhassan JK, Chiroma H, Dada EM (2019) Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms. J Reliable Intell 5(2):67\u201389. https:\/\/doi.org\/10.1007\/s40860-019-00080-3","journal-title":"J Reliable Intell"},{"key":"116_CR81","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s40860-017-0046-x","volume":"4","author":"A Crabtree","year":"2018","unstructured":"Crabtree A, Lodge T, Colley J, Greenhalgh C, Glover K, Haddadi H, Amar Y, Mortier R, Li Q, Moore J, Wang L, Yadav P, Zhao J, Brown A, Urquhart L, McAuley D (2018) Building accountability into the Internt of Things: the IoT Databox model. J Reliable Intell Environ 4:39\u201355. https:\/\/doi.org\/10.1007\/s40860-017-0046-x","journal-title":"J Reliable Intell Environ"},{"key":"116_CR82","doi-asserted-by":"publisher","unstructured":"Karame G (2016) On the security and scalability of Bitcoin\u2019s Blockchain. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 1861\u20131862. https:\/\/doi.org\/https:\/\/doi.org\/10.1145\/2976749.2976756","DOI":"10.1145\/2976749.2976756"},{"key":"116_CR83","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/ICOS.2018.8632817","volume":"2018","author":"I Mat","year":"2019","unstructured":"Mat I, Kassim MRM, Harun AN, Yusoff IM (2019) Smart agriculture using Internet of Things. IEEE Conf Open Syst 2018:54\u201359. https:\/\/doi.org\/10.1109\/ICOS.2018.8632817","journal-title":"IEEE Conf Open Syst"},{"key":"116_CR84","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/bs.adcom.2019.06.002","volume":"115","author":"R Shrestha","year":"2019","unstructured":"Shrestha R, Kim S (2019) Integration of IoT with Blockchain and homomorphic encryption: challenging issues and opportunities. Role Blockchain Technol IoT Appl 115:293. https:\/\/doi.org\/10.1016\/bs.adcom.2019.06.002","journal-title":"Role Blockchain Technol IoT Appl"},{"key":"116_CR85","doi-asserted-by":"publisher","DOI":"10.1109\/IGEHT.2017.8094057","author":"MN Rajkumar","year":"2017","unstructured":"Rajkumar MN, Abinaya S, Kumar VV (2017) Intelligent irrigation system - An IOT based approach. IEEE Int Conf Innov Green Energy Healthcare Technol. https:\/\/doi.org\/10.1109\/IGEHT.2017.8094057","journal-title":"IEEE Int Conf Innov Green Energy Healthcare Technol"},{"key":"116_CR86","unstructured":"Ib\u00e1\u00f1ez, LD, Kieron O, Simperl E (2018). On Blockchains and the general data protection regulation. EU Blockchain Forum and Observatory 1\u201313."},{"key":"116_CR87","doi-asserted-by":"crossref","unstructured":"Gao W, Hatcher WG, Yu W (2018) A survey of Blockchain: techniques, applications, and challenges. In: 2018 IEEE 27th International Conference on Computer Communication and Networks, pp 1\u201311.","DOI":"10.1109\/ICCCN.2018.8487348"},{"issue":"8","key":"116_CR88","doi-asserted-by":"publisher","first-page":"828","DOI":"10.3390\/electronics8080828","volume":"8","author":"BW Nyamtiga","year":"2019","unstructured":"Nyamtiga BW, Costa J, Sicato S, Rathore S, Sung Y, Park JH (2019) Blockchain-based secure storage management with edge computing for IoT. Electronics 8(8):828","journal-title":"Electronics"},{"issue":"2","key":"116_CR89","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s11277-018-6035-4","volume":"104","author":"A Aziz","year":"2019","unstructured":"Aziz A, Singh K (2019) Lightweight Security Scheme for Internet of Things. Wirel Pers Commun 104(2):577\u2013593. https:\/\/doi.org\/10.1007\/s11277-018-6035-4","journal-title":"Wirel Pers Commun"},{"issue":"12","key":"116_CR90","doi-asserted-by":"publisher","first-page":"6988","DOI":"10.1007\/s11227-018-2506-3","volume":"74","author":"S Park","year":"2018","unstructured":"Park S, Kim H, Ryou J (2018) Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment. J Supercomput 74(12):6988\u20137002. https:\/\/doi.org\/10.1007\/s11227-018-2506-3","journal-title":"J Supercomput"},{"key":"116_CR91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IMCET.2018.8603057","volume":"2018","author":"J Halabi","year":"2019","unstructured":"Halabi J, Artail H (2019) A lightweight synchronous cryptographic hash chain solution to securing the vehicle CAN bus. IEEE Int Multidiscipl Conf Eng Technol 2018:1\u20136. https:\/\/doi.org\/10.1109\/IMCET.2018.8603057","journal-title":"IEEE Int Multidiscipl Conf Eng Technol"},{"key":"116_CR92","doi-asserted-by":"publisher","unstructured":"Mohammedi M, Omar M, Aitabdelmalek W, Mansouri A, Bouabdallah A (2018) Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems. In: 2018 13th International Symposium on Programming and Systems, pp 1\u20136. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/ISPS.2018.8379017","DOI":"10.1109\/ISPS.2018.8379017"},{"issue":"14","key":"116_CR93","doi-asserted-by":"publisher","first-page":"18383","DOI":"10.1007\/s11042-018-5660-y","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia IoT devices. Multimedia Tools Appl 77(14):18383\u201318413. https:\/\/doi.org\/10.1007\/s11042-018-5660-y","journal-title":"Multimedia Tools Appl"},{"key":"116_CR94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60618-7_60","author":"T Omrani","year":"2018","unstructured":"Omrani T, Sliman L, Becheikh R, Belghith S, Hedia BB (2018) Towards an ultra-lightweight cryptosystem for IoT. Adv Intell Syst Comput. https:\/\/doi.org\/10.1007\/978-3-319-60618-7_60","journal-title":"Adv Intell Syst Comput"},{"key":"116_CR95","doi-asserted-by":"publisher","unstructured":"Chowdhury AR, Mahmud J, Kamal ARM, Hamid MA (2018) MAES: Modified advanced encryption standard for resource constraint environments 1\u20136. In: 2018 IEEE Sensors Applications Symposium. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/SAS.2018.8336747","DOI":"10.1109\/SAS.2018.8336747"},{"key":"116_CR96","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCE.2018.8326298","volume":"2018","author":"A Eldosouky","year":"2018","unstructured":"Eldosouky A, Saad W (2018) On the cybersecurity of m-Health IoT systems with LED bitslice implementation. IEEE Inte Conf Consum Electron 2018:1\u20136. https:\/\/doi.org\/10.1109\/ICCE.2018.8326298","journal-title":"IEEE Inte Conf Consum Electron"},{"key":"116_CR97","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICC.2018.8422794","volume":"2018","author":"X Hou","year":"2018","unstructured":"Hou X, Wang J, Jiang C, Guan S, Ren Y (2018) A sink node assisted lightweight intrusion detection mechanism for WBAN. IEEE Int Conf Commun 2018:1\u20136. https:\/\/doi.org\/10.1109\/ICC.2018.8422794","journal-title":"IEEE Int Conf Commun"},{"issue":"23","key":"116_CR98","doi-asserted-by":"publisher","first-page":"31397","DOI":"10.1007\/s11042-018-6051-0","volume":"77","author":"M Noura","year":"2018","unstructured":"Noura M, Noura H, Chehab A, Mansour MM, Sleem L, Couturier R (2018) A dynamic approach for a lightweight and secure cipher for medical images. Multimedia Tools Appl 77(23):31397\u201331426. https:\/\/doi.org\/10.1007\/s11042-018-6051-0","journal-title":"Multimedia Tools Appl"},{"key":"116_CR99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78816-6_9","author":"MS Haque","year":"2018","unstructured":"Haque MS, Chowdhury MU (2018) A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV). Intl Conf Secur Privacy Comm Syst. https:\/\/doi.org\/10.1007\/978-3-319-78816-6_9","journal-title":"Intl Conf Secur Privacy Comm Syst"},{"key":"116_CR100","doi-asserted-by":"publisher","unstructured":"Mustafa G, Ashraf R, Mirza MA, Jamil A (2018) A review of data security and cryptographic techniques in IoT based devices. In: Proceedings of the2nd International Conference on Future Networks and Distributed Systems 1\u20139. https:\/\/doi.org\/https:\/\/doi.org\/10.1145\/3231053.3231100","DOI":"10.1145\/3231053.3231100"},{"key":"116_CR101","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718761814","author":"MA Al Sibahee","year":"2018","unstructured":"Al Sibahee MA, Lu S, Abduljabbar ZA, Ibrahim A, Hussien ZA, Mutlaq KAA, Hussain MA (2018) Efficient encrypted image retrieval in IoT-cloud with multi-user authentication. Intl J Distrib Sens Netw. https:\/\/doi.org\/10.1177\/1550147718761814","journal-title":"Intl J Distrib Sens Netw"},{"issue":"3\u20134","key":"116_CR102","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/23742917.2017.1384917","volume":"1","author":"WJ Buchanan","year":"2018","unstructured":"Buchanan WJ, Li S, Asif R (2018) Lightweight cryptography methods. J Cyber Secur Technol 1(3\u20134):187\u2013201. https:\/\/doi.org\/10.1080\/23742917.2017.1384917","journal-title":"J Cyber Secur Technol"},{"issue":"8","key":"116_CR103","doi-asserted-by":"publisher","first-page":"3712","DOI":"10.1109\/TII.2017.2784395","volume":"14","author":"P Xu","year":"2018","unstructured":"Xu P, He S, Wang W, Susilo W, Jin H (2018) Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Trans Industr Inf 14(8):3712\u20133723. https:\/\/doi.org\/10.1109\/TII.2017.2784395","journal-title":"IEEE Trans Industr Inf"},{"key":"116_CR104","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.jcss.2017.03.001","volume":"90","author":"A Alabdulatif","year":"2017","unstructured":"Alabdulatif A, Kumarage H, Khalil I, Yi X (2017) Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. J Comput Syst Sci 90:28\u201345. https:\/\/doi.org\/10.1016\/j.jcss.2017.03.001","journal-title":"J Comput Syst Sci"},{"key":"116_CR105","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058307","author":"ER Naru","year":"2017","unstructured":"Naru ER, Saini H, Sharma M (2017) A recent review on lightweight cryptography in IoT. Proc Intern Conf IoT Soc Mobile Anal Cloud. https:\/\/doi.org\/10.1109\/I-SMAC.2017.8058307","journal-title":"Proc Intern Conf IoT Soc Mobile Anal Cloud"},{"key":"116_CR106","doi-asserted-by":"publisher","first-page":"26820","DOI":"10.1109\/ACCESS.2018.2822822","volume":"6","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N, Nam Y (2018) Analysis of lightweight encryption scheme for fog-to-things communication. IEEE Access 6:26820\u201326830. https:\/\/doi.org\/10.1109\/ACCESS.2018.2822822","journal-title":"IEEE Access"},{"key":"116_CR107","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302\u20133312. https:\/\/doi.org\/10.1109\/ACCESS.2017.2677520","journal-title":"IEEE Access"},{"key":"116_CR108","doi-asserted-by":"publisher","unstructured":"Al Salami S, Baek J, Salah K, Damiani E (2016) Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security 382\u2013388. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/ARES.2016.40","DOI":"10.1109\/ARES.2016.40"},{"key":"116_CR109","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISNE.2014.6839375","volume":"2014","author":"JY Lee","year":"2014","unstructured":"Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for Internet of Things. Int Sympos Next-Gener Electron 2014:1\u20132. https:\/\/doi.org\/10.1109\/ISNE.2014.6839375","journal-title":"Int Sympos Next-Gener Electron"},{"key":"116_CR110","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"X Yao","year":"2015","unstructured":"Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener Comput Syst 49:104\u2013112. https:\/\/doi.org\/10.1016\/j.future.2014.10.010","journal-title":"Future Gener Comput Syst"},{"key":"116_CR111","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.future.2019.05.023","volume":"100","author":"S Moin","year":"2019","unstructured":"Moin S, Karim A, Safdar Z, Safdar K, Ahmed E, Imran M (2019) Securing IoTs in distributed Blockchain: analysis, requirements and open issues. Future Gener Comput Syst 100:325\u2013343. https:\/\/doi.org\/10.1016\/j.future.2019.05.023","journal-title":"Future Gener Comput Syst"},{"key":"116_CR112","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/bs.adcom.2018.12.001","volume":"115","author":"HF Atlam","year":"2019","unstructured":"Atlam HF, Wills GB (2019) Intersections between IoT and distributed ledger. Role Blockchain Technol IoT Appl 115:73\u2013113. https:\/\/doi.org\/10.1016\/bs.adcom.2018.12.001","journal-title":"Role Blockchain Technol IoT Appl"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-020-00116-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-020-00116-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-020-00116-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T19:10:14Z","timestamp":1635016214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-020-00116-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,24]]},"references-count":112,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["116"],"URL":"https:\/\/doi.org\/10.1007\/s40860-020-00116-z","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,24]]},"assertion":[{"value":"22 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}