{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:21:40Z","timestamp":1770337300532,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s40860-021-00153-2","type":"journal-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T11:02:58Z","timestamp":1629716578000},"page":"379-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A private Ethereum blockchain implementation for secure data handling in Internet of Medical Things"],"prefix":"10.1007","volume":"8","author":[{"given":"Dheeraj","family":"Mohan","sequence":"first","affiliation":[]},{"given":"Lakshmi","family":"Alwin","sequence":"additional","affiliation":[]},{"given":"P.","family":"Neeraja","sequence":"additional","affiliation":[]},{"given":"K. Deepak","family":"Lawrence","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2601-5265","authenticated-orcid":false,"given":"Vinod","family":"Pathari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"key":"153_CR1","unstructured":"Research, Statistics, Data and Systems. https:\/\/www.cms.gov\/Research-Statistics-Data-and-Systems\/Statistics-Trends-and-Reports\/NationalHealthExpendData\/NationalHealthAccountsHistorical. Accessed 12 June 2021"},{"key":"153_CR2","unstructured":"IoMT (Internet of Medical Things) Market size, share. https:\/\/www.fortunebusinessinsights.com\/industry-reports\/internet-of-medical-things-iomt-market-101844. Accessed 12 June 2021"},{"key":"153_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s40860-017-0038-x","volume":"3","author":"N Vithanwattana","year":"2017","unstructured":"Vithanwattana N, Mapp G, George C (2017) Developing a comprehensive information security framework for mHealth: a detailed analysis. J Reliable Intell Environ 3:21\u201339. https:\/\/doi.org\/10.1007\/s40860-017-0038-x","journal-title":"J Reliable Intell Environ"},{"key":"153_CR4","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s40860-018-0062-5","volume":"4","author":"PK Dhillon","year":"2018","unstructured":"Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for IoT-based healthcare services. J Reliable Intell Environ 4:141\u2013160. https:\/\/doi.org\/10.1007\/s40860-018-0062-5","journal-title":"J Reliable Intell Environ"},{"key":"153_CR5","unstructured":"U.S. Department of Health and Human Services\u2014Office for Civil Rights. https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf. Accessed 12 June 2021"},{"key":"153_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/mc.2018.3620987","volume":"51","author":"F Hudson","year":"2018","unstructured":"Hudson F, Clark C (2018) Wearables and medical interoperability: the evolving frontier. Computer 51:86\u201390. https:\/\/doi.org\/10.1109\/mc.2018.3620987","journal-title":"Computer"},{"key":"153_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s40860-019-00076-z","volume":"5","author":"O Anya","year":"2019","unstructured":"Anya O, Tawfik H, Alani MM, Hu J (2019) Cybersecurity design considerations for cross-boundary clinical decision support. J Reliable Intell Environ 5:91\u2013103. https:\/\/doi.org\/10.1007\/s40860-019-00076-z","journal-title":"J Reliable Intell Environ"},{"key":"153_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40860-019-00079-w","volume":"6","author":"SD Suganthi","year":"2020","unstructured":"Suganthi SD, Anitha R, Sureshkumar V et al (2020) End to end light weight mutual authentication scheme in IoT-based healthcare environment. J Reliable Intell Environ 6:3\u201313. https:\/\/doi.org\/10.1007\/s40860-019-00079-w","journal-title":"J Reliable Intell Environ"},{"key":"153_CR9","doi-asserted-by":"publisher","first-page":"9239","DOI":"10.1109\/access.2016.2645904","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang J, Xue N, Huang X (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239\u20139250. https:\/\/doi.org\/10.1109\/access.2016.2645904","journal-title":"IEEE Access"},{"key":"153_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100079","volume":"10","author":"AR Rao","year":"2020","unstructured":"Rao AR, Ravishankar Rao A, Clarke D (2020) Perspectives on emerging directions in using IoT devices in blockchain applications. Internet Things 10:100079. https:\/\/doi.org\/10.1016\/j.iot.2019.100079","journal-title":"Internet Things"},{"key":"153_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100159","volume":"9","author":"MA Uddin","year":"2020","unstructured":"Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2020) Blockchain leveraged decentralized IoT eHealth framework. Internet Things 9:100159. https:\/\/doi.org\/10.1016\/j.iot.2020.100159","journal-title":"Internet Things"},{"key":"153_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iot.2018.05.002","volume":"1\u20132","author":"D Minoli","year":"2018","unstructured":"Minoli D, Occhiogrosso B (2018) Blockchain mechanisms for IoT security. Internet Things 1\u20132:1\u201313. https:\/\/doi.org\/10.1016\/j.iot.2018.05.002","journal-title":"Internet Things"},{"key":"153_CR13","doi-asserted-by":"publisher","unstructured":"Seliem M, Elgazzar K (2019) BIoMT: Blockchain for the Internet of Medical Things. In: 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) pp 1\u20134. http:\/\/doi.org\/https:\/\/doi.org\/10.1109\/blackseacom.2019.8812784","DOI":"10.1109\/blackseacom.2019.8812784"},{"key":"153_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/mce.2018.2880806","volume":"8","author":"KR Ozyilmaz","year":"2019","unstructured":"Ozyilmaz KR, Yurdakul A (2019) Designing a blockchain-based IoT With Ethereum, Swarm, and LoRa: The software solution to create high availability with minimal security risks. IEEE Consum Electron Mag 8:28\u201334. https:\/\/doi.org\/10.1109\/mce.2018.2880806","journal-title":"IEEE Consum Electron Mag"},{"key":"153_CR15","doi-asserted-by":"publisher","unstructured":"Dey T, Jaiswal S, Sunderkrishnan S, Katre N (2017) HealthSense: a medical use case of Internet of Things and blockchain. In: 2017 International conference on intelligent sustainable systems (ICISS), pp 486\u2013491. https:\/\/doi.org\/10.1109\/iss1.2017.8389459","DOI":"10.1109\/iss1.2017.8389459"},{"key":"153_CR16","doi-asserted-by":"publisher","unstructured":"Xu Q, Aung KMM, Zhu Y, Yong KL (2018) A blockchain-based storage system for data analytics in the internet of things. In: New advances in the internet of things. Springer, Champaign, pp 119\u2013138. https:\/\/doi.org\/10.1007\/978-3-319-58190-3_8","DOI":"10.1007\/978-3-319-58190-3_8"},{"key":"153_CR17","doi-asserted-by":"publisher","unstructured":"Ellouze F, Fersi G, Jmaiel M (2020) Blockchain for Internet of Medical Things: A Technical Review. In: The Impact of Digital Technologies on Public Health in Developed and Developing Countries. Springer, Cham, pp 259\u2013267. https:\/\/doi.org\/10.1007\/978-3-030-51517-1_22","DOI":"10.1007\/978-3-030-51517-1_22"},{"key":"153_CR18","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"A Dwivedi","year":"2019","unstructured":"Dwivedi A, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare Blockchain for IoT. Sensors 19:326. https:\/\/doi.org\/10.3390\/s19020326","journal-title":"Sensors"},{"key":"153_CR19","doi-asserted-by":"publisher","unstructured":"Srivastava G, Crichigno J, Dhar S (2019) A light and secure healthcare blockchain for IoT medical devices. In: 2019 IEEE Canadian conference of electrical and computer engineering (CCECE), pp 1\u20135. https:\/\/doi.org\/10.1109\/ccece.2019.8861593","DOI":"10.1109\/ccece.2019.8861593"},{"key":"153_CR20","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","volume":"102","author":"SN Mohanty","year":"2020","unstructured":"Mohanty SN, Ramya KC, Sheeba Rani S et al (2020) An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 102:1027\u20131037. https:\/\/doi.org\/10.1016\/j.future.2019.09.050","journal-title":"Future Gener Comput Syst"},{"key":"153_CR21","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.procs.2018.03.017","volume":"129","author":"M Pusti\u0161ek","year":"2018","unstructured":"Pusti\u0161ek M, Kos A (2018) Approaches to Front-End IoT application development for the Ethereum Blockchain. Procedia Comput Sci 129:410\u2013419. https:\/\/doi.org\/10.1016\/j.procs.2018.03.017","journal-title":"Procedia Comput Sci"},{"key":"153_CR22","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Future Gener Comput Syst 97:512\u2013529. https:\/\/doi.org\/10.1016\/j.future.2019.02.060","journal-title":"Future Gener Comput Syst"},{"key":"153_CR23","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s40860-020-00116-z","volume":"7","author":"AA Alfa","year":"2020","unstructured":"Alfa AA, Alhassan JK, Olaniyi OM, Olalere M (2020) Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions. J Reliable Intell Environ 7:115\u2013143. https:\/\/doi.org\/10.1007\/s40860-020-00116-z","journal-title":"J Reliable Intell Environ"},{"key":"153_CR24","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126\u2013142. https:\/\/doi.org\/10.1016\/j.cose.2018.06.004","journal-title":"Comput Secur"},{"key":"153_CR25","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1016\/j.procs.2020.04.092","volume":"171","author":"A Gibson","year":"2020","unstructured":"Gibson A, Thamilarasu G (2020) Protect your pacemaker: blockchain based authentication and consented authorization for implanted medical devices. Procedia Comput Sci 171:847\u2013856. https:\/\/doi.org\/10.1016\/j.procs.2020.04.092","journal-title":"Procedia Comput Sci"},{"key":"153_CR26","doi-asserted-by":"publisher","unstructured":"Hatzivasilis G, Soultatos O, Ioannidis S, et al (2019) Review of security and privacy for the internet of medical things (IoMT). In: 2019 15th International conference on distributed computing in sensor systems (DCOSS). IEEE, pp 457\u2013464. https:\/\/doi.org\/10.1109\/DCOSS.2019.00091","DOI":"10.1109\/DCOSS.2019.00091"},{"key":"153_CR27","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.3390\/s19102228","volume":"19","author":"L Hang","year":"2019","unstructured":"Hang L, Kim D-H (2019) Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity. Sensors 19:2228. https:\/\/doi.org\/10.3390\/s19102228","journal-title":"Sensors"},{"key":"153_CR28","doi-asserted-by":"publisher","first-page":"4650","DOI":"10.1109\/jiot.2018.2874095","volume":"6","author":"S Biswas","year":"2019","unstructured":"Biswas S, Sharif K, Li F et al (2019) A scalable blockchain framework for secure transactions in IoT. IEEE Internet Things J 6:4650\u20134659. https:\/\/doi.org\/10.1109\/jiot.2018.2874095","journal-title":"IEEE Internet Things J"},{"key":"153_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.3023553","author":"A Coronato","year":"2020","unstructured":"Coronato A, Cuzzocrea A (2020) An innovative risk assessment methodology for medical information systems. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/tkde.2020.3023553","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"153_CR30","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. Accessed 12 June 2021"},{"key":"153_CR31","unstructured":"Buterin V (2014) A next-generation smart contract and decentralized application platform. https:\/\/ethereum.org\/en\/whitepaper\/. Accessed 12 June 2021"},{"key":"153_CR32","unstructured":"Solidity. https:\/\/solidity.readthedocs.io\/en\/v0.6.4\/. Accessed 12 June 2021"},{"key":"153_CR33","unstructured":"web3.js\u2014Ethereum JavaScript API\u2014web3.js 1.0.0 documentation. https:\/\/web3js.readthedocs.io\/en\/v1.2.6\/. Accessed 12 June 2021"},{"key":"153_CR34","unstructured":"Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.197.pdf. Accessed 12 June 2021"},{"key":"153_CR35","doi-asserted-by":"crossref","unstructured":"Pornin T (2013) Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA)","DOI":"10.17487\/rfc6979"},{"key":"153_CR36","unstructured":"Ada L (2012) Adafruit Industries DHT11 basic temperature-humidity sensor + extras. https:\/\/learn.adafruit.com\/dht\/using-a-dhtxx-sensor. Accessed 12 June 2021"},{"key":"153_CR37","unstructured":"Croston B (2019) RPi.GPIO. https:\/\/pypi.org\/project\/RPi.GPIO\/. Accessed 12 June 2021"},{"key":"153_CR38","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1080\/01611194.2014.988363","volume":"39","author":"VG Mart\u00ednez","year":"2015","unstructured":"Mart\u00ednez VG, Gayoso Mart\u00ednez V, Hern\u00e1ndez Encinas L, Queiruga Dios A (2015) Security and practical considerations when implementing the elliptic curve integrated encryption scheme. Cryptologia 39:244\u2013269. https:\/\/doi.org\/10.1080\/01611194.2014.988363","journal-title":"Cryptologia"},{"key":"153_CR39","unstructured":"Mohan D (2020) dheerajmohan\/Private-IoMT-Blockchain. https:\/\/github.com\/dheerajmohan\/Private-IoMT-Blockchain. Accessed 12 June 2021"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00153-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-021-00153-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00153-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T19:52:40Z","timestamp":1667418760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-021-00153-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["153"],"URL":"https:\/\/doi.org\/10.1007\/s40860-021-00153-2","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,23]]},"assertion":[{"value":"12 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The complete code realizing the proposed platform is released under the permissive BSD 3-Clause License. The source code for the implementation of the work is available at github.com\/dheerajmohan\/Private-IoMT-Blockchain.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}