{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:46:20Z","timestamp":1768823180834,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T00:00:00Z","timestamp":1563753600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T00:00:00Z","timestamp":1563753600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s42044-019-00044-z","type":"journal-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T11:02:57Z","timestamp":1563793377000},"page":"189-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Blockchain-based security management of IoT infrastructure with Ethereum transactions"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4435-7856","authenticated-orcid":false,"given":"S. K. Tanzir","family":"Mehedi","sequence":"first","affiliation":[]},{"given":"Abdullah Al Mamun","family":"Shamim","sequence":"additional","affiliation":[]},{"given":"Mohammad Badrul Alam","family":"Miah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,22]]},"reference":[{"key":"44_CR1","doi-asserted-by":"publisher","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications. Work. PerCom Work. 2017 618\u2013623, \n                    https:\/\/doi.org\/10.1109\/percomw.2017.7917634\n                    \n                   (2017)","DOI":"10.1109\/percomw.2017.7917634"},{"key":"44_CR2","doi-asserted-by":"publisher","unstructured":"Quadri, S.A.I., Sathish, P.: IoT based home automation and surveillance system. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 861\u2013866. IEEE, 15\u201316 June 2017 (2017). \n                    https:\/\/doi.org\/10.1109\/ICCONS.2017.8250586","DOI":"10.1109\/ICCONS.2017.8250586"},{"key":"44_CR3","unstructured":"Ramachandran, G.S., Krishnamachari, B.: Blockchain for the IoT: Opportunities and challenges, pp. 21\u201333 (2018). \n                    http:\/\/arxiv.org\/abs\/1805.02818"},{"key":"44_CR4","unstructured":"Toffler, A.: Future Shock: IoT benefits beyond traffic and lighting energy optimization. 98\u2013100 (1990)"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/ACCESS.2017.2782733","volume":"6","author":"JH Lee","year":"2017","unstructured":"Lee, J.H.: BIDaaS: Blockchain Based ID As a Service. IEEE Access 6, 2274\u20132278 (2017). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2017.2782733","journal-title":"IEEE Access"},{"key":"44_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCE.2017.2776459","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E., Yang, C.: Blockchain as a decentralized security framework. IEEE Consumer Electron Mag 7, 18\u201321 (2018). \n                    https:\/\/doi.org\/10.1109\/MCE.2017.2776459","journal-title":"IEEE Consumer Electron Mag"},{"key":"44_CR7","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. [Online]. \n                    https:\/\/bitcoin.org\/bitcoin.pdf\n                    \n                   (2008). Accessed Aug 2018"},{"key":"44_CR8","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in internet of things: challenges and solutions. (2016). \n                    arXiv: 1605.05187"},{"key":"44_CR9","doi-asserted-by":"publisher","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: Proceedings of\u20142017 IEEE 6th International Congress on Big Data, BigData Congress. 2017 557\u2013564, \n                    https:\/\/doi.org\/10.1109\/bigdatacongress.2017.85\n                    \n                   (2017)","DOI":"10.1109\/bigdatacongress.2017.85"},{"key":"44_CR10","unstructured":"Liu, X.: IOT2. 0: Internet of Things Based on Blockchain. IEEE IEMCON 2018 - The 9th IEEE Annual Information Technology, Electronics & Mobile Communication Conference, Vancouver, BC, 1\u20133 November 2018 (2018)"},{"key":"44_CR11","doi-asserted-by":"publisher","first-page":"158","DOI":"10.21832\/9781783092246-013","volume":"1","author":"J Conteh","year":"2014","unstructured":"Conteh, J., Copland, F., Cresese, A.: Multilingual teachers\u2019 resources in three different contexts: empowering learning. Multiling Turn Lang Educ 1, 158\u2013178 (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-40162-1","journal-title":"Multiling Turn Lang Educ"},{"key":"44_CR12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9675050","author":"EF Jesus","year":"2018","unstructured":"Jesus, E.F., Chicarino, V.R., De Albuquerque, C.V., Rocha, A.A.A.: A survey of how to use blockchain to secure internet of things and the Stalker attack. Secur Commun Netw (2018). \n                    https:\/\/doi.org\/10.1155\/2018\/9675050","journal-title":"Secur Commun Netw"},{"key":"44_CR13","doi-asserted-by":"publisher","unstructured":"Foil Arms and Hog.: WTF is Brexit?\u2014Foil Arms and Hog\u2014YouTube. YouTube 1\u20139, \n                    https:\/\/doi.org\/10.1007\/s10838-008-9062-0\n                    \n                   (2016)","DOI":"10.1007\/s10838-008-9062-0"},{"key":"44_CR14","unstructured":"Eibhl\u00edn, O.: Detecting Patterns in the Ethereum Transactional Data using Unsupervised Learning. (2018). \n                    https:\/\/scss.tcd.ie\/publications\/theses\/diss\/2018\/TCD-SSSDISSERTATION-2018-027.pdf"},{"key":"44_CR15","unstructured":"Donsez, D., Qu\u00e9ma, V.: Blockchains for Trusted IoT. \n                    https:\/\/wiki.eclipse.org\/images\/0\/01\/Eclipse-IoT-Days-Grenoble-2018-lockchain.pdf\n                    \n                   (2018)"},{"key":"44_CR16","doi-asserted-by":"publisher","unstructured":"Buterin, V.: OffsetMapping. (2009). \n                    https:\/\/doi.org\/10.5663\/aps.v1i1.10138","DOI":"10.5663\/aps.v1i1.10138"},{"key":"44_CR17","doi-asserted-by":"publisher","unstructured":"Hildenbrandt, E. et al.: KEVM: A complete semantics of the ethereum virtual machine. In: Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018, vol. 2018, pp. 204\u2013217. IEEE Computer Society. (2018). \n                    https:\/\/doi.org\/10.1109\/CSF.2018.00022","DOI":"10.1109\/CSF.2018.00022"},{"key":"44_CR18","unstructured":"Tonelli, R., Destefanis, G., Marchesi, M., Ortu, M.: Smart Contracts Software Metrics: a First Study. arXiv: 1802.01517v1 (2018)"},{"key":"44_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/fi10020020","volume":"10","author":"V Gatteschi","year":"2018","unstructured":"Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., Santamar\u00eda, V.: Blockchain and smart contracts for insurance: is the technology mature enough? Future Internet 10, 8\u201313 (2018). \n                    https:\/\/doi.org\/10.3390\/fi10020020","journal-title":"Future Internet"},{"key":"44_CR20","unstructured":"https:\/\/rinkeby.etherscan.io\/address\/0x513c67ef8dd393a423900aafcc78a6878e465ae5#writeContract\n                    \n                  . Accessed Oct 2018"},{"key":"44_CR21","unstructured":"https:\/\/rinkeby.etherscan.io\/address\/0x513c67ef8dd393a423900aafcc78a6878e465ae5#code\n                    \n                  . Accessed Oct 2018"},{"key":"44_CR22","unstructured":"Opportunities and Use Cases for Distributed Ledger Technologies in IoT, pp. 1\u201342 (2018). \n                    https:\/\/www.gsma.com\/iot\/opportunities-distributed-ledger-in-iot"},{"key":"44_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2014.2320093","author":"N Komninos","year":"2014","unstructured":"Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. Commun Surv Tutorials IEEE (2014). \n                    https:\/\/doi.org\/10.1109\/comst.2014.2320093","journal-title":"Commun Surv Tutorials IEEE"},{"key":"44_CR24","unstructured":"Wadhwa, N., Hussain, S.Z., Rizvi, S.A.M.: A Combined Method for Confidentiality, Integrity, Availability and Authentication (CMCIAA). In: World Congress on Engineering II, 6\u20139 (2013)"},{"key":"44_CR25","unstructured":"\u00d6zy\u0131lmaz, K.R., Yurdakul, A.: Designing a blockchain-based IoT infrastructure with Ethereum, Swarm and LoRa. (2018). \n                    http:\/\/arxiv.org\/abs\/1809.07655"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-019-00044-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42044-019-00044-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-019-00044-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T23:12:32Z","timestamp":1595286752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42044-019-00044-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,22]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["44"],"URL":"https:\/\/doi.org\/10.1007\/s42044-019-00044-z","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,22]]},"assertion":[{"value":"9 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}