{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:22:53Z","timestamp":1774160573408,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04082-2","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T12:22:09Z","timestamp":1749212529000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Privacy-Preserving Blockchain Learning Model for Reliable Industrial Internet of Things Data Transmission"],"prefix":"10.1007","volume":"6","author":[{"given":"Abdulrahman Mathkar","family":"Alotaibi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"4082_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-030-66222-6_3","volume-title":"Emergence of cyber physical system and IoT in smart automation and robotics: computer engineering in automation","author":"H Khujamatov","year":"2021","unstructured":"Khujamatov H, Reypnazarov E, Khasanov D, Akhmedov N. IoT, iiot, and cyber-physical systems integration. Emergence of cyber physical system and IoT in smart automation and robotics: computer engineering in automation. Cham: Springer International Publishing; 2021. pp. 31\u201350."},{"key":"4082_CR2","doi-asserted-by":"crossref","unstructured":"Sari A, Lekidis A, Butun I. Industrial networks and IIoT: Now and future trends. Industrial IoT: Challenges, Design Principles, Applications, and Security (2020): 3\u201355.","DOI":"10.1007\/978-3-030-42500-5_1"},{"key":"4082_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3390\/s23177470","volume":"23","author":"B Alotaibi","year":"2023","unstructured":"Alotaibi B. A survey on the industrial internet of things security: requirements, attacks, AI-based solutions, and edge computing opportunities. Sensors. 2023;23:17.","journal-title":"Sensors"},{"key":"4082_CR4","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.comcom.2023.06.020","volume":"208","author":"S Mekala","year":"2023","unstructured":"Mekala S, Harsha Z, Baig A, Anwar, Zeadally S. Cybersecurity for industrial IoT (IIoT): threats, countermeasures, challenges and future directions. Comput Commun. 2023;208:294\u2013320.","journal-title":"Comput Commun"},{"issue":"4","key":"4082_CR5","first-page":"341","volume":"8","author":"E Boateng","year":"2020","unstructured":"Boateng E, Yeboah J, Otoo, Daniel A. Abaye. Basic tenets of classification algorithms K-nearest-neighbor, support vector machine, random forest and neural network: A review. J Data Anal Inform Process. 2020;8(4):341\u201357.","journal-title":"J Data Anal Inform Process"},{"key":"4082_CR6","doi-asserted-by":"crossref","unstructured":"Adam M, Hammoudeh M, Alrawashdeh R, Alsulaimy B. A survey on security, privacy, trust, and architectural challenges in IoT systems. IEEE Access (2024).","DOI":"10.1109\/ACCESS.2024.3382709"},{"key":"4082_CR7","doi-asserted-by":"publisher","first-page":"2409","DOI":"10.1109\/ACCESS.2023.3348552","volume":"12","author":"Jo\u00e3o Henriques","year":"2024","unstructured":"Henriques Jo\u00e3o, Caldeira F. Tiago cruz, and Paulo sim\u00f5es. A survey on forensics and compliance auditing for critical infrastructure protection. IEEE Access. 2024;12:2409\u201344.","journal-title":"IEEE Access"},{"issue":"3","key":"4082_CR8","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.1007\/s10115-024-02285-2","volume":"67","author":"C Chen","year":"2025","unstructured":"Chen C, Liu J, Tan H, Li X, Wang KI-K, Li P, Sakurai K, Dou D. Trustworthy federated learning: privacy, security, and beyond. Knowl Inf Syst. 2025;67(3):2321\u201356.","journal-title":"Knowl Inf Syst"},{"key":"4082_CR9","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhao Y, Li Z, Cheng X, Wang Y, Kotevska O. Philip S. Yu, and Tyler derr. A survey on privacy in graph neural networks: attacks, preservation, and applications. IEEE Trans Knowl Data Eng (2024).","DOI":"10.1109\/TKDE.2024.3454328"},{"key":"4082_CR10","doi-asserted-by":"crossref","unstructured":"Moorthy S, Krishna, Jagannath J. Survey of graph neural network for internet of things and nextg networks. ArXiv Preprint ArXiv:2405.17309 (2024).","DOI":"10.36227\/techrxiv.171742564.46066868\/v1"},{"issue":"12","key":"4082_CR11","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.3390\/electronics13122274","volume":"13","author":"T Altaf","year":"2024","unstructured":"Altaf T, Wang X, Ni W, Yu G, Liu RP, Braun R. GNN-Based network traffic analysis for the detection of sequential attacks in IoT. Electronics. 2024;13(12):2274.","journal-title":"Electronics"},{"issue":"1","key":"4082_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10723-021-09544-4","volume":"19","author":"A Demichev","year":"2021","unstructured":"Demichev A, Kryukov A, Prikhod\u2019ko N. Business process engineering for data storing and processing in a collaborative distributed environment based on provenance metadata, smart contracts and blockchain technology. J Grid Comput. 2021;19(1):3.","journal-title":"J Grid Comput"},{"issue":"8","key":"4082_CR13","doi-asserted-by":"publisher","first-page":"22811","DOI":"10.1007\/s11042-023-16411-9","volume":"83","author":"D Zouache","year":"2024","unstructured":"Zouache D, Got A, Alarabiat D, Abualigah L, El-Ghazali Talbi. A novel multi-objective wrapper-based feature selection method using quantum-inspired and swarm intelligence techniques. Multimedia Tools Appl. 2024;83(8):22811\u201335.","journal-title":"Multimedia Tools Appl"},{"key":"4082_CR14","doi-asserted-by":"crossref","unstructured":"Liu J, Sun Chang-ai, Wu T, and Marco Aiello. Blockchain-based Privacy-preserving Data Service Provisioning for Internet of Things. In 2024 IEEE International Conference on Web Services (ICWS), pp. 524\u2013534. IEEE, 2024.","DOI":"10.1109\/ICWS62655.2024.00073"},{"key":"4082_CR15","first-page":"100891","volume":"29","author":"A Pandey","year":"2023","unstructured":"Pandey A, Kumar R, Saxena A, Awasthi, Sunil MP. Privacy preserved data sharing using blockchain and support vector machine for industrial IOT applications. Measurement: Sens. 2023;29:100891.","journal-title":"Measurement: Sens"},{"issue":"9","key":"4082_CR16","doi-asserted-by":"publisher","first-page":"6358","DOI":"10.1109\/TII.2022.3142030","volume":"18","author":"P Kumar","year":"2022","unstructured":"Kumar P, Kumar R, Gupta GP, Tripathi R, Srivastava G. P2tif: A blockchain and deep learning framework for privacy-preserved threat intelligence in industrial Iot. IEEE Trans Industr Inf. 2022;18(9):6358\u201367.","journal-title":"IEEE Trans Industr Inf"},{"key":"4082_CR17","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1109\/JEDS.2024.3358087","volume":"12","author":"P Kumar","year":"2024","unstructured":"Kumar P, Malarvizhi MM, Kamruzzaman BS, Alfurhood B, Hossain. Harikumar nagarajan, and Surendar Rama sitaraman. Balanced performance merit on wind and solar energy contact with clean environment enrichment. IEEE J Electron Devices Soc. 2024;12:808\u201323.","journal-title":"IEEE J Electron Devices Soc"},{"issue":"4","key":"4082_CR18","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1007\/s10586-021-03399-w","volume":"25","author":"J Xu","year":"2022","unstructured":"Xu J, Lin J, Liang W, Kuan-Ching Li. Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments. Cluster Comput. 2022;25(4):2515\u201326.","journal-title":"Cluster Comput"},{"key":"4082_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.32604\/cmc.2022.023553","volume":"72","author":"JS Mustafa Hilal, Anwer","year":"2022","unstructured":"Mustafa Hilal, Anwer JS, Alzahrani I, Abunadi N, Nemri, Fahd N, Al-Wesabi A, Motwakel. Ishfaq yaseen, and Abu Sarwar zamani. Intelligent deep learning model for privacy preserving IIoT on 6G environment. Computers. Mater Continua. 2022;72:1.","journal-title":"Mater Continua"},{"issue":"5","key":"4082_CR20","doi-asserted-by":"publisher","first-page":"3551","DOI":"10.1109\/TII.2021.3116037","volume":"18","author":"P Zhang","year":"2021","unstructured":"Zhang P, Hong Y, Kumar N, Alazab M, Alshehri MD, Jiang C. BC-EdgeFL: A defensive transmission model based on blockchain-assisted reinforced federated learning in IIoT environment. IEEE Trans Industr Inf. 2021;18(5):3551\u201361.","journal-title":"IEEE Trans Industr Inf"},{"key":"4082_CR21","doi-asserted-by":"crossref","unstructured":"Nisha M, Sharon G, Rajakumar R, Shirly Myrtle N, Raja Priya, Muthulakshmi A. Blockchain-enabled privacy and homomorphic encryption with voting classifier in iiot. In 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 144\u2013148. IEEE, 2023.","DOI":"10.1109\/ICSCCC58608.2023.10176683"},{"issue":"9","key":"4082_CR22","doi-asserted-by":"publisher","first-page":"6092","DOI":"10.1109\/TII.2020.2974555","volume":"16","author":"PC Arachchige","year":"2020","unstructured":"Arachchige PC, Mahawaga P, Bertok I, Khalil D, Liu S, Camtepe, Atiquzzaman M. A trustworthy privacy preserving framework for machine learning in industrial IoT systems. IEEE Trans Industr Inf. 2020;16(9):6092\u2013102.","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"4082_CR23","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Y Lu","year":"2019","unstructured":"Lu Y, Huang X, Dai Y, Sabita Maharjan, and, Zhang Y. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Industr Inf. 2019;16(6):4177\u201386.","journal-title":"IEEE Trans Industr Inf"},{"key":"4082_CR24","doi-asserted-by":"crossref","unstructured":"Alnaghes M, Falkner N, Shen H. A privacy-preserving blockchain scheme for the reliable exchange of IoT data. In International Conference on Parallel and Distributed Computing: Applications and Technologies, pp. 260\u2013271. Singapore: Springer Nature Singapore, 2023.","DOI":"10.1007\/978-981-99-8211-0_24"},{"issue":"7","key":"4082_CR25","doi-asserted-by":"publisher","first-page":"4904","DOI":"10.1109\/TII.2020.2968923","volume":"17","author":"J Feng","year":"2020","unstructured":"Feng J, Yang LT, Zhang R, Benard Safari Gavuna. Privacy-preserving Tucker train decomposition over blockchain-based encrypted industrial IoT data. IEEE Trans Industr Inf. 2020;17(7):4904\u201313.","journal-title":"IEEE Trans Industr Inf"},{"key":"4082_CR26","doi-asserted-by":"crossref","unstructured":"Rashid M, Mamunur P, Choi S-H, Lee J, Platos Y, Huh, Ki-Ryong K. Ensuring Privacy and Security of IoT Networks Utilizing Blockchain and Federated Learning. In 2023 10th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 298\u2013305. IEEE, 2023.","DOI":"10.1109\/FiCloud58648.2023.00051"},{"issue":"1","key":"4082_CR27","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1038\/s41598-024-84837-8","volume":"15","author":"P Anand","year":"2025","unstructured":"Anand P, Singh Y, Singh H. Secure IoT data dissemination with blockchain and transfer learning techniques. Sci Rep. 2025;15(1):1665.","journal-title":"Sci Rep"},{"key":"4082_CR28","doi-asserted-by":"crossref","unstructured":"Xie J, Feng L, Fang F, Yuan Z, Deng X, Liu J, Wu P, Li Z. A Blockchain-based Federated Learning Framework for Defending Against Poisoning Attacks in IIOT. In 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 2442\u20132447. IEEE, 2024.","DOI":"10.1109\/CSCWD61410.2024.10580432"},{"issue":"6","key":"4082_CR29","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.3390\/s22062112","volume":"22","author":"M Almaiah","year":"2022","unstructured":"Almaiah M, Amin A, Ali F, Hajjej. Muhammad fermi pasha, and Manal Abdullah alohali. A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things. Sensors. 2022;22(6):2112.","journal-title":"Sensors"},{"issue":"15","key":"4082_CR30","doi-asserted-by":"publisher","first-page":"13281","DOI":"10.1109\/JIOT.2023.3262546","volume":"10","author":"X Yan","year":"2023","unstructured":"Yan X, Miao Y, Li X, Choo K-KR, Meng X, Robert H. Deng. Privacy-preserving asynchronous federated learning framework in distributed IoT. IEEE Internet Things J. 2023;10(15):13281\u201391.","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"4082_CR31","first-page":"694","volume":"333","author":"LN Geng","year":"2025","unstructured":"Geng LN, Kristine M, Erlandson M, Hornig R, Letts C, Selvaggi H, Ashktorab O, Atieh, et al. 2024 update of the RECOVER-Adult long. COVID Res Index JAMA. 2025;333(8):694\u2013700.","journal-title":"COVID Res Index JAMA"},{"key":"4082_CR32","doi-asserted-by":"crossref","unstructured":"Kim S, Chen J, Cheng T, Gindulyte A, He J, He S, Li Q et al. PubChem 2023 update. Nucleic acids research 51, no. D1 (2023): D1373-D1380.","DOI":"10.1093\/nar\/gkac956"},{"key":"4082_CR33","unstructured":"https:\/\/www.kaggle.com\/datasets\/mohamedamineferrag\/edgeiiotset-cyber-security-dataset-of-iot-iiot?utm_source=chatgpt.com"},{"issue":"02","key":"4082_CR34","doi-asserted-by":"publisher","first-page":"2250018","DOI":"10.1142\/S0129183122500188","volume":"33","author":"H Kundra","year":"2022","unstructured":"Kundra H, Khan W, Malik M, Rane KP, Neware R, Jain V. Quantum-inspired firefly algorithm integrated with cuckoo search for optimal path planning. Int J Mod Phys C. 2022;33(02):2250018.","journal-title":"Int J Mod Phys C"},{"issue":"1","key":"4082_CR35","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2008","unstructured":"Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G. Graph Neural Netw Model IEEE Trans Neural Networks. 2008;20(1):61\u201380.","journal-title":"Graph Neural Netw Model IEEE Trans Neural Networks"},{"key":"4082_CR36","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-1-4899-7641-3_9","volume-title":"Machine learning models and algorithms for big data classification: thinking with examples for effective learning","author":"S Suthaharan","year":"2016","unstructured":"Suthaharan S. Support vector machine. Machine learning models and algorithms for big data classification: thinking with examples for effective learning. Boston, MA: Springer US; 2016. pp. 207\u201335."},{"issue":"1","key":"4082_CR37","doi-asserted-by":"publisher","first-page":"31","DOI":"10.17849\/insm-47-01-31-39.1","volume":"47","author":"SJ Rigatti","year":"2017","unstructured":"Rigatti SJ. Random forest. J Insur Med. 2017;47(1):31\u20139.","journal-title":"J Insur Med"},{"key":"4082_CR38","doi-asserted-by":"crossref","unstructured":"Graves A. and Alex Graves. Long short-term memory. Supervised sequence labelling with recurrent neural networks (2012): 37\u201345.","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"4082_CR39","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"M Ferrag","year":"2021","unstructured":"Ferrag M, Amine O, Friha L, Maglaras H, Janicke, Shu L. Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis. IEEe Access. 2021;9:138509\u201342.","journal-title":"IEEe Access"},{"issue":"6","key":"4082_CR40","doi-asserted-by":"publisher","first-page":"2379","DOI":"10.3390\/s22062379","volume":"22","author":"A Lakhan","year":"2022","unstructured":"Lakhan A, Sodhro AH, Majumdar A, Khuwuthyakorn P, Thinnukool O. A lightweight secure adaptive approach for internet-of-medical-things healthcare applications in edge-cloud-based networks. Sensors. 2022;22(6):2379.","journal-title":"Sensors"},{"key":"4082_CR41","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jpdc.2022.01.030","volume":"164","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP. Sahil garg, and Mohammad mehedi hassan. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J Parallel Distrib Comput. 2022;164:55\u201368.","journal-title":"J Parallel Distrib Comput"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04082-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04082-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04082-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T12:22:13Z","timestamp":1749212533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04082-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,6]]},"references-count":41,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["4082"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04082-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,6]]},"assertion":[{"value":"23 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"531"}}