{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:45:57Z","timestamp":1769845557433,"version":"3.49.0"},"reference-count":126,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04106-x","type":"journal-article","created":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:57:52Z","timestamp":1751097472000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["IoT Security Innovations: Recent Technologies, Threats, and Solutions"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8214-4523","authenticated-orcid":false,"given":"Rahila","family":"Rahim","sequence":"first","affiliation":[]},{"given":"Mohammad Ahsan","family":"Chishti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"issue":"1","key":"4106_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy MF, Awad AI, Hamed HF. Intrusion detection systems for iot-based smart environments: a survey. J Cloud Comput. 2018;7(1):1\u201320.","journal-title":"J. Cloud Comput"},{"key":"4106_CR2","doi-asserted-by":"crossref","unstructured":"Gendreau AA, Moorman M. Survey of intrusion detection systems towards an end to end secure internet of things. In: 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud). IEEE; 2016. pp. 84\u201390.","DOI":"10.1109\/FiCloud.2016.20"},{"key":"4106_CR3","doi-asserted-by":"publisher","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","volume":"6","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM, Fraga-Lamas P. A review on the use of blockchain for the internet of things. IEEE Access. 2018;6:32979\u20133001.","journal-title":"IEEE Access"},{"issue":"5","key":"4106_CR4","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang Y, Wu L, Yin G, Li L, Zhao H. A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 2017;4(5):1250\u20138.","journal-title":"IEEE Internet Things J"},{"key":"4106_CR5","doi-asserted-by":"crossref","unstructured":"Khan MA, Quasim MT, Algarni F, Alharthi A. Internet of things: on the opportunities, applications and open challenges in Saudi Arabia. In: 2019 international conference on advances in the emerging computing technologies (AECT). IEEE; 2020. pp. 1\u20135.","DOI":"10.1109\/AECT47998.2020.9194213"},{"key":"4106_CR6","unstructured":"King J, Awad AI. A distributed security mechanism for resource-constrained IoT devices, Informatica. 2016;40(1):133\u2013143."},{"key":"4106_CR7","doi-asserted-by":"crossref","unstructured":"Santos L, Rabadao C, Gon\u00e7alves R. Intrusion detection systems in internet of things: a literature review. In: 2018 13th Iberian conference on information systems and technologies (CISTI). IEEE; 2018. pp. 1\u20137.","DOI":"10.23919\/CISTI.2018.8399291"},{"key":"4106_CR8","doi-asserted-by":"publisher","first-page":"212220","DOI":"10.1109\/ACCESS.2020.3039985","volume":"8","author":"I Ali","year":"2020","unstructured":"Ali I, Ahmed A, Almogren A, Raza MA, Shah SA, Khan A, Gani A. Systematic literature review on iot-based botnet attack. IEEE Access. 2020;8:212220\u201332.","journal-title":"IEEE Access"},{"key":"4106_CR9","doi-asserted-by":"crossref","unstructured":"Dule CS, Rajasekharaiah K. Introduction to internet of things security. In: Secure communication in internet of things. CRC Press; 2024. pp. 1\u201320.","DOI":"10.1201\/9781003477327-1"},{"key":"4106_CR10","doi-asserted-by":"crossref","unstructured":"Rahim R, Ahanger AS, Khan SM, Ma F. Analysis of ids using feature selection approach on nsl-kdd dataset. In: Proceedings of the SCRS conference proceedings on intelligent systems, vol. 26. Bangalore; 2022. pp. 475\u201381.","DOI":"10.52458\/978-93-91842-08-6-45"},{"issue":"2","key":"4106_CR11","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/JIOT.2018.2847733","volume":"6","author":"W Zhou","year":"2018","unstructured":"Zhou W, Jia Y, Peng A, Zhang Y, Liu P. The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 2018;6(2):1606\u201316.","journal-title":"IEEE Internet Things J"},{"key":"4106_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1372-2","volume-title":"Wu: internet of things security","author":"C-K Wu","year":"2021","unstructured":"Wu C-K. Wu: internet of things security. Berlin: Springer; 2021."},{"issue":"16","key":"4106_CR13","doi-asserted-by":"publisher","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","volume":"56","author":"L Atzori","year":"2012","unstructured":"Atzori L, Iera A, Morabito G, Nitti M. The social internet of things (siot)-when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw. 2012;56(16):3594\u2013608.","journal-title":"Comput Netw"},{"key":"4106_CR14","first-page":"27","volume":"9","author":"S Li","year":"2017","unstructured":"Li S. Security architecture in the internet. Secur Internet Things. 2017;9:27.","journal-title":"Secur Internet Things"},{"key":"4106_CR15","doi-asserted-by":"crossref","unstructured":"Zhang J, Jin H, Gong L, Cao J, Gu Z. Overview of iot security architecture. In: 2019 IEEE fourth international conference on data science in cyberspace (DSC). IEEE; 2019. pp. 338\u201345.","DOI":"10.1109\/DSC.2019.00058"},{"issue":"2","key":"4106_CR16","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1108\/ICS-07-2018-0084","volume":"27","author":"O Yousuf","year":"2019","unstructured":"Yousuf O, Mir RN. A survey on the internet of things security: State-of-art, architecture, issues and countermeasures. Inf Comput Secur. 2019;27(2):292\u2013323.","journal-title":"Inf Comput Secur"},{"key":"4106_CR17","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D. Security of the internet of things: perspectives and challenges. Wirel Netw. 2014;20:2481\u2013501.","journal-title":"Wirel Netw"},{"issue":"16","key":"4106_CR18","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.3390\/su13169463","volume":"13","author":"RR Krishna","year":"2021","unstructured":"Krishna RR, Priyadarshini A, Jha AV, Appasani B, Srinivasulu A, Bizon N. State-of-the-art review on iot threats and attacks: taxonomy, challenges and solutions. Sustainability. 2021;13(16):9463.","journal-title":"Sustainability"},{"issue":"9","key":"4106_CR19","doi-asserted-by":"publisher","first-page":"2796","DOI":"10.3390\/s18092796","volume":"18","author":"M Burhan","year":"2018","unstructured":"Burhan M, Rehman RA, Khan B, Kim B-S. Iot elements, layered architectures and security issues: a comprehensive survey. Sensors. 2018;18(9):2796.","journal-title":"Sensors"},{"issue":"3","key":"4106_CR20","first-page":"928","volume":"9","author":"HF Atlam","year":"2018","unstructured":"Atlam HF, Walters R, Wills G. Internet of things: state-of-the-art, challenges, applications, and open issues. Int J Intell Comput Res (IJICR). 2018;9(3):928\u201338.","journal-title":"Int J Intell Comput Res (IJICR)"},{"issue":"4","key":"4106_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9734\/ajrcos\/2024\/v17i4427","volume":"17","author":"W Khalaifat","year":"2024","unstructured":"Khalaifat W. An overview of iot architecture security issues and countermeasures. Asian J Res Comput Sci. 2024;17(4):1\u201318.","journal-title":"Asian J Res Comput Sci"},{"key":"4106_CR22","doi-asserted-by":"crossref","unstructured":"Mahmoud R, Yousuf T, Aloul F, Zualkernan I. Internet of things (iot) security: current status, challenges and prospective measures. In: 2015 10th international conference for internet technology and secured transactions (ICITST). IEEE; 2015. pp. 336\u201341.","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"4106_CR23","first-page":"1","volume":"2021","author":"M Azrour","year":"2021","unstructured":"Azrour M, Mabrouki J, Guezzaz A, Kanwal A. Internet of things security: challenges and key issues. Secur Commun Netw. 2021;2021:1\u201311.","journal-title":"Secur Commun Netw"},{"issue":"3","key":"4106_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/fi12030055","volume":"12","author":"G Nebbione","year":"2020","unstructured":"Nebbione G, Calzarossa MC. Security of iot application layer protocols: challenges and findings. Future Internet. 2020;12(3):55.","journal-title":"Future Internet"},{"key":"4106_CR25","doi-asserted-by":"crossref","unstructured":"Abbasi M, Plaza-Hern\u00e1ndez M, Mezquita Y. Security of iot application layer: Requirements, threats, and solutions. In: Ambient intelligence\u2014software and applications\u201413th international symposium on ambient intelligence. Springer; 2023. pp. 86\u2013100.","DOI":"10.1007\/978-3-031-22356-3_9"},{"issue":"3","key":"4106_CR26","doi-asserted-by":"publisher","first-page":"3677","DOI":"10.1002\/ett.3677","volume":"33","author":"F Al-Turjman","year":"2022","unstructured":"Al-Turjman F, Zahmatkesh H, Shahroze R. An overview of security and privacy in smart cities\u2019 iot communications. Trans Emerg Telecommun Technol. 2022;33(3):3677.","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"12","key":"4106_CR27","doi-asserted-by":"publisher","first-page":"9395","DOI":"10.1016\/j.aej.2022.02.063","volume":"61","author":"YK Saheed","year":"2022","unstructured":"Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R. A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J. 2022;61(12):9395\u2013409.","journal-title":"Alex Eng J"},{"key":"4106_CR28","doi-asserted-by":"crossref","unstructured":"Sandeep S, Rayan T, Kumar S. Case studies on 5G and IoT security issues from the leading 5G and IoT system integration vendors. In: Secure communication for 5G and IoT networks. Lecture Notes in Electrical Engineering. 2022, vol. 836, pp. 197\u2013212.","DOI":"10.1007\/978-3-030-79766-9_12"},{"key":"4106_CR29","first-page":"8458314","volume":"2022","author":"X Chen","year":"2022","unstructured":"Chen X, Li B, Zhou Q. Lightweight and high-performance data protection for edge network security. Wirel Commun Mob Comput. 2022;2022:8458314.","journal-title":"Wirel Commun Mob Comput"},{"key":"4106_CR30","unstructured":"Please update complete details for reference [30]."},{"key":"4106_CR31","doi-asserted-by":"publisher","unstructured":"Zarei M. Securing internet of things against physical layer attacks using hybrid security algorithm (HSA). Preprints.org; 2020. https:\/\/doi.org\/10.20944\/preprints202001.0303.v1.","DOI":"10.20944\/preprints202001.0303.v1"},{"key":"4106_CR32","doi-asserted-by":"crossref","unstructured":"Tabassum A, Lebda W. Security framework for iot devices against cyber-attacks. arXiv preprint arXiv:1912.01712 2019.","DOI":"10.5121\/csit.2019.91321"},{"issue":"2014","key":"4106_CR33","first-page":"1","volume":"1","author":"M Grieves","year":"2014","unstructured":"Grieves M. Digital twin: manufacturing excellence through virtual factory replication. White Paper. 2014;1(2014):1\u20137.","journal-title":"White Paper"},{"key":"4106_CR34","doi-asserted-by":"crossref","unstructured":"Glaessgen EH, Stargel DS. The digital twin paradigm for future NASA and U.S. Air Force vehicles. In: Proceedings of the 53rd AIAA\/ASME\/ASCE\/AHS\/ASC structures, structural dynamics and materials conference, 2012 \u2013 Special Session on the Digital Twin, Honolulu, Hawaii, USA, pp. 1\u201314, AIAA 2012-1818.","DOI":"10.2514\/6.2012-1818"},{"key":"4106_CR35","doi-asserted-by":"publisher","first-page":"108952","DOI":"10.1109\/ACCESS.2020.2998358","volume":"8","author":"A Fuller","year":"2020","unstructured":"Fuller A, Fan Z, Day C, Barlow C. Digital twin: enabling technologies, challenges and open research. IEEE Access. 2020;8:108952\u201371.","journal-title":"IEEE Access"},{"issue":"3","key":"4106_CR36","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/COMST.2022.3171465","volume":"24","author":"C Alcaraz","year":"2022","unstructured":"Alcaraz C, Lopez J. Digital twin: a comprehensive survey of security threats. IEEE Commun Surv Tutor. 2022;24(3):1475\u2013503.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4106_CR37","doi-asserted-by":"publisher","first-page":"167653","DOI":"10.1109\/ACCESS.2019.2953499","volume":"7","author":"BR Barricelli","year":"2019","unstructured":"Barricelli BR, Casiraghi E, Fogli D. A survey on digital twin: definitions, characteristics, applications, and design implications. IEEE Access. 2019;7:167653\u201371.","journal-title":"IEEE Access"},{"issue":"11","key":"4106_CR38","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1080\/24725854.2019.1701753","volume":"52","author":"A Gaikwad","year":"2020","unstructured":"Gaikwad A, Yavari R, Montazeri M, Cole K, Bian L, Rao P. Toward the digital twin of additive manufacturing: integrating thermal simulations, sensing, and analytics to detect process faults. IISE Trans. 2020;52(11):1204\u201317.","journal-title":"IISE Trans"},{"issue":"11","key":"4106_CR39","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1016\/j.ifacol.2018.08.474","volume":"51","author":"W Kritzinger","year":"2018","unstructured":"Kritzinger W, Karner M, Traar G, Henjes J, Sihn W. Digital twin in manufacturing: a categorical literature review and classification. Ifac PapersOnline. 2018;51(11):1016\u201322.","journal-title":"Ifac PapersOnline"},{"issue":"2","key":"4106_CR40","doi-asserted-by":"publisher","first-page":"2116","DOI":"10.1109\/JIOT.2018.2872389","volume":"6","author":"S Gahlot","year":"2018","unstructured":"Gahlot S, Reddy S, Kumar D. Review of smart health monitoring approaches with survey analysis and proposed framework. IEEE Internet Things J. 2018;6(2):2116\u201327.","journal-title":"IEEE Internet Things J"},{"key":"4106_CR41","doi-asserted-by":"crossref","unstructured":"Magargle R, Johnson L, Mandloi P, Davoudabadi P, Kesarkar O, Krishnaswamy S, Batteh J, Pitchaikani A. A simulation-based digital twin for model-driven health monitoring and predictive maintenance of an automotive braking system. In: Modelica. 2017. pp. 132003.","DOI":"10.3384\/ecp1713235"},{"key":"4106_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100165","volume":"6","author":"M Attaran","year":"2023","unstructured":"Attaran M, Celik BG. Digital twin: benefits, use cases, challenges, and opportunities. Decis Anal J. 2023;6: 100165.","journal-title":"Decis Anal J"},{"key":"4106_CR43","doi-asserted-by":"crossref","unstructured":"Brosinsky C, Westermann D, Krebs R. Recent and prospective developments in power system control centers: adapting the digital twin technology for application in power system control centers. In: 2018 IEEE international energy conference (ENERGYCON). IEEE; 2018. pp. 1\u20136.","DOI":"10.1109\/ENERGYCON.2018.8398846"},{"key":"4106_CR44","unstructured":"LLP, TGSS. Digital Twin. https:\/\/medium.com. Accessed 17 May 2024."},{"issue":"2","key":"4106_CR45","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3390\/info14020095","volume":"14","author":"P Empl","year":"2023","unstructured":"Empl P, Pernul G. Digital-twin-based security analytics for the internet of things. Information. 2023;14(2):95.","journal-title":"Information"},{"key":"4106_CR46","doi-asserted-by":"crossref","unstructured":"Eckhart M, Ekelhart A. Digital twins for cyber-physical systems security: state of the art and outlook. Security and Quality in Cyber-Physical Systems Engineering: with forewords by Robert M. Lee and Tom Gilb. 2019. pp. 383\u2013412.","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"4106_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103699","volume":"141","author":"S Suhail","year":"2022","unstructured":"Suhail S, Malik S, Jurdak R, Hussain R, Matulevi\u010dius R, Svetinovic D. Towards situational aware cyber-physical systems: a security-enhancing use case of blockchain-based digital twins. Comput Ind. 2022;141: 103699.","journal-title":"Comput Ind"},{"key":"4106_CR48","doi-asserted-by":"crossref","unstructured":"Eckhart M, Ekelhart A, Weippl E. Enhancing cyber situational awareness for cyber-physical systems through digital twins. In: 2019 24th IEEE international conference on emerging technologies and factory automation (ETFA). IEEE; 2019. pp. 1222\u201325.","DOI":"10.1109\/ETFA.2019.8869197"},{"key":"4106_CR49","doi-asserted-by":"crossref","unstructured":"Mittal S, Tolk A, Pyles A, Van\u00a0Balen N, Bergollo K. Digital twin modeling, co-simulation and cyber use-case inclusion methodology for iot systems. In: 2019 winter simulation conference (WSC). IEEE; 2019. pp. 2653\u201364.","DOI":"10.1109\/WSC40007.2019.9004656"},{"key":"4106_CR50","doi-asserted-by":"crossref","unstructured":"Pokhrel A, Katta V, Colomo-Palacios R. Digital twin for cybersecurity incident prediction: a multivocal literature review. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops (ICSEW 2020), Seoul, Republic of Korea,  pp.\u202f671\u2013678.","DOI":"10.1145\/3387940.3392199"},{"key":"4106_CR51","doi-asserted-by":"crossref","unstructured":"Jagannath J, Ramezanpour K, Jagannath A. Digital twin virtualization with machine learning for IoT and beyond 5G networks: research directions for security and optimal control. In: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning (WiseML \u201922), San Antonio, TX, USA,  pp.\u202f81\u201386.","DOI":"10.1145\/3522783.3529519"},{"issue":"5","key":"4106_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3582571","volume":"32","author":"Q Xu","year":"2023","unstructured":"Xu Q, Ali S, Yue T. Digital twin-based anomaly detection with curriculum learning in cyber-physical systems. ACM Trans Softw Eng Methodol. 2023;32(5):1\u201332.","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4106_CR53","doi-asserted-by":"crossref","unstructured":"Kaur MJ, Mishra VP, Maheshwari P. The convergence of digital twin, IoT, and machine learning: transforming data into action. In: Digital twin technologies and smart cities. Springer International Publishing, 2020, vol. 1, pp. 3\u201317.","DOI":"10.1007\/978-3-030-18732-3_1"},{"issue":"2","key":"4106_CR54","doi-asserted-by":"publisher","first-page":"758","DOI":"10.3390\/app13020758","volume":"13","author":"CL Stergiou","year":"2023","unstructured":"Stergiou CL, Bompoli E, Psannis KE. Security and privacy issues in iot-based big data cloud systems in a digital twin scenario. Appl Sci. 2023;13(2):758.","journal-title":"Appl Sci"},{"issue":"16","key":"4106_CR55","doi-asserted-by":"publisher","first-page":"9165","DOI":"10.3390\/app13169165","volume":"13","author":"CL Stergiou","year":"2023","unstructured":"Stergiou CL, Koidou MP, Psannis KE. Iot-based big data secure transmission and management over cloud system: a healthcare digital twin scenario. Appl Sci. 2023;13(16):9165.","journal-title":"Appl Sci"},{"key":"4106_CR56","unstructured":"Ridhawi IA, Otoum S, Aloqaily M. Decentralized zero-trust framework for digital twin-based 6g. 2023. arXiv preprint arXiv:2302.03107."},{"key":"4106_CR57","doi-asserted-by":"crossref","unstructured":"Sylla T, Chalouf MA, Krief F, Samak\u00e9 K. Towards a context-aware security and privacy as a service in the internet of things. In: IFIP international conference on information security theory and practice. Springer; 2019. pp. 240\u201352.","DOI":"10.1007\/978-3-030-41702-4_15"},{"key":"4106_CR58","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.procir.2023.09.225","volume":"121","author":"A Azambuja","year":"2024","unstructured":"Azambuja A, Giese T, Sch\u00fctzer K, Anderl R, Schleich B, Almeida VR. Digital twins in industry 4.0\u2013opportunities and challenges related to cyber security. Procedia Cirp. 2024;121:25\u201330.","journal-title":"Procedia Cirp"},{"key":"4106_CR59","unstructured":"Kibret SW, Paul K, Ribeiro VJ. Ai-powered security for iot: a blockchain enabled device twin approach. In: Online identity-an essential guide. IntechOpen. 2023."},{"key":"4106_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2020.105183","volume":"128","author":"Z Zhao","year":"2021","unstructured":"Zhao Z, Shen L, Yang C, Wu W, Zhang M, Huang GQ. Iot and digital twin enabled smart tracking for safety management. Comput Oper Res. 2021;128: 105183.","journal-title":"Comput Oper Res"},{"key":"4106_CR61","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o BB, Miani RS, Kawakani CT, Alvarenga SC. A survey of intrusion detection in internet of things. J Netw Comput Appl. 2017;84:25\u201337.","journal-title":"J Netw Comput Appl"},{"key":"4106_CR62","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.pisc.2016.04.005","volume":"8","author":"SK Gautam","year":"2016","unstructured":"Gautam SK, Om H. Computational neural network regression model for host based intrusion detection system. Perspect Sci. 2016;8:93\u20135.","journal-title":"Perspect. Sci."},{"key":"4106_CR63","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"Mishra N, Pandya S. Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review. IEEE Access. 2021;9:59353\u201377.","journal-title":"IEEE Access"},{"key":"4106_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat A, Alazab A. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. 2021;4:1\u201327.","journal-title":"Cybersecurity"},{"issue":"2","key":"4106_CR65","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/a10020039","volume":"10","author":"S Anwar","year":"2017","unstructured":"Anwar S, Mohamad Zain J, Zolkipli MF, Inayat Z, Khan S, Anthony B, Chang V. From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms. 2017;10(2):39.","journal-title":"Algorithms"},{"key":"4106_CR66","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119330","volume":"215","author":"SA Khanday","year":"2023","unstructured":"Khanday SA, Fatima H, Rakesh N. Implementation of intrusion detection model for ddos attacks in lightweight iot networks. Expert Syst Appl. 2023;215: 119330.","journal-title":"Expert Syst Appl"},{"key":"4106_CR67","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1109\/JIOT.2022.3172393","volume":"10","author":"E Gyamfi","year":"2022","unstructured":"Gyamfi E, Jurcut AD. Novel online network intrusion detection system for industrial iot based on oi-svdd and as-elm. IEEE Internet Things J. 2022;10:3827\u201339.","journal-title":"IEEE Internet Things J"},{"key":"4106_CR68","doi-asserted-by":"publisher","first-page":"4016073","DOI":"10.1155\/2022\/4016073","volume":"2022","author":"AR Khan","year":"2022","unstructured":"Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA. Deep learning for intrusion detection and security of internet of things (iot): current analysis, challenges, and possible solutions. Secur Commun Netw. 2022;2022:4016073.","journal-title":"Secur Commun Netw"},{"issue":"3","key":"4106_CR69","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P. Network intrusion detection for iot security based on learning techniques. IEEE Commun Surv Tutor. 2019;21(3):2671\u2013701.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"4106_CR70","doi-asserted-by":"publisher","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","volume":"22","author":"F Hussain","year":"2020","unstructured":"Hussain F, Hussain R, Hassan SA, Hossain E. Machine learning in iot security: current solutions and future challenges. IEEE Commun Surv Tutor. 2020;22(3):1686\u2013721.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4106_CR71","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1016\/j.procs.2020.04.257","volume":"171","author":"KS Kiran","year":"2020","unstructured":"Kiran KS, Devisetty RK, Kalyan NP, Mukundini K, Karthi R. Building a intrusion detection system for iot environment using machine learning techniques. Procedia Comput Sci. 2020;171:2372\u20139.","journal-title":"Procedia Comput Sci"},{"key":"4106_CR72","doi-asserted-by":"crossref","unstructured":"Ali A, Shaukat S, Tayyab M, Khan MA, Khan JS, Ahmad J, et al. Network intrusion detection leveraging machine learning and feature selection. In: 2020 IEEE 17th international conference on smart communities: improving quality of life using ICT, IoT and AI (HONET). IEEE; 2020. pp. 49\u201353.","DOI":"10.1109\/HONET50430.2020.9322813"},{"issue":"5","key":"4106_CR73","first-page":"653","volume":"19","author":"B Sh","year":"2022","unstructured":"Sh B. Network traffic analysis through deep learning for detection of an army of bots in health iot network. Int J Pervasive Comput Commun. 2022;19(5):653\u201365.","journal-title":"Int J Pervasive Comput Commun"},{"key":"4106_CR74","doi-asserted-by":"crossref","unstructured":"Hattarki R, Houji S, Dhage M. Real time intrusion detection system for iot networks. In: 2021 6th international conference for convergence in technology (I2CT). IEEE; 2021. pp. 1\u20135.","DOI":"10.1109\/I2CT51068.2021.9417815"},{"key":"4106_CR75","doi-asserted-by":"crossref","unstructured":"Liang C, Shanmugam B, Azam S, Jonkman M, De\u00a0Boer F, Narayansamy G. Intrusion detection system for internet of things based on a machine learning approach. In: 2019 international conference on vision towards emerging trends in communication and networking (ViTECoN). IEEE; 2019. pp. 1\u20136.","DOI":"10.1109\/ViTECoN.2019.8899448"},{"key":"4106_CR76","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.comnet.2019.05.014","volume":"160","author":"S Hajiheidari","year":"2019","unstructured":"Hajiheidari S, Wakil K, Badri M, Navimipour NJ. Intrusion detection systems in the internet of things: a comprehensive investigation. Comput Netw. 2019;160:165\u201391.","journal-title":"Comput Netw"},{"key":"4106_CR77","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jpdc.2022.01.030","volume":"164","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Garg S, Hassan MM. A distributed intrusion detection system to detect ddos attacks in blockchain-enabled iot network. J Parallel Distrib Comput. 2022;164:55\u201368.","journal-title":"J Parallel Distrib Comput"},{"issue":"3","key":"4106_CR78","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3390\/computers14030087","volume":"14","author":"L Diana","year":"2025","unstructured":"Diana L, Dini P, Paolini D. Overview on intrusion detection systems for computers networking security. Computers. 2025;14(3):87.","journal-title":"Computers"},{"issue":"5","key":"4106_CR79","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E, Williams L, S\u0142owi\u0144ska M, Theodorakopoulos G, Burnap P. A supervised intrusion detection system for smart home iot devices. IEEE Internet Things J. 2019;6(5):9042\u201353.","journal-title":"IEEE Internet Things J"},{"key":"4106_CR80","doi-asserted-by":"crossref","unstructured":"Yi S, Hao Z, Qin Z, Li Q. Fog computing: platform and applications. In: 2015 third IEEE workshop on hot topics in web systems and technologies (HotWeb). IEEE; 2015. pp. 73\u201378.","DOI":"10.1109\/HotWeb.2015.22"},{"issue":"2","key":"4106_CR81","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.icte.2021.05.004","volume":"7","author":"H Sabireen","year":"2021","unstructured":"Sabireen H, Neelanarayanan V. A review on fog computing: architecture, fog with iot, algorithms and research challenges. Ict Express. 2021;7(2):162\u201376.","journal-title":"Ict Express"},{"key":"4106_CR82","unstructured":"Ai Y, Peng M, Zhang K. Edge cloud computing technologies for internet of things. In: A primer. Digit. Commun. Netw (2017)."},{"key":"4106_CR83","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107694","volume":"98","author":"CA De Souza","year":"2022","unstructured":"De Souza CA, Westphall CB, Machado RB. Two-step ensemble approach for intrusion detection and identification in iot and fog computing environments. Comput Electr Eng. 2022;98: 107694.","journal-title":"Comput Electr Eng"},{"key":"4106_CR84","first-page":"7542","volume":"7","author":"ML Bangare","year":"2021","unstructured":"Bangare ML, Bangare PM, Apare RS, Bangare SL. fog computing based security of iot application. Des Eng. 2021;7:7542\u20139.","journal-title":"Des Eng"},{"key":"4106_CR85","doi-asserted-by":"crossref","unstructured":"Akrivopoulos O, Zhu N, Amaxilatis D, Tselios C, Anagnostopoulos A, Chatzigiannakis I. A fog computing-oriented, highly scalable iot framework for monitoring public educational buildings. In: 2018 IEEE international conference on communications (ICC). IEEE; 2018. pp. 1\u20136.","DOI":"10.1109\/ICC.2018.8422489"},{"key":"4106_CR86","doi-asserted-by":"crossref","unstructured":"Shafi Q, Qaisar S, Basit A. Software defined machine learning based anomaly detection in fog based iot network. In: Computational science and its applications\u2014ICCSA 2019: 19th international conference, Saint Petersburg, Russia, July 1\u20134, 2019, Proceedings, Part IV 19. Springer; 2019. pp. 611\u2013621.","DOI":"10.1007\/978-3-030-24305-0_45"},{"key":"4106_CR87","doi-asserted-by":"crossref","unstructured":"Muniswamaiah M, Agerwala T, Tappert CC. Fog computing and the internet of things (iot): a review. In: 2021 8th IEEE international conference on cyber security and cloud computing (CSCloud)\/2021 7th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE; 2021. pp. 10\u201312.","DOI":"10.1109\/CSCloud-EdgeCom52276.2021.00012"},{"key":"4106_CR88","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100049","volume":"10","author":"R Das","year":"2023","unstructured":"Das R, Inuwa MM. A review on fog computing: issues, characteristics, challenges, and potential applications. Telemat Inform Rep. 2023;10: 100049.","journal-title":"Telemat Inform Rep"},{"key":"4106_CR89","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107417","volume":"180","author":"CA De Souza","year":"2020","unstructured":"De Souza CA, Westphall CB, Machado RB, Sobral J, Santos Vieira G. Hybrid approach to intrusion detection in fog-based iot environments. Comput Netw. 2020;180: 107417.","journal-title":"Comput Netw"},{"issue":"2","key":"4106_CR90","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"Alrawais A, Alhothaily A, Hu C, Cheng X. Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 2017;21(2):34\u201342.","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"4106_CR91","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/s10586-022-03606-2","volume":"26","author":"M Jalasri","year":"2023","unstructured":"Jalasri M, Lakshmanan L. Managing data security in fog computing in iot devices using noise framework encryption with power probabilistic clustering algorithm. Clust Comput. 2023;26(1):823\u201336.","journal-title":"Clust Comput"},{"issue":"2","key":"4106_CR92","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/jsan12020019","volume":"12","author":"RJ Alzahrani","year":"2023","unstructured":"Alzahrani RJ, Alzahrani A. A novel multi-algorithm approach to identify network anomalies in the iot using fog computing and a model to distinguish between iot and non-iot devices. J Sens Actuator Netw. 2023;12(2):19.","journal-title":"J Sens Actuator Netw"},{"key":"4106_CR93","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100549","volume":"48","author":"A Hazra","year":"2023","unstructured":"Hazra A, Rana P, Adhikari M, Amgoth T. Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges. Comput Sci Rev. 2023;48: 100549.","journal-title":"Comput Sci Rev"},{"key":"4106_CR94","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102822","volume":"120","author":"S Sicari","year":"2022","unstructured":"Sicari S, Rizzardi A, Coen-Porisini A. Insights into security and privacy towards fog computing evolution. Comput Secur. 2022;120: 102822.","journal-title":"Comput Secur"},{"key":"4106_CR95","doi-asserted-by":"crossref","unstructured":"Joshi SB, Panchal SD. A systematic survey on security challenges for fog-enabled internet of things (iot) and industrial internet of things (iiot). In: security issues in fog computing from 5G to 6G: architectures, applications and solutions. Springer; 2022. pp. 1\u201314.","DOI":"10.1007\/978-3-031-08254-2_1"},{"key":"4106_CR96","doi-asserted-by":"publisher","first-page":"50384","DOI":"10.1109\/ACCESS.2018.2868920","volume":"6","author":"L Zhang","year":"2018","unstructured":"Zhang L, Li J. Enabling robust and privacy-preserving resource allocation in fog computing. IEEE Access. 2018;6:50384\u201393.","journal-title":"IEEE Access"},{"issue":"4","key":"4106_CR97","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1504\/IJGUC.2019.10022143","volume":"10","author":"P Moore","year":"2019","unstructured":"Moore P, Pham HV. A fog computing model for pervasive connected healthcare in smart environments. Int J Grid Util Comput. 2019;10(4):375\u201391.","journal-title":"Int J Grid Util Comput"},{"issue":"3","key":"4106_CR98","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3390\/computers9030076","volume":"9","author":"R Jaiswal","year":"2020","unstructured":"Jaiswal R, Davidrajuh R, Rong C. Fog computing for realizing smart neighborhoods in smart grids. Computers. 2020;9(3):76.","journal-title":"Computers"},{"issue":"23","key":"4106_CR99","doi-asserted-by":"publisher","first-page":"7846","DOI":"10.3390\/s21237846","volume":"21","author":"J Akram","year":"2021","unstructured":"Akram J, Tahir A, Munawar HS, Akram A, Kouzani AZ, Mahmud MP. Cloud-and fog-integrated smart grid model for efficient resource utilisation. Sensors. 2021;21(23):7846.","journal-title":"Sensors"},{"key":"4106_CR100","volume-title":"How to time-stamp a digital document","author":"S Haber","year":"1991","unstructured":"Haber S, Stornetta WS. How to time-stamp a digital document. Berlin: Springer; 1991."},{"issue":"1","key":"4106_CR101","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/computers12010006","volume":"12","author":"T Alam","year":"2022","unstructured":"Alam T. Blockchain-based internet of things: review, current trends, applications, and future challenges. Computers. 2022;12(1):6.","journal-title":"Computers"},{"issue":"3","key":"4106_CR102","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1007\/s10586-020-03059-5","volume":"23","author":"D Pavithran","year":"2020","unstructured":"Pavithran D, Shaalan K, Al-Karaki JN, Gawanmeh A. Towards building a blockchain framework for iot. Clust Comput. 2020;23(3):2089\u2013103.","journal-title":"Clust Comput"},{"key":"4106_CR103","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on iot security: application areas, security threats, and solution architectures. IEEE Access. 2019;7:82721\u201343.","journal-title":"IEEE Access"},{"key":"4106_CR104","doi-asserted-by":"publisher","first-page":"54478","DOI":"10.1109\/ACCESS.2021.3070555","volume":"9","author":"A Al Sadawi","year":"2021","unstructured":"Al Sadawi A, Hassan MS, Ndiaye M. A survey on the integration of blockchain with iot to enhance performance and eliminate challenges. IEEE Access. 2021;9:54478\u201397.","journal-title":"IEEE Access"},{"key":"4106_CR105","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0982-x","volume":"42","author":"KN Griggs","year":"2018","unstructured":"Griggs KN, Ossipova O, Kohlios CP, Baccarini AN, Howson EA, Hayajneh T. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J Med Syst. 2018;42:1\u20137.","journal-title":"J Med Syst"},{"key":"4106_CR106","doi-asserted-by":"crossref","unstructured":"Tian F. A supply chain traceability system for food safety based on haccp, blockchain & internet of things. In: 2017 international conference on service systems and service management. IEEE; 2017. pp. 1\u20136.","DOI":"10.1109\/ICSSSM.2017.7996119"},{"issue":"9","key":"4106_CR107","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3560816","volume":"55","author":"W Issa","year":"2023","unstructured":"Issa W, Moustafa N, Turnbull B, Sohrabi N, Tari Z. Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput Surv. 2023;55(9):1\u201343.","journal-title":"ACM Comput Surv"},{"key":"4106_CR108","doi-asserted-by":"crossref","unstructured":"Kumar S, Vidhate A. Issues and future trends in iot security using blockchain: a review. In: 2023 international conference on intelligent data communication technologies and internet of things (IDCIoT). IEEE; 2023. pp. 976\u201384.","DOI":"10.1109\/IDCIoT56793.2023.10053430"},{"issue":"1","key":"4106_CR109","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJITST.2023.127391","volume":"13","author":"A Parcha","year":"2023","unstructured":"Parcha A, Mishra S, Bist A, Agarwal R, Gupta S, Sharma S, Sathyaraj R. Implementing security in iot systems via blockchain. Int J Internet Technol Secur Trans. 2023;13(1):85\u2013104.","journal-title":"Int J Internet Technol Secur Trans"},{"key":"4106_CR110","doi-asserted-by":"crossref","unstructured":"Aggarwal VK, Sharma N, Kaushik I, Bhushan B, et al. Integration of blockchain and iot (b-iot): architecture, solutions, & future research direction. In: iop conference series: materials science and engineering. IOP Publishing; 2021. pp. 1022:012103.","DOI":"10.1088\/1757-899X\/1022\/1\/012103"},{"issue":"5","key":"4106_CR111","doi-asserted-by":"publisher","first-page":"8114","DOI":"10.1109\/JIOT.2019.2922538","volume":"6","author":"M Wu","year":"2019","unstructured":"Wu M, Wang K, Cai X, Guo S, Guo M, Rong C. A comprehensive survey of blockchain: From theory to iot applications and beyond. IEEE Internet Things J. 2019;6(5):8114\u201354.","journal-title":"IEEE Internet Things J"},{"key":"4106_CR112","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-023-10226-5","volume":"129","author":"S Abed","year":"2023","unstructured":"Abed S, Jaffal R, Mohd BJ. A review on blockchain and iot integration from energy, security and hardware perspectives. Wireless Pers Commun. 2023;129:1\u201344.","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"4106_CR113","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/COMST.2022.3141490","volume":"24","author":"R Huo","year":"2022","unstructured":"Huo R, Zeng S, Wang Z, Shang J, Chen W, Huang T, Wang S, Yu FR, Liu Y. A comprehensive survey on blockchain in industrial internet of things: motivations, research progresses, and future challenges. IEEE Commun Surv Tutor. 2022;24(1):88\u2013122.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"5","key":"4106_CR114","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1108\/JEIM-12-2020-0533","volume":"34","author":"M El-Masri","year":"2021","unstructured":"El-Masri M, Hussain E. Blockchain as a mean to secure internet of things ecosystems-a systematic literature review. J Enterp Inf Manag. 2021;34(5):1371\u2013405.","journal-title":"J Enterp Inf Manag"},{"key":"4106_CR115","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Maglaras L, Janicke H. Blockchain and its role in the internet of things. In: strategic innovative marketing and tourism: 7th ICSIMAT, Athenian Riviera, Greece, 2018. Springer; 2019. pp. 1029\u20131038.","DOI":"10.1007\/978-3-030-12453-3_119"},{"issue":"20","key":"4106_CR116","doi-asserted-by":"publisher","first-page":"9372","DOI":"10.3390\/app11209372","volume":"11","author":"D Khan","year":"2021","unstructured":"Khan D, Jung LT, Hashmani MA. Systematic literature review of challenges in blockchain scalability. Appl Sci. 2021;11(20):9372.","journal-title":"Appl Sci"},{"key":"4106_CR117","doi-asserted-by":"publisher","first-page":"13938","DOI":"10.1109\/ACCESS.2021.3051602","volume":"9","author":"S Singh","year":"2021","unstructured":"Singh S, Hosen AS, Yoon B. Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access. 2021;9:13938\u201359.","journal-title":"IEEE Access"},{"issue":"2","key":"4106_CR118","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1049\/blc2.12058","volume":"4","author":"N Kapsoulis","year":"2024","unstructured":"Kapsoulis N, Psychas A, Litke A, Varvarigou T. Blockchain privacy: fundamental aspects and challenges for the future internet data sharing. IET Blockchain. 2024;4(2):152\u201368.","journal-title":"IET Blockchain"},{"issue":"23","key":"4106_CR119","doi-asserted-by":"publisher","first-page":"10177","DOI":"10.3390\/su162310177","volume":"16","author":"S Almarri","year":"2024","unstructured":"Almarri S, Aljughaiman A. Blockchain technology for iot security and trust: a comprehensive slr. Sustainability. 2024;16(23):10177.","journal-title":"Sustainability"},{"key":"4106_CR120","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2024.101032","volume":"31","author":"AA Agarkar","year":"2024","unstructured":"Agarkar AA, Karyakarte M, Chavhan G, Patil M, Talware R, Kulkarni L. Blockchain aware decentralized identity management and access control system. Measur Sens. 2024;31: 101032.","journal-title":"Measur Sens"},{"key":"4106_CR121","doi-asserted-by":"crossref","unstructured":"Reyna A, Mart\u00edn C, Chen J, Soler E, D\u00edaz M. On blockchain and its integration with IoT: Challenges and opportunities. Future Generation Computer Systems. 2018, vol. 88, pp. 173\u2013190.","DOI":"10.1016\/j.future.2018.05.046"},{"issue":"23","key":"4106_CR122","doi-asserted-by":"publisher","first-page":"11078","DOI":"10.3390\/app142311078","volume":"14","author":"MJ Fern\u00e1ndez-Iglesias","year":"2024","unstructured":"Fern\u00e1ndez-Iglesias MJ, Eitzen C, Anido-Rif\u00f3n L. Efficient traceability systems with smart contracts: balancing on-chain and off-chain data storage for enhanced scalability and privacy. Appl Sci. 2024;14(23):11078.","journal-title":"Appl Sci"},{"key":"4106_CR123","doi-asserted-by":"publisher","first-page":"6033","DOI":"10.1007\/s13369-020-04448-z","volume":"45","author":"L Benarous","year":"2020","unstructured":"Benarous L, Kadri B, Bouridane A. Blockchain-based privacy-aware pseudonym management framework for vehicular networks. Arab J Sci Eng. 2020;45:6033\u201349.","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"4106_CR124","doi-asserted-by":"publisher","first-page":"221","DOI":"10.17705\/2msqe.00018","volume":"18","author":"T Jensen","year":"2019","unstructured":"Jensen T, Henningsson S, Hedman J. Delivering business value with blockchain technology: the long journey of tradelens. MIS Q Exec. 2019;18(4):221\u201343.","journal-title":"MIS Q Exec"},{"key":"4106_CR125","doi-asserted-by":"crossref","unstructured":"Ahmed WA, Rios A. Digitalization of the international shipping and maritime logistics industry: a case study of tradelens. In: The digital supply chain. Elsevier; 2022. pp. 309\u201323.","DOI":"10.1016\/B978-0-323-91614-1.00018-6"},{"issue":"7","key":"4106_CR126","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1080\/00207543.2018.1533261","volume":"57","author":"S Saberi","year":"2019","unstructured":"Saberi S, Kouhizadeh M, Sarkis J, Shen L. Blockchain technology and its relationships to sustainable supply chain management. Int J Prod Res. 2019;57(7):2117\u201335.","journal-title":"Int J Prod Res"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04106-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04106-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04106-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T20:02:54Z","timestamp":1751140974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04106-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,28]]},"references-count":126,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4106"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04106-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,28]]},"assertion":[{"value":"2 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"593"}}