{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:39:55Z","timestamp":1774967995409,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"This research is funded by Zarqa University, Zarqa-Jordan."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00155-z","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T10:45:12Z","timestamp":1750070712000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Strategies for applying interpretable and explainable AI in real world IoT applications"],"prefix":"10.1007","volume":"5","author":[{"given":"Anber Abraheem Shlash","family":"Mohammad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6156-9063","authenticated-orcid":false,"given":"Suleiman Ibrahim Shelash","family":"Mohammad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3549-8172","authenticated-orcid":false,"given":"Badrea","family":"Al Oraini","sequence":"additional","affiliation":[]},{"given":"Asokan","family":"Vasudevan","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Hindieh","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Altarawneh","sequence":"additional","affiliation":[]},{"given":"Muhammad Turki","family":"Alshurideh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4088-8986","authenticated-orcid":false,"given":"Imad","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"issue":"1","key":"155_CR1","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/TR.2020.3047833","volume":"71","author":"G Manogaran","year":"2021","unstructured":"Manogaran G, Alazab M, Shakeel PM, Hsu CH. Blockchain-assisted secure data sharing model for IoT-based smart industries. IEEE Trans Reliab. 2021;71(1):348\u201358.","journal-title":"IEEE Trans Reliab"},{"key":"155_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108703","volume":"108","author":"PC Sharma","year":"2023","unstructured":"Sharma PC, Mahmood MR, Raja H, Yadav NS, Gupta BB, Arya V. Secure authentication and privacy-preserving blockchain for industrial IoT. Comput Electr Eng. 2023;108: 108703.","journal-title":"Comput Electr Eng"},{"issue":"2","key":"155_CR3","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1007\/s10586-023-04056-0","volume":"27","author":"R Vatambeti","year":"2024","unstructured":"Vatambeti R, Krishna EP, Karthik MG, Damera VK. Securing the medical data using enhanced privacy-preserving blockchain technology in IoT. Clust Comput. 2024;27(2):1625\u201337.","journal-title":"Clust Comput"},{"issue":"12","key":"155_CR4","doi-asserted-by":"publisher","first-page":"5893","DOI":"10.3390\/app12125893","volume":"12","author":"A Al-Qarafi","year":"2022","unstructured":"Al-Qarafi A, Alrowais F, Alotaibi S, Nemri N, Al-Wesabi FN, Al Duhayyim M, Al-Shabi M. Optimal machine learning-based privacy-preserving blockchain-assisted IoT with a smart cities environment. Appl Sci. 2022;12(12):5893.","journal-title":"Appl Sci"},{"issue":"16","key":"155_CR5","first-page":"15138","volume":"9","author":"T Li","year":"2022","unstructured":"Li T, Wang H, He D, Yu J. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE IoT J. 2022;9(16):15138\u201349.","journal-title":"IEEE IoT J"},{"key":"155_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3372806","author":"F Wang","year":"2024","unstructured":"Wang F, Cui J, Zhang Q, He D, Zhong H. Blockchain-based secure cross-domain data sharing for edge-assisted industrial IoT. IEEE Trans Inf For Sec. 2024. https:\/\/doi.org\/10.1109\/TIFS.2024.3372806.","journal-title":"IEEE Trans Inf For Sec"},{"issue":"2","key":"155_CR7","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TNSM.2020.3048822","volume":"18","author":"W Lu","year":"2021","unstructured":"Lu W, Ren Z, Xu J, Chen S. Edge blockchain-assisted lightweight privacy-preserving data aggregation for smart grid. IEEE Trans Netw Serv Manage. 2021;18(2):1246\u201359.","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"155_CR8","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.039487","author":"M Firdaus","year":"2023","unstructured":"Firdaus M, Larasati HT, Rhee KH. A blockchain-assisted distributed edge intelligence for privacy-preserving vehicular networks. Comput Mater Continua. 2023. https:\/\/doi.org\/10.32604\/cmc.2023.039487.","journal-title":"Comput Mater Continua"},{"issue":"7","key":"155_CR9","doi-asserted-by":"publisher","first-page":"7435","DOI":"10.1109\/TITS.2022.3158320","volume":"24","author":"KN Qureshi","year":"2022","unstructured":"Qureshi KN, Jeon G, Hassan MM, Hassan MR, Kaur K. Blockchain-based privacy-preserving authentication model for intelligent transportation systems. IEEE Trans Intell Trans Syst. 2022;24(7):7435.","journal-title":"IEEE Trans Intell Trans Syst"},{"key":"155_CR10","doi-asserted-by":"publisher","first-page":"26877","DOI":"10.1109\/ACCESS.2023.3249116","volume":"11","author":"G Thakur","year":"2023","unstructured":"Thakur G, Kumar P, Jangirala S, Das AK, Park Y. An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment. IEEE Access. 2023;11:26877\u201392.","journal-title":"IEEE Access"},{"issue":"6","key":"155_CR11","first-page":"4704","volume":"9","author":"H Li","year":"2021","unstructured":"Li H, Han D, Tang M. A privacy-preserving storage scheme for logistics data with assistance of blockchain. IEEE IoT J. 2021;9(6):4704\u201320.","journal-title":"IEEE IoT J"},{"issue":"6","key":"155_CR12","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.3390\/s22062299","volume":"22","author":"X He","year":"2022","unstructured":"He X, Niu X, Wang Y, Xiong L, Jiang Z, Gong C. A hierarchical blockchain-assisted conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Sensors. 2022;22(6):2299.","journal-title":"Sensors"},{"issue":"3","key":"155_CR13","first-page":"1817","volume":"8","author":"Y Zhao","year":"2020","unstructured":"Zhao Y, Zhao J, Jiang L, Tan R, Niyato D, Li Z, Liu Y. Privacy-preserving blockchain-based federated learning for IoT devices. IEEE IoT J. 2020;8(3):1817\u201329.","journal-title":"IEEE IoT J"},{"issue":"22","key":"155_CR14","first-page":"22501","volume":"9","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Li B, Wu J, Liu B, Chen R, Chang J. Efficient and privacy-preserving blockchain-based multi-factor device authentication protocol for cross-domain IIoT. IEEE IoT Journal. 2022;9(22):22501\u201315.","journal-title":"IEEE IoT Journal"},{"key":"155_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121329","volume":"237","author":"J Miao","year":"2024","unstructured":"Miao J, Wang Z, Wu Z, Ning X, Tiwari P. A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things. Expert Syst Appl. 2024;237: 121329.","journal-title":"Expert Syst Appl"},{"key":"155_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-021-02041-y","volume":"2021","author":"Y Guo","year":"2021","unstructured":"Guo Y, Wang S, Huang J. A blockchain-assisted framework for secure and reliable data sharing in distributed systems. EURASIP J Wirel Commun Netw. 2021;2021:1\u201319.","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"155_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101958","volume":"97","author":"AS Patil","year":"2020","unstructured":"Patil AS, Hamza R, Hassan A, Jiang N, Yan H, Li J. Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Comput Secur. 2020;97: 101958.","journal-title":"Comput Secur"},{"issue":"1","key":"155_CR18","first-page":"829","volume":"2022","author":"X Nie","year":"2022","unstructured":"Nie X, Zhang A, Chen J, Qu Y, Yu S. Blockchain-empowered secure and privacy-preserving health data sharing in edge-based IoMT. Sec Commun Networks. 2022;2022(1):829.","journal-title":"Sec Commun Networks"},{"key":"155_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102158","volume":"117","author":"X Feng","year":"2021","unstructured":"Feng X, Shi Q, Xie Q, Liu L. An efficient privacy-preserving authentication model based on blockchain for VANETs. J Syst Architect. 2021;117: 102158.","journal-title":"J Syst Architect"},{"key":"155_CR20","volume-title":"Towards explainable AI: interpretable models for complex decision-making","author":"J Singh","year":"2024","unstructured":"Singh J, Rani S, Srilakshmi G. Towards explainable AI: interpretable models for complex decision-making. New York: IEEE; 2024."},{"key":"155_CR21","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/ojcoms.2022.3215676","volume":"3","author":"SK Jagatheesaperumal","year":"2022","unstructured":"Jagatheesaperumal SK, Pham Q-V, Ruby R, Yang Z, Xu C, Zhang Z. Explainable AI over the internet of things (IoT): overview, state-of-the-art and future directions. IEEE Open J Commun Soc. 2022;3:2106\u201336. https:\/\/doi.org\/10.1109\/ojcoms.2022.3215676.","journal-title":"IEEE Open J Commun Soc"},{"key":"155_CR22","volume-title":"Next generation healthcare with explainable AI: IoMT-Edge-cloud based advanced eHealth","author":"J Dutta","year":"2023","unstructured":"Dutta J, Puthal D, Yeun CY. Next generation healthcare with explainable AI: IoMT-Edge-cloud based advanced eHealth. New York: IEEE; 2023."},{"issue":"1","key":"155_CR23","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/tce.2023.3320157","volume":"70","author":"R Kumar","year":"2024","unstructured":"Kumar R, Javeed D, Aljuhani A, Jolfaei A, Kumar P, Islam AKMN. Blockchain-based authentication and explainable AI for securing consumer IoT applications. IEEE Trans Consum Electron. 2024;70(1):1145\u201354. https:\/\/doi.org\/10.1109\/tce.2023.3320157.","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"155_CR24","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/computers12020032","volume":"12","author":"CS Kalutharage","year":"2023","unstructured":"Kalutharage CS, Liu X, Chrysoulas C, Pitropakis N, Papadopoulos P. Explainable AI-based DDOS attack identification method for IoT networks. Computers. 2023;12(2):32. https:\/\/doi.org\/10.3390\/computers12020032.","journal-title":"Computers"},{"issue":"2","key":"155_CR25","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/iotm.005.2200028","volume":"5","author":"ZA El Houda","year":"2022","unstructured":"El Houda ZA, Brik B, Senouci S-M. A Novel IoT-based explainable deep learning framework for intrusion detection systems. IEEE Internet of Things Magazine. 2022;5(2):20\u20133. https:\/\/doi.org\/10.1109\/iotm.005.2200028.","journal-title":"IEEE Internet of Things Magazine"},{"key":"155_CR26","doi-asserted-by":"publisher","DOI":"10.36948\/ijfmr.2023.v05i04.5395","author":"AS Aatmaj","year":"2023","unstructured":"Aatmaj AS. Cracking the code self-explaining AI models for transparent decision making in complex algorithms. Int J Multidisc Res. 2023. https:\/\/doi.org\/10.36948\/ijfmr.2023.v05i04.5395.","journal-title":"Int J Multidisc Res"},{"key":"155_CR27","unstructured":"https:\/\/datasetsearch.research.google.com\/search?src=0&query=Interpretability%20and%20Explainability%20in%20Real%20World%20AI%20systems&docid=L2cvMTF2eDV6Y3N2Mg%3D%3D"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00155-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00155-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00155-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T10:45:14Z","timestamp":1750070714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00155-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["155"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00155-z","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"7 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"71"}}