{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T23:51:33Z","timestamp":1770249093241,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T00:00:00Z","timestamp":1767744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T00:00:00Z","timestamp":1770163200000},"content-version":"vor","delay-in-days":28,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00273-8","type":"journal-article","created":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:48:35Z","timestamp":1767775715000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An integrated IoT and blockchain lightweight framework for secure smart cities"],"prefix":"10.1007","volume":"6","author":[{"given":"Kai","family":"Guo","sequence":"first","affiliation":[]},{"given":"Chengyuan","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Muqing","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zeyu","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ashutosh","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,7]]},"reference":[{"key":"273_CR1","doi-asserted-by":"crossref","unstructured":"Zhang B, Chen C, Lee I, Lee K, Ong KL. (2025). A survey on security and privacy issues in wearable health monitoring devices. Computers Secur, 104453.","DOI":"10.1016\/j.cose.2025.104453"},{"key":"273_CR2","doi-asserted-by":"publisher","first-page":"104275","DOI":"10.1016\/j.cose.2024.104275","volume":"150","author":"C Okonkwo","year":"2025","unstructured":"Okonkwo C, Awolusi I, Nnaji C, Akanfe O. Privacy and security of wearable internet of things: A scoping review and conceptual framework development for safety and health management in construction. Computers Secur. 2025;150:104275.","journal-title":"Computers Secur"},{"issue":"7","key":"273_CR3","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s10916-018-0982-x","volume":"42","author":"KN Griggs","year":"2018","unstructured":"Griggs KN, Ossipova O, Kohlios CP, Baccarini AN, Howson EA, Hayajneh T. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J Med Syst. 2018;42(7):130.","journal-title":"J Med Syst"},{"key":"273_CR4","doi-asserted-by":"publisher","first-page":"102301","DOI":"10.1016\/j.scs.2020.102301","volume":"61","author":"MA Ahad","year":"2020","unstructured":"Ahad MA, Paiva S, Tripathi G, Feroz N. Enabling technologies and sustainable smart cities. Sustainable Cities Soc. 2020;61:102301.","journal-title":"Sustainable Cities Soc"},{"issue":"1","key":"273_CR5","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/electronics9010094","volume":"9","author":"A Khatoon","year":"2020","unstructured":"Khatoon A. A blockchain-based smart contract system for healthcare management. Electronics. 2020;9(1):94.","journal-title":"Electronics"},{"key":"273_CR6","doi-asserted-by":"publisher","first-page":"102023","DOI":"10.1016\/j.scs.2020.102023","volume":"55","author":"J Laufs","year":"2020","unstructured":"Laufs J, Borrion H, Bradford B. Security and the smart city: A systematic review. Sustainable Cities Soc. 2020;55:102023.","journal-title":"Sustainable Cities Soc"},{"issue":"1","key":"273_CR7","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang K, Ni J, Yang K, Liang X, Ren J, Shen XS. Security and privacy in smart City applications: challenges and solutions. IEEE Commun Mag. 2017;55(1):122\u20139.","journal-title":"IEEE Commun Mag"},{"issue":"3\u2013A","key":"273_CR8","doi-asserted-by":"publisher","first-page":"384","DOI":"10.7906\/indecs.16.3.11","volume":"16","author":"D Tokody","year":"2018","unstructured":"Tokody D, Albini A, Ady L, Rajnai Z, Pongr\u00e1cz F. Safety and security through the design of autonomous intelligent vehicle systems and intelligent infrastructure in the smart City. Interdisciplinary Description Complex Systems: INDECS. 2018;16(3\u2013A):384\u201396.","journal-title":"Interdisciplinary Description Complex Systems: INDECS"},{"key":"273_CR9","doi-asserted-by":"crossref","unstructured":"Li S. (2018, August). Application of blockchain technology in smart city infrastructure. In 2018 IEEE international conference on smart internet of things (SmartIoT) (pp. 276\u20132766). IEEE.","DOI":"10.1109\/SmartIoT.2018.00056"},{"key":"273_CR10","doi-asserted-by":"publisher","first-page":"104009","DOI":"10.1016\/j.csi.2025.104009","volume":"94","author":"S Prajapat","year":"2025","unstructured":"Prajapat S, Rana A, Kumar P, Das AK, Susilo W. Privacy-preserving authentication protocol for user personal device security in Brain\u2013Computer interface. Comput Stand Interfaces. 2025;94:104009.","journal-title":"Comput Stand Interfaces"},{"issue":"5","key":"273_CR11","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/JIOT.2017.2659783","volume":"4","author":"P Hu","year":"2017","unstructured":"Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X. Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J. 2017;4(5):1143\u201355.","journal-title":"IEEE Internet Things J"},{"key":"273_CR12","doi-asserted-by":"crossref","unstructured":"Daneshgar F, Sianaki A, O., Guruwacharya P. (2019, March). Blockchain: a research framework for data security and privacy. In Workshops of the International Conference on Advanced Information Networking and Applications (pp. 966\u2013974). Cham: Springer International Publishing.","DOI":"10.1007\/978-3-030-15035-8_95"},{"key":"273_CR13","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2017.04.039","volume":"83","author":"VA Memos","year":"2018","unstructured":"Memos VA, Psannis KE, Ishibashi Y, Kim BG, Gupta BB. An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart City framework. Future Generation Comput Syst. 2018;83:619\u201328.","journal-title":"Future Generation Comput Syst"},{"issue":"3","key":"273_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MCOM.2017.1600297CM","volume":"55","author":"R Khatoun","year":"2017","unstructured":"Khatoun R, Zeadally S. Cybersecurity and privacy solutions in smart cities. IEEE Commun Mag. 2017;55(3):51\u20139.","journal-title":"IEEE Commun Mag"},{"key":"273_CR15","doi-asserted-by":"crossref","unstructured":"do Nascimento LV, de Oliveira JPM. (2025). A multi-agent architecture for context sources integration in smart cities. Future Generation Comput Syst, 107862.","DOI":"10.1016\/j.future.2025.107862"},{"key":"273_CR16","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.scs.2018.01.053","volume":"38","author":"BN Silva","year":"2018","unstructured":"Silva BN, Khan M, Han K. Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities. Sustainable Cities Soc. 2018;38:697\u2013713.","journal-title":"Sustainable Cities Soc"},{"issue":"3","key":"273_CR17","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.giq.2017.05.001","volume":"34","author":"H Yeh","year":"2017","unstructured":"Yeh H. The effects of successful ICT-based smart City services: from citizens\u2019 perspectives. Government Inform Q. 2017;34(3):556\u201365.","journal-title":"Government Inform Q"},{"issue":"3","key":"273_CR18","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s00146-013-0464-0","volume":"29","author":"AV Anttiroiko","year":"2014","unstructured":"Anttiroiko AV, Valkama P, Bailey SJ. Smart cities in the new service economy: Building platforms for smart services. AI Soc. 2014;29(3):323\u201334.","journal-title":"AI Soc"},{"issue":"3","key":"273_CR19","doi-asserted-by":"publisher","first-page":"2794","DOI":"10.1109\/COMST.2019.2899617","volume":"21","author":"J Xie","year":"2019","unstructured":"Xie J, Tang H, Huang T, Yu FR, Xie R, Liu J, Liu Y. A survey of blockchain technology applied to smart cities: research issues and challenges. IEEE Commun Surv Tutorials. 2019;21(3):2794\u2013830.","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"273_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.001.1900178","volume":"34","author":"S Hakak","year":"2020","unstructured":"Hakak S, Khan WZ, Gilkar GA, Imran M, Guizani N. Securing smart cities through blockchain technology: Architecture, requirements, and challenges. IEEE Network. 2020;34(1):8\u201314.","journal-title":"IEEE Network"},{"key":"273_CR21","doi-asserted-by":"publisher","first-page":"111278","DOI":"10.1016\/j.comnet.2025.111278","volume":"264","author":"OA Khashan","year":"2025","unstructured":"Khashan OA. Trust-based fog-blockchain model for scalable authentication in smart cities. Comput Netw. 2025;264:111278.","journal-title":"Comput Netw"},{"key":"273_CR22","doi-asserted-by":"publisher","first-page":"104234","DOI":"10.1016\/j.compind.2024.104234","volume":"166","author":"CA Palagan","year":"2025","unstructured":"Palagan CA, Joe SSA, Mary SJ, Jijo EE. Predictive analysis-based sustainable waste management in smart cities using IoT edge computing and blockchain technology. Comput Ind. 2025;166:104234.","journal-title":"Comput Ind"},{"key":"273_CR23","doi-asserted-by":"crossref","unstructured":"Komalavalli C, Saxena D, Laroiya C. Overview of blockchain technology concepts. Handbook of research on blockchain technology. Academic; 2020. pp. 349\u201371.","DOI":"10.1016\/B978-0-12-819816-2.00014-9"},{"key":"273_CR24","doi-asserted-by":"crossref","unstructured":"Pohrmen FH, Das RK, Saha G. (2019). Blockchain-based security aspects in heterogeneous Internet\u2010of\u2010Things networks: a survey. Trans Emerg Telecommunications Technol, 30(10), e3741.","DOI":"10.1002\/ett.3741"},{"key":"273_CR25","doi-asserted-by":"publisher","first-page":"103760","DOI":"10.1016\/j.adhoc.2025.103760","volume":"169","author":"S Salim","year":"2025","unstructured":"Salim S, Moustafa N, Turnbull B. BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for Securing social media-integrated internet of things systems. Ad Hoc Netw. 2025;169:103760.","journal-title":"Ad Hoc Netw"},{"key":"273_CR26","doi-asserted-by":"publisher","first-page":"150184","DOI":"10.1109\/ACCESS.2019.2946988","volume":"7","author":"Y Huang","year":"2019","unstructured":"Huang Y, Bian Y, Li R, Zhao JL, Shi P. Smart contract security: A software lifecycle perspective. IEEE Access. 2019;7:150184\u2013202.","journal-title":"IEEE Access"},{"key":"273_CR27","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.scs.2018.02.039","volume":"39","author":"T Braun","year":"2018","unstructured":"Braun T, Fung BC, Iqbal F, Shah B. Security and privacy challenges in smart cities. Sustainable Cities Soc. 2018;39:499\u2013507.","journal-title":"Sustainable Cities Soc"},{"key":"273_CR28","doi-asserted-by":"crossref","unstructured":"Ma X, Li J, Guo Z, Wan Z. (2024). Role of big data and technological advancements in monitoring and development of smart cities. Heliyon, 10(15).","DOI":"10.1016\/j.heliyon.2024.e34821"},{"key":"273_CR29","doi-asserted-by":"publisher","first-page":"103996","DOI":"10.1016\/j.jnca.2024.103996","volume":"231","author":"ZS Tan","year":"2024","unstructured":"Tan ZS, See-To EW, Lee KY, Dai HN, Wong ML. Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart City facilities. J Netw Comput Appl. 2024;231:103996.","journal-title":"J Netw Comput Appl"},{"key":"273_CR30","doi-asserted-by":"publisher","first-page":"105384","DOI":"10.1016\/j.scs.2024.105384","volume":"108","author":"J Wu","year":"2024","unstructured":"Wu J, Wang H, Yao J. Computer-aided urban energy systems cyber attach detection and mitigation: intelligence hybrid machine learning technique for security enhancement of smart cities. Sustainable Cities Soc. 2024;108:105384.","journal-title":"Sustainable Cities Soc"},{"issue":"5","key":"273_CR31","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao L, Wan X, Lu X, Zhang Y, Wu D. IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process Mag. 2018;35(5):41\u20139.","journal-title":"IEEE Signal Process Mag"},{"key":"273_CR32","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan MU, Rehmani MH, Chen J. Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Future Generation Comput Syst. 2019;97:512\u201329.","journal-title":"Future Generation Comput Syst"},{"key":"273_CR33","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1016\/j.procs.2019.08.101","volume":"155","author":"R Thakore","year":"2019","unstructured":"Thakore R, Vaghashiya R, Patel C, Doshi N. Blockchain-based iot: A survey. Procedia Comput Sci. 2019;155:704\u20139.","journal-title":"Procedia Comput Sci"},{"key":"273_CR34","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.aej.2025.01.020","volume":"119","author":"Z Li","year":"2025","unstructured":"Li Z, Zheng P, Tian Y. Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing. Alexandria Eng J. 2025;119:465\u201377.","journal-title":"Alexandria Eng J"},{"key":"273_CR35","doi-asserted-by":"publisher","first-page":"109726","DOI":"10.1016\/j.comnet.2023.109726","volume":"227","author":"S Mathur","year":"2023","unstructured":"Mathur S, Kalla A, G\u00fcr G, Bohra MK, Liyanage M. A survey on role of blockchain for iot: applications and technical aspects. Comput Netw. 2023;227:109726.","journal-title":"Comput Netw"},{"issue":"2","key":"273_CR36","doi-asserted-by":"publisher","first-page":"102468","DOI":"10.1016\/j.ipm.2020.102468","volume":"58","author":"C Esposito","year":"2021","unstructured":"Esposito C, Ficco M, Gupta BB. Blockchain-based authentication and authorization for smart City applications. Inf Process Manag. 2021;58(2):102468.","journal-title":"Inf Process Manag"},{"key":"273_CR37","doi-asserted-by":"crossref","unstructured":"Alam MA, Jain S. Blockchain implementation using smart grid-based smart City. Handbook of research on blockchain technology. Academic; 2020. pp. 133\u201369.","DOI":"10.1016\/B978-0-12-819816-2.00006-X"},{"key":"273_CR38","doi-asserted-by":"publisher","first-page":"109524","DOI":"10.1016\/j.cie.2023.109524","volume":"184","author":"A Sharma","year":"2023","unstructured":"Sharma A, Singh PK. Applicability of UAVs in detecting and monitoring burning residue of paddy crops with IoT integration: A step towards greener environment. Comput Ind Eng. 2023;184:109524.","journal-title":"Comput Ind Eng"},{"key":"273_CR39","doi-asserted-by":"crossref","unstructured":"Bajaj JS, Kumar N, Kaushal RK. (2021, March). Comparative study to detect driver drowsiness. In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 678\u2013683). IEEE.","DOI":"10.1109\/ICACITE51222.2021.9404761"},{"issue":"4","key":"273_CR40","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1016\/j.jksuci.2020.05.004","volume":"34","author":"AF Al-Badarneh","year":"2022","unstructured":"Al-Badarneh AF, Rababa SA. An analysis of two-way equi-join algorithms under mapreduce. J King Saud University-Computer Inform Sci. 2022;34(4):1074\u201385.","journal-title":"J King Saud University-Computer Inform Sci"},{"key":"273_CR41","doi-asserted-by":"publisher","first-page":"2256","DOI":"10.1109\/TIFS.2022.3181855","volume":"17","author":"Z Zheng","year":"2022","unstructured":"Zheng Z, Li Z, Jiang H, Zhang LY, Tu D. Semantic-aware privacy-preserving online location trajectory data sharing. IEEE Trans Inf Forensics Secur. 2022;17:2256\u201371.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"273_CR42","doi-asserted-by":"publisher","first-page":"4861","DOI":"10.1109\/TDSC.2024.3363507","volume":"21","author":"Z Zheng","year":"2024","unstructured":"Zheng Z, Li Z, Huang C, Long S, Li M, Shen X. Data poisoning attacks and defenses to LDP-based privacy-preserving crowdsensing. IEEE Trans Dependable Secur Comput. 2024;21(5):4861\u201378.","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"273_CR43","doi-asserted-by":"crossref","unstructured":"Ji R, Selwal A, Kumar N, Padha D. (2025). Cascading bagging and boosting ensemble methods for intrusion detection in Cyber-Physical systems. Secur Priv, 8(1), e497.","DOI":"10.1002\/spy2.497"},{"key":"273_CR44","doi-asserted-by":"crossref","unstructured":"Ji R, Kumar N, Padha D. (2024). CNN-GWO-voting & hybrid: ensemble learning inspired intrusion detection approaches for cyber-physical systems. Proceedings of the Indian National Science Academy, 1\u201315.","DOI":"10.1007\/s43538-024-00372-0"},{"key":"273_CR45","doi-asserted-by":"crossref","unstructured":"Ji R, Padha D, Singh Y, Sharma S. (2024). Review of intrusion detection system in cyber-physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges. Trans Emerg Telecommunications Technol, 35(9), e5029.","DOI":"10.1002\/ett.5029"},{"issue":"30","key":"273_CR46","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.17485\/IJST\/v17i30.1794","volume":"17","author":"R Ji","year":"2024","unstructured":"Ji R, Kumar N, Padha D. Hybrid enhanced intrusion detection frameworks for cyber-physical systems via optimal features selection. Indian J Sci Technol. 2024;17(30):3069\u201379.","journal-title":"Indian J Sci Technol"},{"key":"273_CR47","doi-asserted-by":"crossref","unstructured":"Ji R, Kumar N, Padha D. (2025). Optimized intrusion detection approach for Cyber-Physical system using Meta\u2010Learning with stacked generalization: an ensemble learning inspired approach. Secur Priv, 8(3), e70031.","DOI":"10.1002\/spy2.70031"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00273-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00273-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00273-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T11:20:33Z","timestamp":1770204033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00273-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,7]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["273"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00273-8","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,7]]},"assertion":[{"value":"20 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"11"}}