{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:22:04Z","timestamp":1778084524583,"version":"3.51.4"},"reference-count":108,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Netw Distrib Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s44227-025-00072-1","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:23:44Z","timestamp":1761582224000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Systematic Review of Blockchain, AI, and Cloud Integration for Secure Digital Ecosystems"],"prefix":"10.1007","volume":"13","author":[{"given":"Jaibir","family":"Singh","sequence":"first","affiliation":[]},{"given":"Salil","family":"Bharany","sequence":"additional","affiliation":[]},{"given":"Suman","family":"Rani","sequence":"additional","affiliation":[]},{"given":"Ateeq Ur","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Belayneh Matebie","family":"Taye","sequence":"additional","affiliation":[]},{"given":"Ruby","family":"Pant","sequence":"additional","affiliation":[]},{"given":"Upinder","family":"Kaur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"issue":"1","key":"72_CR1","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis JR, Koch GG (1977) Measurement of observer agreement for categorical data. Biometrics 33(1):159\u2013174","journal-title":"Biometrics"},{"key":"72_CR2","doi-asserted-by":"crossref","unstructured":"Petersen K, Ali NB (2011) Identifying strategies for study selection in systematic reviews and maps. In Proc. International Symposium on Empirical Software Engineering and Measurement (ESEM), pp 351\u2013354","DOI":"10.1109\/ESEM.2011.46"},{"key":"72_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ And Psychological Meas 20:37\u201346. https:\/\/doi.org\/10.1177\/001316446002000104","journal-title":"Educ And Psychological Meas"},{"key":"72_CR4","doi-asserted-by":"crossref","unstructured":"Barbara Kitchenham OPB, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering-a systematic literature review. Inf Softw Technol 51(1):7\u201315","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"72_CR5","unstructured":"Kitchenham B (2004) Procedures for performing systematic reviews. Keele, UK, Keele Univ 33(2004):1\u201326"},{"key":"72_CR6","doi-asserted-by":"crossref","unstructured":"Kupiainen E, Mantyla M, Itkonen J (2015) Using metrics in agile and lean software development-a systematic literature review of industrial studies. Inf Softw Technol 62:143\u2013163","DOI":"10.1016\/j.infsof.2015.02.005"},{"key":"72_CR7","doi-asserted-by":"publisher","unstructured":"Navimipour NJ, Charband Y (2016) Knowledge sharing mechanisms and techniques in project teams: literature review, classification, and current trends. Comput In Hum Behav 62:730\u2013742. https:\/\/doi.org\/10.1016\/j.chb.2016.05.003","DOI":"10.1016\/j.chb.2016.05.003"},{"key":"72_CR8","doi-asserted-by":"publisher","unstructured":"Charband Y, Navimipour NJ (2016) Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research. Inf Syst Front 18(6):1131\u20131151. https:\/\/doi.org\/10.1007\/s10796-016-9628-z","DOI":"10.1007\/s10796-016-9628-z"},{"key":"72_CR9","doi-asserted-by":"crossref","unstructured":"Kaur H, Alam MA, Jameel R, Mourya AK, Chang V (2018) A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. J Med Syst 42:156. [CrossRef","DOI":"10.1007\/s10916-018-1007-5"},{"key":"72_CR10","doi-asserted-by":"crossref","unstructured":"Murthy CVB, Shri ML (2020 Feb 24\u201325) A survey on integrating cloud computing with blockchain. In Proceedings of the 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India, 1\u20136","DOI":"10.1109\/ic-ETITE47903.2020.470"},{"key":"72_CR11","doi-asserted-by":"crossref","unstructured":"Niranjanamurthy M, Nithya B, Jagannatha S (2019) Analysis of blockchain technology: pros, cons and SWOT. Clust. Comput 22:14743\u201314757. [CrossRef","DOI":"10.1007\/s10586-018-2387-5"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Baboshkin P, Mikhaylov A, Shaikh ZA (2022) Sustainable cryptocurrency growth impossible? Impact of network Power demand on Bitcoin Price. Finans. \u017dhurnal financ. J 116\u2013130. Available online: https:\/\/ideas.repec.org\/a\/fru\/finjrn\/220308p116-130.html. accessed on 17 October 2022","DOI":"10.31107\/2075-1990-2022-3-116-130"},{"key":"72_CR13","doi-asserted-by":"crossref","unstructured":"Salem H, Mazzara M, Saleh H, Husami R, Hattab SM (2022) Development of a blockchain-based ad listing application. In Proceedings of the International Conference on Advanced Information Networking and Applications, Springer, Sydney, NSW Australia: Berlin\/Heidelberg, Germany, 37\u201345). 13\u201315 April 2022","DOI":"10.1007\/978-3-030-99584-3_4"},{"key":"72_CR14","doi-asserted-by":"crossref","unstructured":"Hasan MK, Alkhalifah A, Islam S, Babiker N, Habib A, Aman AHM, Hossain M (2022) Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations. Wirel Commun Mob Comput 9065768","DOI":"10.1155\/2022\/9065768"},{"key":"72_CR15","doi-asserted-by":"crossref","unstructured":"Abdelmaboud A, Ahmed AIA, Abaker M, Eisa TAE, Albasheer H, Ghorashi SA, Karim FK (2022) Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions. Electronics 11:630","DOI":"10.3390\/electronics11040630"},{"key":"72_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3390\/logistics6010015","volume":"6","author":"A Raja Santhi","year":"2022","unstructured":"Raja Santhi A, Muthuswamy P (2022) Influence of blockchain technology in manufacturing supply chain and logistics. Logistics 6:15","journal-title":"Logistics"},{"key":"72_CR17","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.3390\/electronics10101219","volume":"10","author":"D Guru","year":"2021","unstructured":"Guru D, Perumal S, Varadarajan V (2021) Approaches towards blockchain innovation: a survey and future directions. Electronics 10:1219","journal-title":"Electronics"},{"key":"72_CR18","doi-asserted-by":"publisher","first-page":"629","DOI":"10.3390\/electronics10050629","volume":"10","author":"N Khoshavi","year":"2021","unstructured":"Khoshavi N, Tristani G, Sargolzaei A (2021) Blockchain applications to improve operation and security of transportation systems: a survey. Electronics 10:629","journal-title":"Electronics"},{"key":"72_CR19","doi-asserted-by":"crossref","unstructured":"Bhutta MNM, Khwaja AA, Nadeem A et al. (2021) A survey on blockchain technology: evolution, architecture and security. IEEE Access 9:61048\u201361073","DOI":"10.1109\/ACCESS.2021.3072849"},{"key":"72_CR20","doi-asserted-by":"crossref","unstructured":"Rawat DB, Chaudhary V, Doku R (2020) Blockchain technology: emerging applications and use cases for secure and trustworthy smart systems. J Cybersecur Priv 1:4\u201318","DOI":"10.3390\/jcp1010002"},{"key":"72_CR21","doi-asserted-by":"crossref","unstructured":"Zuo Y (2021) Making smart manufacturing smarter-A survey on blockchain technology in industry 4.0. Enterp Inf Syst 15:1323\u20131353","DOI":"10.1080\/17517575.2020.1856425"},{"key":"72_CR22","doi-asserted-by":"crossref","unstructured":"Qureshi A, Meg\u00edas Jim\u00e9nez D (2020) Blockchain-basedmultimedia content protection: review and open challenges. Appl Sci 11:1","DOI":"10.3390\/app11010001"},{"key":"72_CR23","doi-asserted-by":"publisher","unstructured":"Bonneau J (2012) The science of guessing: analyzing an anonymized corpus of 70 million passwords. In 2012 IEEE Symposium on Security and Privacy. 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change, IEEE. https:\/\/doi.org\/10.1109\/sp.2012.49","DOI":"10.1109\/sp.2012.49"},{"issue":"22","key":"72_CR24","doi-asserted-by":"publisher","first-page":"15312","DOI":"10.3390\/su142215312","volume":"14","author":"S Alam","year":"2022","unstructured":"Alam S, Shuaib M, Ahmad S, Jayakody DNK, Muthanna A, Bharany S, Elgendy IA (2022) Blockchain-based solutions supporting reliable healthcare for fog computing and internet of medical things (IoMT) integration. Sustainability 14(22):15312. https:\/\/doi.org\/10.3390\/su142215312","journal-title":"Sustainability"},{"key":"72_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4333","volume-title":"Transactions on emerging telecommunications technologies","author":"A Sharma","year":"2021","unstructured":"Sharma A, Kaur S, Singh M (2021) A comprehensive review on blockchain and internet of things in healthcare. In: Transactions on emerging telecommunications technologies (vol. 32, Issue 10). Wiley. https:\/\/doi.org\/10.1002\/ett.4333"},{"key":"72_CR26","doi-asserted-by":"publisher","unstructured":"Emmanuel AA, Awokola JA, Alam S, Bharany S, Agboola P, Shuaib M, Ahmed R (2023) A hybrid framework of blockchain and IoT technology in the pharmaceutical industry: a comprehensive study. Mob Info Sys 1\u201314. https:\/\/doi.org\/10.1155\/2023\/3265310","DOI":"10.1155\/2023\/3265310"},{"key":"72_CR27","doi-asserted-by":"publisher","unstructured":"Islam S, Islam MJ, Hossain M, Noor S, Kwak K-S, Islam SMR (2023) A survey on consensus algorithms in Blockchain-based applications: architecture, taxonomy, and operational issues. In IEEE Access, vol 11. Institute of Electrical and Electronics Engineers (IEEE), pp. 39066\u201339082). https:\/\/doi.org\/10.1109\/access.2023.3267047","DOI":"10.1109\/access.2023.3267047"},{"key":"72_CR28","doi-asserted-by":"publisher","unstructured":"Xu X et al. (2016) The blockchain as a software connector. In 2016 13th Working IEEE\/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 182\u2013191). https:\/\/doi.org\/10.1109\/WICSA.2016.21","DOI":"10.1109\/WICSA.2016.21"},{"key":"72_CR29","unstructured":"Ongaro D, Ousterhout J (2014) In search of an understandable consensus algorithm. In Proceedings of the 2014 USENIX conference on USENIX Annual Technical Conference (USENIX ATC\u201914), USENIX Association, USA, 305\u2013320"},{"key":"72_CR30","doi-asserted-by":"publisher","unstructured":"Qureshi JN, Farooq MS, Abid A, Umer T, Bashir AK, Zikria YB (2022) Blockchain applications for the internet of things: systematic review and challenges. In: Microprocessors and microsystems, vol 94. Elsevier BV, p 104632. https:\/\/doi.org\/10.1016\/j.micpro.2022.104632","DOI":"10.1016\/j.micpro.2022.104632"},{"key":"72_CR31","doi-asserted-by":"publisher","unstructured":"Hu B, Zhang Z, Liu J, Liu Y, Yin J, Lu R, Lin X (2021) A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems. In: Patterns (vol. 2, Issue 2, p. Elsevier BV, p 100179. https:\/\/doi.org\/10.1016\/j.patter.2020.100179","DOI":"10.1016\/j.patter.2020.100179"},{"key":"72_CR32","doi-asserted-by":"publisher","unstructured":"Ghanmi H, Hajlaoui N, Touati H, Hadded M, Muhlethaler P, Boudjit S (2024) Blockchain-cloud integration: comprehensive survey and open research issues. In: Concurrency and computation: practice and experience (vol. 36, Issue 15). Wiley. https:\/\/doi.org\/10.1002\/cpe.8122","DOI":"10.1002\/cpe.8122"},{"key":"72_CR33","doi-asserted-by":"publisher","unstructured":"Lin I-C, Liao T-C (2017) A survey of blockchain security issues and challenges. Int J Multiling Network Secur. 19(5(5). https:\/\/doi.org\/10.6633\/IJNS.201709.().01","DOI":"10.6633\/IJNS.201709.().01"},{"key":"72_CR34","doi-asserted-by":"publisher","unstructured":"Bathula A, Gupta SKMerugu S et al. (2024) Blockchain, artificial intelligence, and healthcare: the tripod of future-a narrative review. Artif Intell Rev 57:238. https:\/\/doi.org\/10.1007\/s10462-024-10873-5","DOI":"10.1007\/s10462-024-10873-5"},{"key":"72_CR35","doi-asserted-by":"publisher","unstructured":"Bhumichai D, Smiliotopoulos C, Benton R, Kambourakis G, Damopoulos D (2024) The convergence of artificial intelligence and blockchain: the state of play and the road ahead. In: Information (vol. 15, Issue 5, p. MDPI AG, p 268. https:\/\/doi.org\/10.3390\/info15050268","DOI":"10.3390\/info15050268"},{"key":"72_CR36","doi-asserted-by":"crossref","unstructured":"Srivastava G, Dhar S, Dwivedi AD, Crichigno J (2019 May 5\u20138) Blockchain education. In Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, AB, Canada, 1\u20135","DOI":"10.1109\/CCECE.2019.8861828"},{"key":"72_CR37","doi-asserted-by":"crossref","unstructured":"Johar S, Ahmad N, Asher W, Cruickshank H, Durrani A (2021) Research and applied perspective to blockchain technology: a comprehensive survey. Appl Sci 11:6252","DOI":"10.3390\/app11146252"},{"key":"72_CR38","doi-asserted-by":"crossref","unstructured":"Lemieux VL (2016) Trusting records: is blockchain technology the answer? Rec Manag J 26:110\u2013139","DOI":"10.1108\/RMJ-12-2015-0042"},{"key":"72_CR39","doi-asserted-by":"crossref","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841\u2013853","DOI":"10.1016\/j.future.2017.08.020"},{"key":"72_CR40","doi-asserted-by":"publisher","unstructured":"Krichen M, Ammi M, Mihoub A, Almutiq M (2022) Blockchain for Modern applications: a survey. In: Sensors (vol. 22, Issue 14, p. MDPI AG, p 5274. https:\/\/doi.org\/10.3390\/s22145274","DOI":"10.3390\/s22145274"},{"key":"72_CR41","doi-asserted-by":"crossref","unstructured":"Pu S, Lam JSL (2020) Blockchain adoptions in the maritime industry: a conceptual framework. Marit Policy Manag 48:777\u2013794","DOI":"10.1080\/03088839.2020.1825855"},{"key":"72_CR42","doi-asserted-by":"crossref","unstructured":"Sullivan C, Burger E (2017) E-residency and blockchain. Comput Law Secur Rev 33:470\u2013481","DOI":"10.1016\/j.clsr.2017.03.016"},{"key":"72_CR43","doi-asserted-by":"crossref","unstructured":"K\u00f6hler S, Pizzol M (2020) Technology assessment of blockchain-based technologies in the food supply chain. J. Clean. Prod 269:122193","DOI":"10.1016\/j.jclepro.2020.122193"},{"key":"72_CR44","doi-asserted-by":"publisher","unstructured":"Habib G, Sharma S, Ibrahim S, Ahmad I, Qureshi S, Ishfaq M (2022) Blockchain technology: benefits, challenges, applications, and integration of blockchain technology with cloud computing. In: Future internet (vol. 14, Issue 11, p. MDPI AG, p 341. https:\/\/doi.org\/10.3390\/fi14110341","DOI":"10.3390\/fi14110341"},{"key":"72_CR45","doi-asserted-by":"crossref","unstructured":"Chanson M, Bogner A, Bilgeri D, Fleisch E, Wortmann F (2019) Blockchain for the IoT: privacy-preserving protection of sensor data. J Assoc Inf Syst 20:1274\u20131309","DOI":"10.17705\/1jais.00567"},{"key":"72_CR46","doi-asserted-by":"crossref","unstructured":"Ziolkowski R, Miscione G, Schwabe G (2020) Decision problems in blockchain governance: old wine in new bottles or walking in someone else\u2019s shoes? J Manag Inf Syst 37:316\u2013348","DOI":"10.1080\/07421222.2020.1759974"},{"key":"72_CR47","doi-asserted-by":"crossref","unstructured":"Kim S, Deka GC (2020) Advanced applications of blockchain technology. Springer, Berlin\/Heidelberg, Germany","DOI":"10.1007\/978-981-13-8775-3"},{"key":"72_CR48","doi-asserted-by":"crossref","unstructured":"Rieger A, Lockl J, Urbach N, Guggenmos F, Fridgen G (2019) Building a Blockchain application that complies with the EU general Data Protection regulation. MIS Q Exec 18:263\u2013279","DOI":"10.17705\/2msqe.00020"},{"key":"72_CR49","doi-asserted-by":"crossref","unstructured":"Miseviciute J (2018) Blockchain and virtual currency regulation in the EU. J Invest Compliance 19:33\u201338","DOI":"10.1108\/JOIC-04-2018-0026"},{"key":"72_CR50","doi-asserted-by":"crossref","unstructured":"Al Sukkar G, Saifan R, Khwaldeh S, Maqableh M, Jafar I (2016) Address resolution protocol (ARP): spoofing attack and proposed defence. Commun Netw 8:118\u2013130","DOI":"10.4236\/cn.2016.83012"},{"key":"72_CR51","doi-asserted-by":"crossref","unstructured":"AbdelSalam AM, Elkilani WS, Amin KM (2014) An automated approach for preventing ARP spoofing attack using static ARP entries. Int J Adv Comput Sci Appl 5:105\u2013112","DOI":"10.14569\/IJACSA.2014.050114"},{"key":"72_CR52","unstructured":"Sabani MJA, Shafana MS, Kariapper R (2020) Security issues by allied attacks in blockchain technology. Int J Adv Sci Technol 29:5371\u20135376"},{"key":"72_CR53","unstructured":"Liu Y, Liu J, Salles MAV et al. (2021) Building blocks of sharding blockchain system: concepts, approaches, and open problems. arXiv: 2102.13364"},{"key":"72_CR54","doi-asserted-by":"crossref","unstructured":"Wang G, Shi ZJ, Nixon M, Han S (2019 Oct 21\u201323) SoK: sharding on blockchain. In Proceedings of the Proceedings of the 1st ACM Conference on Advances in Financial Technologies, New York, NY, USA, 41\u201361","DOI":"10.1145\/3318041.3355457"},{"key":"72_CR55","doi-asserted-by":"crossref","unstructured":"Duan L, Sun Y, Zhang K, Ding Y (2022) Multiple-layer security threats on the ethereum blockchain and their countermeasures. Security and communication. Networks 5307697","DOI":"10.1155\/2022\/5307697"},{"key":"72_CR56","doi-asserted-by":"crossref","unstructured":"Maleshkov V, Valchanov H, Aleksieva V (2024) Blockchain-based Model for warehouse management Systems for artworks and collectibles. Eng Proc 70:39","DOI":"10.3390\/engproc2024070039"},{"key":"72_CR57","doi-asserted-by":"crossref","unstructured":"Aleksieva V, Valchanov H, Haka A, Dinev D (2023) Logistics Model based on Smart contracts on Blockchain and IoT. Eng Proc 41:2\u201310","DOI":"10.3390\/engproc2023041008"},{"key":"72_CR58","unstructured":"Aleksieva V, Valchanov H, Haka A, Dinev D (2023 Nov 23\u201325) Model of controlled environment based on blockchain and IoT. In Proceedings of the Conference on Communications, Information, Electronic and Energy Systems (CIEES\u201923), Plovdiv, Bulgaria"},{"key":"72_CR59","doi-asserted-by":"publisher","unstructured":"T R, V SBS, S S, T A (2023 Jun 30) A study on Blockchain technologies for security and privacy applications in a network. Int J Electron And Commun Eng 10(6. Seventh Sense Research Group Journals, pp. 69\u201391. https:\/\/doi.org\/10.14445\/23488549\/ijece-v10i6p107","DOI":"10.14445\/23488549\/ijece-v10i6p107"},{"key":"72_CR60","doi-asserted-by":"crossref","unstructured":"Ajayi O, Saadawi T (2021) Detecting insider attacks in blockchain networks. In Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October-2 November","DOI":"10.1109\/ISNCC52172.2021.9615799"},{"key":"72_CR61","doi-asserted-by":"crossref","unstructured":"Xi J, Zou S, Xu G, Guo Y, Lu Y, Xu J, Zhang X (2021) A comprehensive survey on sharding in Blockchains. Mob Inf Syst 5483243","DOI":"10.1155\/2021\/5483243"},{"key":"72_CR62","doi-asserted-by":"crossref","unstructured":"Khalid HY, Ismael PM, Al Khalil AB (2019) Efficient mechanism for securing software defined network against ARP spoofing attack. J Univ Duhok 22:124\u2013131","DOI":"10.26682\/sjuod.2019.22.1.14"},{"key":"72_CR63","doi-asserted-by":"crossref","unstructured":"Katal A, Sethi V, Lamba S (2021) Blockchain consensus algorithms: study and challenges. Springer International Publishing, Cham, Switzerland","DOI":"10.1007\/978-3-030-65691-1_4"},{"key":"72_CR64","doi-asserted-by":"crossref","unstructured":"Bashar G, Hill G, Singha S, Marella P, Dagher GG, Xiao J (2019 Dec 12\u201314) Contextualizing consensus protocols in blockchain: a short survey. In Proceedings of the 1st IEEE International Conference in Trust, Privacy and Security in Intelligent Systems and Applications, Los Angeles, CA, USA","DOI":"10.1109\/TPS-ISA48467.2019.00031"},{"key":"72_CR65","doi-asserted-by":"crossref","unstructured":"Sayeed S, Marco-Gisbert H (2020) Proof of adjourn (PoAj): a novel approach to mitigate blockchain attacks. Appl Sci 10:6607","DOI":"10.3390\/app10186607"},{"key":"72_CR66","doi-asserted-by":"crossref","unstructured":"Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang DH, Mohaisen D (2020) Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun Surv Tutor 22:1977\u20132008","DOI":"10.1109\/COMST.2020.2975999"},{"key":"72_CR67","doi-asserted-by":"crossref","unstructured":"Singh S, Hosen ASMS, Yoon B (2021) Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access. 9:13938\u201313959","DOI":"10.1109\/ACCESS.2021.3051602"},{"key":"72_CR68","doi-asserted-by":"crossref","unstructured":"Hu T, Xin B, Liu X, Chen T, Ding K, Zhang X (2020) Tracking the insider attacker: a blockchain traceability system for insider threats. Sensors 20:5297","DOI":"10.3390\/s20185297"},{"key":"72_CR69","doi-asserted-by":"crossref","unstructured":"Alsunaidi SJ, Alhaidari FA (2019 Apr 3\u20134) A survey of consensus algorithms for blockchain technology. In Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, pp 1\u20136","DOI":"10.1109\/ICCISci.2019.8716424"},{"key":"72_CR70","doi-asserted-by":"crossref","unstructured":"Kaur D, Uslu S, Rittichier KJ, Durresi A (2022) Trustworthy artificial intelligence: a review. ACM Comput Surv (CSUR) 55:1\u201338","DOI":"10.1145\/3491209"},{"key":"72_CR71","doi-asserted-by":"crossref","unstructured":"Malhotra D, Saini P, Singh AK (2024) Blockchain-based proof-of-authenticity frameworks for explainable AI. Multimed Tools Appl 83:37889\u201337911","DOI":"10.1007\/s11042-023-16951-0"},{"key":"72_CR72","doi-asserted-by":"crossref","unstructured":"Ressi D, Romanello R, Piazza C, Rossi S (2024) AI-enhanced blockchain technology: a review of advancements and opportunities. J Netw Comput Appl 225:103858","DOI":"10.1016\/j.jnca.2024.103858"},{"key":"72_CR73","doi-asserted-by":"crossref","unstructured":"Martinez D, Magdalena L, Savitri AN (2024) AI and blockchain integration: enhancing security and transparency in financial transactions. Int Trans Artif Intell. (ITALIC) 3:11\u201320","DOI":"10.33050\/italic.v3i1.651"},{"key":"72_CR74","doi-asserted-by":"crossref","unstructured":"Goundar S (2024 Dec 9\u201311) Blockchain-AI integration for resilient real-time cyber security. In Proceedings of the Global Congress on Emerging Technologies (GCET-2024), Gran Canaria, Spain, 342\u2013349","DOI":"10.1109\/GCET64327.2024.10934609"},{"key":"72_CR75","doi-asserted-by":"crossref","unstructured":"Minh D, Wang HX, Li YF, Nguyen TN (2022) Explainable artificial intelligence: A comprehensive review. Artif Intell Rev 55:3503\u20133568","DOI":"10.1007\/s10462-021-10088-y"},{"key":"72_CR76","doi-asserted-by":"crossref","unstructured":"Balani Z, Mohammed MS (2025 May 15\u201316) The convergence of AI and blockchain technologies: a review on enhancing IoT security. In Proceedings of the 2025 5th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), Fez, Morocco, 1\u20137","DOI":"10.1109\/IRASET64571.2025.11008214"},{"key":"72_CR77","doi-asserted-by":"crossref","unstructured":"Cernevi\u010dien\u0117 J, Kaba\u0161inskas A (2024) Explainable artificial intelligence (XAI) in finance: a systematic literature review. Artif Intell Rev 57:216","DOI":"10.1007\/s10462-024-10854-8"},{"key":"72_CR78","doi-asserted-by":"crossref","unstructured":"Chamola V, Hassija V, Sulthana AR, Ghosh D, Dhingra D, Sikdar B (2023) A review of trustworthy and explainable artificial intelligence (XAI). IEEE Access. 11:78994\u201379015","DOI":"10.1109\/ACCESS.2023.3294569"},{"key":"72_CR79","doi-asserted-by":"crossref","unstructured":"Bendiab G, Hameurlaine A, Germanos G, Kolokotronis N, Shiaeles S (2023) Autonomous vehicles security: challenges and solutions using blockchain and artificial intelligence. IEEE Trans Intell Transp Syst 24:3614\u20133637","DOI":"10.1109\/TITS.2023.3236274"},{"key":"72_CR80","doi-asserted-by":"crossref","unstructured":"Thakur T, Mehra A, Hassija V, Chamola V, Srinivas R, Gupta KK, Singh AP (2021) Smart water conservation through a machine learning and blockchain-enabled decentralized edge computing network. Appl Soft Comput 106:107274","DOI":"10.1016\/j.asoc.2021.107274"},{"key":"72_CR81","doi-asserted-by":"crossref","unstructured":"Six N, Herbaut N, Salinesi C (2022) Blockchain software patterns for the design of decentralized applications: a systematic literature review. Blockchain: Res Appl 3:100061","DOI":"10.1016\/j.bcra.2022.100061"},{"key":"72_CR82","doi-asserted-by":"crossref","unstructured":"De Ree M, Mantas G, Rodriguez J, Otung IED (2022) Decentralized and efficient key management to secure communication in dense and dynamic environments. IEEE Trans Intell Transp Syst 24:7586\u20137598","DOI":"10.1109\/TITS.2022.3160068"},{"key":"72_CR83","doi-asserted-by":"crossref","unstructured":"Mika B, Goudz A (2021) Blockchain-technology in the energy industry: blockchain as a driver of the energy revolution? With focus on the situation in Germany. Energy Syst 12:285\u2013355","DOI":"10.1007\/s12667-020-00391-y"},{"key":"72_CR84","doi-asserted-by":"crossref","unstructured":"Aliyu AA, Liu J, Gilliard E (2024) A decentralized and self-adaptive intrusion detection approach using continuous learning and blockchain technology. J Data Sci Intell Syst","DOI":"10.47852\/bonviewJDSIS42023803"},{"key":"72_CR85","doi-asserted-by":"crossref","unstructured":"Cong Y, Hou Y, Jiang J, Chen S, Cai X (2023) Features and evolution of global energy trade patterns from the perspective of complex networks. Energies 16:5677","DOI":"10.3390\/en16155677"},{"key":"72_CR86","doi-asserted-by":"crossref","unstructured":"Sharma PK, Kumar N, Park JH (2020) Blockchain technology toward green IoT: opportunities and challenges. IEEE Netw 34:263\u2013269","DOI":"10.1109\/MNET.001.1900526"},{"key":"72_CR87","doi-asserted-by":"crossref","unstructured":"Merhej J, Harb H, Abouaissa A, Idoumghar L (2024) Toward a new era of smart and secure healthcare information exchange systems: combining blockchain and artificial intelligence. Appl Sci 14:8808","DOI":"10.3390\/app14198808"},{"key":"72_CR88","doi-asserted-by":"crossref","unstructured":"Jabbar S, Lloyd H, Hammoudeh M, Adebisi B, Raza U (2021) Blockchain-enabled supply chain: analysis, challenges, and future directions. Multimed Syst 27:787\u2013806","DOI":"10.1007\/s00530-020-00687-0"},{"key":"72_CR89","doi-asserted-by":"crossref","unstructured":"Zografopoulos I, Ospina J, Liu X, Konstantinou C (2021) Cyber-physical energy systems security: threat modeling, risk assessment, resources, metrics, and case studies. IEEE Access. 9:29775\u201329818","DOI":"10.1109\/ACCESS.2021.3058403"},{"key":"72_CR90","doi-asserted-by":"publisher","unstructured":"Gariya N, Asrani A, Mandal A, Shaikh A, Cha D (2025) A comprehensive analysis of integrating Blockchain technology into the energy supply chain for the enhancement of transparency and sustainability. Energies 18(11):2951. https:\/\/doi.org\/10.3390\/en18112951","DOI":"10.3390\/en18112951"},{"key":"72_CR91","doi-asserted-by":"publisher","unstructured":"Shevchuk R, Martsenyuk V, Adamyk B, Benson V, Melnyk A (2025) Anomaly detection in blockchain: a systematic review of trends, challenges, and future directions. Appl Sci 15(15):8330. https:\/\/doi.org\/10.3390\/app15158330","DOI":"10.3390\/app15158330"},{"key":"72_CR92","doi-asserted-by":"publisher","unstructured":"Bharany S, Maashi M (2023) A critical investigation into the blockchain technology and its present-day uses. In 2023 3rd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 69\u201372). https:\/\/doi.org\/10.1109\/ICCIT58132.2023.10273943","DOI":"10.1109\/ICCIT58132.2023.10273943"},{"key":"72_CR93","doi-asserted-by":"publisher","unstructured":"Abibou R, Zaz Y, Motahhir S (2025) Unlocking potential: a review of blockchain and artificial intelligence integration. Discrete Math, Algoritms Appl. https:\/\/doi.org\/10.1142\/s1793830925300012","DOI":"10.1142\/s1793830925300012"},{"key":"72_CR94","doi-asserted-by":"publisher","unstructured":"Tooki OO, Popoola OM (2025) A systematic review on blockchain-based energy trading in a decentralized transactive energy system: opportunities, complexities, strategic challenges, research directions. Results Eng 27:106237. https:\/\/doi.org\/10.1016\/j.rineng.2025.106237","DOI":"10.1016\/j.rineng.2025.106237"},{"key":"72_CR95","doi-asserted-by":"publisher","unstructured":"Boamah SA, Louis JD, McNair J, Gilbert JE (2025) A survey for blockchain-enabled resource management in edge networks. IEEE Access. 13:77252\u201377277. https:\/\/doi.org\/10.1109\/access.2025.3562126","DOI":"10.1109\/access.2025.3562126"},{"key":"72_CR96","doi-asserted-by":"crossref","unstructured":"Wang T, Liu J, Liu T, Zhai D, Wang J, Zhang T (2023 Dec) Secure and scalable blockchain for IIoT with dual compression scheme. In In Proc. IEEE Int. Conf. Internet Things (iThings) IEEE Green Comput. Commun. (GreenCom) IEEE Cyber, Phys. Social Comput. (CPSCom) IEEE Smart Data (SmartData) IEEE Congr. Cybermatics (Cybermatics), pp 1\u20136","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00025"},{"key":"72_CR97","doi-asserted-by":"crossref","unstructured":"Jabor MS, Azez AS, Campelo JC, Pina AB (2023 May) New approach to improve power consumption associated with blockchain in WSNs, PLoS ONE, vol. 18(5):e0285924","DOI":"10.1371\/journal.pone.0285924"},{"key":"72_CR98","doi-asserted-by":"crossref","unstructured":"Gaba S, Budhiraja I, Makkar A, Garg D (2022 May) Machine learning for detecting security attacks on blockchain using software defined networking. In Proc. IEEE Int. Conf. Commun. Workshops (ICC Workshops), pp 260\u2013264","DOI":"10.1109\/ICCWorkshops53468.2022.9814656"},{"key":"72_CR99","doi-asserted-by":"crossref","unstructured":"Heiss J, Gr\u00fcnewald E, Tai S, Haimerl N, Schulte S (2022 Aug) Advancing blockchain-based federated learning through verifiable off-chain computations. In Proc. IEEE Int. Conf. Blockchain (Blockchain), pp 194\u2013201","DOI":"10.1109\/Blockchain55522.2022.00034"},{"key":"72_CR100","doi-asserted-by":"crossref","unstructured":"Baranwal G, Kumar D, Vidyarthi DP (2023. [Online]. Available: Sep) Blockchain based resource allocation in cloud and distributed edge computing: a survey. Comput Commun 209:469\u2013498. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366423002566","DOI":"10.1016\/j.comcom.2023.07.023"},{"key":"72_CR101","doi-asserted-by":"crossref","unstructured":"Yu G, Wang X, Ni W, Lu Q, Xu X, Liu RP, Zhu L (2023 Nov) Adaptive resource scheduling in permissionless sharded-blockchains: a decentralized multiagent deep reinforcement learning approach. IEEE Trans Syst, Man, Cybern, Syst 53(11):7256\u20137268","DOI":"10.1109\/TSMC.2023.3296614"},{"key":"72_CR102","doi-asserted-by":"publisher","unstructured":"Lee I (2019) The internet of things for enterprises: an ecosystem, architecture, and IoT service business model. Internet Things 7:100078. https:\/\/doi.org\/10.1016\/j.iot.2019.100078","DOI":"10.1016\/j.iot.2019.100078"},{"key":"72_CR103","doi-asserted-by":"publisher","unstructured":"Hong S (2020) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-To-Peer Netw Appl 13(2):579\u2013589. https:\/\/doi.org\/10.1007\/s12083-019-00739-x","DOI":"10.1007\/s12083-019-00739-x"},{"key":"72_CR104","doi-asserted-by":"publisher","unstructured":"Gupta S, Sinha S, Bhushan B (2020) Emergence of blockchain technology: fundamentals, working and its various implementations. In Proceedings of the International Conference on Innovative Computing & Communications (ICICC). https:\/\/doi.org\/10.2139\/ssrn.3569577","DOI":"10.2139\/ssrn.3569577"},{"key":"72_CR105","doi-asserted-by":"publisher","unstructured":"Assaqty MIS, Gao YHu X et al. (2020 91\u201397) Private-blockchain-based industrial IoT for material and product tracking in smart manufacturing. IEEE Netw 34(5). https:\/\/doi.org\/10.1109\/MNET.011.1900537","DOI":"10.1109\/MNET.011.1900537"},{"key":"72_CR106","doi-asserted-by":"crossref","unstructured":"Belchior R, Vasconcelos A, Guerreiro S, Correia M (2021) A survey on blockchain interoperability: past, present and future trends. Acm Comput Surv. (CSUR) 54:1\u201341","DOI":"10.1145\/3471140"},{"key":"72_CR107","doi-asserted-by":"crossref","unstructured":"Feng T, Yang P, Liu C, Fang J, Ma R (2022 Feb) \u2018Blockchain data privacy protection and sharing scheme based on zero-knowledge proof,\u2019 Wireless Commun. Mob Comput 2022:1\u201311","DOI":"10.1155\/2022\/1040662"},{"key":"72_CR108","doi-asserted-by":"crossref","unstructured":"Venkatesan K, Rahayu SB (2024 Jan) Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques. Sci Rep 14(1):1149","DOI":"10.1038\/s41598-024-51578-7"}],"container-title":["International Journal of Networked and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44227-025-00072-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44227-025-00072-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44227-025-00072-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T17:03:02Z","timestamp":1766077382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44227-025-00072-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":108,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["72"],"URL":"https:\/\/doi.org\/10.1007\/s44227-025-00072-1","relation":{},"ISSN":["2211-7938","2211-7946"],"issn-type":[{"value":"2211-7938","type":"print"},{"value":"2211-7946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"15 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent Statement"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Institutional Review Board Statement"}},{"value":"The authors declare no competing interests.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"28"}}