{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:37:41Z","timestamp":1765438661959,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Basic Science Research Program through the National Research Foundation of Korea, Ministry of Education","doi-asserted-by":"publisher","award":["2018R1D1A1B07047601"],"award-info":[{"award-number":["2018R1D1A1B07047601"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion, Korea government (MSIT)","doi-asserted-by":"publisher","award":["2018-0-00245"],"award-info":[{"award-number":["2018-0-00245"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2020.3047413","type":"journal-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T21:10:23Z","timestamp":1608930623000},"page":"3592-3615","source":"Crossref","is-referenced-by-count":29,"title":["BorderChain: Blockchain-Based Access Control Framework for the Internet of Things Endpoint"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3574-7820","authenticated-orcid":false,"given":"Yustus Eko","family":"Oktian","sequence":"first","affiliation":[]},{"given":"Sang-Gon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ganache Your Personal Blockchain for Ethereum Development","year":"2020","key":"ref39"},{"journal-title":"CLUSTER","year":"2020","key":"ref38"},{"journal-title":"Crypto","year":"2020","key":"ref33"},{"journal-title":"ETH gas station","year":"2020","key":"ref32"},{"key":"ref31","first-page":"68","article-title":"Threat modeling-uncover security design flaws using the stride approach","volume":"2006","author":"hernan","year":"2006","journal-title":"MSDN Magazine-Louisville"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/s18030917"},{"journal-title":"Memcached A Distributed Memory Object Caching System","year":"2020","key":"ref37"},{"journal-title":"Autocannon A HTTP\/1 1 Benchmarking Tool Written in Node Greatly Inspired by Wrk and Wrk2 With Support for HTTP Pipelining and HTTPS","year":"2020","author":"collina","key":"ref36"},{"journal-title":"express js Fast unopinionated minimalist web framework for node","year":"2020","author":"holowaychuk","key":"ref35"},{"journal-title":"ETH-Crypto Cryptographic Javascript-Functions for Ethereum and Tutorials on How to Use them Together With Web3js and Solidity","year":"2020","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.005"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"ref11","article-title":"Certcoin: A namecoin based decentralized authentication system","volume":"6","author":"fromknecht","year":"2014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055530"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390280"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377385"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554519"},{"journal-title":"Running a Full Node Bitcoin&#x2014;Minimum Requirements","year":"2020","key":"ref28"},{"journal-title":"How to not break the internet","year":"2016","author":"kochetkova","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5220\/0006240502160223"},{"journal-title":"NASA Hacked 500 MB of Mission Data Stolen Through a Raspberry Pi Computer","year":"2019","author":"mamiit","key":"ref3"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"nakamoto","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2014.7049308"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref8","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"journal-title":"Gartner Says 5 8 Billion Enterprise and Automotive IoT Endpoints Will Be in Use in 2020","year":"2019","author":"goasduff","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680960"},{"journal-title":"Gartner Identifies Top 10 Strategic IoT Technologies and Trends","year":"2018","author":"omale","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457161"},{"journal-title":"Identifying the Internet of Things&#x2014;One Device at a Time","year":"2018","author":"desai","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"ref42","first-page":"112","article-title":"The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication","author":"vukoli?","year":"2015","journal-title":"Proc Int Workshop Open Problems Netw Secur"},{"journal-title":"X 509 Internet public key infrastructure online certificate status protocol-OCSP","year":"1999","author":"myers","key":"ref24"},{"journal-title":"Transaction Speeds How Do Cryptocurrencies Stak Up To Visa or PayPal?","year":"2020","author":"amoros","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412073"},{"journal-title":"Revocation is Broken","year":"2017","author":"helme","key":"ref26"},{"journal-title":"The search engine for the Internet of Things","year":"2020","key":"ref43"},{"journal-title":"Sectigo Revokes Certificates Used to Sign Malware Following Recent Report","year":"2019","author":"arghire","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09309027.pdf?arnumber=9309027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:47Z","timestamp":1639770947000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9309027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3047413","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}