{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T00:33:39Z","timestamp":1778632419467,"version":"3.51.4"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3259068","type":"journal-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T17:55:50Z","timestamp":1679334950000},"page":"28370-28383","source":"Crossref","is-referenced-by-count":42,"title":["LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5300-4641","authenticated-orcid":false,"given":"Abba","family":"Garba","sequence":"first","affiliation":[{"name":"School of ECCS, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3333-6574","authenticated-orcid":false,"given":"David","family":"Khoury","sequence":"additional","affiliation":[{"name":"Department of CS and ICT, American University AUST, Beirut, Lebanon"}]},{"given":"Patrick","family":"Balian","sequence":"additional","affiliation":[{"name":"Department of CS and ICT, American University AUST, Beirut, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0292-2765","authenticated-orcid":false,"given":"Samir","family":"Haddad","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Mathematics, Faculty of Arts and Sciences, University of Balamand, Koura, Lebanon"}]},{"given":"Jinane","family":"Sayah","sequence":"additional","affiliation":[{"name":"Department of Telecom and Networks, Issam Fares Faculty of Technology, University of Balamand, Koura, Lebanon"}]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Telecom and Networks, Issam Fares Faculty of Technology, University of Balamand, Koura, Lebanon"}]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[{"name":"School of ECCS, Peking University, Beijing, China"}]},{"given":"Hani","family":"Hamdan","sequence":"additional","affiliation":[{"name":"Laboratoire des Signaux et Syst&#x00E8;mes (L2S UMR CNRS 8506), CentraleSup&#x00E9;lec, CNRS, Universit&#x00E9; Paris-Saclay, Gif-sur-Yvette, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7732-3578","authenticated-orcid":false,"given":"Jinan","family":"Charafeddine","sequence":"additional","affiliation":[{"name":"Laboratoire d&#x2019;Ing&#x00E9;nierie des Syst&#x00E8;mes de Versailles (LISV EA 4048), P&#x00F4;le scientifique et technologique de V&#x00E9;lizy, Universit&#x00E9; Paris-Saclay, V&#x00E9;lizy, France"}]},{"given":"Khalid","family":"Al-Mutib","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119527978"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3277593.3277595"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2646120"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93797-7_14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101658"},{"key":"ref7","volume-title":"SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)","year":"2013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148820"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2625821"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2560"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS50907.2020.00108"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3069128"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5220\/0007366803450352"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.460"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7633"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30359-3_26"},{"key":"ref17","volume-title":"LocalPKI: An Interoperable and IoT Friendly PKI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93797-7_14"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934049"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP49548.2020.9163555"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tsp55681.2022.9851252"},{"issue":"1","key":"ref22","first-page":"1694","article-title":"A user-centric PKI based-protocol to manage FC2 digital identities","volume":"8","author":"Bouzefrane","year":"2011","journal-title":"Int. J. Comput. Sci."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0006461101870199"},{"key":"ref24","volume-title":"A Peer-to-Peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref25","volume-title":"Ethereum Yellow Pager: A Secure Decentralised Generalised Transaction Ledger Berlin Version Beacfbd","year":"2022"},{"key":"ref26","article-title":"Ethereum: A next-generation smart contract and decentralized application platform (2013)","author":"Buterin","year":"2017"},{"key":"ref27","volume-title":"Ethereum Whitepaper","year":"2019"},{"key":"ref28","first-page":"236","article-title":"Low-resource eclipse attacks on Ethereum\u2019s peer-to-peer network","volume":"2018","author":"Marcus","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref29","first-page":"129","article-title":"Eclipse attacks on bitcoin\u2019s peer-to-peer network","volume-title":"Proc. 24th USENIX Secur. Symp.","volume":"2015","author":"Heilman"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417247"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.026"},{"key":"ref32","article-title":"Ethereum eclipse attacks","author":"W\u00fcst","year":"2016"},{"key":"ref33","article-title":"Light clients and proof of stake","author":"Buterin","year":"2015"},{"key":"ref34","volume-title":"Ether Daily Price (USD) Chart"},{"key":"ref35","article-title":"Transport layer security (TLS)\/datagram transport layer security (DTLS) profiles for the Internet of Things","author":"Tschofenig","year":"7925"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2511301"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/cic.2018.00-45"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/en14196317"},{"key":"ref39","volume-title":"Mobile Edge Computing (MEC); Technical Requirements"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2969474"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/cscn.2017.8088619"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/i-smac.2017.8058395"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10076434.pdf?arnumber=10076434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T17:38:57Z","timestamp":1707845937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10076434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3259068","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}