{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T20:10:02Z","timestamp":1756757402647,"version":"3.44.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/csnet47905.2019.9108958","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T17:03:11Z","timestamp":1591376591000},"page":"28-34","source":"Crossref","is-referenced-by-count":5,"title":["A Blockchain-based Lightweight Authentication Solution for IoT"],"prefix":"10.1109","author":[{"given":"Achraf","family":"Fayad","sequence":"first","affiliation":[{"name":"Telecom Paristech,France"}]},{"given":"Badis","family":"Hammi","sequence":"additional","affiliation":[{"name":"PSB Paris School,France"}]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[{"name":"Telecom Paristech,France"}]},{"given":"Ahmed","family":"Serhrouchni","sequence":"additional","affiliation":[{"name":"Telecom Paristech,France"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.158"},{"key":"ref12","article-title":"RFC 5280: Internet X. 509 Public Key Infrastructure Certificate and CRL profile","author":"cooper","year":"2008","journal-title":"Internet Engineering Task Force (IETF)"},{"key":"ref13","article-title":"RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2","author":"dierks","year":"2008","journal-title":"Internet Engineering Task Force (IETF)"},{"key":"ref14","article-title":"RFC 6347: Datagram Transport Layer Security Version 1.2","author":"rescorla","year":"2012","journal-title":"Internet Engineering Task Force (IETF)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"article-title":"Blockchain in Internet of Things: challenges and solutions","year":"2016","author":"dorri","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899012"},{"key":"ref18","first-page":"1","article-title":"BCTrust: A decentralized authentication blockchain-based mechanism","author":"hammi","year":"2018","journal-title":"Wireless Communications and Networking Conference (WCNC) 2018 IEEE"},{"key":"ref19","first-page":"3","article-title":"A lightweight mutual authentication protocol for the iot","author":"hammi","year":"2017","journal-title":"Inter Conference on Mobile and Wireless Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref3","first-page":"1","article-title":"An adaptive authentication and authorization scheme for iot&#x2019;s gateways: a blockchain based approach","author":"fayad","year":"2018","journal-title":"2018 Third International Conference on Security of Smart Cities Industrial Control System and Communications (SSIC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8242001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45402-2_58"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref1","article-title":"Internet of Things (IoT) Technologies for Smart Cities","author":"hammi","year":"2017","journal-title":"IET Networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263790"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269719"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054867"}],"event":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2019,10,23]]},"location":"Quito, Ecuador","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 3rd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106988\/9108844\/09108958.pdf?arnumber=9108958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:28:40Z","timestamp":1756754920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/csnet47905.2019.9108958","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}