{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:33:37Z","timestamp":1775838817812,"version":"3.50.1"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/jiot.2018.2812239","type":"journal-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T19:15:01Z","timestamp":1520277301000},"page":"1184-1195","source":"Crossref","is-referenced-by-count":1090,"title":["Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5123-2608","authenticated-orcid":false,"given":"Oscar","family":"Novo","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"wood","year":"2013","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref11","author":"sompolinsky","year":"2013","journal-title":"Secure High-Rate Transaction Processing in Bitcoin"},{"key":"ref12","first-page":"235","article-title":"Byzantine fault tolerance, from theory to reality","author":"driscoll","year":"2003","journal-title":"Proc Int Conf Comput Safety Rel Security (SAFECOMP)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref15","year":"2015","journal-title":"The Autonomous Decentralized Peer-to-Peer Telemetry (ADEPT) System"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2080.357392"},{"key":"ref17","article-title":"Uncover security design flaws using the STRIDE approach","volume":"21","author":"hernan","year":"2006","journal-title":"MSDN Mag"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"ref19","first-page":"368","article-title":"From pretty good to great: Enhancing PGP using bitcoin and the blockchain","volume":"abs 1508","author":"wilson","year":"2015","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICIOT.2017.34"},{"key":"ref3","article-title":"Dynamic resource caching in the IoT application layer for smart cities","author":"sun","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v2i9.548","article-title":"Formalizing and securing relationships on public networks","volume":"2","author":"szabo","year":"1997","journal-title":"First Monday"},{"key":"ref5","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2560812"},{"key":"ref7","first-page":"258","article-title":"Proofs of work and bread pudding protocols","author":"jakobsson","year":"2015","journal-title":"Information and Network Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600492CM"},{"key":"ref9","first-page":"585","article-title":"Proofs of space","author":"dziembowski","year":"2015","journal-title":"Proc 35th Annu Cryptol Conf Adv Cryptol II (CRYPTO)"},{"key":"ref1","article-title":"Ericsson mobility report: On the pulse of the networked society","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref21","first-page":"523","author":"ouaddah","year":"2017","journal-title":"Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT"},{"key":"ref24","year":"2017","journal-title":"OMA Lightweight M2M Technical Specification"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"ref25","author":"der stok","year":"2017","journal-title":"CoAp Management Interfaces"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8334665\/08306880.pdf?arnumber=8306880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T05:16:10Z","timestamp":1643174170000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8306880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":25,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2812239","relation":{},"ISSN":["2327-4662"],"issn-type":[{"value":"2327-4662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}