{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:53:18Z","timestamp":1776077598955,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772403"],"award-info":[{"award-number":["61772403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1401251"],"award-info":[{"award-number":["U1401251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2017JM6004"],"award-info":[{"award-number":["2017JM6004"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National 111 Program of China","award":["B16037"],"award-info":[{"award-number":["B16037"]}]},{"name":"National 111 Program of China","award":["B08038"],"award-info":[{"award-number":["B08038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/jiot.2018.2874222","type":"journal-article","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T19:36:09Z","timestamp":1538768169000},"page":"4671-4679","source":"Crossref","is-referenced-by-count":62,"title":["Blockchain-Based Secure Time Protection Scheme in IoT"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shangyang","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanhui","family":"Ren","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kan","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9697-2108","authenticated-orcid":false,"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-7169","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-5404","authenticated-orcid":false,"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2017.0619"},{"key":"ref30","article-title":"Blockchain challenges and opportunities: A survey","author":"zheng","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214179"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-46276-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.40"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.150"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700168"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2011.06.012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.377675"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2012.2232472"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2196996"},{"key":"ref27","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s140916932"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0169-2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2015.2494358"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600195WC"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00196"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0993-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.262"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2089210"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2495147"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.07.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2410777"},{"key":"ref23","first-page":"1","article-title":"The flooding time synchronization protocol","author":"maroti","year":"2004"},{"key":"ref26","first-page":"823","article-title":"Authenticated network time synchronization","author":"dowling","year":"2016","journal-title":"Proc Usenix Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/S0217984917500087"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8738925\/08482304.pdf?arnumber=8482304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:08:56Z","timestamp":1657746536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8482304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2874222","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}