{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:06:52Z","timestamp":1773248812614,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-17-1-0393"],"award-info":[{"award-number":["H98230-17-1-0393"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-17-1-0352"],"award-info":[{"award-number":["H98230-17-1-0352"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000104","name":"National Aeronautics and Space Administration","doi-asserted-by":"publisher","award":["NNX15AK38A"],"award-info":[{"award-number":["NNX15AK38A"]}],"id":[{"id":"10.13039\/100000104","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/jiot.2018.2878154","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:50:15Z","timestamp":1540583415000},"page":"4719-4732","source":"Crossref","is-referenced-by-count":236,"title":["EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4881-5711","authenticated-orcid":false,"given":"Jianli","family":"Pan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9214-2468","authenticated-orcid":false,"given":"Jianyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Austin","family":"Hester","sequence":"additional","affiliation":[]},{"given":"Ismail","family":"Alqerm","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9305-3405","authenticated-orcid":false,"given":"Yuanni","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref38","article-title":"Blockchain in Internet of Things: Challenges and solutions","author":"dorri","year":"2016","journal-title":"arXiv preprint arXiv 1608 05187"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref32","author":"garcia-morchon","year":"2018","journal-title":"State-of-the-art and challenges for the Internet of Things security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2748133"},{"key":"ref30","article-title":"Method and system for secure resource management of IoT utilizing blockchain and smart contracts","author":"wang","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779263"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2721914.2721921"},{"key":"ref34","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"Proc OSDI"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3051335"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.63"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISNE.2014.6839375"},{"key":"ref14","author":"shelby","year":"7252","journal-title":"The Constrained Application Protocol (CoAP)"},{"key":"ref15","author":"kivinen","year":"7815","journal-title":"Minimal Internet Key Exchange Version 2 (IKEv2) Initiator Implementation"},{"key":"ref16","article-title":"Lightweight IKEv2: A key management solution for both the compressed IPsec and the IEEE 802.15.4 security","volume":"23","author":"raza","year":"2012","journal-title":"Proceedings of the IETF Workshop on Smart Object Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.010"},{"key":"ref18","year":"2018","journal-title":"IETF Light-Weight Implementation Guidance (LWIG) Working Group"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/253769.253802"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871706"},{"key":"ref4","year":"2018","journal-title":"Android Things 1 0 Launches Google Promises 3 Years of Updates for Every Device"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701095"},{"key":"ref3","year":"2016","journal-title":"How 1 5 million connected cameras were hijacked to make an unprecedented botnet"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref29","article-title":"Edge-IoT framework based on blockchain and smart contracts and associated method of use","author":"pan","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref8","year":"2016","journal-title":"The mobile-edge computing initiative"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref2","author":"woolf","year":"2016","journal-title":"DDoS attack that disrupted internet was largest of its kind in history experts say"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref1","year":"2010","journal-title":"CEO to Shareholders 50 Billion Connections 2020"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500391"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.74"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3158333"},{"key":"ref48","author":"eliot","year":"2018","journal-title":"Manufacturer Usage Description Specification"},{"key":"ref22","first-page":"6","article-title":"BeyondCorp: A new approach to enterprise security","volume":"39","author":"ward","year":"2014","journal-title":"login"},{"key":"ref47","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref21","first-page":"28","article-title":"BeyondCorp: Design to deployment at Google","author":"osborn","year":"2016","journal-title":"Proc USENIX"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8242003"},{"key":"ref24","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700863"},{"key":"ref23","year":"2016","journal-title":"Getting started with a zero trust approach to network security"},{"key":"ref44","article-title":"Using blockchain and smart contracts for secure data provenance management","author":"ramachandran","year":"2017","journal-title":"arXiv preprint arXiv 1709 10119"},{"key":"ref26","article-title":"Smart contracts: Building blocks for digital markets","volume":"16","author":"szabo","year":"1996","journal-title":"EXTROPY J Transhumanist"},{"key":"ref43","article-title":"Smart contract-based access control for the Internet of Things","author":"zhang","year":"2018","journal-title":"arXiv preprint arxiv 1802 05807"},{"key":"ref25","author":"narayanan","year":"2016","journal-title":"Bitcoin and Cryptocurrency Technologies"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8738925\/08510796.pdf?arnumber=8510796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:08:56Z","timestamp":1657746536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8510796\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":48,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2878154","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}