{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:41:21Z","timestamp":1774687281947,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002642","name":"Korea University Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002642","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/jiot.2020.3022033","type":"journal-article","created":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T22:10:26Z","timestamp":1599516626000},"page":"3346-3359","source":"Crossref","is-referenced-by-count":31,"title":["IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems"],"prefix":"10.1109","volume":"8","author":[{"given":"Sreenivas Sudarshan","family":"Seshadri","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2308-1734","authenticated-orcid":false,"given":"David","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Mukunda","family":"Subedi","sequence":"additional","affiliation":[{"name":"Tata Consultancy Services, Mumbai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and the Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3885-3346","authenticated-orcid":false,"given":"Sara","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Qian","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0733-0136","authenticated-orcid":false,"given":"Junghee","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Cyber Security and the Institute of Cyber Security and Privacy, Korea University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/isaf.1424"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2387155"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2906198"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2013.78"},{"key":"ref37","article-title":"Vulnerability analysis of on-chip access-control memory","author":"chavda","year":"2017","journal-title":"Proc USENIX Workshop Hot Topics Storage File Syst"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref35","first-page":"14","article-title":"Smashing the stack for fun and profit","volume":"7","author":"one","year":"1996","journal-title":"Phrack Mag"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936278"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2947339"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785328"},{"key":"ref2","year":"2020","journal-title":"New Wave of Attacks Aiming to Rope Home Routers Into IoT Botnets"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref20","year":"2020","journal-title":"Hyperledger Fabric project"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1870-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944400"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205993"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038393"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073181"},{"key":"ref53","first-page":"117","article-title":"Don&#x2019;t talk unless I say so! securing the Internet of Things with default-off networking","author":"hong","year":"2018","journal-title":"Proc 3rd ACM\/IEEE Int Conf Internet Things Design Implement (IoTDI)"},{"key":"ref52","first-page":"2b","article-title":"BACnet explained, part one","volume":"55","author":"newman","year":"2013","journal-title":"Supplement to ASHRAE J"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2900987"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2961339"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2947432"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486322"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.43"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822945"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2002.1029996"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00092-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738563"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"ref3","year":"2020","journal-title":"Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406189"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2017.8068718"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856708"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2017.8289757"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986581"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2017.06.054"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CCTA.2017.8062773"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355100"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954128"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999468"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897792"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8585864"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875542"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9358034\/09187247.pdf?arnumber=9187247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:51Z","timestamp":1652194431000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9187247\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":53,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3022033","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}