{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:40:12Z","timestamp":1771612812470,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Basic Science Research Program through the National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","award":["NRF-2020R1I1A2073603"],"award-info":[{"award-number":["NRF-2020R1I1A2073603"]}],"id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,5,1]]},"DOI":"10.1109\/jiot.2021.3109314","type":"journal-article","created":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T20:34:35Z","timestamp":1630528475000},"page":"6374-6388","source":"Crossref","is-referenced-by-count":37,"title":["AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber\u2013Physical Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0872-0331","authenticated-orcid":false,"given":"Basudeb","family":"Bera","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4869-6620","authenticated-orcid":false,"given":"Sourav","family":"Saha","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar University, Patiala, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3222-1708","authenticated-orcid":false,"given":"Han-Chieh","family":"Chao","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Dong Hwa University, Hualien City, Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2015.08.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2019.05.003"},{"key":"ref3","volume-title":"Ethereum Gas","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref7","volume-title":"Why the Shellshock Bug Is Worse than Heartbleed","author":"Cerrudo","year":"2014"},{"key":"ref8","volume-title":"Serious Bug Exposes Sensitive Data From Millions Sites Sitting Behind CloudFlare","author":"Khandelwal","year":"2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70241"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2834351"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2015.07.022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"ref15","volume-title":"Automated Validation of Internet Security Protocols and Applications","year":"2019"},{"key":"ref16","volume-title":"MIRACL Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485206"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2456026"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3046509"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3043760"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2706752"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857845"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866697"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2664183"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/070414"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1591"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3201594"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2018.8352379"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908499"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.019"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s20020501"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2971254"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030308"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3009382"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3995"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101877"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2969565"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944400"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3013892"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942389"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2717"},{"key":"ref47","volume-title":"Security Think Tank: AI Cyber Attacks Will Be a Step-Change for Criminals","author":"Howells","year":"2020"},{"key":"ref48","volume-title":"When Blockchain Meets Artificial Intelligence","author":"Shroff","year":"2020"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000196"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"ref51","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2966242"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.011"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3000576"},{"key":"ref57","volume-title":"Introduction to Numerical Analysis","author":"Hildebrand","year":"1974"},{"key":"ref58","volume-title":"The Art of Computer Programming: Seminumerical Algorithms","volume":"2","author":"Knuth","year":"1997"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.180-1"},{"key":"ref60","volume-title":"Implementing PBFT in Blockchain)","author":"Khullar","year":"2019"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9762554\/09526870.pdf?arnumber=9526870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:12:32Z","timestamp":1705018352000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9526870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,1]]},"references-count":60,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3109314","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,1]]}}}