{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:12:37Z","timestamp":1763536357648,"version":"3.41.0"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2247561","2238680"],"award-info":[{"award-number":["2247561","2238680"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Office of Naval Research subawarded through Virginia Tech","award":["N00014-24-1-2730"],"award-info":[{"award-number":["N00014-24-1-2730"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,6,1]]},"DOI":"10.1109\/jiot.2025.3535671","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:48:31Z","timestamp":1738090111000},"page":"16095-16111","source":"Crossref","is-referenced-by-count":1,"title":["DEXO: A Secure and Fair Exchange Mechanism for Decentralized IoT Data Markets"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8992-768X","authenticated-orcid":false,"given":"Yue","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Kentucky, Lexington, KY, USA"}]},{"given":"Ifteher","family":"Alom","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Kentucky, Lexington, KY, USA"}]},{"given":"Wenhai","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Technology, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0946-3197","authenticated-orcid":false,"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Kentucky, Lexington, KY, USA"}]}],"member":"263","reference":[{"volume-title":"FCC Proposes $91.6M Fine against T-Mobile in Location Information Case","year":"2020","key":"ref1"},{"volume-title":"FCC Proposes $57.2M Fine against AT&T in Location Information Case","year":"2020","key":"ref2"},{"volume-title":"FCC Proposes $48.3M Fine against Verizon in Location Information Case","year":"2020","key":"ref3"},{"volume-title":"Data Brokers and Data Breaches","year":"2022","author":"Sherman","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3161478"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3131542.3131564"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5026"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00053"},{"volume-title":"Databroker official Website","year":"2020","key":"ref9"},{"volume-title":"Ocean protocol: Tools for the Web3 data economy","year":"2020","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656952"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391687"},{"volume-title":"Rarible official Website","year":"2020","key":"ref13"},{"volume-title":"Opensea official Website","year":"2017","key":"ref14"},{"volume-title":"What is the blockchain oracle problem?","year":"2020","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"volume-title":"Chainlink 2.0: Next steps in the evolution of decentralized oracle networks.","year":"2021","author":"Breidenbachetal","key":"ref17"},{"volume-title":"Bandchain whitepaper","year":"2022","key":"ref18"},{"volume-title":"Decentralized APIS for web 3.0","year":"2020","author":"Benligiray","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229019"},{"volume-title":"Arm Trustzone Technology","year":"2023","key":"ref21"},{"volume-title":"Apple t2 secure chip","year":"2019","key":"ref22"},{"volume-title":"Op-tee: attestation.c","year":"2023","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384749"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_30"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417239"},{"volume-title":"Ethereum: A secure decentralised generalised transaction ledger","year":"2014","author":"Wood","key":"ref28"},{"volume-title":"EOS.IO technical white paper v2","year":"2018","key":"ref29"},{"volume-title":"How to build a dApp in three steps","year":"2023","author":"Papacharissiou","key":"ref30"},{"volume-title":"Streamr: Decentralized real-time data economy","year":"2017","key":"ref31"},{"volume-title":"On the Impossibility of Fair Exchange Without a Trusted Third Party","year":"1999","author":"Pagnia","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348192"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.01.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134060"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3212734.3212736"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00080"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24775"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_37"},{"volume-title":"Introduction to WINkLink","year":"2022","key":"ref40"},{"volume-title":"The 3 levels of data aggregation in chainlink price feeds","year":"2023","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"volume-title":"Intel SGX explained","year":"2016","author":"Costan","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"volume-title":"Secure Encrypted Virtualization (SEV)","year":"2020","key":"ref45"},{"volume-title":"Intel\u00ae software guard extensions: Strengthen enclave trust with attestation","year":"2023","key":"ref46"},{"volume-title":"Integritee network docs","year":"2021","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_10"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_2"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"volume-title":"Op-tee on github: Trusted firmware project.","year":"2017","key":"ref53"},{"volume-title":"Repo manifest for op-tee development","year":"2023","key":"ref54"},{"volume-title":"Trusted firmware op tee: v3.17.0 release.","year":"2022","author":"Harbin","key":"ref55"},{"volume-title":"c-sss: AC implementation of Shamir\u2019s secret sharing","year":"2020","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.22581\/muet1982.2204.14"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/11008454\/10856225-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11008454\/10856225.pdf?arnumber=10856225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T17:43:31Z","timestamp":1747849411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10856225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,1]]},"references-count":57,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3535671","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2025,6,1]]}}}