{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:26:14Z","timestamp":1766579174234,"version":"3.48.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"\u201cNational Research Foundation of Korea (NRF) Grant funded by the Korea Government","award":["RS-2024-00450915"],"award-info":[{"award-number":["RS-2024-00450915"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tce.2025.3608165","type":"journal-article","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T17:45:55Z","timestamp":1757526355000},"page":"9401-9414","source":"Crossref","is-referenced-by-count":2,"title":["A Blockchain-Based Mutual Authentication Scheme With Data Sovereignty for IoT-Based Healthcare Digital Twin Environments"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0014-1965","authenticated-orcid":false,"given":"DeokKyu","family":"Kwon","sequence":"first","affiliation":[{"name":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0406-6547","authenticated-orcid":false,"given":"Youngho","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MCE.2022.3208986"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ACCESS.2022.3193941"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/JIOT.2021.3051158"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MWC.002.2200015"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JIOT.2023.3263909"},{"issue":"4","key":"ref6","first-page":"239","article-title":"Authentication methods in Internet-of-Things platform: A comprehensive review","volume":"13","author":"Zargar","year":"2024","journal-title":"Majlesi J. Telecommun. Devices"},{"volume-title":"Decentralized Identifiers (DIDs) V1.0 Core Architecture, Data Model, and Representations","year":"2025","key":"ref7"},{"volume-title":"Verifiable Credentials Data Model 1.0 Expressing Verifiable Information on the Web","year":"2025","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-540-30580-4_6"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/77648.77649"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-540-70545-1_38"},{"volume-title":"Scyther tool.","year":"2025","key":"ref12"},{"volume-title":"MIRACL cryptographic SDK.","year":"2025","key":"ref13"},{"volume-title":"NS-3.29.","year":"2025","key":"ref14"},{"volume-title":"Ganache.","year":"2025","key":"ref15"},{"volume-title":"Remix project.","year":"2025","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1038\/s41598-025-90219-5"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TCE.2024.3357115"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TCE.2024.3435860"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/MNET.118.2200071"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/COMST.2023.3308717"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ACCESS.2022.3173617"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TII.2021.3121505"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/VTC2021-Fall52928.2021.9625518"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1002\/ett.4922"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TITS.2024.3394438"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/JIOT.2024.3511132"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TIT.1983.1056650"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/3-540-46035-7_22"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/3-540-48405-1_25"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/JIOT.2025.3544443"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TITS.2024.3428491"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/s11042-024-19379-2"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TITS.2025.3525505"},{"volume-title":"Proc. Decentralized Bus. Rev.","author":"Nakamoto","article-title":"Bitcoin: A peer-to-peer electronic cash system","key":"ref35"},{"volume-title":"Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform","year":"2014","author":"Buterin","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.2307\/2007884"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1007\/978-3-540-24676-3_31"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/s10586-024-04565-6"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TIFS.2017.2721359"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/3-540-45539-6_12"},{"year":"2000","author":"Carman","article-title":"Constraints and approaches for distributed sensor network security (final): DARPA project report, (cryptographic technologies group, trusted information system, NAI labs","key":"ref42"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11306167\/11157782.pdf?arnumber=11157782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:41:37Z","timestamp":1766428897000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11157782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":42,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3608165","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"type":"print","value":"0098-3063"},{"type":"electronic","value":"1558-4127"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}