{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:20:51Z","timestamp":1777389651834,"version":"3.51.4"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tnsm.2024.3438621","type":"journal-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:44:33Z","timestamp":1723052673000},"page":"5888-5903","source":"Crossref","is-referenced-by-count":10,"title":["SATI: Sidechain-Based Access Control &amp; Trust Mechanism for IoT Networks"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7417-9873","authenticated-orcid":false,"given":"Aditya","family":"Pathak","sequence":"first","affiliation":[{"name":"Faculty of Engineering and Applied Science, University of Regina, Regina, SK, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9192-7976","authenticated-orcid":false,"given":"Irfan","family":"Al-Anbagi","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Applied Science, University of Regina, Regina, SK, Canada"}]},{"given":"Howard J.","family":"Hamilton","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Regina, Regina, SK, Canada"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"1","article-title":"Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology","volume":"11","author":"Mohanta","year":"2020","journal-title":"Internet Things"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3372136"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348125"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8889192"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2922538"},{"issue":"8","key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/e23081054","article-title":"Hyperledger fabric access control system for Internet of Things layer in blockchain-based applications","volume":"23","author":"Iftekhar","year":"2021","journal-title":"Entropy"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040630"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265349"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.019"},{"issue":"3","key":"ref10","first-page":"47","article-title":"A survey of secure Internet of Things in relation to blockchain","volume":"10","author":"Alizadeh","year":"2020","journal-title":"J. Internet Services Inf. Secur."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33083-4_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968492"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3077276"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/en16031510"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11091416"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.2972742"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app11209372"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967218"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3179875"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3510547.3517921"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00189"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878154"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"issue":"4","key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/fi12040061","article-title":"Blockchain and fog based architecture for internet of everything in smart cities","volume":"12","author":"Singh","year":"2020","journal-title":"Future Internet"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460035"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958355"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035252"},{"issue":"1","key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ipm.2020.102393","article-title":"PF-BTS: A privacy-aware fog-enhanced blockchain-assisted task scheduling","volume":"58","author":"Baniata","year":"2021","journal-title":"Inf. Process. Manage."},{"issue":"1","key":"ref32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/electronics11010167","article-title":"Fine grained access control based on smart contract for edge computing","volume":"11","author":"Zhu","year":"2022","journal-title":"Electronics"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881246"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3047640"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422632"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGEA53208.2021.00098"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3291064.3291073"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254521"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005541"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00198"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3179727"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149046"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3125091"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00190"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4108\/eai.18-6-2016.2264183"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3240990"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3189832"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3121722"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"issue":"1","key":"ref52","first-page":"1","article-title":"Evaluation of security level of cryptography: ECDSA signature scheme","volume":"15","author":"Menezes","year":"2001","journal-title":"Certicom Res."},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06944-4_13"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107233"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920297"},{"key":"ref56","first-page":"414","article-title":"The Scyther tool: Verification, falsification, and analysis of security protocols: Tool paper","volume-title":"Proc. Int. Conf. Comput. Aided Verif.","author":"Cremers"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10714905\/10630615.pdf?arnumber=10630615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T04:29:12Z","timestamp":1728707352000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10630615\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":56,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3438621","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}