{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:50:34Z","timestamp":1759229434204,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":21,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3287921.3287933","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"150-154","source":"Crossref","is-referenced-by-count":10,"title":["Blockchain and Internet of Things Opportunities and Challenges"],"prefix":"10.1145","author":[{"given":"Kimheng","family":"Sok","sequence":"first","affiliation":[{"name":"PReCISE Research Center, University of Namur, Namur, Belgium"}]},{"given":"Jean No\u00ebl","family":"Colin","sequence":"additional","affiliation":[{"name":"PReCISE Research Center, University of Namur, Namur, Belgium"}]},{"given":"Kimtho","family":"Po","sequence":"additional","affiliation":[{"name":"Institute of Technology of Cambodia, Phnom Penh, Cambodia"}]}],"member":"320","reference":[{"key":"key-10.1145\/3287921.3287933-1","unstructured":"Kasey Panetta. 15th Aug, 2017. Top Trends in the Gartner Hype Cycle for Emerging Technologies, 2017. https:\/\/www.gartner.com\/smarterwithgartner\/top-trends-in-the-gartner-hype-cycle-for-emerging-technologies-2017\/"},{"key":"key-10.1145\/3287921.3287933-2","unstructured":"Amy Nordrum. Aug 2016. Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is outdated. IEEE Spectrum (Aug 2016)."},{"key":"key-10.1145\/3287921.3287933-3","unstructured":"Krebsonsecurity. 21st Oct, 2016. DDoS on Dyn Impacts Twitter, Spotify, Reddit. https:\/\/krebsonsecurity.com\/2016\/10\/ddos-on-dyn-impacts-twitter-spotify-reddit\/"},{"key":"key-10.1145\/3287921.3287933-4","doi-asserted-by":"crossref","unstructured":"Mark Weiser. 1991. The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications (1991).","DOI":"10.1038\/scientificamerican0991-94"},{"key":"key-10.1145\/3287921.3287933-5","unstructured":"ITU. 15th June, 2012. Overview of the Internet of Things. https:\/\/www.itu.int\/ITU-T\/recommendations\/rec.aspx?rec=y.2060"},{"key":"key-10.1145\/3287921.3287933-6","unstructured":"IEEE Standard Association. Sep 2016. Standard for an Architectural Framework for the Internet of Things (IoT) IEEE P2413. http:\/\/grouper.ieee.org\/groups\/2413\/Intro-to-IEEE-P2413.pdf"},{"key":"key-10.1145\/3287921.3287933-7","unstructured":"Ms. Smith. 4th Sep, 2017. 465,000 Abbott pacemakers vulnerable to hacking, need a firmware fix. https:\/\/www.csoonline.com\/article\/3222068\/hacking\/465000-abbott-pacemakers-vulnerable-to-hacking-need-a-firmware-fix.html"},{"key":"key-10.1145\/3287921.3287933-8","unstructured":"Lain Thomson. 13rd Oct, 2016. Wi-Fi baby heart monitor may have the worst IoT security of 2016. https:\/\/www.theregister.co.uk\/2016\/10\/13\/possibly_worst_iot_security_failure_yet\/"},{"key":"key-10.1145\/3287921.3287933-9","unstructured":"S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008)."},{"key":"key-10.1145\/3287921.3287933-10","unstructured":"N. Szabo. 1994. The idea of Smart Contracts. (1994)."},{"key":"key-10.1145\/3287921.3287933-11","unstructured":"Kimheng SOK Jean N&#246;el COLIN, Kimtho PO. 2018. Blockchain and Smart Contract state of the art."},{"key":"key-10.1145\/3287921.3287933-12","doi-asserted-by":"crossref","unstructured":"M. Conoscenti. 2016. Blockchain for the Internet of Things: a Systematic Literature Review. IEEE (2016).","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"key-10.1145\/3287921.3287933-13","unstructured":"V. Pureswaran. Apr 2015. Empowering the edge - Use case abstract for the ADEPT proof-of-concept. htttp:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=GBE03666USEN"},{"key":"key-10.1145\/3287921.3287933-14","unstructured":"Guard Time Technology. 2017. KSI Blockchain Technology. https:\/\/guardtime.com\/technology"},{"key":"key-10.1145\/3287921.3287933-15","unstructured":"Intrinsic-ID. 2017. Intrinsic-ID Physical Unclonable Functions Technology. https:\/\/www.intrinsic-id.com\/physical-unclonable-functions"},{"key":"key-10.1145\/3287921.3287933-16","unstructured":"Pycom. [n. d.]. Pycom Products. https:\/\/docs.pycom.io\/chapter\/products.html"},{"key":"key-10.1145\/3287921.3287933-17","unstructured":"TTN. [n. d.]. The Things Network. https:\/\/www.thethingsnetwork.org\/"},{"key":"key-10.1145\/3287921.3287933-18","unstructured":"The Linux Foundation Projects. [n. d.]. Hyperledger Fabric. https:\/\/www.hyperledger.org\/projects\/fabric"},{"key":"key-10.1145\/3287921.3287933-19","unstructured":"IOTA. [n. d.]. Tangle. https:\/\/www.iota.org\/research\/meet-the-tangle"},{"key":"key-10.1145\/3287921.3287933-20","unstructured":"Vitalik Buterin Virgil Griffith. 2017. Casper the Friendly Finality Gadget. https:\/\/www.poolofstake.io\/wp-content\/uploads\/2018\/04\/Pool_of_Stake_whitepaper.pdf"},{"key":"key-10.1145\/3287921.3287933-21","unstructured":"Bitshares. 2013. Delegated Proof of Stake. http:\/\/docs.bitshares.org\/bitshares\/dpos.html"}],"event":{"number":"9","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2018","name":"the Ninth International Symposium","start":{"date-parts":[[2018,12,6]]},"location":"Danang City, Viet Nam","end":{"date-parts":[[2018,12,7]]}},"container-title":["Proceedings of the Ninth International Symposium on Information and Communication Technology - SoICT 2018"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287921.3287933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3287933&ftid=2025939&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:54Z","timestamp":1750208274000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3287921.3287933"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1145\/3287921.3287933","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}