{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T19:05:32Z","timestamp":1772046332062,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594611","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"64-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Digital Twins and Blockchain for IoT Management"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6886-3513","authenticated-orcid":false,"given":"Mayra","family":"Samaniego","sequence":"first","affiliation":[{"name":"Computer Science, University of Saskatchewan, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6703-5839","authenticated-orcid":false,"given":"Ralph","family":"Deters","sequence":"additional","affiliation":[{"name":"Computer Science, University of Saskatchewan, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.023121167"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-019-02849-1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2019.101837"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2974007"},{"key":"e_1_3_2_1_5_1","volume-title":"The role of AI for developing digital twins in healthcare: The case of cancer care","author":"Kaul R.","year":"2022","unstructured":"R. Kaul , \u201c The role of AI for developing digital twins in healthcare: The case of cancer care ,\u201d Wiley Interdiscip Rev Data Min Knowl Discov , 2022 , doi: 10.1002\/widm.1480. 10.1002\/widm.1480 R. Kaul , \u201cThe role of AI for developing digital twins in healthcare: The case of cancer care,\u201d Wiley Interdiscip Rev Data Min Knowl Discov, 2022, doi: 10.1002\/widm.1480."},{"key":"e_1_3_2_1_6_1","first-page":"158","volume-title":"Advanced Sciences and Technologies for Security Applications","author":"Ahmadi-Assalemi G.","year":"2020","unstructured":"G. Ahmadi-Assalemi , \u201c Digital twins for precision healthcare ,\u201d in Advanced Sciences and Technologies for Security Applications , Springer , 2020 , pp. 133\u2013 158 . doi: 10.1007\/978-3-030-35746-7_8. 10.1007\/978-3-030-35746-7_8 G. Ahmadi-Assalemi , \u201cDigital twins for precision healthcare,\u201d in Advanced Sciences and Technologies for Security Applications, Springer, 2020, pp. 133\u2013158. doi: 10.1007\/978-3-030-35746-7_8."},{"key":"e_1_3_2_1_7_1","volume-title":"Sustainability (Switzerland)","volume":"12","author":"Dembski F.","unstructured":"F. Dembski , U. W\u00f6ssner , M. Letzgus , M. Ruddat , and C. Yamu , \u201c Urban digital twins for smart cities and citizens: The case study of herrenberg, germany ,\u201d Sustainability (Switzerland) , vol. 12 , no. 6, Mar. 2020, doi: 10.3390\/su12062307. 10.3390\/su12062307 F. Dembski, U. W\u00f6ssner, M. Letzgus, M. Ruddat, and C. Yamu, \u201cUrban digital twins for smart cities and citizens: The case study of herrenberg, germany,\u201d Sustainability (Switzerland), vol. 12, no. 6, Mar. 2020, doi: 10.3390\/su12062307."},{"key":"e_1_3_2_1_8_1","volume-title":"Computational Urban Science","volume":"1","author":"Deren L.","unstructured":"L. Deren , Y. Wenbo , and S. Zhenfeng , \u201c Smart city based on digital twins ,\u201d Computational Urban Science , vol. 1 , no. 1, Dec. 2021, doi: 10.1007\/s43762-021-00005-y. 10.1007\/s43762-021-00005-y L. Deren, Y. Wenbo, and S. Zhenfeng, \u201cSmart city based on digital twins,\u201d Computational Urban Science, vol. 1, no. 1, Dec. 2021, doi: 10.1007\/s43762-021-00005-y."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.agsy.2020.103046"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105942"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2998530"},{"key":"e_1_3_2_1_12_1","volume-title":"Accessed","author":"Nakamoto S.","year":"2017","unstructured":"S. Nakamoto , \u201c Bitcoin: A Peer-to-Peer Electronic Cash System .\u201d Accessed : Jan. 15, 2017 . [Online]. Available : www.bitcoin.org S. Nakamoto, \u201cBitcoin: A Peer-to-Peer Electronic Cash System.\u201d Accessed: Jan. 15, 2017. [Online]. Available: www.bitcoin.org"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.32628\/CSEIT195137"},{"key":"e_1_3_2_1_14_1","first-page":"V5","article-title":"Research on the architecture of Internet of Things","author":"Wu M.","year":"2010","unstructured":"M. Wu , T.-J. Lu , F.-Y. Ling , J. Sun , and H.-Y. Du , \u201c Research on the architecture of Internet of Things ,\u201d in Advanced Computer Theory and Engineering (ICACTE) , 2010 , pp. V5 - 484 -V5-487. M. Wu, T.-J. Lu, F.-Y. Ling, J. Sun, and H.-Y. Du, \u201cResearch on the architecture of Internet of Things,\u201d in Advanced Computer Theory and Engineering (ICACTE), 2010, pp. V5-484-V5-487.","journal-title":"Advanced Computer Theory and Engineering (ICACTE)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579543"},{"key":"e_1_3_2_1_16_1","volume-title":"Future Internet: The Internet of Things Architecture , Possible Applications and Key Challenges","author":"Khan R.","year":"2012","unstructured":"R. Khan , S. U. Khan , R. Zaheer , and S. Khan , \u201c Future Internet: The Internet of Things Architecture , Possible Applications and Key Challenges ,\u201d 2012 , doi: 10.1109\/FIT.2012.53. 10.1109\/FIT.2012.53 R. Khan, S. U. Khan, R. Zaheer, and S. Khan, \u201cFuture Internet: The Internet of Things Architecture , Possible Applications and Key Challenges,\u201d 2012, doi: 10.1109\/FIT.2012.53."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"issue":"12","key":"e_1_3_2_1_18_1","first-page":"1","article-title":"IoT privacy and security: Challenges and solutions","volume":"10","author":"Tawalbeh L.","year":"2020","unstructured":"L. Tawalbeh , F. Muheidat , M. Tawalbeh , and M. Quwaider , \u201c IoT privacy and security: Challenges and solutions ,\u201d Applied Sciences (Switzerland) , vol. 10 , no. 12 , pp. 1 \u2013 17 , 2020 , doi: 10.3390\/APP10124102. 10.3390\/APP10124102 L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, \u201cIoT privacy and security: Challenges and solutions,\u201d Applied Sciences (Switzerland), vol. 10, no. 12, pp. 1\u201317, 2020, doi: 10.3390\/APP10124102.","journal-title":"Applied Sciences (Switzerland)"},{"key":"e_1_3_2_1_19_1","volume-title":"Apr. 04, 2023. https:\/\/learn.microsoft.com\/en-us\/azure\/digital-twins\/concepts-models (accessed","year":"2023","unstructured":"Microsoft , \u201c Learn about twin models and how to define them in Azure Digital Twins ,\u201d Apr. 04, 2023. https:\/\/learn.microsoft.com\/en-us\/azure\/digital-twins\/concepts-models (accessed May 02, 2023 ). Microsoft, \u201cLearn about twin models and how to define them in Azure Digital Twins,\u201d Apr. 04, 2023. https:\/\/learn.microsoft.com\/en-us\/azure\/digital-twins\/concepts-models (accessed May 02, 2023)."},{"key":"e_1_3_2_1_20_1","volume-title":"What is a digital twin?","author":"IBM","year":"2023","unstructured":"IBM , \u201c What is a digital twin? \u201d https:\/\/www.ibm.com\/topics\/what-is-a-digital-twin#:\u223c:text=The%20difference%20between%20digital%20twin,order%20to%20study%20multiple%20processes. (accessed Apr. 25, 2023 ). IBM, \u201cWhat is a digital twin?\u201d https:\/\/www.ibm.com\/topics\/what-is-a-digital-twin#:\u223c:text=The%20difference%20between%20digital%20twin,order%20to%20study%20multiple%20processes. (accessed Apr. 25, 2023)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/buildings11040151"},{"key":"e_1_3_2_1_22_1","volume-title":"Computer","volume":"52","author":"Saracco R.","unstructured":"R. Saracco , \u201c Digital Twins: Bridging Physical Space and Cyberspace ,\u201d Computer , vol. 52 , no. 12. IEEE Computer Society, pp. 58\u201364, Dec. 01, 2019. doi: 10.1109\/MC.2019.2942803. 10.1109\/MC.2019.2942803 R. Saracco, \u201cDigital Twins: Bridging Physical Space and Cyberspace,\u201d Computer, vol. 52, no. 12. IEEE Computer Society, pp. 58\u201364, Dec. 01, 2019. doi: 10.1109\/MC.2019.2942803."},{"key":"e_1_3_2_1_23_1","volume-title":"Energies","volume":"14","author":"Ptak A.","unstructured":"A. Ptak , \u201c Smart city management in the context of electricity consumption savings ,\u201d Energies ( Basel) , vol. 14 , no. 19, 2021, doi: 10.3390\/en14196170. 10.3390\/en14196170 A. Ptak, \u201cSmart city management in the context of electricity consumption savings,\u201d Energies (Basel), vol. 14, no. 19, 2021, doi: 10.3390\/en14196170."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/861998"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361070"},{"key":"e_1_3_2_1_27_1","volume-title":"Guide to Attribute Based Access Control ( ABAC ) Definition and Considerations ( Draft )","author":"Hu V. C.","year":"2013","unstructured":"V. C. Hu , A. R. Friedman , A. J. Lang , M. M. Cogdell , K. Scarfone , and R. Kuhn , \u201c Guide to Attribute Based Access Control ( ABAC ) Definition and Considerations ( Draft ) ,\u201d 2013 . V. C. Hu, A. R. Friedman, A. J. Lang, M. M. Cogdell, K. Scarfone, and R. Kuhn, \u201cGuide to Attribute Based Access Control ( ABAC ) Definition and Considerations ( Draft ),\u201d 2013."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/357980.357993"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/538134"},{"key":"e_1_3_2_1_30_1","first-page":"15","volume-title":"Access Control & IoT: Capability Based Authorization Access Control System","author":"Rotondi D.","year":"2011","unstructured":"D. Rotondi and C. Seccia , \u201c Access Control & IoT: Capability Based Authorization Access Control System ,\u201d pp. 1\u2013 15 , 2011 . D. Rotondi and C. Seccia, \u201cAccess Control & IoT: Capability Based Authorization Access Control System,\u201d pp. 1\u201315, 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516241.1516285"},{"key":"e_1_3_2_1_32_1","series-title":"Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST","first-page":"42","volume-title":"A cooperative RBAC-based IoTs server with trust evaluation mechanism","author":"Chen H. C.","year":"2018","unstructured":"H. C. Chen , \u201c A cooperative RBAC-based IoTs server with trust evaluation mechanism ,\u201d in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST , Springer International Publishing , 2018 , pp. 36\u2013 42 . doi: 10.1007\/978-3-030-00410-1_5. 10.1007\/978-3-030-00410-1_5 H. C. Chen, \u201cA cooperative RBAC-based IoTs server with trust evaluation mechanism,\u201d in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer International Publishing, 2018, pp. 36\u201342. doi: 10.1007\/978-3-030-00410-1_5."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180457.3180464"},{"key":"e_1_3_2_1_34_1","first-page":"212","volume-title":"ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things","author":"Antonio S.","year":"2020","unstructured":"S. Antonio and R. Sandhu , \u201c ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things ,\u201d pp. 203\u2013 212 , 2020 . S. Antonio and R. Sandhu, \u201cABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things,\u201d pp. 203\u2013212, 2020."},{"key":"e_1_3_2_1_35_1","first-page":"113","volume-title":"Proceedings - 17th ACM\/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2018","author":"Neto A. L. M.","year":"2018","unstructured":"A. L. M. Neto , Y. L. Pereira , A. L. F. Souza , I. Cunha , and L. B. Oliveira , \u201c Demo Abstract: Attributed-Based Authentication and Access Control for IoT Home Devices ,\u201d Proceedings - 17th ACM\/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2018 , pp. 112\u2013 113 , 2018 , doi: 10.1109\/IPSN.2018.00019. 10.1109\/IPSN.2018.00019 A. L. M. Neto, Y. L. Pereira, A. L. F. Souza, I. Cunha, and L. B. Oliveira, \u201cDemo Abstract: Attributed-Based Authentication and Access Control for IoT Home Devices,\u201d Proceedings - 17th ACM\/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2018, pp. 112\u2013113, 2018, doi: 10.1109\/IPSN.2018.00019."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"e_1_3_2_1_37_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","first-page":"219","volume-title":"A brief survey on IoT privacy: Taxonomy, issues and future trends","author":"Sarwar K.","year":"2019","unstructured":"K. Sarwar , S. Yongchareon , and J. Yu , \u201c A brief survey on IoT privacy: Taxonomy, issues and future trends ,\u201d in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , Springer Verlag , 2019 , pp. 208\u2013 219 . doi: 10.1007\/978-3-030-17642-6_18. 10.1007\/978-3-030-17642-6_18 K. Sarwar, S. Yongchareon, and J. Yu, \u201cA brief survey on IoT privacy: Taxonomy, issues and future trends,\u201d in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 2019, pp. 208\u2013219. doi: 10.1007\/978-3-030-17642-6_18."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.003"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3093573"},{"issue":"9","key":"e_1_3_2_1_40_1","first-page":"1271","article-title":"Blockchain for the IoT: Privacy-preserving protection of sensor data","volume":"20","author":"Chanson M.","year":"2019","unstructured":"M. Chanson , A. Bogner , D. Bilgeri , E. Fleisch , and F. Wortmann , \u201c Blockchain for the IoT: Privacy-preserving protection of sensor data ,\u201d J Assoc Inf Syst , vol. 20 , no. 9 , pp. 1271 \u2013 1307 , 2019 , doi: 10.17705\/1jais.00567. 10.17705\/1jais.00567 M. Chanson, A. Bogner, D. Bilgeri, E. Fleisch, and F. Wortmann, \u201cBlockchain for the IoT: Privacy-preserving protection of sensor data,\u201d J Assoc Inf Syst, vol. 20, no. 9, pp. 1271\u20131307, 2019, doi: 10.17705\/1jais.00567.","journal-title":"J Assoc Inf Syst"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2983466"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_43"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.09.008"},{"issue":"99","key":"e_1_3_2_1_46_1","first-page":"1","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols and Applications","author":"Al-Fuqaha A.","year":"2015","unstructured":"A. Al-Fuqaha , M. Guizani , M. Mohammadi , M. Aledhari , and M. Ayyash , \u201c Internet of Things: A Survey on Enabling Technologies, Protocols and Applications ,\u201d IEEE Communications Surveys & Tutorials , vol. PP, no. 99 , pp. 1 \u2013 1 , 2015 , doi: 10.1109\/COMST.2015.2444095. 10.1109\/COMST.2015.2444095 A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, \u201cInternet of Things: A Survey on Enabling Technologies, Protocols and Applications,\u201d IEEE Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1\u20131, 2015, doi: 10.1109\/COMST.2015.2444095.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSensT.2017.8304465"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"e_1_3_2_1_49_1","first-page":"436","volume-title":"2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016","author":"Samaniego M.","year":"2017","unstructured":"M. Samaniego and R. Deters , \u201c Blockchain as a Service for IoT ,\u201d in 2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016 , 2017 , pp. 433\u2013 436 . doi: 10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102. 10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102 M. Samaniego and R. Deters, \u201cBlockchain as a Service for IoT,\u201d in 2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016, 2017, pp. 433\u2013436. doi: 10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3010089.3016027"},{"key":"e_1_3_2_1_51_1","volume-title":"Virtual Resources & Internet of Things","author":"Samaniego M.","year":"2016","unstructured":"M. Samaniego , \u201c Virtual Resources & Internet of Things ,\u201d University of Saskatchewan , 2016 . M. Samaniego, \u201cVirtual Resources & Internet of Things,\u201d University of Saskatchewan, 2016."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2018.00011"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209281.3209391"},{"key":"e_1_3_2_1_54_1","volume-title":"Digest of Technical Papers - IEEE International Conference on Consumer Electronics","volume":"2020","author":"Thakker J.","unstructured":"J. Thakker , I. Chang , and Y. Park , \u201c Secure data management in internet-of-things based on blockchain ,\u201d Digest of Technical Papers - IEEE International Conference on Consumer Electronics , vol. 2020-Janua, 2020 , doi: 10.1109\/ICCE46568.2020.9042998. 10.1109\/ICCE46568.2020.9042998 J. Thakker, I. Chang, and Y. Park, \u201cSecure data management in internet-of-things based on blockchain,\u201d Digest of Technical Papers - IEEE International Conference on Consumer Electronics, vol. 2020-Janua, 2020, doi: 10.1109\/ICCE46568.2020.9042998."},{"key":"e_1_3_2_1_55_1","volume-title":"Digest of Technical Papers - IEEE International Conference on Consumer Electronics","volume":"2020","author":"Hasegawa Y.","unstructured":"Y. Hasegawa and H. Yamamoto , \u201c Highly reliable IoT data management platform using blockchain and transaction data analysis ,\u201d Digest of Technical Papers - IEEE International Conference on Consumer Electronics , vol. 2020-Janua, 2020 , doi: 10.1109\/ICCE46568.2020.9042994. 10.1109\/ICCE46568.2020.9042994 Y. Hasegawa and H. Yamamoto, \u201cHighly reliable IoT data management platform using blockchain and transaction data analysis,\u201d Digest of Technical Papers - IEEE International Conference on Consumer Electronics, vol. 2020-Janua, 2020, doi: 10.1109\/ICCE46568.2020.9042994."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-219"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChinaW.2019.8849969"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19092042"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2933482"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00031"},{"key":"e_1_3_2_1_61_1","first-page":"176","volume-title":"ICETE 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications","volume":"2","author":"Laurent M.","year":"2018","unstructured":"M. Laurent , N. Kaaniche , C. Le , and M. vander Plaetse , \u201cA blockchain based access control scheme ,\u201d ICETE 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications , vol. 2 , no. July , pp. 168\u2013 176 , 2018 , doi: 10.5220\/0006855601680176. 10.5220\/0006855601680176 M. Laurent, N. Kaaniche, C. Le, and M. vander Plaetse, \u201cA blockchain based access control scheme,\u201d ICETE 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, vol. 2, no. July, pp. 168\u2013176, 2018, doi: 10.5220\/0006855601680176."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"e_1_3_2_1_63_1","first-page":"99","article-title":"Blockchain based proxy re-encryption scheme for secure IoT data sharing","author":"Manzoor A.","year":"2018","unstructured":"A. Manzoor , M. Liyanage , A. Braeken , S. S. Kanhere , and M. Ylianttila , \u201c Blockchain based proxy re-encryption scheme for secure IoT data sharing ,\u201d ArXiv , pp. 99 \u2013 103 , 2018 . A. Manzoor, M. Liyanage, A. Braeken, S. S. Kanhere, and M. Ylianttila, \u201cBlockchain based proxy re-encryption scheme for secure IoT data sharing,\u201d ArXiv, pp. 99\u2013103, 2018.","journal-title":"ArXiv"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.036"},{"key":"e_1_3_2_1_65_1","volume-title":"Applied Sciences (Switzerland)","author":"Sultana T.","unstructured":"T. Sultana , A. Almogren , M. Akbar , M. Zuair , I. Ullah , and N. Javaid , \u201c Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices ,\u201d Applied Sciences (Switzerland) , vol. 10 , no. 2, 2020, doi: 10.3390\/app10020488. 10.3390\/app10020488 T. Sultana, A. Almogren, M. Akbar, M. Zuair, I. Ullah, and N. Javaid, \u201cData sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices,\u201d Applied Sciences (Switzerland), vol. 10, no. 2, 2020, doi: 10.3390\/app10020488."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896065"},{"issue":"5","key":"e_1_3_2_1_68_1","first-page":"1","article-title":"A secured proxy-based data sharing module in IoT environments using blockchain","volume":"19","author":"Agyekum K. O. B. O.","year":"2019","unstructured":"K. O. B. O. Agyekum , \u201c A secured proxy-based data sharing module in IoT environments using blockchain ,\u201d Sensors (Switzerland) , vol. 19 , no. 5 , pp. 1 \u2013 20 , 2019 , doi: 10.3390\/s19051235. 10.3390\/s19051235 K. O. B. O. Agyekum , \u201cA secured proxy-based data sharing module in IoT environments using blockchain,\u201d Sensors (Switzerland), vol. 19, no. 5, pp. 1\u201320, 2019, doi: 10.3390\/s19051235.","journal-title":"Sensors (Switzerland)"},{"key":"e_1_3_2_1_69_1","volume-title":"Neural Comput Appl","volume":"0123456789","author":"Yaqoob I.","year":"2021","unstructured":"I. Yaqoob , K. Salah , R. Jayaraman , and Y. Al-Hammadi , \u201c Blockchain for healthcare data management: opportunities, challenges, and future recommendations ,\u201d Neural Comput Appl , vol. 0123456789 , 2021 , doi: 10.1007\/s00521-020-05519-w. 10.1007\/s00521-020-05519-w I. Yaqoob, K. Salah, R. Jayaraman, and Y. Al-Hammadi, \u201cBlockchain for healthcare data management: opportunities, challenges, and future recommendations,\u201d Neural Comput Appl, vol. 0123456789, 2021, doi: 10.1007\/s00521-020-05519-w."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.36548\/jismac.2020.3.003"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57997-5_26"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1137-0_3"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICCC.2017.9"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00019"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5383\/JUSPN.09.02.001"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.022"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.38"},{"key":"e_1_3_2_1_78_1","first-page":"377","volume-title":"Detecting Suspicious Transactions in IoT Blockchains for Smart Living Spaces","author":"Samaniego M.","year":"2019","unstructured":"M. Samaniego and R. Deters , \u201c Detecting Suspicious Transactions in IoT Blockchains for Smart Living Spaces ,\u201d Springer International Publishing , 2019 , pp. 364\u2013 377 . doi: 10.1007\/978-3-030-19945-6. 10.1007\/978-3-030-19945-6 M. Samaniego and R. Deters, \u201cDetecting Suspicious Transactions in IoT Blockchains for Smart Living Spaces,\u201d Springer International Publishing, 2019, pp. 364\u2013377. doi: 10.1007\/978-3-030-19945-6."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900661"},{"key":"e_1_3_2_1_80_1","first-page":"283","volume-title":"Advances in Computers","author":"Raj P.","year":"2021","unstructured":"P. Raj , \u201c Empowering digital twins with blockchain ,\u201d in Advances in Computers , Academic Press Inc ., 2021 , pp. 267\u2013 283 . doi: 10.1016\/bs.adcom.2020.08.013. 10.1016\/bs.adcom.2020.08.013 P. Raj, \u201cEmpowering digital twins with blockchain,\u201d in Advances in Computers, Academic Press Inc., 2021, pp. 267\u2013283. doi: 10.1016\/bs.adcom.2020.08.013."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517189"},{"key":"e_1_3_2_1_82_1","volume-title":"What is REST?","author":"Fredrich T.","year":"2016","unstructured":"T. Fredrich , \u201c What is REST? \u201d http:\/\/www.restapitutorial.com\/lessons\/whatisrest.html (accessed Oct. 26, 2016 ). T. Fredrich, \u201cWhat is REST?\u201d http:\/\/www.restapitutorial.com\/lessons\/whatisrest.html (accessed Oct. 26, 2016)."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/1360086042000276762"},{"key":"e_1_3_2_1_84_1","volume-title":"The Go Programming Language","year":"2016","unstructured":"Golang.org , \u201c The Go Programming Language ,\u201d 2016 . https:\/\/golang.org\/pkg\/crypto\/rsa\/#example_EncryptOAEP (accessed Aug. 12, 2017). Golang.org, \u201cThe Go Programming Language,\u201d 2016. https:\/\/golang.org\/pkg\/crypto\/rsa\/#example_EncryptOAEP (accessed Aug. 12, 2017)."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"e_1_3_2_1_86_1","volume-title":"Hypertext Transfer Protocol: Message Syntax and Routing","author":"Fielding R.","year":"2014","unstructured":"R. Fielding and J. Reschke , Eds. , \u201c Hypertext Transfer Protocol: Message Syntax and Routing ,\u201d Jun. 2014 . doi: 10.17487\/rfc7230. 10.17487\/rfc7230 R. Fielding and J. Reschke, Eds., \u201cHypertext Transfer Protocol: Message Syntax and Routing,\u201d Jun. 2014. doi: 10.17487\/rfc7230."},{"key":"e_1_3_2_1_87_1","volume-title":"The Solidity Contract-Oriented Programming Language","year":"2023","unstructured":"\u201c The Solidity Contract-Oriented Programming Language .\u201d https:\/\/github.com\/ethereum\/solidity (accessed Mar. 17, 2023 ). \u201cThe Solidity Contract-Oriented Programming Language.\u201d https:\/\/github.com\/ethereum\/solidity (accessed Mar. 17, 2023)."},{"key":"e_1_3_2_1_88_1","volume-title":"Understanding event logs on the Ethereum blockchain","author":"Hollander L.","year":"2020","unstructured":"L. Hollander , \u201c Understanding event logs on the Ethereum blockchain ,\u201d 2020 . https:\/\/medium.com\/mycrypto\/understanding-event-logs-on-the-ethereum-blockchain-f4ae7ba50378 (accessed Dec. 11, 2022). L. Hollander, \u201cUnderstanding event logs on the Ethereum blockchain,\u201d 2020. https:\/\/medium.com\/mycrypto\/understanding-event-logs-on-the-ethereum-blockchain-f4ae7ba50378 (accessed Dec. 11, 2022)."},{"key":"e_1_3_2_1_89_1","volume-title":"web3.js","year":"2019","unstructured":"\u201c web3.js .\u201d https:\/\/web3js.readthedocs.io\/en\/1.0\/ (accessed Jun. 19, 2019 ). \u201cweb3.js.\u201d https:\/\/web3js.readthedocs.io\/en\/1.0\/ (accessed Jun. 19, 2019)."},{"key":"e_1_3_2_1_90_1","volume-title":"About Node.js","year":"2022","unstructured":"\u201c About Node.js .\u201d https:\/\/nodejs.org\/en\/about (accessed Jul. 30, 2022 ). \u201cAbout Node.js.\u201d https:\/\/nodejs.org\/en\/about (accessed Jul. 30, 2022)."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2016.71"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.849"},{"key":"e_1_3_2_1_93_1","first-page":"269","volume-title":"Electronics and Mobile Communication Conference (IEMCON), IEEE","author":"De Camargo Silva L.","year":"2019","unstructured":"L. De Camargo Silva , M. Samaniego , and R. Deters , \u201c IoT and Blockchain for Smart Locks,\u201d in 2019 IEEE 10th Annual Information Technology , Electronics and Mobile Communication Conference (IEMCON), IEEE , 2019 , pp. 262\u2013 269 . L. De Camargo Silva, M. Samaniego, and R. Deters, \u201cIoT and Blockchain for Smart Locks,\u201d in 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), IEEE, 2019, pp. 262\u2013269."},{"key":"e_1_3_2_1_94_1","volume-title":"Proof-of-Work (POW)","year":"2022","unstructured":"\u201c Proof-of-Work (POW) .\u201d https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pow\/ (accessed Jul. 30, 2022 ). \u201cProof-of-Work (POW).\u201d https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pow\/ (accessed Jul. 30, 2022)."},{"key":"e_1_3_2_1_95_1","volume-title":"Proof-of-Stake (POS)","year":"2022","unstructured":"\u201c Proof-of-Stake (POS) .\u201d https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pos\/ (accessed Jul. 30, 2022 ). \u201cProof-of-Stake (POS).\u201d https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pos\/ (accessed Jul. 30, 2022)."},{"key":"e_1_3_2_1_96_1","volume-title":"Proof of Authority","year":"2022","unstructured":"\u201c Proof of Authority .\u201d https:\/\/medium.com\/coinmonks\/proof-of-authority-ac34f1b3a2c2 (accessed Jul. 30, 2022 ). \u201cProof of Authority.\u201d https:\/\/medium.com\/coinmonks\/proof-of-authority-ac34f1b3a2c2 (accessed Jul. 30, 2022)."},{"key":"e_1_3_2_1_97_1","volume-title":"An Introduction to PBFT Consensus Algorithm","year":"2022","unstructured":"\u201c An Introduction to PBFT Consensus Algorithm .\u201d https:\/\/medium.com\/tronnetwork\/an-introduction-to-pbft-consensus-algorithm-11cbd90aaec (accessed Jul. 30, 2022 ). \u201cAn Introduction to PBFT Consensus Algorithm.\u201d https:\/\/medium.com\/tronnetwork\/an-introduction-to-pbft-consensus-algorithm-11cbd90aaec (accessed Jul. 30, 2022)."}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594611"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":97,"alternative-id":["10.1145\/3594556.3594611","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594611","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}