{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:34:50Z","timestamp":1777566890730,"version":"3.51.4"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:00:00Z","timestamp":1584403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:00:00Z","timestamp":1584403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002553","name":"Seoul National University of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002553","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the advancement of Information and Communication Technology (ICT) and the proliferation of sensor technologies, the Internet of Things (IoT) is now being widely used in smart home for the purposes of efficient resource management and pervasive sensing. In smart homes, various IoT devices are connected to each other, and these connections are centered on gateways. The role of gateways in the smart homes is significant, however, its centralized structure presents multiple security vulnerabilities such as integrity, certification, and availability. To address these security vulnerabilities, in this paper, we propose a blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes. The network consists of three layers including device, gateway, and cloud layers. The blockchain technology is employed at the gateway layer wherein data is stored and exchanged in the form blocks of blockchain to support decentralization and overcome the problem from traditional centralized architecture. The blockchain ensures the integrity of the data inside and outside of the smart home and provides availability through authentication and efficient communication between network members. We implemented the proposed network on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy. The evaluation results demonstrate that the proposed security solutions outperforms over the existing solutions.<\/jats:p>","DOI":"10.1186\/s13673-020-0214-5","type":"journal-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:07:07Z","timestamp":1584403627000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":110,"title":["A blockchain-based smart home gateway architecture for preventing data forgery"],"prefix":"10.1186","volume":"10","author":[{"given":"Younghun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Shailendra","family":"Rathore","sequence":"additional","affiliation":[]},{"given":"Jin Ho","family":"Park","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1831-0309","authenticated-orcid":false,"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,17]]},"reference":[{"key":"214_CR1","doi-asserted-by":"crossref","unstructured":"Sun, R., Xi, J., Yin, C., Wang, J., Kim, G. J. (2018). Location privacy protection research based on querying anonymous region construction for smart campus. Mobile information systems, 2018","DOI":"10.1155\/2018\/3682382"},{"key":"214_CR2","first-page":"13","volume":"15","author":"RJ Robles","year":"2010","unstructured":"Robles RJ, Kim TH, Cook D, Das S (2010) A review on security in smart home development. Int J Adv Sci Technol 15:13\u201322","journal-title":"Int J Adv Sci Technol"},{"issue":"1","key":"214_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-018-0162-5","volume":"9","author":"JH Park","year":"2019","unstructured":"Park JH, Salim MM, Jo JH, Sicato JCS, Rathore S, Park JH (2019) CIoT-Net: a scalable cognitive IoT based smart city network architecture. Human Compu Inf Sci 9(1):1\u201329","journal-title":"Human Compu Inf Sci"},{"issue":"7","key":"214_CR4","first-page":"1468","volume":"19","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ (2019) Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 19(7):1468\u20131494","journal-title":"Sensors"},{"key":"214_CR5","doi-asserted-by":"crossref","unstructured":"Mittal Y, Toshniwal P, Sharma S, Singhal D, Gupta R, Mittal VK (2015) A voice-controlled multi-functional smart home automation system. In: 2015 Annual IEEE India conference (INDICON), 2015","DOI":"10.1109\/INDICON.2015.7443538"},{"key":"214_CR6","doi-asserted-by":"crossref","unstructured":"Schiefer M (2015) Smart home definition and security threats. In: 2015 ninth international conference on IT security incident management & IT forensics, 2015","DOI":"10.1109\/IMF.2015.17"},{"key":"214_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jnca.2016.04.013","volume":"87","author":"B Xiong","year":"2017","unstructured":"Xiong B, Yang K, Zhao J, Li K (2017) Robust dynamic network traffic partitioning against malicious attacks. J Netw Comput Appl 87:20\u201331","journal-title":"J Netw Comput Appl"},{"key":"214_CR8","doi-asserted-by":"crossref","unstructured":"Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 international conference on pervasive computing (ICPC), 2015","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"issue":"4","key":"214_CR9","first-page":"639","volume":"47","author":"K Gu","year":"2018","unstructured":"Gu K, Yang L, Yin B (2018) Location data record privacy protection based on differential privacy mechanism. Inf Technol Control 47(4):639\u2013654","journal-title":"Inf Technol Control"},{"issue":"4","key":"214_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCE.2018.2816745","volume":"7","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Rathore S, Park JH (2018) DistArch-SCNet: blockchain-based distributed architecture with li-fi communication for a scalable smart city network. IEEE Consum Electr Mag 7(4):55\u201364","journal-title":"IEEE Consum Electr Mag"},{"key":"214_CR11","unstructured":"PR Wire (2016) Gartner: blockchain and connected home are almost at the peak of the hype cycle. https:\/\/prwire.com.au\/pr\/62010\/gartner-blockchain-andconnected-home-are-almost-at-the-peak-of-the-hype-cycle. Accessed 28 Dec 2019"},{"key":"214_CR12","first-page":"184","volume":"13","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed blockchain based vehicular network architecture in smart city. JIPS 13:184\u2013195","journal-title":"JIPS"},{"key":"214_CR13","doi-asserted-by":"crossref","unstructured":"Sanchez I, Satta R, Fovino IN, Baldini G, Steri G, Shaw D, Ciardulli A (2014) Privacy leakages in smart home wireless technologies. In: 2014 international carnahan conference on security technology (ICCST), 2014","DOI":"10.1109\/CCST.2014.6986977"},{"key":"214_CR14","doi-asserted-by":"crossref","unstructured":"Ahram T, Sargolzaei A, Sargolzaei S, Daniels J, Amaba B (2017) Blockchain technology innovations. In: 2017 IEEE technology & engineering management conference (TEMSCON), 2017","DOI":"10.1109\/TEMSCON.2017.7998367"},{"issue":"14","key":"214_CR15","doi-asserted-by":"publisher","first-page":"3960","DOI":"10.3390\/su11143974","volume":"11","author":"S Rathore","year":"2019","unstructured":"Rathore S, Pan Y, Park JH (2019) BlockDeepNet: a Blockchain-based secure deep learning for IoT network. Sustainability 11(14):3960\u20133974","journal-title":"Sustainability"},{"key":"214_CR16","first-page":"20694","volume":"6","author":"J Chandramohan","year":"2017","unstructured":"Chandramohan J, Nagarajan R, Satheeshkumar K, Ajithkumar N, Gopinath PA, Ranjithkumar S (2017) Intelligent smart home automation and security system using arduino and Wi-fi. Int J Eng Comput Sci (IJECS) 6:20694\u201320698","journal-title":"Int J Eng Comput Sci (IJECS)"},{"key":"214_CR17","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s11036-017-0866-1","volume":"22","author":"M Chen","year":"2017","unstructured":"Chen M, Yang J, Zhu X, Wang X, Liu M, Song J (2017) Smart home 2.0: innovative smart home system powered by botanical IoT and emotion detection. Mob Netw Appl 22:1159\u20131169","journal-title":"Mob Netw Appl"},{"key":"214_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/info7030044","volume":"7","author":"H Lin","year":"2016","unstructured":"Lin H, Bergmann N (2016) IoT privacy and security challenges for smart home environments. Information 7:1\u201315","journal-title":"Information"},{"key":"214_CR19","first-page":"1","volume":"9","author":"S Singh","year":"2017","unstructured":"Singh S, Sharma PK, Park JH (2017) SH-SecNet: an enhanced secure network architecture for the diagnosis of security threats in a smart home. Sustainability 9:1\u201319","journal-title":"Sustainability"},{"issue":"3","key":"214_CR20","first-page":"1","volume":"11","author":"S He","year":"2017","unstructured":"He S, Zeng W, Xie K, Yang H, Lai M, Su X (2017) PPNC: privacy Preserving Scheme for Random Linear Network Coding in Smart Grid. KSII Transact Internet Inf Sys 11(3):1\u201310","journal-title":"KSII Transact Internet Inf Sys"},{"key":"214_CR21","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.ins.2016.12.050","volume":"390","author":"K Xie","year":"2017","unstructured":"Xie K, Ning X, Wang X, He S, Ning Z, Liu X, Qin Z (2017) An efficient privacy-preserving compressive data gathering scheme in WSNs. Inf Sci 390:82\u201394","journal-title":"Inf Sci"},{"key":"214_CR22","doi-asserted-by":"crossref","unstructured":"Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O (2015) Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), 2015","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"214_CR23","doi-asserted-by":"crossref","unstructured":"Copos B, Levitt K, Bishop M, Rowe J. (2016) Is anybody home? Inferring activity from smart home network traffic. In: 2016 IEEE security and privacy workshops (SPW), 2016","DOI":"10.1109\/SPW.2016.48"},{"key":"214_CR24","doi-asserted-by":"crossref","unstructured":"Lee B, Malik S, Wi S, Lee JH (2016) Firmware verification of embedded devices based on a blockchain. In: international conference on heterogeneous networking for quality, reliability, security and robustness, 2016","DOI":"10.1007\/978-3-319-60717-7_6"},{"key":"214_CR25","doi-asserted-by":"crossref","unstructured":"Bull P, Austin R, Popov E, Sharma M, Watson R (2016) Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), 2016","DOI":"10.1109\/FiCloud.2016.30"},{"issue":"1","key":"214_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/s13673-019-0195-4","volume":"9","author":"C Yin","year":"2019","unstructured":"Yin C, Zhou B, Yin Z, Wang J (2019) Local privacy protection classification based on human-centric computing. Human Comput Inf Sci 9(1):33","journal-title":"Human Comput Inf Sci"},{"key":"214_CR27","unstructured":"Panwar N, Sharma S, Mehrotra S, Krzywiecki \u0141, Venkatasubramanian N (2019) Smart home survey on security and privacy. arXiv preprint. arXiv:1904.05476"},{"key":"214_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2914911","author":"GS Poh","year":"2019","unstructured":"Poh GS, Gope P, Ning J (2019) Privhome: privacy-preserving authenticated communication in smart home environment. IEEE Trans Depend Secur Comput. https:\/\/doi.org\/10.1109\/TDSC.2019.2914911","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"214_CR29","first-page":"3","volume":"182","author":"Z Shouran","year":"2019","unstructured":"Shouran Z, Ashari A, Priyambodo T (2019) Internet of things (IoT) of smart home: privacy and security. Int J Comput Appl 182:3\u20138","journal-title":"Int J Comput Appl"},{"key":"214_CR30","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79\u201389","journal-title":"Appl Soft Comput"},{"issue":"12","key":"214_CR31","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MCOM.2018.1700822","volume":"56","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Rathore S, Jeong YS, Park JH (2018) SoftEdgeNet: SDN based energy-efficient distributed network architecture for edge computing. IEEE Commun Mag 56(12):104\u2013111","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"214_CR32","first-page":"1","volume":"14","author":"NY Kim","year":"2018","unstructured":"Kim NY, Rathore S, Ryu JH, Park JH, Park JH (2018) A survey on cyber physical system security for IoT: issues, challenges, threats, solutions. J Inf Process Syst 14(6):1\u201310","journal-title":"J Inf Process Syst"},{"issue":"3","key":"214_CR33","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1109\/JIOT.2018.2799936","volume":"5","author":"X Huang","year":"2018","unstructured":"Huang X, Yu R, Kang J, Xia Z, Zhang Y (2018) Software defined networking for energy harvesting internet of things. IEEE Internet Things J 5(3):1389\u20131399","journal-title":"IEEE Internet Things J"},{"key":"214_CR34","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.comnet.2014.06.020","volume":"74","author":"CMS Magurawalage","year":"2014","unstructured":"Magurawalage CMS, Yang K, Hu L, Zhang J (2014) Energy-efficient and network-aware offloading algorithm for mobile cloud computing. Comput Netw 74:22\u201333","journal-title":"Comput Netw"},{"key":"214_CR35","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jnca.2019.06.019","volume":"143","author":"S Rathore","year":"2019","unstructured":"Rathore S, Kwon BW, Park JH (2019) BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network. J Netw Comput Appl 143:167\u2013177","journal-title":"J Netw Comput Appl"},{"key":"214_CR36","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TCE.2016.7448561","volume":"62","author":"BC Choi","year":"2016","unstructured":"Choi BC, Lee SH, Na JC, Lee JH (2016) Secure firmware validation and update for consumer devices in home networking. IEEE Trans Consum Electron 62:39\u201344","journal-title":"IEEE Trans Consum Electron"},{"key":"214_CR37","doi-asserted-by":"crossref","unstructured":"Palani K, Holt E, Smith S (2016) Invisible and forgotten: Zero-day blooms in the IoT. In: 2016 IEEE international conference on pervasive computing and communication workshops (PerCom Workshops), 2016","DOI":"10.1109\/PERCOMW.2016.7457163"},{"key":"214_CR38","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: mirai and other botnets. Computer 50:80\u201384","journal-title":"Computer"},{"key":"214_CR39","first-page":"653","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin IC, Liao TC (2017) A survey of blockchain security issues and challenges. IJ Netw Secur 19:653\u2013659","journal-title":"IJ Netw Secur"},{"key":"214_CR40","first-page":"1","volume":"10","author":"MM Salim","year":"2019","unstructured":"Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput 10:1\u201344","journal-title":"J Supercomput"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-020-0214-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-020-0214-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-020-0214-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T22:44:40Z","timestamp":1666133080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-020-0214-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,17]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["214"],"URL":"https:\/\/doi.org\/10.1186\/s13673-020-0214-5","relation":{},"ISSN":["2192-1962"],"issn-type":[{"value":"2192-1962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,17]]},"assertion":[{"value":"29 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"9"}}