{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:07Z","timestamp":1773615787739,"version":"3.50.1"},"reference-count":38,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701001","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:54Z","timestamp":1741962174000},"page":"1336-1342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Application of Distributed Ledger Technology to Ensure the Security of Smart City Information Systems"],"prefix":"10.3103","volume":"58","author":[{"given":"M. O.","family":"Kalinin","sequence":"first","affiliation":[]},{"given":"A. G.","family":"Busygin","sequence":"additional","affiliation":[]},{"given":"A. S.","family":"Konoplev","sequence":"additional","affiliation":[]},{"given":"V. M.","family":"Krundyshev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7799_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.2478\/emj-2019-0012","volume":"11","author":"J. Winkowska","year":"2019","unstructured":"Winkowska, J., Szpilko, D., and Peji\u0107, S., Smart city concept in the light of the literature review, Engineering Management in Production and Services, 2019, vol. 11, no. 2, pp. 70\u201386. https:\/\/doi.org\/10.2478\/emj-2019-0012","journal-title":"Engineering Management in Production and Services"},{"key":"7799_CR2","doi-asserted-by":"publisher","first-page":"86448","DOI":"10.1109\/access.2020.2992441","volume":"8","author":"A. Kirimtat","year":"2020","unstructured":"Kirimtat, A., Krejcar, O., Kertesz, A., and Tasgetiren, M.F., Future trends and current state of smart city concepts: A survey, IEEE Access, 2020, vol. 8, pp. 86448\u201386467. https:\/\/doi.org\/10.1109\/access.2020.2992441","journal-title":"IEEE Access"},{"key":"7799_CR3","doi-asserted-by":"publisher","unstructured":"Li, Sh., Application of blockchain technology in smart city infrastructure, 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), Xi\u2019an, China, 2018, IEEE, 2018, pp. 276\u20132766. https:\/\/doi.org\/10.1109\/smartiot.2018.00056","DOI":"10.1109\/smartiot.2018.00056"},{"key":"7799_CR4","doi-asserted-by":"publisher","unstructured":"Majdoubi, D.E., El Bakkali, H., and Sadki, S., Towards smart blockchain-based system for privacy and security in a smart city environment, 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), Marrakesh, Morocco, 2020, IEEE, 2020, pp. 1\u20137. https:\/\/doi.org\/10.1109\/cloudtech49835.2020.9365905","DOI":"10.1109\/cloudtech49835.2020.9365905"},{"key":"7799_CR5","doi-asserted-by":"publisher","unstructured":"El Ioini, N. and Pahl, C., A review of distributed ledger technologies, On the Move to Meaningful Internet Systems. OTM 2018 Conferences, Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., and Meersman, R., Eds., Lecture Notes in Computer Science, vol. 11230, Cham: Springer, 2018, pp. 277\u2013288. https:\/\/doi.org\/10.1007\/978-3-030-02671-4_16","DOI":"10.1007\/978-3-030-02671-4_16"},{"key":"7799_CR6","doi-asserted-by":"publisher","unstructured":"Chinnasamy, P., Vinothini, C., Arun Kumar, S., Allwyn Sundarraj, A., Annlin Jeba, S.V., and Praveena, V., Blockchain technology in smart-cities, Blockchain Technology: Applications and Challenges, Panda, S.K., Jena, A.K., Swain, S.K., and Satapathy, S.C., Eds., Intelligent Systems Reference Library, vol. 203, Cham: Springer, 2021, pp. 179\u2013200. https:\/\/doi.org\/10.1007\/978-3-030-69395-4_11","DOI":"10.1007\/978-3-030-69395-4_11"},{"key":"7799_CR7","doi-asserted-by":"publisher","unstructured":"Tekeoglu, A. and Ahmed, N., TangoChain: A lightweight distributed ledger for Internet of Things devices in smart cities, 2019 IEEE International Smart Cities Conference (ISC2), Casablanca, Morocco, 2019, IEEE, 2019, pp. 18\u201321. https:\/\/doi.org\/10.1109\/isc246665.2019.9071753","DOI":"10.1109\/isc246665.2019.9071753"},{"key":"7799_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/mnet.001.1900178","volume":"34","author":"S. Hakak","year":"2020","unstructured":"Hakak, S., Khan, W.Z., Gilkar, G.A., Imran, M., and Guizani, N., Securing smart cities through blockchain technology: Architecture, requirements, and challenges, IEEE Network, 2020, vol. 34, no. 1, pp. 8\u201314. https:\/\/doi.org\/10.1109\/mnet.001.1900178","journal-title":"IEEE Network"},{"key":"7799_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.31585\/jbba-3-1-(7)2020","volume":"3","author":"P. Moro","year":"2020","unstructured":"Moro, P., Duke, E., and Duke, A.K., Distributed ledger technologies and the Internet of Things: A devices attestation system for smart cities, J. Br. Blockchain Assoc., 2020, vol. 3, no. 1, pp. 1\u20137. https:\/\/doi.org\/10.31585\/jbba-3-1-(7)2020","journal-title":"J. Br. Blockchain Assoc."},{"key":"7799_CR10","doi-asserted-by":"publisher","first-page":"4636","DOI":"10.3390\/s20164636","volume":"20","author":"J.V. Botello","year":"2020","unstructured":"Botello, J.V., Mesa, A.P., Rodr\u00edguez, F.A., D\u00edaz-L\u00f3pez, D., Nespoli, P., and M\u00e1rmol, F.G., BlockSIEM: Protecting smart city services through a blockchain-based and distributed SIEM, Sensors, 2020, vol. 20, no. 16, p. 4636. https:\/\/doi.org\/10.3390\/s20164636","journal-title":"Sensors"},{"key":"7799_CR11","doi-asserted-by":"publisher","first-page":"10953","DOI":"10.1109\/jsen.2019.2935035","volume":"19","author":"B. Alotaibi","year":"2019","unstructured":"Alotaibi, B., Utilizing blockchain to overcome cyber security concerns in the Internet of Things: A review, IEEE Sens. J., 2019, vol. 19, no. 23, pp. 10953\u201310971. https:\/\/doi.org\/10.1109\/jsen.2019.2935035","journal-title":"IEEE Sens. J."},{"key":"7799_CR12","doi-asserted-by":"publisher","unstructured":"Ahi, A. and Singh, A.V., Role of distributed ledger technology (DLT) to enhance resiliency in Internet of Things (IoT) ecosystem, 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 2019, IEEE, 2019, pp. 782\u2013786. https:\/\/doi.org\/10.1109\/aicai.2019.8701282","DOI":"10.1109\/aicai.2019.8701282"},{"key":"7799_CR13","doi-asserted-by":"publisher","first-page":"102355","DOI":"10.1016\/j.cose.2021.102355","volume":"108","author":"M. Ali","year":"2021","unstructured":"Ali, M., Karimipour, H., and Tariq, M., Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges, Comput. Secur., 2021, vol. 108, p. 102355. https:\/\/doi.org\/10.1016\/j.cose.2021.102355","journal-title":"Comput. Secur."},{"key":"7799_CR14","doi-asserted-by":"publisher","unstructured":"Paul, R., Baidya, P., Sau, S., Maity, K., Maity, S., and Mandal, S.B., IoT based secure smart city architecture using blockchain, 2nd International Conference on Data Science and Business Analytics (ICDSBA), Changsha, China, 2018, IEEE, 2018, pp. 215\u2013220. https:\/\/doi.org\/10.1109\/ICDSBA.2018.00045","DOI":"10.1109\/ICDSBA.2018.00045"},{"key":"7799_CR15","doi-asserted-by":"publisher","unstructured":"Ali, M.S., Dolui, K., and Antonelli, F., IoT data privacy via blockchains and IPFS, Proceedings of the Seventh International Conference on the Internet of Things, Linz, Austria, 2017, New York: Association for Computing Machinery, 2017, p. 14. https:\/\/doi.org\/10.1145\/3131542.3131563","DOI":"10.1145\/3131542.3131563"},{"key":"7799_CR16","doi-asserted-by":"publisher","first-page":"6143","DOI":"10.1109\/jiot.2020.2977196","volume":"7","author":"D.V. Medhane","year":"2020","unstructured":"Medhane, D.V., Sangaiah, A.K., Hossain, M.Sh., Muhammad, G., and Wang, J., Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach, IEEE Internet Things J., 2020, vol. 7, no. 7, pp. 6143\u20136149. https:\/\/doi.org\/10.1109\/jiot.2020.2977196","journal-title":"IEEE Internet Things J."},{"key":"7799_CR17","doi-asserted-by":"publisher","first-page":"13938","DOI":"10.1109\/access.2021.3051602","volume":"9","author":"S. Singh","year":"2021","unstructured":"Singh, S., Hosen, A.S.M.S., and Yoon, B., Blockchain security attacks, challenges, and solutions for the future distributed IoT network, IEEE Access, 2021, vol. 9, pp. 13938\u201313959. https:\/\/doi.org\/10.1109\/access.2021.3051602","journal-title":"IEEE Access"},{"key":"7799_CR18","unstructured":"Chenxin, L., Chenxin, L., Peilun, L., Dong, Z., Zhe, Y., Ming, W., Guang, Y., Wei, X., Fan, L., and Andrew, C.Y., A decentralized blockchain with high throughput and fast confirmation, USENIX ATC\u201920: Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, Berkeley, CA: USENIX Association, 2020, pp. 515\u2013528."},{"key":"7799_CR19","doi-asserted-by":"publisher","unstructured":"Nicolas, K. and Wang, Yi., A novel double spending attack countermeasure in blockchain, 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, 2019, IEEE, 2019, pp. 383\u2013388. https:\/\/doi.org\/10.1109\/UEMCON47517.2019.8992991","DOI":"10.1109\/UEMCON47517.2019.8992991"},{"key":"7799_CR20","doi-asserted-by":"publisher","first-page":"352","DOI":"10.18178\/ijmlc.2020.10.2.942","volume":"10","author":"A. Begum","year":"2020","unstructured":"Begum, A., Begum, A., Tareq, A.H., Sultana, M., Sohel, M.K., Rahman, T., and Sarwar, A.H., Blockchain attacks, analysis and a model to solve double spending attack, International Journal of Machine Learning and Computing, 2020, vol. 10, no. 2, pp. 352\u2013357. https:\/\/doi.org\/10.18178\/ijmlc.2020.10.2.942","journal-title":"International Journal of Machine Learning and Computing"},{"key":"7799_CR21","doi-asserted-by":"publisher","first-page":"809","DOI":"10.3103\/s0146411616080241","volume":"50","author":"D.P. Zegzhda","year":"2016","unstructured":"Zegzhda, D.P., Stepanova, T.V., and Suprun, A.F., Multiagent system controllability evaluation using the multilevel structure of the graph of agents, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 809\u2013812. https:\/\/doi.org\/10.3103\/s0146411616080241","journal-title":"Autom. Control Comput. Sci."},{"key":"7799_CR22","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.3390\/app9091788","volume":"9","author":"S. Sayeed","year":"2019","unstructured":"Sayeed, S. and Marco-Gisbert, H., Assessing blockchain consensus and security mechanisms against the 51%\u00a0attack, Appl. Sci., 2019, vol. 9, no. 9, p. 1788. https:\/\/doi.org\/10.3390\/app9091788","journal-title":"Appl. Sci."},{"key":"7799_CR23","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.icte.2019.08.002","volume":"7","author":"O. Pal","year":"2021","unstructured":"Pal, O., Alam, B., Thakur, V., and Singh, S., Key management for blockchain technology, ICT Express, 2021, vol. 7, no. 1, pp. 76\u201380. https:\/\/doi.org\/10.1016\/j.icte.2019.08.002","journal-title":"ICT Express"},{"key":"7799_CR24","doi-asserted-by":"publisher","unstructured":"Bhushan, B. and Sharma, N., Transaction privacy preservations for blockchain technology, International Conference on Innovative Computing and Communications, Gupta, D., Khanna, A., Bhattacharyya, S., Hassanien, A.E., Anand, S., and Jaiswal, A., Eds., Advances in Intelligent Systems and Computing, vol. 1166, Singapore: Springer, 2021, pp. 377\u2013393. https:\/\/doi.org\/10.1007\/978-981-15-5148-2_34","DOI":"10.1007\/978-981-15-5148-2_34"},{"key":"7799_CR25","doi-asserted-by":"publisher","unstructured":"Nicolas, K., Wang, Yi., and Giakos, G.C., Comprehensive overview of selfish mining and double spending attack countermeasures, 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, 2019, IEEE, 2019, pp. 1\u20136. https:\/\/doi.org\/10.1109\/Sarnoff47838.2019.9067821","DOI":"10.1109\/Sarnoff47838.2019.9067821"},{"key":"7799_CR26","doi-asserted-by":"publisher","unstructured":"Aleksandrova, E., Pendrikova, O., Shtyrkina, A., Shkorkina, E., Yarmak, A., and Tick, J., Threshold isogeny-based group authentication scheme, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 117\u2013126. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_10","DOI":"10.1007\/978-3-030-93872-7_10"},{"key":"7799_CR27","doi-asserted-by":"publisher","unstructured":"Xing, Q., Wang, B., and Wang, X., POSTER: BGPCoin: A trustworthy blockchain-based resource management solution for BGP security, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, 2017, New York: Association for Computing Machinery, 2017, pp. 2591\u20132593. https:\/\/doi.org\/10.1145\/3133956.3138828","DOI":"10.1145\/3133956.3138828"},{"key":"7799_CR28","doi-asserted-by":"publisher","unstructured":"Swathi, P., Modi, Ch., and Patel, D., Preventing sybil attack in blockchain using distributed behavior monitoring of miners, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 2019, IEEE, 2019, pp. 1\u20136. https:\/\/doi.org\/10.1109\/icccnt45670.2019.8944507","DOI":"10.1109\/icccnt45670.2019.8944507"},{"key":"7799_CR29","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.3390\/s22031094","volume":"22","author":"Z. Shah","year":"2022","unstructured":"Shah, Z., Ullah, I., Li, H., Levula, A., and Khurshid, Kh., Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): A survey, Sensors, 2022, vol. 22, no. 3, p. 1094. https:\/\/doi.org\/10.3390\/s22031094","journal-title":"Sensors"},{"key":"7799_CR30","doi-asserted-by":"publisher","first-page":"948","DOI":"10.3103\/s0146411619080078","volume":"53","author":"A.D. Dakhnovich","year":"2019","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., An approach to building cyber-resistant interactions in the industrial Internet of Things, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 948\u2013953. https:\/\/doi.org\/10.3103\/s0146411619080078","journal-title":"Autom. Control Comput. Sci."},{"key":"7799_CR31","first-page":"194","volume":"17","author":"E.B. Aleksandrova","year":"2014","unstructured":"Aleksandrova, E.B., Vasilev, P.N., and Rezedinova, E.U., Extended dynamic revocable BBS group signature scheme, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 2, pp. 194\u2013202.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7799_CR32","doi-asserted-by":"publisher","first-page":"772","DOI":"10.3390\/s21030772","volume":"21","author":"H. Honar Pajooh","year":"2021","unstructured":"Honar Pajooh, H., Rashid, M., Alam, F., and Demidenko, S., Multi-layer blockchain-based security architecture for Internet of Things, Sensors, 2021, vol. 21, no. 3, p. 772. https:\/\/doi.org\/10.3390\/s21030772","journal-title":"Sensors"},{"key":"7799_CR33","doi-asserted-by":"publisher","first-page":"102468","DOI":"10.1016\/j.ipm.2020.102468","volume":"58","author":"Ch. Esposito","year":"2021","unstructured":"Esposito, Ch., Ficco, M., and Gupta, B.B., Blockchain-based authentication and authorization for smart city applications, Inf. Process. Manage., 2021, vol. 58, no. 2, p. 102468. https:\/\/doi.org\/10.1016\/j.ipm.2020.102468","journal-title":"Inf. Process. Manage."},{"key":"7799_CR34","doi-asserted-by":"publisher","unstructured":"El Majdoubi, D., El Bakkali, H., and Sadki, S., Towards smart blockchain-based system for privacy and security in a smart city environment, 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), Marrakesh, Morocco, 2020, IEEE, 2020, pp. 1\u20137. https:\/\/doi.org\/10.1109\/cloudtech49835.2020.9365905","DOI":"10.1109\/cloudtech49835.2020.9365905"},{"key":"7799_CR35","doi-asserted-by":"publisher","first-page":"106581","DOI":"10.1016\/j.compeleceng.2020.106581","volume":"83","author":"F. Shahid","year":"2020","unstructured":"Shahid, F., Khan, A., and Jeon, G., Post-quantum distributed ledger for internet of things, Comput. Electr. Eng., 2020, vol. 83, p. 106581. https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106581","journal-title":"Comput. Electr. Eng."},{"key":"7799_CR36","doi-asserted-by":"publisher","first-page":"101653","DOI":"10.1016\/j.cose.2019.101653","volume":"88","author":"I. Makhdoom","year":"2020","unstructured":"Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., and Ni, W., PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities, Comput. Secur., 2020, vol. 88, p. 101653. https:\/\/doi.org\/10.1016\/j.cose.2019.101653","journal-title":"Comput. Secur."},{"key":"7799_CR37","doi-asserted-by":"publisher","first-page":"405","DOI":"10.33581\/1561-4085-2020-23-4-405-413","volume":"23","author":"E.B. Aleksandrova","year":"2019","unstructured":"Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Post-quantum group-oriented authentication in IoT, Nonlinear Phenom. Complex Syst., 2019, vol. 23, no. 4, pp. 405\u2013413. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-405-413","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7799_CR38","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/IOTM.001.2100043","volume":"4","author":"Q. Yang","year":"2021","unstructured":"Yang, Q., Wang, H., Wu, X., Wang, T., Zhang, S., and Liu, N., Secure blockchain platform for industrial IoT with trusted computing hardware, IEEE Internet Things Mag., 2021, vol. 4, no. 4, pp. 86\u201392. https:\/\/doi.org\/10.1109\/IOTM.001.2100043","journal-title":"IEEE Internet Things Mag."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701001.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701001","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701001.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:35Z","timestamp":1773612275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":38,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7799"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701001","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"3 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The autors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}